By Topic

Computer

Issue 1 • Jan. 2005

Filter Results

Displaying Results 1 - 25 of 28
  • [Front cover]

    Publication Year: 2005, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (491 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2005, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (830 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2005, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • Article summaries

    Publication Year: 2005, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (48 KB) | HTML iconHTML
    Freely Available from IEEE
  • Letters

    Publication Year: 2005, Page(s): 6
    Request permission for commercial reuse | PDF file iconPDF (44 KB) | HTML iconHTML
    Freely Available from IEEE
  • Building on the Past - Looking to the Future

    Publication Year: 2005, Page(s):7 - 9
    Request permission for commercial reuse | PDF file iconPDF (154 KB)
    Freely Available from IEEE
  • Maintaining Technical Currency in Today's Technology Climate

    Publication Year: 2005, Page(s):10 - 11
    Request permission for commercial reuse | PDF file iconPDF (87 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Machine Intelligence Meets Neuroscience

    Publication Year: 2005, Page(s):12 - 15
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (336 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 32 & 16 Years Ago

    Publication Year: 2005, Page(s):16 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (52 KB) | HTML iconHTML

    The more we know about yesterday, the better we will be able to deal with today. Computer offers this column providing excerpts from past issues to serve as a memory jogger for older members and as a perspective creator for newer members. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Malicious bots threaten network security

    Publication Year: 2005, Page(s):18 - 20
    Cited by:  Papers (24)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    Viruses, worms, Trojan horses, and network intrusions are among the threats that security administrators worry about on a regular basis. However, there is a less familiar threat that many experts say could be just as dangerous: malicious bot software. A bot is a program that operates automatically as an agent for a user or another program. Hackers forward bots to victims by a number of means, and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Squeezing supercomputers onto a chip

    Publication Year: 2005, Page(s):21 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB) | HTML iconHTML

    Researchers are pursuing various ways of developing chips with supercomputer-level capabilities. For example, using designs with multiple processing cores that operate in parallel can boost performance. Thus, some of the new supercomputer-on-chips don't run as fast as Pentium processors, making them more energy efficient, but yield higher performance. Research projects are also using small chip-fe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • News Briefs

    Publication Year: 2005, Page(s):24 - 26
    Request permission for commercial reuse | PDF file iconPDF (162 KB) | HTML iconHTML
    Freely Available from IEEE
  • Robonaut: the 'short list' of technology hurdles

    Publication Year: 2005, Page(s):28 - 37
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1792 KB) | HTML iconHTML

    The International Space Station highlights NASA's reliance on extravehicular activity spacewalks to configure external equipment, connect services, and perform maintenance. Conventional EVA operations are planned for two astronauts working an eight-hour day. The recent emergence of highly dexterous space robots could help conserve EVA hours by relieving humans of many routine inspection and mainte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reactive animation: realistic modeling of complex dynamic systems

    Publication Year: 2005, Page(s):38 - 47
    Cited by:  Papers (28)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (768 KB) | HTML iconHTML

    Some complex systems are transformational, of an input-process-output type, repeatedly carrying out their prescribed work for each new set of inputs. A far more problematic class comprises large systems that are heavily controlor event-driven. Such systems (dubbed reactive because they react to various kinds of events, signals, and conditions in intricate ways) are often concurrent and distributed... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embedded entertainment with smart projectors

    Publication Year: 2005, Page(s):48 - 55
    Cited by:  Papers (50)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1200 KB) | HTML iconHTML

    The popularity of today's flat-panel liquid-crystal and plasma TV displays shows that emerging trends favor large-screen displays. Another display type may soon conquer the entertainment market, however: video projectors have experienced an enormous metamorphosis during the past decade. These devices now offer admirable cost reductions and performance increases, and they can generate images much l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-assembled architectures and the temporal aspects of computing

    Publication Year: 2005, Page(s):56 - 64
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB) | HTML iconHTML

    Despite the convenience of clean abstractions, technological trends are blurring the lines between design layers and creating new interactions between previously unrelated architecture layers. For example, virtual machines such as VMWare and Transmeta implement the application-software-visible architecture in virtual-machine software, allowing more flexibility in the hardware/software interface be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Challenges for quantum computing with solid-state devices

    Publication Year: 2005, Page(s):65 - 69
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1112 KB) | HTML iconHTML

    Quantum computing has attracted considerable interest in the past decade as a possible way to deal with certain intractable problems of conventional digital computing. Quantum computers built using the versatile methods of solid-state technology are attractive because the many thousands of devices needed for such a computer could be fabricated with well-established technologies. However, the imper... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Society Information

    Publication Year: 2005, Page(s): 70
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • India's IT services industry: a comparative analysis

    Publication Year: 2005, Page(s):71 - 75
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    To remain globally competitive, multinational corporations are outsourcing their IT services and relocating their labor-intensive operations overseas to low-wage countries. In the past decade, India's IT services industry emerged as an important player in this global market. While worldwide IT services revenue increased less than 2 percent from 2000 to 2003, India's IT services industry experience... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Society Offers a Wide Array of Products and Services in 2005

    Publication Year: 2005, Page(s):79 - 83
    Request permission for commercial reuse | PDF file iconPDF (207 KB)
    Freely Available from IEEE
  • Call and Calendar

    Publication Year: 2005, Page(s):84 - 87
    Request permission for commercial reuse | PDF file iconPDF (291 KB)
    Freely Available from IEEE
  • Advertisement/Product Index

    Publication Year: 2005, Page(s): 99
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bookshelf

    Publication Year: 2005, Page(s): 100
    Request permission for commercial reuse | PDF file iconPDF (136 KB) | HTML iconHTML
    Freely Available from IEEE
  • Products

    Publication Year: 2005, Page(s):101 - 102
    Request permission for commercial reuse | PDF file iconPDF (368 KB) | HTML iconHTML
    Freely Available from IEEE
  • The engineering of supersystems

    Publication Year: 2005, Page(s):103 - 105
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    An everyday mobile phone contains two to four processors executing several hundred million instructions per second (MIPS) in closely coupled or networked configurations that implement the mobile modem as software on a single digital signal processor (DSP). The base stations controlling wireless and wireline communications systems are themselves a hierarchy of closely coupled systems with multiproc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com