By Topic

Computer

Issue 6 • Date Jun 1995

Filter Results

Displaying Results 1 - 12 of 12
  • Resources for networks in less-industrialized nations

    Publication Year: 1995, Page(s):66 - 71
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB)

    True global connectivity is years away. Countries must first have an internal network, no matter how small, before linking electronically to the rest of the world's networks. The article considers the evolution of the Relcom (Reliable Communications) network in the ex Soviet Union. Relcom is a spin off of the Demos Cooperative, which in 1982 began distributing a version of Unix in the Soviet Union... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Where the big money is

    Publication Year: 1995, Page(s):6 - 7
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (132 KB)

    Someone once told the author that toy manufacturers had greater influence over computer design than computer scientists and this is true-the really big bucks are in consumer software products (about $90 billion per year), not information processing ($30-40 billion), client/server software (a few billion), scientific computing (maybe $2 billion), or multimedia (tens of billions). The author discuss... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implications of classical scheduling results for real-time systems

    Publication Year: 1995, Page(s):16 - 25
    Cited by:  Papers (116)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (868 KB)

    Knowledge of complexity, fundamental limits and performance bounds-well known for many scheduling problems-helps real time designers choose a good design and algorithm and avoid poor ones. The scheduling problem has so many dimensions that it has no accepted taxonomy. We divide scheduling theory between uniprocessor and multiprocessor results. In the uniprocessor section, we begin with independent... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • International survey: virtual-environment research

    Publication Year: 1995, Page(s):57 - 65
    Cited by:  Papers (24)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (836 KB)

    Research on virtual environment technologies is just beginning to change the ways we use computers. Continued research will lead to applications that affect both our work and leisure. The article examines five major research areas: displays for presenting information to the user's visual, auditory and haptic senses; sensors and other technologies for transferring information from the user to the c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interrupt processing in concurrent processors

    Publication Year: 1995, Page(s):36 - 46
    Cited by:  Papers (11)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (820 KB)

    Systems architects are faced with many possibilities for designing interrupt processing strategies that optimize computer resources and performance. This framework of hardware implementation techniques highlights choices for consideration. The approach we've developed broadly classifies interrupt processing techniques and implementations into six phases. In preparing this taxonomy, we've examined ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Satan: double-edged sword

    Publication Year: 1995, Page(s):82 - 83
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB)

    Who can resist the allure of free software tools-especially software tools designed to do something as important as detect network vulnerabilities? As you might suspect, anything free generally carries a hidden price tag. Security Administrator Tools for Analyzing Networks (Satan) was released as freeware on April 5, 1995 (April 4 on many popular anonymous ftp sites). Developed by Dan Farmer (form... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On-line monitoring: a tutorial

    Publication Year: 1995, Page(s):72 - 78
    Cited by:  Papers (48)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (848 KB)

    Online monitoring can complement formal techniques to increase application dependability. The article outlines the concepts and identifies the activities that comprise event based monitoring, describing several representative monitoring systems. It focuses on four areas: dependability, performance enhancement, correctness checking, and security View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A specification-driven architectural design environment

    Publication Year: 1995, Page(s):26 - 35
    Cited by:  Papers (3)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (908 KB)

    We introduce an environment we've developed that helps designers represent, model, and explore design tradeoffs at the architectural abstraction level and synthesize designs at the behavioral level. The Design Analysis and Synthesis Environment (DASE) accomplishes this by supporting design capture, design space exploration, and validation for the final design synthesis. DASE specifically caters to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolving the HPCCI. Recommendations from the NRC/CSTB 1995 Report

    Publication Year: 1995, Page(s):79 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    Early in 1994 Congress asked the National Research Council to assess the goals, management, and progress of the High-performance Computing and Communications Initiative (HPCCI) and to determine how it needs to evolve to meet the challenges of the nation's information infrastructure. The NRC's Computer Science and Telecommunications Board convened a committee of 12 experts, which offered its assess... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault injection: a method for validating computer-system dependability

    Publication Year: 1995, Page(s):47 - 56
    Cited by:  Papers (82)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (884 KB)

    A fault tolerant computer system's dependability must be validated to ensure that its redundancy has been correctly implemented and the system will provide the desired level of reliable service. Fault injection-the deliberate insertion of faults into an operational system to determine its response offers an effective solution to this problem. We survey several fault injection studies and discuss t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Why is technology transfer so hard?

    Publication Year: 1995, Page(s):86 - 87
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB)

    If you were the vice president of software in a company with 10,000 software personnel, what would you do to make sure your software team had state-of-the-art tools and methodologies? At a more fundamental level, how would you and your staff even find out what they are and whether your current tools and methodologies are good, bad, or average? That is the crux of two major challenges to the softwa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Patent or perish: the best defense is a good offense

    Publication Year: 1995, Page(s):84 - 85
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB)

    Peach Pit and Stem (PPS) Corporation called a meeting with Rinky-Dink Mom-n-Pop Shop to discuss Mom-n-Pop's recent rise to fame and fortune in the telecommunications industry. After extensive research and testing, Mom-n-Pop had implemented a low cost private communication network by using fiber optic cables and ceramic mugs rather than the traditional string and paper cups. (The ceramic mugs repor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com