By Topic

Computer

Issue 2 • Feb. 2009

Filter Results

Displaying Results 1 - 25 of 33
  • [Front cover]

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (796 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (478 KB)
    Freely Available from IEEE
  • Computer Highlights Society Magazines

    Publication Year: 2009, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (415 KB)
    Freely Available from IEEE
  • Letters

    Publication Year: 2009, Page(s):6 - 7
    Request permission for commercial reuse | PDF file iconPDF (153 KB) | HTML iconHTML
    Freely Available from IEEE
  • Scanning the Horizon

    Publication Year: 2009, Page(s):8 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (538 KB) | HTML iconHTML

    In addition to reducing the time it took to pay for purchases, bar codes and scanners provided a system that would track inventory, reduce theft, and provide data to help merchants understand how their goods were purchased. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 32 and 16 Years Ago

    Publication Year: 2009, Page(s):12 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    Highlights new technologies being written about in Computer Magazine in 1977 and 1993. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Will Mobile Computing's Future Be Location, Location, Location?

    Publication Year: 2009, Page(s):14 - 17
    Cited by:  Papers (13)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1421 KB) | HTML iconHTML

    As mobile computing has become more popular over the past decade, experts have touted the future of location-based services. LBS systems could determine mobile users' locations. Proponents say they could thus enable applications that would not only tell people where they are and how best to get to their destinations, but also whether friends are nearby, what the local weather forecast is, and wher... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [CS Info Page]

    Publication Year: 2009, Page(s): 18
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • Users Take a Close Look at Visual Analytics

    Publication Year: 2009, Page(s):19 - 22
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1016 KB) | HTML iconHTML

    The need to more easily and effectively analyze the mountains of data that organizations are gathering and also to see their findings in ways that are simple to understand and work with has created a growing interest in visual analytics. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • News Briefs

    Publication Year: 2009, Page(s):23 - 26
    Request permission for commercial reuse | PDF file iconPDF (847 KB) | HTML iconHTML
    Freely Available from IEEE
  • An Open Grid Services Architecture Primer

    Publication Year: 2009, Page(s):27 - 34
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB) | HTML iconHTML

    To expand the use of distributed computer infrastructures as well as facilitate grid interoperability, OGSA has developed standards and specifications that address a range of scenarios, including high-throughput computing, federated data management, and service mobility. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BYC [advertisement]

    Publication Year: 2009, Page(s): 35
    Request permission for commercial reuse | PDF file iconPDF (875 KB)
    Freely Available from IEEE
  • IPv6 Security Challenges

    Publication Year: 2009, Page(s):36 - 42
    Cited by:  Papers (26)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (751 KB) | HTML iconHTML

    IPv6, the new version of the Internet protocol, has been developed to provide new services and to support the Internet's growth. This paper presents an overview of the key security issues, which outlines the challenges in deploying and transitioning to IPv6. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CN [advertisement]

    Publication Year: 2009, Page(s): 43
    Request permission for commercial reuse | PDF file iconPDF (1554 KB)
    Freely Available from IEEE
  • Dynamic Trust Management

    Publication Year: 2009, Page(s):44 - 52
    Cited by:  Papers (26)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1427 KB) | HTML iconHTML

    We continue to investigate the use of trust management techniques to specify dynamic policies in complex integrated service-oriented networks. For this work, we use the DoD GIG's service-oriented architecture as a focal point. In this research's initial phase, we are developing prototype dynamic trust management policy services for a service-oriented architecture. In our research's next phase, we ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CSDA and CSDP [advertisement]

    Publication Year: 2009, Page(s): 53
    Request permission for commercial reuse | PDF file iconPDF (302 KB)
    Freely Available from IEEE
  • Modeling Trust Negotiation for Web Services

    Publication Year: 2009, Page(s):54 - 61
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1176 KB) | HTML iconHTML

    As Web services become more widely adopted, developers must cope with the complexity of evolving trust negotiation policies spanning numerous autonomous services. The Trust-Serv framework uses a state-machine-based modeling approach that supports life-cycle policy management and automated enforcement. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Refactoring for Data Locality

    Publication Year: 2009, Page(s):62 - 71
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1527 KB) | HTML iconHTML

    Refactoring for data locality opens a new avenue for performance-oriented program rewriting. SLO has broken down a large part of the complexity that software developers face when speeding up programs with numerous cache misses. Therefore, we consider SLO to belong to a new generation of program analyzers. Whereas existing cache profilers (generation 1.0) highlight problems such as cache misses, se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Creating and Reading Realistic Electronic Books

    Publication Year: 2009, Page(s):72 - 81
    Cited by:  Papers (5)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2841 KB) | HTML iconHTML

    A digital library project aims to combine the look and feel of physical books with the advantages of online documents such as hyperlinks and multimedia. A lightweight open source implementation enables highly responsive page turning and works within standard Web browsers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Career opportunities

    Publication Year: 2009, Page(s):82 - 84
    Request permission for commercial reuse | PDF file iconPDF (230 KB)
    Freely Available from IEEE
  • Bookshelf

    Publication Year: 2009, Page(s): 85
    Request permission for commercial reuse | PDF file iconPDF (239 KB) | HTML iconHTML
    Freely Available from IEEE
  • CS membership forms

    Publication Year: 2009, Page(s): 86
    Request permission for commercial reuse | PDF file iconPDF (887 KB)
    Freely Available from IEEE
  • CS membership forms

    Publication Year: 2009, Page(s): 87
    Request permission for commercial reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • CS membership forms

    Publication Year: 2009, Page(s): 88
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • Computer Society Awards Honor Top Researchers

    Publication Year: 2009, Page(s):89 - 94
    Request permission for commercial reuse | PDF file iconPDF (1682 KB)
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com