Scheduled System Maintenance
On Saturday, December 10, single article sales and account management will be unavailable from 5:00 AM-7:30 PM ET.
We apologize for the inconvenience.
By Topic

Computer

Issue 7 • July 2014

Filter Results

Displaying Results 1 - 25 of 28
  • Front Cover

    Publication Year: 2014, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (2177 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (162 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2014, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (716 KB)
    Freely Available from IEEE
  • Computer Highlights Society Magazines

    Publication Year: 2014, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (950 KB)
    Freely Available from IEEE
  • Managing Data-Intensive Applications in the Cloud

    Publication Year: 2014, Page(s): 6
    Request permission for commercial reuse | PDF file iconPDF (494 KB) | HTML iconHTML
    Freely Available from IEEE
  • Andrew S. Tanenbaum: The Impact of MINIX

    Publication Year: 2014, Page(s):7 - 8
    Request permission for commercial reuse | PDF file iconPDF (585 KB) | HTML iconHTML
    Freely Available from IEEE
  • Supreme Court IP Update

    Publication Year: 2014, Page(s):9 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2202 KB) | HTML iconHTML

    Several cases involving intellectual property were argued before the US Supreme Court in early 2014, and decisions have just been released. The Web extra at http://youtu.be/Ppi0tzRnLQU is an audio recording in which author Brian M. Gaff provides an audio recording of the Computing and the Law column, he discusses how several cases involving intellectual property were argued before the US Supreme C... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 32 & 16 Years Ago

    Publication Year: 2014, Page(s):13 - 14
    Request permission for commercial reuse | PDF file iconPDF (416 KB) | HTML iconHTML
    Freely Available from IEEE
  • Letters

    Publication Year: 2014, Page(s): 15
    Request permission for commercial reuse | PDF file iconPDF (159 KB) | HTML iconHTML
    Freely Available from IEEE
  • News Briefs

    Publication Year: 2014, Page(s):16 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2248 KB) | HTML iconHTML

    Topics include governments disrupting two major cyberattack systems, eBay facing investigations into a huge data breach, practical applications emerging for the Internet of Things, the EU's top court supporting the "right to be forgotten," police arresting malware suspects in an international cybercrime crackdown, a study showing that facial-recognition algorithms are improving rapid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Thinking Virtual

    Publication Year: 2014, Page(s):22 - 23
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (4570 KB) | HTML iconHTML
    Freely Available from IEEE
  • Transcending the Self in Immersive Virtual Reality

    Publication Year: 2014, Page(s):24 - 30
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2445 KB) | HTML iconHTML

    Cognitive neuroscientists have discovered through various experiments that our body representation is surprisingly flexible. Multisensory body illusions work well in immersive virtual reality, and recent findings suggest that they offer both a powerful tool for neuroscience and a new path for future exploration. Because virtual reality is entirely programmed, the form or type of virtual body can b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual Reality Exposure Therapy for Combat-Related Posttraumatic Stress Disorder

    Publication Year: 2014, Page(s):31 - 37
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1993 KB) | HTML iconHTML

    Virtual reality (VR) technology is rapidly evolving to support prolonged exposure (PE) therapy, a proven treatment for combat-related posttraumatic stress disorder. Building on the successful 2007 Virtual Iraq/Afghanistan VRET system, a team of behavioral scientists, software engineers, and virtual artists has created Bravemind, a flexible VR system that offers significantly enhanced PE treatment ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse Engineering Animal Vision with Virtual Reality and Genetics

    Publication Year: 2014, Page(s):38 - 45
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3404 KB) | HTML iconHTML

    Neuroscientists are using virtual reality systems, combined with other advances such as new molecular genetic tools and brain-recording technologies, to reveal how neuronal circuits process and act on visual information. The Web extra at http://youtu.be/e_BxdbNidyQ is an overview video showing the FlyVR system in operation, including four example experiments. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Immersive 3D Telepresence

    Publication Year: 2014, Page(s):46 - 52
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3827 KB) | HTML iconHTML

    Cutting-edge work on 3D telepresence at a multinational research center provides insight into the technology's potential, as well as into its remaining challenges. Here we present a brief overview of some of our recent immersive 3D telepresence work, focusing on major issues, recent results, and remaining challenges, mainly with respect to 3D acquisition and reconstruction, and 3D display. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Shortening the Boot Time of Android OS

    Publication Year: 2014, Page(s):53 - 58
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (597 KB) | HTML iconHTML

    A variation of the suspend-resume technique eliminates the need to initialize the Linux kernel, and when combined with approaches to enhance external memory read speed and shrink the suspend image, can decrease Android OS boot time by up to 90 percent. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research Feature 
  • Measuring Variance between Smartphone Energy Consumption and Battery Life

    Publication Year: 2014, Page(s):59 - 65
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (623 KB) | HTML iconHTML

    A case study reveals that energy savings do not always translate to longer smartphone battery life and that evaluating any savings plan must be based on battery consumption, not energy used. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monitoring Translation Lookahead Buffers to Detect Code Injection Attacks

    Publication Year: 2014, Page(s):66 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (726 KB) | HTML iconHTML

    By identifying memory pages that external I/O operations have modified, a proposed scheme blocks malicious injected code activation, accurately distinguishing an attack from legitimate code injection with negligible performance impact and no changes to the user application. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Talking to the Future

    Publication Year: 2014, Page(s):73 - 75
    Request permission for commercial reuse | PDF file iconPDF (1258 KB) | HTML iconHTML
    Freely Available from IEEE
  • Robert David Steele on OSINT

    Publication Year: 2014, Page(s):76 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (459 KB) | HTML iconHTML

    Open source intelligence (OSINT) represents a new, public, transparent, and constitutionally friendly approach to intelligence gathering. As such it should be of considerable interest to technologists, journalists, and civil libertarians. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy Efficiency through Significance-Based Computing

    Publication Year: 2014, Page(s):82 - 85
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1375 KB) | HTML iconHTML

    An extension of approximate computing, significance-based computing exploits applications' inherent error resiliency and offers a new structural paradigm that strategically relaxes full computational precision to provide significant energy savings with minimal performance degradation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward Connected Shared Experiences

    Publication Year: 2014, Page(s):86 - 89
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3247 KB) | HTML iconHTML

    To move beyond the current "talking heads" paradigm and enable truly natural and immersive shared experiences, video-mediated communication systems must be able to understand the context of the shared activity as well as the social layer of interaction. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cloudebug: A Programmable Online Malware Testbed

    Publication Year: 2014, Page(s):90 - 92
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1447 KB) | HTML iconHTML

    Virtual machines for malware analysis in current cloud-based debugging services are not easily accessible or operable by end users. Cloudebug allows users to operate its VM directly in the cloud. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 802 LAN/MAN Standards: High Quality and Market Relevant

    Publication Year: 2014, Page(s):93 - 95
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (786 KB) | HTML iconHTML

    This column provides an overview of the 802 LAN/MAN Standards Committee over the past 34 years and postulates reasons for its success. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Society Connection

    Publication Year: 2014, Page(s):96 - 97
    Request permission for commercial reuse | PDF file iconPDF (454 KB)
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com