By Topic

Computer

Issue 6 • June 1996

Filter Results

Displaying Results 1 - 15 of 15
  • Client-Server and Object-Oriented Training

    Publication Year: 1996
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2159 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Student and Chapter Award Winners for 1996

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (286 KB)
    Freely Available from IEEE
  • A call for standards for portable Web applications

    Publication Year: 1996
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gurus share insights onn objects

    Publication Year: 1996
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (780 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Better development with BoundsChecker

    Publication Year: 1996
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1161 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Strategies for managing requirements creep

    Publication Year: 1996, Page(s):92 - 94
    Cited by:  Papers (15)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB)

    One of the most chronic problems in software development is the fact that application requirements are almost never stable and fixed. Frequent changes in requirements are not always caused by capricious clients (although sometimes they are). The root cause of requirements volatility is that many applications are attempting to automate domains that are only partly understood. As software design and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Social activity indicators for groupware

    Publication Year: 1996, Page(s):37 - 42
    Cited by:  Papers (5)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1164 KB)

    Suppose you're a member of a few development teams, working with people who are geographically dispersed. You're using distributed groupware to work with your team mates. How do you decide when to work on a project and when to ignore requests to work on a project, when there are enough users on the groupware system to bother using it, who is available to answer a question, and which applications s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Public key cryptography

    Publication Year: 1996, Page(s):101 - 104
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1484 KB)

    The RSA algorithm can be used for a kind of unforgeable digital signature. In this application, the secret key is used to encrypt a message, which can then itself be decrypted by anyone possessing the public key. Digital signatures can play a role in many activities that do not require secrecy but require sender authentication and guaranteed message integrity. Because it offers the possibility of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structured evaluation of computer systems

    Publication Year: 1996, Page(s):45 - 51
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1432 KB)

    Evaluating computers and other systems is difficult for a couple of reasons. First, the goal of evaluation is typically ill-defined: customers, sometimes even designers, either don't know or can't specify exactly what result they expect. Often, they don't specify the architectural variants to consider, and often the metrics and workload they expect you to use are ill-defined. Second, they rarely c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IPOs. II. Getting the corporate house in order

    Publication Year: 1996, Page(s):90 - 91
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB)

    Finding a good underwriter is important to the success of an initial public offering (IPO). The underwriter, an IPO's basic investor, is responsible for introducing the issuing company to the public and attracting enough additional investment to make the offering a success. An issuer's documents and records will be closely examined during the IPO process. US securities laws include strict disclosu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust distributed computing and sensing algorithm

    Publication Year: 1996, Page(s):53 - 60
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1440 KB)

    Sensors that supply data to computer systems are inherently unreliable. When sensors are distributed, reliability is further compromised. How can a system tell good sensor data from faulty? A hybrid algorithm combines proposed solutions to address the problem View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Creating printed music automatically

    Publication Year: 1996, Page(s):61 - 68
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1548 KB)

    Most users of notational software have little or no music copyist training, and musicianship does not guarantee notational skills. Even professional composers fail at many notational tasks if they have not had explicit copyist training. The ability to notate music has very little in common with the ability to compose or play it. Unfortunately, we do not have the rules for notating music in a presc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design models for computer-human interfaces

    Publication Year: 1996, Page(s):28 - 35
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1420 KB)

    Computer-human interface design has been recognized as a distinct field for only a little more than a decade, but the design of interfaces to control mechanical devices has a much longer history. The interface-design models used in these mechanical systems play similar roles in computer systems, despite the obvious differences between the two types of systems. There are many ways to control a give... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Refining the curriculum: client-server and object-oriented training

    Publication Year: 1996, Page(s):80 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2604 KB)

    Managers and programmers in a programming shop moving to client-server (CS) and object-oriented (OO) technology need to answer the following questions: What tasks will he most important for fully functioning CS and OO developers? Should training and educational requirements focus on programming skills (such as mastering a particular language) or on more general aspects of analysis and design? We d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From content-based retrieval to invisible telepresence

    Publication Year: 1996, Page(s):85 - 86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (760 KB)

    Better tools for producing and managing data, combined with the human desire for information, have resulted in a data explosion. Indeed, data overload often leaves us confused, disoriented, and inefficient. The challenge is to find relevant data that lets us extract the information we want. Keyword-based systems cannot do this well, especially when working with images and video. It will be impossi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com