By Topic

Computer

Issue 8 • August 2012

Filter Results

Displaying Results 1 - 25 of 27
  • Front Cover

    Publication Year: 2012, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1497 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (191 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2012, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (1020 KB)
    Freely Available from IEEE
  • Computer Highlights Society Magazines

    Publication Year: 2012, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (1502 KB)
    Freely Available from IEEE
  • Letters

    Publication Year: 2012, Page(s):6 - 7
    Request permission for commercial reuse | PDF file iconPDF (618 KB) | HTML iconHTML
    Freely Available from IEEE
  • Teaching the World: Daphne Koller and Coursera

    Publication Year: 2012, Page(s):8 - 9
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (473 KB) | HTML iconHTML

    The increasing interest in moving forward from the simple sharing of course materials to develop a more course-like online experience represents the next step toward realizing the vision for open education. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Information Page

    Publication Year: 2012, Page(s): 10
    Request permission for commercial reuse | PDF file iconPDF (161 KB)
    Freely Available from IEEE
  • Doing Business in China

    Publication Year: 2012, Page(s):11 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (687 KB) | HTML iconHTML

    The eighth in a series of articles providing basic information on legal issues facing people and businesses that operate in computing-related markets discusses some issues that can occur when doing business in the People's Republic of China. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 32 & 16 years ago

    Publication Year: 2012, Page(s):14 - 15
    Request permission for commercial reuse | PDF file iconPDF (576 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conferences Advertisement

    Publication Year: 2012, Page(s): 16
    Request permission for commercial reuse | PDF file iconPDF (913 KB)
    Freely Available from IEEE
  • Converged Infrastructure: Addressing the Efficiency Challenge

    Publication Year: 2012, Page(s):17 - 20
    Request permission for commercial reuse | PDF file iconPDF (722 KB) | HTML iconHTML
    Freely Available from IEEE
  • News Briefs

    Publication Year: 2012, Page(s):21 - 23
    Request permission for commercial reuse | PDF file iconPDF (1566 KB) | HTML iconHTML
    Freely Available from IEEE
  • Massively Multithreaded Computing Systems

    Publication Year: 2012, Page(s):24 - 25
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (631 KB) | HTML iconHTML
    Freely Available from IEEE
  • Algorithm and Data Optimization Techniques for Scaling to Massively Threaded Systems

    Publication Year: 2012, Page(s):26 - 32
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5116 KB) | HTML iconHTML

    A study of the implementation patterns among massively threaded applications for many-core GPUs reveals that each of the seven most commonly used algorithm and data optimization techniques can enhance the performance of applicable kernels by 2 to 10× in current processors while also improving future scalability. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A GPU Task-Parallel Model with Dependency Resolution

    Publication Year: 2012, Page(s):34 - 41
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (16273 KB) | HTML iconHTML

    A task-parallel approach to programming commodity graphics hardware is useful for implementing irregular parallel workloads with dependencies, particularly for applications such as video encoding and backtracking algorithms View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Can GPGPU Programming Be Liberated from the Data-Parallel Bottleneck?

    Publication Year: 2012, Page(s):42 - 52
    Cited by:  Papers (8)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1447 KB) | HTML iconHTML

    With the growth in transistor counts in modern hardware, heterogeneous systems are becoming commonplace. Core counts are increasing such that GPU and CPU designs are reaching deep into the tens of cores. For performance reasons, different cores in a heterogeneous platform follow different design choices. Based on throughput computing goals, GPU cores tend to support wide vectors and substantial re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing Next-Generation Massively Multithreaded Architectures for Irregular Applications

    Publication Year: 2012, Page(s):53 - 61
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1382 KB) | HTML iconHTML

    Massively multithreaded architectures like the Cray XMT address the needs of irregular data-intensive applications better than commodity clusters. A proposed evolution of the XMT integrates multicore processors and next-generation interconnects, along with memory reference aggregation to optimize network utilization. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cinefile: A Category-Based Analytic Browser

    Publication Year: 2012, Page(s):62 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1512 KB) | HTML iconHTML

    A category-based browser identifies related items and groups them into custom-defined categories that it uses as first-class query constructs, making it possible to view aggregate information and receive approximate answers that might be difficult to state explicitly. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Open Access: An Evolving Alternative

    Publication Year: 2012, Page(s):70 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (309 KB) | HTML iconHTML

    Open access impacts both the general public's good will and the ability to satisfy the public good that is inherent in creating new scholarship. Although it offers an alternative to the traditional publishing model that makes scholarship freely available digitally without common copyright and licensing restrictions, open access has garnered significant debate. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Playdates with Robots

    Publication Year: 2012, Page(s):73 - 75
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (728 KB) | HTML iconHTML

    Studies of different robot features and behaviors are leading to the development of models for more effective peer-based interaction between robots and children. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward Sociotechnical Urban Superorganisms

    Publication Year: 2012, Page(s):76 - 78
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1653 KB) | HTML iconHTML

    Sooner or later, we'll all become part of an urban superorganism, putting our ICT devices and unique human capabilities to use for the good of both ourselves and society. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Complexity of Software Systems

    Publication Year: 2012, Page(s):79 - 81
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (953 KB) | HTML iconHTML

    Developing the tools necessary for reasoning about and understanding large, complex software systems requires interdisciplinary research that borrows from other domains where complexity similarly comes into play. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • When Is a Cyberattack a Use of Force or an Armed Attack?

    Publication Year: 2012, Page(s):82 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (999 KB) | HTML iconHTML

    A cyberattack involving military or intelligence operations might not rise to the level of a “use of force” under international law. Legal experts generally agree that to qualify as an armed attack, a cyberattack must result in death or a significant degree of injury to persons or physical damage to property. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Election

    Publication Year: 2012, Page(s):85 - 93
    Request permission for commercial reuse | PDF file iconPDF (972 KB)
    Freely Available from IEEE
  • IEEE President-Elect Candidates Address Computer Society Concerns

    Publication Year: 2012, Page(s):94 - 99
    Request permission for commercial reuse | PDF file iconPDF (287 KB)
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com