By Topic

Popular Articles (May 2015)

Includes the top 50 most frequently downloaded documents for this publication according to the most recent monthly usage statistics.
  • 1. Enabling the Internet of Things

    Publication Year: 2015 , Page(s): 28 - 35
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2292 KB) |  | HTML iconHTML  

    Merging the virtual World Wide Web with nearby physical devices that are part of the Internet of Things gives anyone with a mobile device and the appropriate authorization the power to monitor or control anything. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2. A spiral model of software development and enhancement

    Publication Year: 1988 , Page(s): 61 - 72
    Cited by:  Papers (500)  |  Patents (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1184 KB)  

    A short description is given of software process models and the issues they address. An outline is given of the process steps involved in the spiral model, an evolving risk-driven approach that provides a framework for guiding the software process, and its application to a software project is shown. A summary is given of the primary advantages and implications involved in using the spiral model an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3. The Current State of Business Intelligence

    Publication Year: 2007 , Page(s): 96 - 99
    Cited by:  Papers (26)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (775 KB) |  | HTML iconHTML  

    Business intelligence (BI) is now widely used, especially in the world of practice, to describe analytic applications. BI is currently the top-most priority of many chief information officers. BI has become a strategic initiative and is now recognized by CIOs and business leaders as instrumental in driving business effectiveness and innovation. BI is a process that includes two primary activities:... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 4. Securing the Internet of Things

    Publication Year: 2011 , Page(s): 51 - 58
    Cited by:  Papers (23)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2131 KB) |  | HTML iconHTML  

    This paper presents security of Internet of things. In the Internet of Things vision, every physical object has a virtual component that can produce and consume services Such extreme interconnection will bring unprecedented convenience and economy, but it will also require novel approaches to ensure its safe and ethical use. The Internet and its users are already under continual attack, and a grow... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 5. Agile software development: the business of innovation

    Publication Year: 2001 , Page(s): 120 - 127
    Cited by:  Papers (62)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (224 KB)  

    The rise and fall of the dotcom-driven Internet economy shouldn't distract us from seeing that the business environment continues to change at a dramatically increasing pace. To thrive in this turbulent environment, we must confront the business need for relentless innovation and forge the future workforce culture. Agile software development approaches, such as extreme programming, Crystal methods... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 6. From visual simulation to virtual reality to games

    Publication Year: 2005 , Page(s): 25 - 32
    Cited by:  Papers (153)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (720 KB) |  | HTML iconHTML  

    During the past decades, the virtual reality community has based its development on a synthesis of earlier work in interactive 3D graphics, user interfaces, and visual simulation. Currently, the VR field is transitioning into work influenced by video games. Because much of the research and development being conducted in the games community parallels the VR community's efforts, it has the potential... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 7. Rethinking Computers for Cybersecurity

    Publication Year: 2015 , Page(s): 16 - 25
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2727 KB)  

    Cyberattacks are growing at an alarming rate, even as our dependence on cyberspace transactions increases. Our software security solutions may no longer be sufficient. It is time to rethink computer design from the foundations. Can hardware security be enlisted to improve cybersecurity? The author discusses two classes of hardware security: hardware-enhanced security architectures for improving so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 8. Social Networking

    Publication Year: 2008 , Page(s): 97 - 100
    Cited by:  Papers (21)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1233 KB) |  | HTML iconHTML  

    In the context of today's electronic media, social networking has come to mean individuals using the Internet and Web applications to communicate in previously impossible ways. This is largely the result of a culture-wide paradigm shift in the uses and possibilities of the Internet itself. The current Web is a much different entity than the Web of a decade ago. This new focus creates a riper breed... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 9. No Silver Bullet Essence and Accidents of Software Engineering

    Publication Year: 1987 , Page(s): 10 - 19
    Cited by:  Papers (375)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (10356 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 10. Get ready for agile methods, with care

    Publication Year: 2002 , Page(s): 64 - 69
    Cited by:  Papers (101)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (114 KB) |  | HTML iconHTML  

    Although many of their advocates consider the agile and plan-driven software development methods polar opposites, synthesizing the two can provide developers with a comprehensive spectrum of tools and options. Real-world examples argue for and against agile methods. Responding to change has been cited as the critical technical success factor in the Internet browser battle between Microsoft and Net... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 11. Big Data's Big Unintended Consequences

    Publication Year: 2013 , Page(s): 46 - 53
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (996 KB) |  | HTML iconHTML  

    Businesses and governments exploit big data without regard for issues of legality, data quality, disparate data meanings, and process quality. This often results in poor decisions, with individuals bearing the greatest risk. The threats harbored by big data extend far beyond the individual, however, and call for new legal structures, business processes, and concepts such as a Private Data Commons.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 12. Genetic algorithms: a survey

    Publication Year: 1994 , Page(s): 17 - 26
    Cited by:  Papers (256)  |  Patents (17)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1178 KB)  

    Genetic algorithms provide an alternative to traditional optimization techniques by using directed random searches to locate optimal solutions in complex landscapes. We introduce the art and science of genetic algorithms and survey current issues in GA theory and practice. We do not present a detailed study, instead, we offer a quick guide into the labyrinth of GA research. First, we draw the anal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 13. Gaining intellectual control of software development [Perspectives]

    Publication Year: 2000 , Page(s): 27 - 33
    Cited by:  Papers (8)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (185 KB)  

    The results from two workshops on software engineering research strategies, commissioned by the National Science Foundation last year, hint at new directions that software development might take. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 14. Protecting Websites from Attack with Secure Delivery Networks

    Publication Year: 2015 , Page(s): 26 - 34
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2376 KB)  

    Secure delivery networks can help prevent or mitigate the most common attacks against mission-critical websites. A case study from a leading provider of content delivery services illustrates one such network's operation and effectiveness. The Web extra at https://youtu.be/4FRRI0aJLQM is an overview of the evolving threat landscape with Akamai Director of Web Security Solutions Product Marketing, D... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 15. Privacy and Big Data

    Publication Year: 2014 , Page(s): 7 - 9
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1140 KB) |  | HTML iconHTML  

    Big data's explosive growth has prompted the US government to release new reports that address the issues--particularly related to privacy--resulting from this growth. The Web extra at http://youtu.be/j49eoe5g8-c is an audio recording from the Computing and the Law column, in which authors Brian M. Gaff, Heather Egan Sussman, and Jennifer Geetter discuss how big data's explosive growth has prompte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 16. Denial and Deception in Cyber Defense

    Publication Year: 2015 , Page(s): 36 - 44
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1663 KB)  

    As attack techniques evolve, cybersystems must also evolve to provide the best continuous defense. Leveraging classical denial and deception techniques to understand the specifics of adversary attacks enables an organization to build an active, threat-based cyber defense. The Web extra at https://youtu.be/9g_HLNXiLto is a video that describes how in January 2012, MITRE performed a real-time, red t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 17. CAP twelve years later: How the "rules" have changed

    Publication Year: 2012 , Page(s): 23 - 29
    Cited by:  Papers (18)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (5711 KB) |  | HTML iconHTML  

    The CAP theorem asserts that any networked shared-data system can have only two of three desirable properties. However, by explicitly handling partitions, designers can optimize consistency and availability, thereby achieving some trade-off of all three. The featured Web extra is a podcast from Software Engineering Radio, in which the host interviews Dwight Merriman about the emerging NoSQL moveme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 18. Designing safety-critical computer systems

    Publication Year: 2003 , Page(s): 40 - 46
    Cited by:  Papers (12)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (306 KB) |  | HTML iconHTML  

    The ubiquitous computer is the electronic component of choice for system developers, who increasingly exploit computing's power in safety-critical applications such as steer-by-wire automotive systems and powered prosthetics. However, these computer-based systems raise the ongoing concern that they might fail and cause harm. Exploring the systematic design of safety-critical computer systems helps... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 19. The PhD Pipeline

    Publication Year: 2015 , Page(s): 76 - 79
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1271 KB)  

    As computer science (CS) departments throughout the US struggle to recruit domestic doctoral students (those who are US citizens or permanent residents), the CS research pipeline continues to be a cause for concern. International students have long been crucial to the vitality of US doctoral programs as well as to research productivity, but increasingly, these graduates return to their native coun... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 20. Matrix Factorization Techniques for Recommender Systems

    Publication Year: 2009 , Page(s): 30 - 37
    Cited by:  Papers (162)  |  Patents (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2920 KB) |  | HTML iconHTML  

    As the Netflix Prize competition has demonstrated, matrix factorization models are superior to classic nearest neighbor techniques for producing product recommendations, allowing the incorporation of additional information such as implicit feedback, temporal effects, and confidence levels. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 21. Cryptographically Secure Computation

    Publication Year: 2015 , Page(s): 78 - 81
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1397 KB)  

    Researchers are making secure multiparty computation--a cryptographic technique that enables information sharing and analysis while keeping sensitive inputs secret--faster and easier to use for application software developers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 22. Virtual Reality Exposure Therapy for Combat-Related Posttraumatic Stress Disorder

    Publication Year: 2014 , Page(s): 31 - 37
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1993 KB) |  | HTML iconHTML  

    Virtual reality (VR) technology is rapidly evolving to support prolonged exposure (PE) therapy, a proven treatment for combat-related posttraumatic stress disorder. Building on the successful 2007 Virtual Iraq/Afghanistan VRET system, a team of behavioral scientists, software engineers, and virtual artists has created Bravemind, a flexible VR system that offers significantly enhanced PE treatment ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 23. The vision of autonomic computing

    Publication Year: 2003 , Page(s): 41 - 50
    Cited by:  Papers (1163)  |  Patents (50)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (284 KB) |  | HTML iconHTML  

    A 2001 IBM manifesto observed that a looming software complexity crisis -caused by applications and environments that number into the tens of millions of lines of code - threatened to halt progress in computing. The manifesto noted the almost impossible difficulty of managing current and planned computing systems, which require integrating several heterogeneous environments into corporate-wide com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 24. Networks on chips: a new SoC paradigm

    Publication Year: 2002 , Page(s): 70 - 78
    Cited by:  Papers (1275)  |  Patents (24)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (194 KB) |  | HTML iconHTML  

    On-chip micronetworks, designed with a layered methodology, will meet the distinctive challenges of providing functionally correct, reliable operation of interacting system-on-chip components. A system on chip (SoC) can provide an integrated solution to challenging design problems in the telecommunications, multimedia, and consumer electronics domains. Much of the progress in these fields hinges o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 25. Crime data mining: a general framework and some examples

    Publication Year: 2004 , Page(s): 50 - 56
    Cited by:  Papers (55)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (590 KB) |  | HTML iconHTML  

    A major challenge facing all law-enforcement and intelligence-gathering organizations is accurately and efficiently analyzing the growing volumes of crime data. Detecting cybercrime can likewise be difficult because busy network traffic and frequent online transactions generate large amounts of data, only a small portion of which relates to illegal activities. Data mining is a powerful tool that e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 26. Implementing the Federal Cybersecurity R&D Strategy

    Publication Year: 2015 , Page(s): 45 - 55
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1828 KB)  

    In 2011, the US government asked for game-changing research that would fundamentally improve the security, safety, and trustworthiness of the national digital infrastructure. Agencies have responded with novel ideas, from moving target management to tailored trustworthy spaces. The Web extra at https://youtu.be/ZdUDIDolCM4 is a video of Vint Cerf introducing the Honorable Al Gore, 45th Vice Presid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 27. Toward the Web of Things: Applying Web Technologies to the Physical World

    Publication Year: 2015 , Page(s): 34 - 42
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (977 KB)  

    Just as Internet connectivity has enabled intuitive information sharing and interaction through the Web, so the Internet of Things might be the basis for the Web of Things, enabling equally simple interaction among devices, systems, users, and applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 28. Second-Generation Big Data Systems

    Publication Year: 2015 , Page(s): 36 - 41
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1683 KB) |  | HTML iconHTML  

    More varied data channels, increasingly diverse analytic methods, and new deployment models-along with some fundamental technology shifts-will significantly impact the next generation of big data systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 29. Agile software development, the people factor

    Publication Year: 2001 , Page(s): 131 - 133
    Cited by:  Papers (69)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (92 KB) |  | HTML iconHTML  

    In a previous article (2001), we introduced agile software development through the problem it addresses and the way in which it addresses the problem. Here, we describe the effects of working in an agile style View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 30. Battery modeling for energy aware system design

    Publication Year: 2003 , Page(s): 77 - 87
    Cited by:  Papers (112)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (432 KB) |  | HTML iconHTML  

    Advances in battery technology have not kept pace with rapidly growing energy demands. Most laptops, handheld PCs, and cell phones use batteries that take anywhere from 1.5 to 4 hours to fully charge but can run on this charge for only a few hours. The battery has thus become a key control parameter in the energy management of portables. To meet the stringent power budget of these devices, researc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 31. The Web of Things: Challenges and Opportunities

    Publication Year: 2015 , Page(s): 26 - 32
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1387 KB)  

    As billions of devices connect to the Internet, a new Web of Things is emerging, with virtual representations of physical or abstract realities increasingly accessible via Web technologies. Achieving a new phase of exponential growth, comparable to the earliest days of the Web, will require open markets, open standards, and the vision to imagine the potential for this expanding WoT. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 32. Integrating Big Data: A Semantic Extract-Transform-Load Framework

    Publication Year: 2015 , Page(s): 42 - 50
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1950 KB)  

    Current tools that facilitate the extract-transform-load (ETL) process focus on ETL workflow, not on generating meaningful semantic relationships to integrate data from multiple, heterogeneous sources. A proposed semantic ETL framework applies semantics to various data fields and so allows richer data integration. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 33. The architecture of virtual machines

    Publication Year: 2005 , Page(s): 32 - 38
    Cited by:  Papers (103)  |  Patents (29)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1440 KB) |  | HTML iconHTML  

    A virtual machine can support individual processes or a complete system depending on the abstraction level where virtualization occurs. Some VMs support flexible hardware usage and software isolation, while others translate from one instruction set to another. Virtualizing a system or component -such as a processor, memory, or an I/O device - at a given abstraction level maps its interface and vis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 34. Social Media for Social Value

    Publication Year: 2013 , Page(s): 82 - 85
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1378 KB) |  | HTML iconHTML  

    Social media, with their low direct costs and enormous reach, enable nonprofit entities like the American Red Cross and Kiva to better accomplish their missions and improve the lives of millions of people worldwide. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 35. How open source is changing the software developer's career

    Publication Year: 2015 , Page(s): 51 - 57
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (692 KB)  

    Software developers with open source project experience acquire verifiable technical expertise, peer-certified competencies, and positional power--advantages that align with companies' need to obtain a competitive advantage. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 36. In-Memory Graph Databases for Web-Scale Data

    Publication Year: 2015 , Page(s): 24 - 35
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2399 KB)  

    A software stack relies primarily on graph-based methods to implement scalable resource description framework databases on top of commodity clusters, providing an inexpensive way to extract meaning from volumes of heterogeneous data. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 37. Cyberentity Security in the Internet of Things

    Publication Year: 2013 , Page(s): 46 - 53
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1512 KB) |  | HTML iconHTML  

    A proposed Internet of Things system architecture offers a solution to the broad array of challenges researchers face in terms of general system security, network security, and application security. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 38. Entrepreneurial Innovation at Google

    Publication Year: 2011 , Page(s): 56 - 61
    Multimedia
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (921 KB) |  | HTML iconHTML  

    To fully realize its innovation potential, Google encourages all of its employees to think and act like entrepreneurs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 39. 10 potholes in the road to information quality

    Publication Year: 1997 , Page(s): 38 - 46
    Cited by:  Papers (13)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (504 KB)  

    Poor information quality can create chaos. Unless its root cause is diagnosed, efforts to address it are akin to patching potholes. The article describes ten key causes, warning signs, and typical patches. With this knowledge, organisations can identify and address these problems before they have financial and legal consequences View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 40. Managing Data in Healthcare Information Systems: Many Models, One Solution

    Publication Year: 2015 , Page(s): 52 - 59
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1800 KB)  

    Because healthcare data comes from multiple, vastly different sources, databases must adopt a range of models to process and store it. A polyglot-persistent framework combines relational, graph, and document data models to accommodate information variety. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 41. BYOD? OMG!

    Publication Year: 2015 , Page(s): 10 - 11
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (744 KB) |  | HTML iconHTML  

    Bring Your Own Device--allowing employees to bring personally owned technology to their workplaces might improve productivity, but it also creates risks for employers. The Web extra at http://youtube/t2UpGr1AmiQ is an audio recording of Brian M. Gaff reading his Computing and the Law column, in which he discusses how bring your own device (BYOD) allows employees to bring personally owned technolog... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 42. Query by image and video content: the QBIC system

    Publication Year: 1995 , Page(s): 23 - 32
    Cited by:  Papers (908)  |  Patents (94)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (792 KB)  

    Research on ways to extend and improve query methods for image databases is widespread. We have developed the QBIC (Query by Image Content) system to explore content-based retrieval methods. QBIC allows queries on large image and video databases based on example images, user-constructed sketches and drawings, selected color and texture patterns, camera and object motion, and other graphical inform... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 43. Enabling Smart Camera Networks with Smartphone Processors

    Publication Year: 2015 , Page(s): 56 - 63
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2134 KB)  

    Distributed smart cameras exploit smartphone processor performance in their node communication and video metadata exchange, allowing the network to collectively reason in interpreting the scene, generating alerts, and making decisions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 44. Corporate Governance of Big Data: Perspectives on Value, Risk, and Cost

    Publication Year: 2013 , Page(s): 32 - 38
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1311 KB) |  | HTML iconHTML  

    Finding data governance practices that maintain a balance between value creation and risk exposure is the new organizational imperative for unlocking competitive advantage and maximizing value from the application of big data. The first Web extra at http://youtu.be/B2RlkoNjrzA is a video in which author Paul Tallon expands on his article "Corporate Governance of Big Data: Perspectives on Value, Ri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 45. Lessons from Stuxnet

    Publication Year: 2011 , Page(s): 91 - 93
    Cited by:  Papers (18)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1420 KB) |  | HTML iconHTML  

    The article mentions that the malware such as Stuxnet can affect critical physical infrastructures that are controlled by software, which implies that threats might extend to real lives. Stuxnet differs from past malware in several ways. First, most malware tries to infect as many computers as possible, whereas Stuxnet appears to target industrial control systems and delivers its pay load under ve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 46. Iterative and incremental developments. a brief history

    Publication Year: 2003 , Page(s): 47 - 56
    Cited by:  Papers (118)  |  Patents (7)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (276 KB) |  | HTML iconHTML  

    Although many view iterative and incremental development as a modern practice, its application dates as far back as the mid-1950s. Prominent software-engineering thought leaders from each succeeding decade supported IID practices, and many large projects used them successfully. These practices may have differed in their details, but all had a common theme-to avoid a single-pass sequential, documen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 47. Wearable devices: new ways to manage information

    Publication Year: 1999 , Page(s): 57 - 64
    Cited by:  Papers (21)  |  Patents (197)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (788 KB)  

    Although the Information Age has many upsides, one of its major downsides is information overload. Indeed, the amount of information easily pushes the limit of what people can manage. This conflict drives research to seek a solution to humanity's information woes. As computers have shrunk from room size to palm size, so they have also moved from being passive accessories, such as laptops and perso... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 48. Virtual Reality: How Much Immersion Is Enough?

    Publication Year: 2007 , Page(s): 36 - 43
    Cited by:  Papers (30)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1412 KB) |  | HTML iconHTML  

    Solid evidence of virtual reality's benefits has graduated from impressive visual demonstrations to producing results in practical applications. Further, a realistic experience is no longer immersion's sole asset. Empirical studies show that various components of immersion provide other benefits - full immersion is not always necessary. The goal of immersive virtual environments (VEs) was to let t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 49. The Computer Dictionary Project: an update

    Publication Year: 1996
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (88 KB)  

    Since the mid-1980s, the IEEE Computer Society's Computer Dictionary Project has served the society, the IEEE, and computer professionals throughout the world by producing glossaries of computer-related terminology. The project's working group has finished one glossary for each of 10 computer science areas: the mathematics of computing, computer applications, modeling and simulation, image process... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 50. Penetration Testing for Web Services

    Publication Year: 2014 , Page(s): 30 - 36
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1778 KB) |  | HTML iconHTML  

    Web services are often deployed with critical software security faults that open them to malicious attack. Penetration testing using commercially available automated tools can help avoid such faults, but new analysis of several popular testing tools reveals significant failings in their performance. The Web extra at http://youtu.be/COgKs9e679o is an audio interview in which authors Nuno Antunes an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes highly acclaimed peer-reviewed articles written for and by professionals representing the full spectrum of computing technology from hardware to software and from current research to new applications.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com