By Topic

Computer

Issue 6 • 2017

Filter Results

Displaying Results 1 - 25 of 29
  • Front Cover 
  • Front Cover

    Publication Year: 2017, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (472 KB)
    Freely Available from IEEE
  • House Advertisement 
  • New Membership Options for a Better Fit

    Publication Year: 2017, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (797 KB)
    Freely Available from IEEE
  • Table of Contents 
  • Table of Contents

    Publication Year: 2017, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (1088 KB)
    Freely Available from IEEE
  • Masthead 
  • Masthead

    Publication Year: 2017, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (141 KB)
    Freely Available from IEEE
  • Elsewhere in the CS 
  • Computer Highlights Society Magazines

    Publication Year: 2017, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (1586 KB)
    Freely Available from IEEE
  • Spotlight on Transactions 
  • A Haptic Compass for Navigation

    Publication Year: 2017, Page(s): 6
    Request permission for commercial reuse | PDF file iconPDF (274 KB)
    Freely Available from IEEE
  • 50 & 25 Years Ago 
  • Computer, June 1967 and 1992

    Publication Year: 2017, Page(s): 7
    Request permission for commercial reuse | PDF file iconPDF (728 KB) | HTML iconHTML
    Freely Available from IEEE
  • Computing 
  • The Internet of Everything

    Publication Year: 2017, Page(s):8 - 9
    Request permission for commercial reuse | PDF file iconPDF (3954 KB) | HTML iconHTML
    Freely Available from IEEE
  • Reflections from Our Editors 
  • The Yau Years: 1981-1984

    Publication Year: 2017, Page(s):10 - 11
    Request permission for commercial reuse | PDF file iconPDF (395 KB) | HTML iconHTML
    Freely Available from IEEE
  • Computer's Legacy 
  • Retrospective on Amdahl's Law in the Multicore Era

    Publication Year: 2017, Page(s):12 - 14
    Request permission for commercial reuse | PDF file iconPDF (844 KB) | HTML iconHTML
    Freely Available from IEEE
  • House Advertisement 
  • myCS

    Publication Year: 2017, Page(s): 15
    Request permission for commercial reuse | PDF file iconPDF (1869 KB)
    Freely Available from IEEE
  • Guest Editors' Introduction 
  • VLSI for the Internet of Things

    Publication Year: 2017, Page(s):16 - 18
    Request permission for commercial reuse | PDF file iconPDF (518 KB) | HTML iconHTML
    Freely Available from IEEE
  • VLSI for the Internet of Things 
  • Exploring Hardware Heterogeneity to Improve Pervasive Context Inferences

    Publication Year: 2017, Page(s):19 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB) | HTML iconHTML

    Context-aware inference apps have become pervasive as a result of the Internet of Things (IoT). However, most of these apps run continuously on a single device, resulting in limited sensor coverage and high energy consumption. Recent advances in IoT devices, specifically hardware heterogeneity, can be leveraged to improve the accuracy and energy efficiency of context inferences. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Approximate Computing for Low Power and Security in the Internet of Things

    Publication Year: 2017, Page(s):27 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1183 KB) | HTML iconHTML

    To save resources for Internet of Things (IoT) devices, a proposed approach segments operands and corresponding basic arithmetic operations that can be carried out by approximate function units for almost all applications. The approach also increases the security of IoT devices by hiding information for IP watermarking, digital fingerprinting, and lightweight encryption. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A PLiM Computer for the Internet of Things

    Publication Year: 2017, Page(s):35 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (682 KB) | HTML iconHTML

    Emerging applications are dramatically changing computer architecture requirements, with a shift toward big data that is processed using simple computations. A programmable logic-in-memory (PLiM) computer can allow memory cells to perform primitive logic operations and therefore compute without needing to communicate with a processing unit. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Doing a Lot with a Little: Micropower Conversion and Management for Ambient-Powered Electronics

    Publication Year: 2017, Page(s):41 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (893 KB) | HTML iconHTML

    The microelectronic components integral to connecting objects in the Internet of Things require efficient power supplies. One solution is to harvest energy from the objects' environment, and researchers are actively tackling problems in integrated power conversion and management to realize the vision of nanopower devices. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Perspectives 
  • Kickstarting Semiconductor Innovation with Open Source Hardware

    Publication Year: 2017, Page(s):50 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (431 KB) | HTML iconHTML

    Hardware innovation is slowing, yet software innovation is flourishing, in large part because of a thriving open source ecosystem. Open source can similarly boost hardware development, but the way forward will require industry, academia, and hardware enthusiasts to address five significant issues. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Big Data Analytics beyond the Single Datacenter

    Publication Year: 2017, Page(s):60 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (852 KB) | HTML iconHTML

    Contrary to the notion that all big data can be processed in "the cloud," each cloud is tied to one or more datacenters, and cloud implementation details matter when data must be distributed over multiple centers. In these cases, approaches are needed to optimize the application's execution path. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The IoT Connection 
  • The IoT Blame Game

    Publication Year: 2017, Page(s):69 - 73
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (729 KB) | HTML iconHTML

    Applications in the Internet of Things offer many benefits and risks. Poor design, unplanned interconnections, and human adversaries raise the stakes and liabilities for systems designers. Early identification, mitigation, and prevention of these threats can help limit liability issues. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Future Today 
  • Marketing and Engineering--Working across the Aisle

    Publication Year: 2017, Page(s):74 - 75
    Request permission for commercial reuse | PDF file iconPDF (997 KB) | HTML iconHTML
    Freely Available from IEEE
  • Rebooting Computing 
  • The Opportunities and Controversies of Reversible Computing

    Publication Year: 2017, Page(s):76 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (755 KB) | HTML iconHTML

    Industry's inability to reduce logic gates' energy consumption is slowing growth in an important part of the worldwide economy. Some scientists argue that alternative approaches could greatly reduce energy consumption. These approaches entail myriad technical and political issues. View full abstract»

    Freely Available from IEEE
  • Cybertrust 
  • Web Application Security: Threats, Countermeasures, and Pitfalls

    Publication Year: 2017, Page(s):81 - 85
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1745 KB) | HTML iconHTML

    Penetration testing is a crucial defense against common Web application security threats such as SQL injection and cross-site scripting attacks. A proposed Web vulnerability scanner automatically generates test data with combinative evasion techniques, significantly expanding test coverage and revealing more vulnerabilities. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Indistinguishable from Magic 
  • Improve IT, Improve Healthcare

    Publication Year: 2017, Page(s):86 - 91
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3463 KB) | HTML iconHTML

    While not a magical solution to healthcare problems, improving IT will improve quality and reduce preventable errors that cause patient harm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cloud Cover 
  • A High-Availability Cloud for Research Computing

    Publication Year: 2017, Page(s):92 - 95
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1328 KB) | HTML iconHTML

    This article describes the lessons learned, challenges faced, and innovations made in designing and implementing a high-availability private cloud for research computing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CS Connection 
  • CS Connection

    Publication Year: 2017, Page(s):96 - 98
    Request permission for commercial reuse | PDF file iconPDF (1997 KB)
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@computer.org