Computer

Issue 9 • Sept. 2016

Filter Results

Displaying Results 1 - 25 of 31
  • Front Cover 
  • [Front cover]

    Publication Year: 2016, Page(s): c1
    Request permission for commercial reuse | |PDF file iconPDF (2004 KB)
    Freely Available from IEEE
  • House Advertisement 
  • The Universität der Bundeswehr München [Advertisement]

    Publication Year: 2016, Page(s):c2 - 1
    Request permission for commercial reuse | |PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • New Membership Options for a Better Fit [Advertisement]

    Publication Year: 2016, Page(s): 2
    Request permission for commercial reuse | |PDF file iconPDF (407 KB)
    Freely Available from IEEE
  • Achieve your career goals with the fit that's right for you [Advertisement]

    Publication Year: 2016, Page(s): 3
    Request permission for commercial reuse | |PDF file iconPDF (172 KB)
    Freely Available from IEEE
  • Masthead 
  • [Masthead]

    Publication Year: 2016, Page(s): 4
    Request permission for commercial reuse | |PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • Table of Contents 
  • Table of contents

    Publication Year: 2016, Page(s):5 - 6
    Request permission for commercial reuse | |PDF file iconPDF (1246 KB)
    Freely Available from IEEE
  • 70th Anniversary Milestones 
  • IEEE Computer Society Membership

    Publication Year: 2016, Page(s): 7
    Request permission for commercial reuse | |PDF file iconPDF (991 KB) | HTML iconHTML
    Freely Available from IEEE
  • 32 & 16 Years Ago 
  • 32 & 16 Years Ago

    Publication Year: 2016, Page(s):8 - 9
    Request permission for commercial reuse | |PDF file iconPDF (927 KB) | HTML iconHTML
    Freely Available from IEEE
  • Elsewhere in the CS 
  • Computer Highlights Society Magazines

    Publication Year: 2016, Page(s):10 - 11
    Request permission for commercial reuse | |PDF file iconPDF (2246 KB)
    Freely Available from IEEE
  • Spotlight on Transactions 
  • Modern Computer Arithmetic

    Publication Year: 2016, Page(s): 12
    Request permission for commercial reuse | |PDF file iconPDF (496 KB)
    Freely Available from IEEE
  • House Advertisement 
  • Call for Nominees Education Awards Nominations

    Publication Year: 2016, Page(s): 13
    Request permission for commercial reuse | |PDF file iconPDF (783 KB)
    Freely Available from IEEE
  • Guest Editors' Introduction 
  • Next-Generation Computing Paradigms

    Publication Year: 2016, Page(s):14 - 20
    Cited by:  Papers (1)
    Request permission for commercial reuse | |PDF file iconPDF (2946 KB) | HTML iconHTML
    Freely Available from IEEE
  • Emerging Computing Paradigms 
  • The Quantum Future of Computation

    Publication Year: 2016, Page(s):21 - 30
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2003 KB) | HTML iconHTML

    Still in early development, quantum computing is already overturning our contemporary notions of computational methods and devices. Understanding the applications enabled by quantum computing--and how to harness them--will alter the economic, industrial, academic, and societal landscape. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Path to Scalable Distributed Quantum Computing

    Publication Year: 2016, Page(s):31 - 42
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1848 KB) | HTML iconHTML

    Researchers are fabricating quantum processors powerful enough to execute small instances of quantum algorithms. Scalability concerns are motivating distributed-memory multicomputer architectures, and experimental efforts have demonstrated some of the building blocks for such a design. Numberous systems are emerging with the goal of enabling local and distributed quantum computing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embodied Molecular Computation: Potential and Challenges

    Publication Year: 2016, Page(s):43 - 51
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1401 KB) | HTML iconHTML

    In its quest for more powerful computing paradigms and machines, DARPA's Defense Science Research Council looked at molecular computing, a compelling approach to unconventional computing that draws on information processing in physical, chemical, and biological systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From Swarm Intelligence to Metaheuristics: Nature-Inspired Optimization Algorithms

    Publication Year: 2016, Page(s):52 - 59
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1177 KB) | HTML iconHTML

    Nature has provided rich models for computational problem solving, including optimizations based on the swarm intelligence exhibited by fireflies, bats, and ants. These models can stimulate computer scientists to think nontraditionally in creating tools to address application design challenges. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cortically Coupled Computing: A New Paradigm for Synergistic Human-Machine Interaction

    Publication Year: 2016, Page(s):60 - 68
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (3825 KB) | HTML iconHTML

    Unlike traditional brain-computer interfaces that use brain signals for direct control of computers and robotics, a cortically coupled computer system opportunistically senses the brain state, capturing a user's implicit or explicit computation, and then communicates this information to a traditional computer system via a neural interface. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research Feature 
  • Real-Time Computing on Multicore Processors

    Publication Year: 2016, Page(s):69 - 77
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1249 KB) | HTML iconHTML

    Architects of multicore chips for avionics must define and bound intercore interference, which requires assuming a constant worst-case execution time for tasks executing on the chip. With the Single Core Equivalent technology package, engineers can treat each core as if it were a single-core chip. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Spreadsheet Space: Eliminating the Boundaries of Data Cross-Referencing

    Publication Year: 2016, Page(s):78 - 85
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1151 KB) | HTML iconHTML

    In the Spreadsheet Space, a virtual space for tabular data sharing, users in diverse administrative domains reference each others' spreadsheets at the cell level as well as share data from a variety of platforms and databases. Spreadsheet Space users enjoy the unlimited scope of cloud collaboration with the security of a more limited environment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Social Computing 
  • Social Computing for Mobile Big Data

    Publication Year: 2016, Page(s):86 - 90
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (3496 KB) | HTML iconHTML

    Mobile big data contains vast statistical features in various dimensions, including spatial, temporal, and the underlying social domain. Understanding and exploiting the features of mobile data from a social network perspective will be extremely beneficial to wireless networks, from planning, operation, and maintenance to optimization and marketing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computing Education 
  • Teaching Cloud Computing

    Publication Year: 2016, Page(s):91 - 93
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1121 KB) | HTML iconHTML

    Just how do you teach cloud computing? It requires substantial hands-on applications and is constantly evolving--thus it presents some unique challenges for educators. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Student Design Showcase 
  • Seeing Is Understanding

    Publication Year: 2016, Page(s):94 - 97
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2027 KB) | HTML iconHTML

    To help teach object-oriented programming, students at King Abdulaziz University in Saudi Arabia created a self-paced, interactive program that associates code with visual cues to reinforce the concepts of inheritance and polymorphism. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cybertrust 
  • Entropy as a Service: Unlocking Cryptography's Full Potential

    Publication Year: 2016, Page(s):98 - 102
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1933 KB) | HTML iconHTML

    Securing the Internet requires strong cryptography, which depends on good entropy for generating unpredictable keys. Entropy as a service provides entropy from a decentralized root of trust, scaling across diverse geopolitical locales and remaining trustworthy unless much of the collective is compromised. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Out of Band 
  • Coda in the Key of F2654hD4

    Publication Year: 2016, Page(s):104 - 109
    Request permission for commercial reuse | |PDF file iconPDF (1968 KB) | HTML iconHTML
    Freely Available from IEEE
  • Cloud Cover 
  • Security and Risk Assessment in the Cloud

    Publication Year: 2016, Page(s):110 - 113
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1791 KB) | HTML iconHTML

    Fears about the data security that cloud service providers offer is a primary reason many organizations haven't fully adopted cloud services. Key issues include data storage, data replication, integrity verification, access control, risk assessment, and secure query processing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org