Computer

Volume 36 Issue 5 • May 2003

Filter Results

Displaying Results 1 - 14 of 14
  • Leave Bernoulli out of this [airplane flight]

    Publication Year: 2003, Page(s):10 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (309 KB)

    Bernoulli discovered that as the velocity of a fluid increases, its pressure decreases. Concerning flight, Bernoulli's principle applies to the shape of an airplane wing. Air travels across the top and bottom of the wing at the same time, traveling faster on top (creating less pressure) because the wing is curved and slower on the bottom (creating more pressure) because it is flat. The trouble is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • XML raises concerns as it gains prominence

    Publication Year: 2003, Page(s):14 - 16
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (293 KB)

    XML's growing implementation has raised several key concerns. First, because they provide considerable information about a document's content, XML files include much more data than HTML files. This can burden a company's network, processor, and storage infrastructures. In addition to extensively describing a document's contents, XML files typically appear in plain text. These factors create securi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Federated approach expands database-access technology

    Publication Year: 2003, Page(s):18 - 20
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (319 KB)

    Searching multiple data sources for specific information is complex and time-consuming, largely because a user query traditionally accesses only one data source at a time. In response to this problem, a number of vendors have developed federated database-access technology products that let users query multiple, heterogeneous data sources simultaneously. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • News briefs - Vendors support new fixed wireless broadband technology

    Publication Year: 2003, Page(s): 22
    Request permission for commercial reuse | PDF file iconPDF (232 KB) | HTML iconHTML
    Freely Available from IEEE
  • Researchers improve parallel processing

    Publication Year: 2003, Page(s): 23
    Request permission for commercial reuse | PDF file iconPDF (177 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Artificial intelligence: hype or reality?

    Publication Year: 2003, Page(s):24 - 28
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1158 KB) | HTML iconHTML

    Artificial intelligence is not just hype, as many working applications use AI techniques. However, we have yet to develop a system that spans the full spectrum of intelligent behavior. For example, building a system that an make sensible decisions about unfamiliar situations in everyday, nonspecialist domains remains difficult. Nevertheless, it seems likely that applications like distributed black... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless advertising's challenges and opportunities

    Publication Year: 2003, Page(s):30 - 37
    Cited by:  Papers (52)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2688 KB) | HTML iconHTML

    Rapidly developing wireless net-working technology and the growing mobile-device user base have fueled interest in activities that deliver advertisements to mobile devices over a wireless network. Studies by wireless media research companies indicate that delivering permission-based alerts to wireless phones captures consumers' attention, drives response actions, and builds brand awareness. Wirele... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward Internet distributed computing

    Publication Year: 2003, Page(s):38 - 46
    Cited by:  Papers (18)  |  Patents (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB) | HTML iconHTML

    Emerging Internet uses-including peer-to-peer and grid computing-provide both a glimpse of and the impetus for evolving the Internet into a distributed computing, platform of unprecedented scale. Taking a longer view, the authors consider what would be needed to make the Internet an application-hosting platform: a networked, distributed counterpart of the hosting environment traditional operating ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating mobile IP with ad hoc networks

    Publication Year: 2003, Page(s):48 - 55
    Cited by:  Papers (77)  |  Patents (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (601 KB) | HTML iconHTML

    Extending traditional IEEE 802.11-based access points to incorporate the flexibility of mobile ad hoc networks would help make the dream of ubiquitous broadband wireless access a reality. The authors discuss several issues related to integrating the mobile Internet protocol with Manets. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of three vertical search spiders

    Publication Year: 2003, Page(s):56 - 62
    Cited by:  Papers (45)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB)

    The Web's dynamic, unstructured nature makes locating resources difficult. Vertical search engines solve part of the problem by keeping indexes only in specific domains. They also offer more opportunity to apply domain knowledge in the spider applications that collect content for their databases. The authors used three approaches to investigate algorithms for improving the performance of vertical ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ten reasons to use divisible load theory

    Publication Year: 2003, Page(s):63 - 68
    Cited by:  Papers (146)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB)

    During the past decade, divisible load theory has become a powerful tool for modeling data-intensive computational problems. DLT emerged from a desire to create intelligent sensor networks, but most recent applications involve parallel and distributed computing. Like other linear mathematical models such as Markovian queuing theory and electric resistive circuit theory, DLT offers easy computation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IT systems perspective - The business rule approach

    Publication Year: 2003, Page(s):85 - 87
    Cited by:  Papers (3)  |  Patents (4)
    Request permission for commercial reuse | PDF file iconPDF (262 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embedde computing - Toward IP-based system-level soc design

    Publication Year: 2003, Page(s):88 - 89
    Cited by:  Papers (7)
    Request permission for commercial reuse | PDF file iconPDF (286 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The profession - The computing profession at a crossroads

    Publication Year: 2003, Page(s):92 - 91
    Cited by:  Papers (2)
    Request permission for commercial reuse | PDF file iconPDF (233 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org