Computer

Volume 37 Issue 3 • March 2004

Filter Results

Displaying Results 1 - 25 of 31
  • Computer - Front cover

    Publication Year: 2004, Page(s): 01
    Request permission for commercial reuse | PDF file iconPDF (872 KB)
    Freely Available from IEEE
  • Computer - Table of Contents

    Publication Year: 2004, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (853 KB)
    Freely Available from IEEE
  • Article summaries

    Publication Year: 2004, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (194 KB) | HTML iconHTML
    Freely Available from IEEE
  • Letters

    Publication Year: 2004, Page(s):6 - 7
    Request permission for commercial reuse | PDF file iconPDF (257 KB) | HTML iconHTML
    Freely Available from IEEE
  • 32 & 16 years ago

    Publication Year: 2004, Page(s): 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (190 KB) | HTML iconHTML

    The more we know about yesterday, the better we will be able to deal with today. Computer offers this bimonthly column providing excerpts from past issues to serve as a memory jogger for older members and as a perspective creator for newer members. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Zen of overclocking

    Publication Year: 2004, Page(s):9 - 12
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (895 KB) | HTML iconHTML

    The author spotlights "better-than-worst-case" design. With normal worst-case design, any computing system is a conglomeration of components, operating within frequencies, power supply voltages, and temperature ranges that were set to simultaneously accommodate worst-case values of every single component. These stacked margins result in noticeable headroom under nominal conditions. It is this head... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Voice authentication speaks to the marketplace

    Publication Year: 2004, Page(s):13 - 15
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (330 KB) | HTML iconHTML

    Individuals trying to make a purchase with a credit card, access a protected computer system, or retrieve account information from their bank can speak into a telephone and have their voice identified by a voice-authentication system to verify they are who they claim to be. A growing number of voice-authorization products are appearing, however, concerns in areas such as security and accuracy may ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Displaying data in thin air

    Publication Year: 2004
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (411 KB) | HTML iconHTML
    Freely Available from IEEE
  • Reversible computing may improve mobile performance

    Publication Year: 2004
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (210 KB) | HTML iconHTML

    Researchers are working hard at developing one of the first reversible computers, a machine that promises to reduce energy consumption and thereby enable performance improvements in cellular telephones, laptops, and other battery-operated devices. Reversible computers, also called adiabatic systems, recycle their energy and thus emit very little heat. This lets computing power grow without hitting... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Billion-transistor architectures: there and back again

    Publication Year: 2004, Page(s):22 - 28
    Cited by:  Papers (34)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    In September 1997, Computer published a special issue on billion-transistor microprocessor architectures. Comparing that issue's predictions about the trends that would drive architectural development with the factors that subsequently emerged shows a greater-than-predicted emphasis on clock speed and an unforeseen importance of power constraints. Of seven architectural visions proposed in 1997, n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Metamorphic programming: unconventional high performance

    Publication Year: 2004, Page(s):30 - 38
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (603 KB) | HTML iconHTML

    A programming methodology that violates most of the rules of good programming has shown spectacular reductions in simulation times on several benchmarks. Applying this technique in logic-level VLSI circuit simulation also improved simulation performance. For a new VLSI circuit, faster simulation translates into faster time to market, so even the most peculiar programming type is worth exploring if... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society - Information

    Publication Year: 2004, Page(s): 39
    Request permission for commercial reuse | PDF file iconPDF (217 KB)
    Freely Available from IEEE
  • We may need a new box

    Publication Year: 2004, Page(s):40 - 41
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB) | HTML iconHTML

    Meeting emerging computer design industry challenges requires finding a balance between continuing to apply old technology beyond the point where it is workable and prematurely deploying new technology without knowing its limitations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliable and efficient system-on-chip design

    Publication Year: 2004, Page(s):42 - 50
    Cited by:  Papers (48)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB) | HTML iconHTML

    To increase processor performance, the microprocessor industry is scaling feature sizes into the deep submicron and sub-100-nanometer regime. The recent emergence of noise and the dramatic increase in process variations have raised serious questions about using nanometer process technologies to design reliable, low-power, high-performance computing systems. The design and electronic design automat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Going beyond worst-case specs with TEAtime

    Publication Year: 2004, Page(s):51 - 56
    Cited by:  Papers (29)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (543 KB) | HTML iconHTML

    Virtually all engineers use worst-case component specifications for new system designs, thereby ensuring that the resulting product will operate under worst-case conditions. However, given that most systems operate under typical operating conditions that rarely approach the demands of worst-case conditions, building such robust systems incurs a significant performance cost. Further, classic worst-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Making typical silicon matter with Razor

    Publication Year: 2004, Page(s):57 - 65
    Cited by:  Papers (88)  |  Patents (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (677 KB) | HTML iconHTML

    Voltage scaling has emerged as a powerful technology for addressing the power challenges that current on-chip densities pose. Razor is a voltage-scaling technology based on dynamic, in-situ detection and correction of circuit-timing errors. Razor permits design optimizations that tune the energy in a microprocessor pipeline to typical circuit-operational levels. This eliminates the voltage margins... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Speeding up processing with approximation circuits

    Publication Year: 2004, Page(s):67 - 73
    Cited by:  Papers (80)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (334 KB) | HTML iconHTML

    Current microprocessors employ a global timing reference to synchronize data transfer. A synchronous system must know the maximum time needed to compute a function, but a circuit usually finishes computation earlier than the worst-case delay. The system nevertheless waits for the maximum time bound to guarantee a correct result. As a first step in achieving variable pipeline delays based on data v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2004 IEEE Computer Society Professional Membership / Subscription Application

    Publication Year: 2004, Page(s):75 - 76
    Request permission for commercial reuse | PDF file iconPDF (230 KB)
    Freely Available from IEEE
  • CSIDC 2004 attracts hundreds of student teams

    Publication Year: 2004, Page(s):77 - 79
    Request permission for commercial reuse | PDF file iconPDF (277 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Register now for software developer credential

    Publication Year: 2004, Page(s):79 - 83
    Request permission for commercial reuse | PDF file iconPDF (264 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Products

    Publication Year: 2004, Page(s): 91
    Request permission for commercial reuse | PDF file iconPDF (273 KB) | HTML iconHTML
    Freely Available from IEEE
  • Programming with Objects: A Comparative Presentation of Object-Oriented Programming with C++ and Java [Book Review]

    Publication Year: 2004, Page(s): 92
    Request permission for commercial reuse | PDF file iconPDF (251 KB) | HTML iconHTML
    Freely Available from IEEE
  • Managing systems development

    Publication Year: 2004, Page(s):93 - 94
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (250 KB) | HTML iconHTML

    This article is the first of a two-part series on the unmet promise of IT project management. Here we describe the evolutionary path that has brought us to today's project culture and how successful organizations are managing projects. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agent hell: a scenario of worst practices

    Publication Year: 2004, Page(s):96 - 98
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (259 KB) | HTML iconHTML

    To help develop and maintain well-engineered agent systems, we must define good modeling tools and methodologies. Despite the impossibility of controlling both individual agents and environmental dynamism, we need ways to predict interactive behavior among large numbers of agents and to provide some sort of control for easily maintaining them. Systematic development of agent-based systems requires... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embedded is the new paradigm(s)

    Publication Year: 2004, Page(s):99 - 101
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    Embedded computing moved beyond toasters quite some time ago, but there are still misconceptions about what embedded computers do. Some of those misconceptions come from an old-fashioned view of what a computer is. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org