Computer

Volume 30 Issue 4 • April 1997

Filter Results

Displaying Results 1 - 20 of 20
  • Andrew Grove's Vision For The Internet

    Publication Year: 1997, Page(s):14 - 15
    Cited by:  Patents (1)
    Request permission for commercial reuse | PDF file iconPDF (101 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Students stumble onto internet explorer flaw

    Publication Year: 1997, Page(s):18 - 20
    Request permission for commercial reuse | PDF file iconPDF (116 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tomorrow's Internet Is Here Today

    Publication Year: 1997, Page(s):22 - 23
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | PDF file iconPDF (192 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Binary Version Could Bring Vrml Into Mainstream

    Publication Year: 1997, Page(s):25 - 27
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sources of failure in the public switched telephone network

    Publication Year: 1997, Page(s):31 - 36
    Cited by:  Papers (75)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (135 KB)

    What makes a distributed system reliable? A study of failures in the US public switched telephone network (PSTN) shows that human intervention is one key to this large system's reliability. Software is not the weak link in the PSTN system's dependability. Extensive use of built-in self-test and recovery mechanisms in major system components (switches) contributed to software dependability and are ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multicode: a truly multilingual approach to text encoding

    Publication Year: 1997, Page(s):37 - 43
    Cited by:  Papers (5)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (103 KB)

    Unicode was designed to extend ASCII for encoding text in different languages, but it still has several important drawbacks. Multicode addresses many of Unicode's drawbacks and should have considerable appeal to programmers who work with text in a variety of languages. Its future, however, depends on the computer industry's acceptance. Multicode can represent Unicode files because it reserves a ch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding Fault Tolerance And Reliability

    Publication Year: 1997, Page(s):45 - 50
    Cited by:  Papers (39)
    Request permission for commercial reuse | PDF file iconPDF (519 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward systematic design of fault-tolerant systems

    Publication Year: 1997, Page(s):51 - 58
    Cited by:  Papers (73)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (62 KB)

    After 30 years of study and practice in fault tolerance, high-confidence computing remains a costly privilege of several critical applications. It is time to explore ways to deliver high-confidence computing to all users. The speed of computing will ultimately be limited by the laws of physics, but the demand for affordable high-confidence computing will continue as long as people use computers to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Piranha: a CORBA tool for high availability

    Publication Year: 1997, Page(s):59 - 66
    Cited by:  Papers (21)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1693 KB)

    Despite the most careful planning, system applications can be dogged by unexpected failures. Our firm is keenly aware of the need for availability. To help meet that need, I developed an experimental CORBA-based restart service and monitor called Piranha, which both monitors and manages distributed applications to help systems attain high availability. First, Piranha acts as a network monitor that... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software-based replication for fault tolerance

    Publication Year: 1997, Page(s):68 - 74
    Cited by:  Papers (144)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1649 KB)

    Replication handled by software on off-the-shelf hardware costs less than using specialized hardware. Although an intuitive concept, replication requires sophisticated techniques for successful implementation. Group communication provides an adequate framework. We present a survey of the techniques developed since the mid-1980s to implement replicated services, emphasizing the relationship between... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault injection techniques and tools

    Publication Year: 1997, Page(s):75 - 82
    Cited by:  Papers (324)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1272 KB)

    Fault injection is important to evaluating the dependability of computer systems. Researchers and engineers have created many novel methods to inject faults, which can be implemented in both hardware and software. The contrast between the hardware and software methods lies mainly in the fault injection points they can access, the cost and the level of perturbation. Hardware methods can inject faul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault-tolerant, real-time communication in FDDI-based networks

    Publication Year: 1997, Page(s):83 - 90
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1255 KB)

    The first high-speed network to meet the Safenet standard's bandwidth requirements, the Fiber Distributed Data Interface (FDDI) needs help to meet Safenet's fault tolerance requirement. Researchers have proposed a number of FDDI-based network architecture designs for improving fault tolerance. An architecture called FBRN (FDDI-Based Reconfigurable Network) provides enhanced fault tolerance by usin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tc Seeks To Manage Complexity In Computing

    Publication Year: 1997, Page(s):91 - 92
    Request permission for commercial reuse | PDF file iconPDF (39 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Top-level Domain Name Controversy

    Publication Year: 1997, Page(s):105 - 106
    Cited by:  Patents (2)
    Request permission for commercial reuse | PDF file iconPDF (40 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embedded Systems Software

    Publication Year: 1997, Page(s): 107
    Request permission for commercial reuse | PDF file iconPDF (26 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Weighty Computer Science Reference

    Publication Year: 1997, Page(s): 108
    Request permission for commercial reuse | PDF file iconPDF (27 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-integrated computing

    Publication Year: 1997, Page(s):110 - 111
    Cited by:  Papers (119)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (48 KB)

    Computers now control many critical systems in our lives, from the brakes on our cars to the avionics control systems on planes. Such computers wed physical systems to software, tightly integrating the two and generating complex component interactions unknown in earlier systems. Thus, it is imperative that we construct software and its associated physical system so they can evolve together. The pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pitfalls and strategies in automated testing

    Publication Year: 1997, Page(s):114 - 116
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (63 KB)

    According to popular mythology, people with little programming experience can use GUI-level regression test tools to quickly and competently create extensive black box test suites that are easy to maintain. Though some efforts to use these tools have been successful, several have failed miserably. This was the focus of a two-day meeting at which 13 experienced testers discussed patterns of success... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparing Internet search engines

    Publication Year: 1997, Page(s):117 - 118
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (43 KB)

    Search engines are sophisticated utilities designed expressly to find information on the global Internet. An expensive combination of high-speed computer networks and specialized software, they are usually created by large corporations and occasionally by universities. They are freely available to anyone with Internet access, and there are no search restrictions. With more than 150 search engines ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software reuse: ostriches beware

    Publication Year: 1997, Page(s):119 - 120
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (47 KB)

    When it comes to software reuse, many software executives, like ostriches, are pushing their heads deeper into the sand. The author discusses some active reuse programs in several companies. The number of companies employing active reuse is high enough to establish that reuse on this scale is possible at the current state of the software art. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org