By Topic

Computer

Issue 2 • Feb. 2002

Filter Results

Displaying Results 1 - 22 of 22
  • On computers and rock 'n' roll

    Publication Year: 2002, Page(s):9 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (138 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IBM begins autonomic-computing project

    Publication Year: 2002, Page(s): 25
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (52 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Malicious code hits instant messaging

    Publication Year: 2002, Page(s): 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (65 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Faster processors with optical connections

    Publication Year: 2002, Page(s): 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining knowledge [Book Review]

    Publication Year: 2002, Page(s): 105
    Request permission for commercial reuse | PDF file iconPDF (86 KB) | HTML iconHTML
    Freely Available from IEEE
  • Darwin does checkers [Book Review]

    Publication Year: 2002, Page(s): 105
    Request permission for commercial reuse | PDF file iconPDF (86 KB) | HTML iconHTML
    Freely Available from IEEE
  • Law and the web [Book Review]

    Publication Year: 2002, Page(s): 105
    Request permission for commercial reuse | PDF file iconPDF (86 KB) | HTML iconHTML
    Freely Available from IEEE
  • Neural networks from the ground up [Book Review]

    Publication Year: 2002, Page(s): 105
    Request permission for commercial reuse | PDF file iconPDF (86 KB) | HTML iconHTML
    Freely Available from IEEE
  • Making a wired world wireless [Book Review]

    Publication Year: 2002, Page(s): 105
    Request permission for commercial reuse | PDF file iconPDF (86 KB) | HTML iconHTML
    Freely Available from IEEE
  • Representative democracy and the profession

    Publication Year: 2002, Page(s):120, 118 - 119
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB)

    Digital technology could be instrumental in providing a more democratic and participatory form of government. Whether justified or not, the perception of incipient economocracy must be reversed. For, to paraphrase a much admired judicial maxim, democracy must not only be done, it must also be seen to be done. Making elected representatives more democratic and responsive to those represented, or at... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multicast support in mobile commerce applications

    Publication Year: 2002, Page(s):115 - 117
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (115 KB)

    Mobile commerce is an emerging discipline that involves mobile devices, applications, middleware, and wireless networks. Although most e-commerce applications can be modified to run in a wireless environment, m-commerce includes a wide range of new services ranging from locational advertising to mobile offices that are only possible with a wireless infrastructure. Among the many challenges m-comme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Linux in Hollywood: a star is born

    Publication Year: 2002, Page(s):112 - 114
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (377 KB)

    Although Linux has yet to achieve wide popularity in the computer game world (see ibid., Dec., p.161-2, 2001), it is making rapid progress toward becoming the dominant operating system in the other major entertainment arena: motion pictures. Name a motion picture from the past year or two (to 2002) that featured stunning animation or dazzling special effects, and chances are the film's producers u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance simulation tools

    Publication Year: 2002, Page(s):38 - 39
    Cited by:  Papers (9)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (182 KB)

    Understanding the performance of microprocessors, multiprocessors, and distributed computers requires studying them in isolation as well as observing their interaction with the entire system architecture View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web services: beyond the hype

    Publication Year: 2002, Page(s):18 - 21
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (182 KB)

    The paper considers Web services (WS). WS comprises a set of platform-neutral technologies designed to ease the delivery of network services over intranets and the Internet. Cross-platform capabilities are one of WS's key attractions because interoperability has been a dream of the distributed computing community for years. The paper lists some WS Web sites and discusses Java-based initiatives View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security: technical, social, and legal challenges

    Publication Year: 2002, Page(s):109 - 111
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (108 KB)

    Information security is increasingly making headlines these days, and usually the news is not good, some new Internet worm, virus, or Trojan is devastating corporate networks. After more than 25 years of research and engineering, why is our information infrastructure more at risk than ever? Unfortunately, there is no simple answer to this question, and there are no simple solutions. Addressing the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enter the dragon: China's computer industry

    Publication Year: 2002, Page(s):28 - 36
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB) | HTML iconHTML

    China transformed its economy by shifting from technological nationalism to a more pragmatic strategy of developing national capabilities in conjunction with multinational corporations. Consistent with this transformation, China has revamped its industrial and technology policies to become a major producer of computer hardware and a major market for computing products. In 2000, mainland Chinese pu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Asim: a performance model framework

    Publication Year: 2002, Page(s):68 - 76
    Cited by:  Papers (89)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (415 KB) | HTML iconHTML

    The longevity and usefulness of a microprocessor performance model has historically depended on the model writer's skills and discipline. However, at Compaq the models became extremely complex and unmanageable because designers lacked a structured way to develop them. To cope with these complexities, Compaq researchers began developing Asim in late 1998 to allow model writers to faithfully represe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rsim: simulating shared-memory multiprocessors with ILP processors

    Publication Year: 2002, Page(s):40 - 49
    Cited by:  Papers (85)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (143 KB) | HTML iconHTML

    The early 1990s saw several announcements of commercial shared-memory systems using processors that aggressively exploited instruction-level parallelism (ILP), including the MIPS R10000, Hewlett-Packard PA8000, and Intel Pentium Pro. These processors could potentially reduce memory read stalls by overlapping read latency with other operations, possibly changing the nature of performance bottleneck... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wanted: more network-security graduates and research

    Publication Year: 2002, Page(s):22 - 24
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (151 KB)

    The rash of viruses, intrusions, has focused considerable attention on network security in the US. At the same time, experts say the US is not spending enough on network-security research and universities are not producing enough graduates with advanced degrees in the field to conduct the necessary future research. This situation troubles many security experts, who note that much of the US's natio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Body of knowledge for software quality measurement

    Publication Year: 2002, Page(s):77 - 83
    Cited by:  Papers (31)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (130 KB) | HTML iconHTML

    Measuring quality is the key to developing high-quality software. The author describes two approaches that help to identify the body of knowledge software engineers need to achieve this goal. The first approach derives knowledge requirements from a set of issues identified during two standards efforts: the IEEE Std. 1061-1998 for a Software Quality Metrics Methodology and the American National Sta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simics: A full system simulation platform

    Publication Year: 2002, Page(s):50 - 58
    Cited by:  Papers (867)  |  Patents (37)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (702 KB) | HTML iconHTML

    Full system simulation seeks to strike a balance between accuracy and performance. Many of its possibilities have been obvious to practitioners in both academia and industry for quite some time, perhaps decades, but Simics supports more of these possibilities within a single framework than other tools do. Simics is a platform for full system simulation that can run actual firmware and completely u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SimpleScalar: an infrastructure for computer system modeling

    Publication Year: 2002, Page(s):59 - 67
    Cited by:  Papers (702)  |  Patents (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (389 KB) | HTML iconHTML

    Designers can execute programs on software models to validate a proposed hardware design's performance and correctness, while programmers can use these models to develop and test software before the real hardware becomes available. Three critical requirements drive the implementation of a software model: performance, flexibility, and detail. Performance determines the amount of workload the model ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com