By Topic

Computer

Issue 4 • Apr. 2016

Filter Results

Displaying Results 1 - 25 of 28
  • Front Cover 
  • Front Cover

    Publication Year: 2016, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1957 KB)
    Freely Available from IEEE
  • Move Your Career Forward IEEE Computer Society Membership

    Publication Year: 2016, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (187 KB)
    Freely Available from IEEE
  • Table of Contents 
  • Table of Contents

    Publication Year: 2016, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (1380 KB)
    Freely Available from IEEE
  • Masthead 
  • Masthead

    Publication Year: 2016, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • Elsewhere in the CS 
  • Computer Highlights Society Magazines

    Publication Year: 2016, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (1684 KB)
    Freely Available from IEEE
  • 70th Anniversary Milestones 
  • Computer Society Publications

    Publication Year: 2016, Page(s):8 - 9
    Request permission for commercial reuse | PDF file iconPDF (1269 KB) | HTML iconHTML
    Freely Available from IEEE
  • Computing and the Law 
  • The Need for Speed

    Publication Year: 2016, Page(s):10 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (841 KB) | HTML iconHTML

    Getting a patent through the US patent application process generally takes two to three years, but there are ways to accelerate that process if you're in a hurry. The Web extra at https://youtu.be/pnPksToYXDA is an audio recording of author Brian M. Gaff reading his column. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computing Conversations 
  • Bruce Schneier: Building Cryptographic Systems

    Publication Year: 2016, Page(s):13 - 15
    Request permission for commercial reuse | PDF file iconPDF (811 KB) | HTML iconHTML
    Freely Available from IEEE
  • 32 & 16 Years Ago 
  • 32 & 16 Years Ago

    Publication Year: 2016, Page(s):16 - 17
    Request permission for commercial reuse | PDF file iconPDF (925 KB) | HTML iconHTML
    Freely Available from IEEE
  • Spotlight on Transactions 
  • Cross-Domain Data Fusion

    Publication Year: 2016, Page(s): 18
    Request permission for commercial reuse | PDF file iconPDF (502 KB)
    Freely Available from IEEE
  • Call for Papers

    Publication Year: 2016, Page(s): 19
    Request permission for commercial reuse | PDF file iconPDF (188 KB)
    Freely Available from IEEE
  • Guest Editors' Introduction 
  • Big Data

    Publication Year: 2016, Page(s):20 - 22
    Request permission for commercial reuse | PDF file iconPDF (2210 KB) | HTML iconHTML
    Freely Available from IEEE
  • Big Data 
  • Operational NoSQL Systems: What's New and What's Next?

    Publication Year: 2016, Page(s):23 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1253 KB) | HTML iconHTML

    Operational NoSQL systems are relatively new in the data-management ecosystem, and there is much confusion about their capabilities and how they differ from traditional relational database systems. This summary of characteristics clearly distinguishes the two system classes and provides a glimpse into directions for future work. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Renaissance in Database Management: Navigating the Landscape of Candidate Systems

    Publication Year: 2016, Page(s):31 - 42
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1475 KB) | HTML iconHTML

    Big data requirements are motivating new database-management models that can process billions of data requests per second, and established relational models are changing to keep pace. The authors provide practical tools for navigating this shifting product landscape and finding candidate systems that best fit a data manager's application needs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cognitive Storage for Big Data

    Publication Year: 2016, Page(s):43 - 51
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1186 KB) | HTML iconHTML

    Storage system efficiency can be significantly improved by determining the value of data. A key concept is cognitive storage, or optimizing storage systems by better comprehending the relevance of data to user needs and preferences. The Web extra at https://youtu.be/P-ZxlTLwzTI is a video of authors Giovanni Cherubini and Vinodh Venkatesan of IBM Research--Zurich discussing the concepts, applicati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nomadic Computing for Big Data Analytics

    Publication Year: 2016, Page(s):52 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2025 KB) | HTML iconHTML

    Analyzing the massive datasets of today's applications will require scalable and sophisticated machine-learning methods. NOMAD, a novel nomadic framework, combines two common approaches: stochastic optimization and distributed computing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predicting Student Performance Using Personalized Analytics

    Publication Year: 2016, Page(s):61 - 69
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1514 KB) | HTML iconHTML

    To help solve the ongoing problem of student retention, new expected performance-prediction techniques are needed to facilitate degree planning and determine who might be at risk of failing or dropping a class. Personalized multiregression and matrix factorization approaches based on recommender systems, initially developed for e-commerce applications, accurately forecast students' grades in futur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Perspectives 
  • Low Acceptance Rates of Conference Papers Considered Harmful

    Publication Year: 2016, Page(s):70 - 73
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (652 KB) | HTML iconHTML

    A quantitative analysis supports the argument that very low acceptance rates of conference papers are more likely to impede publication of bold and innovative research results than to indicate the chosen papers' prestige and elite status. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Out of Band 
  • The Bogus Science Theorem (and the Junk Science Wager)

    Publication Year: 2016, Page(s):74 - 78
    Request permission for commercial reuse | PDF file iconPDF (975 KB) | HTML iconHTML
    Freely Available from IEEE
  • Rebooting Computing 
  • The Boolean Logic Tax

    Publication Year: 2016, Page(s):79 - 82
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1074 KB) | HTML iconHTML

    Moore's law relies on device size reduction for progress, but an energy tax due to Boolean logic properties could block this progress. There are alternatives. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Indistinguishable from Magic 
  • Skin--The Next User Interface

    Publication Year: 2016, Page(s):83 - 87
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1631 KB) | HTML iconHTML

    Although there are numerous technical and ethical challenges, making sensors and output components compatible with elastic skin has the potential to offer an unprecedented level of directness and expressiveness in mobile computing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The IOT Connection 
  • Toward Building a Safe, Secure, and Easy-to-Use Internet of Things Infrastructure

    Publication Year: 2016, Page(s):88 - 91
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (573 KB) | HTML iconHTML

    Carnegie Mellon University is leading a multi-institutional effort to build an open infrastructure to support the Internet of Things. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Science Fiction Prototyping 
  • Afrofuturism

    Publication Year: 2016, Page(s):92 - 93
    Request permission for commercial reuse | PDF file iconPDF (1033 KB) | HTML iconHTML
    Freely Available from IEEE
  • Cybertrust 
  • Diversity in Cybersecurity

    Publication Year: 2016, Page(s):94 - 98
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1718 KB) | HTML iconHTML

    Randomizing software characteristics can help thwart cyberattacks by denying critical information about a target system previously known to an attacker. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call and Calendar 
  • Call and Calendar

    Publication Year: 2016, Page(s):99 - 103
    Request permission for commercial reuse | PDF file iconPDF (1061 KB)
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org