Computer

Volume 37 Issue 10 • Oct. 2004

Filter Results

Displaying Results 1 - 25 of 26
  • [Front cover]

    Publication Year: 2004, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1305 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2004, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (595 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2004, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • Article summaries

    Publication Year: 2004, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (46 KB) | HTML iconHTML
    Freely Available from IEEE
  • Letters

    Publication Year: 2004, Page(s):6 - 7
    Request permission for commercial reuse | PDF file iconPDF (112 KB) | HTML iconHTML
    Freely Available from IEEE
  • Trusting a Chaotic Future

    Publication Year: 2004, Page(s):8 - 10
    Request permission for commercial reuse | PDF file iconPDF (148 KB) | HTML iconHTML
    Freely Available from IEEE
  • Report to Members

    Publication Year: 2004, Page(s):15 - 19
    Request permission for commercial reuse | PDF file iconPDF (1224 KB) | HTML iconHTML
    Freely Available from IEEE
  • Will gesture recognition technology point the way?

    Publication Year: 2004, Page(s):20 - 23
    Cited by:  Papers (4)  |  Patents (11)
    Request permission for commercial reuse | PDF file iconPDF (330 KB) | HTML iconHTML
    Freely Available from IEEE
  • The lowdown on high-rise chips

    Publication Year: 2004, Page(s):24 - 27
    Cited by:  Patents (1)
    Request permission for commercial reuse | PDF file iconPDF (350 KB) | HTML iconHTML
    Freely Available from IEEE
  • New chips stop buffer overflow attacks

    Publication Year: 2004
    Cited by:  Papers (5)  |  Patents (2)
    Request permission for commercial reuse | PDF file iconPDF (119 KB) | HTML iconHTML
    Freely Available from IEEE
  • Fighting Internet auction fraud: an assessment and proposal

    Publication Year: 2004, Page(s):31 - 37
    Cited by:  Papers (25)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    Online auctions constitute one of the most successful Internet business models. However, auction fraud has become far and away the largest component of all Internet fraud, posing a threat to the model's future. Traditional government organizations such as the Federal Trade Commission and the Secret Service in the US, as well as new agencies such as Internet Fraud Watch and the Internet Fraud Compl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spam and the social-technical gap

    Publication Year: 2004, Page(s):38 - 45
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB) | HTML iconHTML

    The runaway increase in spam cannot be stemmed by technical change alone. Spam currently constitutes up to 30 percent of all in-box messages. In these spam wars, as filters become more intelligent so do spammers' countermeasures. The continued growth of spam suggests the need for a new approach. Although most see spam as a personal problem, we suggest it is a social problem that needs a social res... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rainbow: architecture-based self-adaptation with reusable infrastructure

    Publication Year: 2004, Page(s):46 - 54
    Cited by:  Papers (439)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB) | HTML iconHTML

    While attractive in principle, architecture-based self-adaptation raises a number of research and engineering challenges. First, the ability to handle a wide variety of systems must be addressed. Second, the need to reduce costs in adding external control to a system must be addressed. Our rainbow framework attempts to address both problems. By adopting an architecture-based approach, it provides ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using UML-based rate monotonic analysis to predict schedulability

    Publication Year: 2004, Page(s):56 - 63
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (149 KB) | HTML iconHTML

    Timeliness is essential in real-time systems, in which a late response is sometimes worse than no response at all because the violation of a single deadline could lead to loss of life or property. System analysts use an appropriate scheduling algorithm to ensure the predictability of such a system. The Object Management Group's adoption of the UML profile for schedulability, performance, and timel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Meaningful modeling: what's the semantics of "semantics"?

    Publication Year: 2004, Page(s):64 - 72
    Cited by:  Papers (154)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (375 KB) | HTML iconHTML

    The Unified Modeling Language (UML) is a complex collection of mostly diagrammatic notations for software modeling, and its standardization has prompted an animated discussion about UML's semantics and how to represent it. We have thus set out to clarify some of the notions involved in defining modeling languages, with an eye toward the particular difficulties arising in defining UML. We are prima... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ActiveCampus: experiments in community-oriented ubiquitous computing

    Publication Year: 2004, Page(s):73 - 81
    Cited by:  Papers (80)  |  Patents (31)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (635 KB) | HTML iconHTML

    The continuing proliferation of handheld computing devices offers a new platform for mobile computing applications that could enrich our experience of the world around us. Yet many questions about realizing this vision remain open. We have been investigating these questions at the University of California, San Diego, through the ActiveCampus Project. ActiveCampus explores technologies that can enr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Society Connection

    Publication Year: 2004, Page(s):82 - 85
    Request permission for commercial reuse | PDF file iconPDF (226 KB) | HTML iconHTML
    Freely Available from IEEE
  • Call and Calendar

    Publication Year: 2004, Page(s):86 - 88
    Request permission for commercial reuse | PDF file iconPDF (171 KB)
    Freely Available from IEEE
  • Computer Society Information

    Publication Year: 2004, Page(s): 90
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • Bookshelf

    Publication Year: 2004, Page(s): 104
    Request permission for commercial reuse | PDF file iconPDF (46 KB) | HTML iconHTML
    Freely Available from IEEE
  • Products

    Publication Year: 2004, Page(s): 105
    Request permission for commercial reuse | PDF file iconPDF (195 KB) | HTML iconHTML
    Freely Available from IEEE
  • Magic boxes and boots: security in hardware

    Publication Year: 2004, Page(s):106 - 109
    Cited by:  Papers (1)  |  Patents (6)
    Request permission for commercial reuse | PDF file iconPDF (524 KB) | HTML iconHTML
    Freely Available from IEEE
  • User-centered location awareness

    Publication Year: 2004, Page(s):110 - 111
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (297 KB) | HTML iconHTML
    Freely Available from IEEE
  • The Panda3D graphics engine

    Publication Year: 2004, Page(s):112 - 114
    Cited by:  Papers (12)
    Request permission for commercial reuse | PDF file iconPDF (326 KB) | HTML iconHTML
    Freely Available from IEEE
  • A taxonomy of network computing systems

    Publication Year: 2004, Page(s):115 - 119
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (184 KB) | HTML iconHTML
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org