Scheduled System Maintenance
On Friday, September 21, IEEE Xplore will undergo scheduled maintenance. Users may experience intermittent access from 2:30–4:30 pm ET (6:30–8:30 UTC). The site may be unavailable for approximately 60 minutes during this period.
We apologize for any inconvenience.

Computer

Volume 37 Issue 6 • June 2004

Filter Results

Displaying Results 1 - 23 of 23
  • [Front cover]

    Publication Year: 2004, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (627 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2004, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (726 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2004, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (57 KB)
    Freely Available from IEEE
  • Article summaries

    Publication Year: 2004, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (45 KB) | HTML iconHTML
    Freely Available from IEEE
  • Let's hear from those in the back

    Publication Year: 2004, Page(s):6 - 9
    Request permission for commercial reuse | PDF file iconPDF (282 KB) | HTML iconHTML
    Freely Available from IEEE
  • Announcement

    Publication Year: 2004, Page(s): 17
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • Is broadband over power lines about to take off?

    Publication Year: 2004
    Request permission for commercial reuse | PDF file iconPDF (281 KB) | HTML iconHTML
    Freely Available from IEEE
  • Call for Papers

    Publication Year: 2004, Page(s): 21
    Request permission for commercial reuse | PDF file iconPDF (92 KB)
    Freely Available from IEEE
  • A roadmap for enterprise system implementation

    Publication Year: 2004, Page(s):22 - 29
    Cited by:  Papers (10)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (227 KB) | HTML iconHTML

    Enterprise systems are complex and expensive and create dramatic organizational change. Implementing an enterprise system can be the "corporate equivalent of a root canal," a meaningful analogy given that an ES with its single database replaces myriad special-purpose legacy systems that once operated in isolation. An ES, or enterprise resource planning system, has the Herculean task of seamlessly ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guest Editors' Introduction: Securing the High-Speed Internet

    Publication Year: 2004, Page(s):33 - 35
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | PDF file iconPDF (359 KB) | HTML iconHTML
    Freely Available from IEEE
  • Computer security in the real world

    Publication Year: 2004, Page(s):37 - 46
    Cited by:  Papers (65)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (171 KB) | HTML iconHTML

    Most computers today are insecure because security is costly in terms of user inconvenience and foregone features, and people are unwilling to pay the price. Real-world security depends more on punishment than on locks, but it's hard to even find network attackers, much less punish them. The basic elements of security are authentication, authorization, and auditing: the gold standard. The idea of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Worm epidemics in high-speed networks

    Publication Year: 2004, Page(s):48 - 53
    Cited by:  Papers (26)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB) | HTML iconHTML

    Future worm epidemics might spread at unprecedented rates in high-speed networks. A comprehensive automated defense system will be the only way to contain new threats but could be too risky to implement without more reliable detection accuracy and better real-time traffic analysis. Although researchers continue to work on improving worm detection accuracy and real-time traffic analysis, a practica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Making the gigabit IPsec VPN architecture secure

    Publication Year: 2004, Page(s):54 - 60
    Cited by:  Papers (5)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (530 KB) | HTML iconHTML

    By placing the security processors directly in the data path to secure traffic without the aid of additional outside devices or software, the flow-through security device creates a virtual private network that maximizes network processing unit host offload with minimal system integration effort. A virtual private network uses the Internet protocol security (IPsec) framework to provide confidential... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A quantitative study of firewall configuration errors

    Publication Year: 2004, Page(s):62 - 67
    Cited by:  Papers (172)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (335 KB) | HTML iconHTML

    The protection that firewalls provide is only as good as the policy they are configured to implement. Analysis of real configuration data show that corporate firewalls are often enforcing rule sets that violate well established security guidelines. Firewalls are the cornerstone of corporate intranet security. Once a company acquires a firewall, a systems administrator must configure and manage it ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Society Connection

    Publication Year: 2004, Page(s):68 - 70
    Request permission for commercial reuse | PDF file iconPDF (348 KB)
    Freely Available from IEEE
  • Call and Calendar

    Publication Year: 2004, Page(s):71 - 72
    Request permission for commercial reuse | PDF file iconPDF (816 KB)
    Freely Available from IEEE
  • Products

    Publication Year: 2004, Page(s): 73
    Request permission for commercial reuse | PDF file iconPDF (77 KB) | HTML iconHTML
    Freely Available from IEEE
  • Bookshelf

    Publication Year: 2004, Page(s): 74
    Request permission for commercial reuse | PDF file iconPDF (106 KB) | HTML iconHTML
    Freely Available from IEEE
  • Enhancing personal communications with multimedia

    Publication Year: 2004, Page(s):79 - 81
    Cited by:  Patents (1)
    Request permission for commercial reuse | PDF file iconPDF (144 KB) | HTML iconHTML
    Freely Available from IEEE
  • A patch in nine saves time?

    Publication Year: 2004, Page(s):82 - 83
    Cited by:  Papers (3)
    Request permission for commercial reuse | PDF file iconPDF (233 KB) | HTML iconHTML
    Freely Available from IEEE
  • Imperceptible sensory channels

    Publication Year: 2004, Page(s):84 - 85
    Cited by:  Patents (15)
    Request permission for commercial reuse | PDF file iconPDF (135 KB) | HTML iconHTML
    Freely Available from IEEE
  • Diagnosing attention disorders in a virtual classroom

    Publication Year: 2004, Page(s):87 - 89
    Cited by:  Papers (3)
    Request permission for commercial reuse | PDF file iconPDF (355 KB) | HTML iconHTML
    Freely Available from IEEE
  • The economics of international conferences

    Publication Year: 2004, Page(s):92 - 91
    Request permission for commercial reuse | PDF file iconPDF (146 KB) | HTML iconHTML
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org