Computer

Volume 37 Issue 7 • July 2004

Filter Results

Displaying Results 1 - 24 of 24
  • [Front cover]

    Publication Year: 2004, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (464 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2004, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (415 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2004, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • Article summaries

    Publication Year: 2004, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (45 KB) | HTML iconHTML
    Freely Available from IEEE
  • Letters

    Publication Year: 2004, Page(s):6 - 7
    Request permission for commercial reuse | PDF file iconPDF (98 KB) | HTML iconHTML
    Freely Available from IEEE
  • Travel Stories

    Publication Year: 2004, Page(s):8 - 10
    Request permission for commercial reuse | PDF file iconPDF (172 KB) | HTML iconHTML
    Freely Available from IEEE
  • 32 & 16 Years Ago

    Publication Year: 2004, Page(s):11 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (83 KB) | HTML iconHTML

    The more we know about yesterday, the better we will be able to deal with today. Computer offers this bimonthly column providing excerpts from past issues to serve as a memory jogger for older members and as a perspective creator for newer members. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Open source databases move into the marketplace

    Publication Year: 2004, Page(s):13 - 15
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (160 KB) | HTML iconHTML
    Freely Available from IEEE
  • Computer Society Information

    Publication Year: 2004, Page(s): 19
    Request permission for commercial reuse | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • Is MIMO the future of wireless communications?

    Publication Year: 2004, Page(s):20 - 22
    Cited by:  Papers (6)
    Request permission for commercial reuse | PDF file iconPDF (161 KB) | HTML iconHTML
    Freely Available from IEEE
  • The new dope on semiconductor doping

    Publication Year: 2004
    Request permission for commercial reuse | PDF file iconPDF (165 KB) | HTML iconHTML
    Freely Available from IEEE
  • Who is liable for insecure systems?

    Publication Year: 2004, Page(s):27 - 34
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (207 KB) | HTML iconHTML

    A survey of security-related liability issues shows that as data crime increases and the costs of hacking and other malicious behavior soar, vendors must make their software more secure or suffer market and legal consequences. The notion of liability for insecure computer systems has shifted. We have seen both the enactment of legislation affecting liability and the appearance of actual liability ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Issues in high-speed Internet security

    Publication Year: 2004, Page(s):36 - 42
    Cited by:  Papers (13)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (765 KB) | HTML iconHTML

    With global Internet access, people and organizations can share information instantly. Unfortunately, such access also leaves the Internet vulnerable to malicious actions that can cripple computers, businesses, governments, and lives on a scale never before possible. Hackers, worms, and viruses can unleash attacks with electronic as well as physical, economic, and safety ramifications. Over the pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scaling to the end of silicon with EDGE architectures

    Publication Year: 2004, Page(s):44 - 55
    Cited by:  Papers (149)  |  Patents (33)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (226 KB) | HTML iconHTML

    Microprocessor designs are on the verge of a post-RISC era in which companies must introduce new ISAs to address the challenges that modern CMOS technologies pose while also exploiting the massive levels of integration now possible. To meet these challenges, we have developed a new class of ISAs, called explicit data graph execution (EDGE), that will match the characteristics of semiconductor tech... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Composing adaptive software

    Publication Year: 2004, Page(s):56 - 64
    Cited by:  Papers (252)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (157 KB) | HTML iconHTML

    Interest in adaptive computing systems has increased dramatically in the past few years, and a variety of techniques now allow software to adapt dynamically to its environment. Compositional adaptation enables software to modify its structure and behavior dynamically in response to change in its execution environment. A review of current technology compares how, when, and where recomposition occur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Seamless mobile computing on fixed infrastructure

    Publication Year: 2004, Page(s):65 - 72
    Cited by:  Papers (14)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (425 KB) | HTML iconHTML

    The term mobile computing typically evokes images of a laptop, handheld, or wearable computer. However, the plummeting cost of hardware suggests that pervasive computing infrastructure could minimize the need to carry such devices in the near future. Personal computing will be available anywhere on demand, like light at the flip of a switch. Only when a user starts to use a computer will it acquir... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Policy-based dynamic reconfiguration of mobile-code applications

    Publication Year: 2004, Page(s):73 - 80
    Cited by:  Papers (12)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (169 KB) | HTML iconHTML

    Global wireless networks have opened the way to a ubiquitous Internet computing environment in which a variety of portable devices remain connected to the Internet fabric - even as their locations change continuously - and access to data and services is independent of both device type and location. In this environment, applications must be able to change the location of their execution. In additio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call and Calendar

    Publication Year: 2004, Page(s): 81
    Request permission for commercial reuse | PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • Bookshelf

    Publication Year: 2004, Page(s): 82
    Request permission for commercial reuse | PDF file iconPDF (97 KB) | HTML iconHTML
    Freely Available from IEEE
  • Products

    Publication Year: 2004, Page(s): 83
    Request permission for commercial reuse | PDF file iconPDF (97 KB) | HTML iconHTML
    Freely Available from IEEE
  • Computer Society Connection

    Publication Year: 2004, Page(s):84 - 87
    Request permission for commercial reuse | PDF file iconPDF (302 KB) | HTML iconHTML
    Freely Available from IEEE
  • A critical look at open source

    Publication Year: 2004, Page(s):92 - 94
    Cited by:  Papers (9)  |  Patents (2)
    Request permission for commercial reuse | PDF file iconPDF (111 KB) | HTML iconHTML
    Freely Available from IEEE
  • Embedded system security

    Publication Year: 2004, Page(s):95 - 97
    Cited by:  Papers (28)  |  Patents (2)
    Request permission for commercial reuse | PDF file iconPDF (159 KB) | HTML iconHTML
    Freely Available from IEEE
  • In defense of PowerPoint

    Publication Year: 2004, Page(s):100 - 99
    Request permission for commercial reuse | PDF file iconPDF (319 KB) | HTML iconHTML
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org