Computer

Volume 37 Issue 4 • April 2004

Filter Results

Displaying Results 1 - 25 of 32
  • IEEE Computer Magazine - April 2004

    Publication Year: 2004, Page(s): 01
    Request permission for commercial reuse | PDF file iconPDF (1097 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2004, Page(s):02 - 1
    Request permission for commercial reuse | PDF file iconPDF (922 KB)
    Freely Available from IEEE
  • [IEEE Computer - Magazine's Staff]

    Publication Year: 2004, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (214 KB)
    Freely Available from IEEE
  • Article summaries

    Publication Year: 2004, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (194 KB) | HTML iconHTML
    Freely Available from IEEE
  • Announcement

    Publication Year: 2004, Page(s): 5
    Request permission for commercial reuse | PDF file iconPDF (142 KB)
    Freely Available from IEEE
  • Software quality improvement - Letters

    Publication Year: 2004, Page(s):6 - 7
    Request permission for commercial reuse | PDF file iconPDF (268 KB) | HTML iconHTML
    Freely Available from IEEE
  • Announcement

    Publication Year: 2004, Page(s): 8
    Request permission for commercial reuse | PDF file iconPDF (140 KB)
    Freely Available from IEEE
  • Brainstorming, influence, and icebergs [project management]

    Publication Year: 2004, Page(s):9 - 12
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (302 KB) | HTML iconHTML

    Brainstorming done right is an exhilarating, exhausting process. The personnel mix in a brainstorming group is crucial. Ideally, the group includes at least one and at most two "idea fountain" types, the kind of people whose brains automatically generate 10 ideas for every one being discussed. The group also should include at least one person who strongly wants useful results out of the session, s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Will network processor units live up to their promise?

    Publication Year: 2004, Page(s):13 - 15
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (390 KB) | HTML iconHTML

    Networking technology has been advancing faster than CPU technology in many ways, and this has created a need for new design approaches for chips used in networking settings. The NPU market started small several years ago with a few start-up companies but has since grown and begun to consolidate around several leading vendors. In addition, the technology has matured in terms of programming tools, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intel develops silicon that switches optical signals

    Publication Year: 2004
    Request permission for commercial reuse | PDF file iconPDF (213 KB) | HTML iconHTML
    Freely Available from IEEE
  • Spam hits instant messaging

    Publication Year: 2004
    Request permission for commercial reuse | PDF file iconPDF (207 KB) | HTML iconHTML
    Freely Available from IEEE
  • Announcement

    Publication Year: 2004, Page(s): 19
    Request permission for commercial reuse | PDF file iconPDF (567 KB)
    Freely Available from IEEE
  • Coping with Java threads

    Publication Year: 2004, Page(s):20 - 27
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    A thread is a basic unit of program execution that can share a single address space with other threads - that is, they can read and write the same variables and data structures. Originally, only assembly programmers used threads. A few older programming languages such as PL/I supported thread concurrency, but newer languages such as C and C++ use libraries instead. Only recently have programming l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A software infrastructure for authenticated Web metering

    Publication Year: 2004, Page(s):28 - 33
    Cited by:  Papers (3)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (530 KB) | HTML iconHTML

    As the popularity of the Internet and the number of resources available on it have grown, potential customers are increasingly turning to it for information about products and services. Accordingly, online advertising is gaining a significant portion of the advertising market. The Internet has become a mainstream advertising channel, surpassing traditional media such as newspapers and radio in num... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive neural network clustering of Web users

    Publication Year: 2004, Page(s):34 - 40
    Cited by:  Papers (24)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (366 KB) | HTML iconHTML

    The degree of personalization that a Web site offers in presenting its services to users is an important attribute contributing to the site's popularity. Web server access logs contain substantial data about user access patterns. One way to solve this problem is to group users on the basis of their Web interests and then organize the site's structure according to the needs of different groups. Two... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • XML-based specification for Web services document security

    Publication Year: 2004, Page(s):41 - 49
    Cited by:  Papers (35)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB) | HTML iconHTML

    The Internet and related technologies have seen tremendous growth in distributed applications such as medicine, education, e-commerce, and digital libraries. As demand increases for online content and integrated, automated services, various applications employ Web services technology for document exchange among data repositories. Web services provide a mechanism to expose data and functionality us... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Crime data mining: a general framework and some examples

    Publication Year: 2004, Page(s):50 - 56
    Cited by:  Papers (156)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (590 KB) | HTML iconHTML

    A major challenge facing all law-enforcement and intelligence-gathering organizations is accurately and efficiently analyzing the growing volumes of crime data. Detecting cybercrime can likewise be difficult because busy network traffic and frequent online transactions generate large amounts of data, only a small portion of which relates to illegal activities. Data mining is a powerful tool that e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Information

    Publication Year: 2004, Page(s): 57
    Request permission for commercial reuse | PDF file iconPDF (217 KB)
    Freely Available from IEEE
  • Outperforming LRU with an adaptive replacement cache algorithm

    Publication Year: 2004, Page(s):58 - 65
    Cited by:  Papers (84)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (567 KB) | HTML iconHTML

    The self-tuning, low-overhead, scan-resistant adaptive replacement cache algorithm outperforms the least-recently-used algorithm by dynamically responding to changing access patterns and continually balancing between workload recency and frequency features. Caching, a fundamental metaphor in modern computing, finds wide application in storage systems, databases, Web servers, middleware, processors... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Announcement

    Publication Year: 2004, Page(s): 66
    Request permission for commercial reuse | PDF file iconPDF (181 KB)
    Freely Available from IEEE
  • 2004 IEEE Computer Society Professional Membership / Subscription Application

    Publication Year: 2004, Page(s):67 - 68
    Request permission for commercial reuse | PDF file iconPDF (231 KB)
    Freely Available from IEEE
  • Burton J. Smith named Cray award winner

    Publication Year: 2004, Page(s): 69
    Request permission for commercial reuse | PDF file iconPDF (230 KB)
    Freely Available from IEEE
  • Computer Society honors outstanding students

    Publication Year: 2004, Page(s): 70
    Request permission for commercial reuse | PDF file iconPDF (188 KB)
    Freely Available from IEEE
  • Call and Calendar

    Publication Year: 2004, Page(s):71 - 72
    Request permission for commercial reuse | PDF file iconPDF (202 KB)
    Freely Available from IEEE
  • Bookshelf

    Publication Year: 2004, Page(s):73 - 75
    Request permission for commercial reuse | PDF file iconPDF (319 KB)
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org