Computer

Volume 38 Issue 4 • April 2005

Filter Results

Displaying Results 1 - 20 of 20
  • 32 & 16 YEARS AGO

    Publication Year: 2005, Page(s):10 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (52 KB) | HTML iconHTML

    The more we know about yesterday, the better we will be able to deal with today. Computer offers this column providing excerpts from past issues to serve as a memory jogger for older members and as a perspective creator for newer members. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Point of Highest Leverage

    Publication Year: 2005, Page(s):12 - 14
    Request permission for commercial reuse | PDF file iconPDF (147 KB) | HTML iconHTML
    Freely Available from IEEE
  • Will binary XML speed network traffic?

    Publication Year: 2005, Page(s):16 - 18
    Cited by:  Papers (5)  |  Patents (2)
    Request permission for commercial reuse | PDF file iconPDF (213 KB) | HTML iconHTML
    Freely Available from IEEE
  • Mobile phones: the next frontier for hackers?

    Publication Year: 2005, Page(s):20 - 23
    Cited by:  Papers (34)  |  Patents (2)
    Request permission for commercial reuse | PDF file iconPDF (120 KB) | HTML iconHTML
    Freely Available from IEEE
  • Future interconnection environment

    Publication Year: 2005, Page(s):27 - 33
    Cited by:  Papers (60)  |  Patents (1)
    Request permission for commercial reuse | PDF file iconPDF (241 KB) | HTML iconHTML
    Freely Available from IEEE
  • Overcoming the Internet impasse through virtualization

    Publication Year: 2005, Page(s):34 - 41
    Cited by:  Papers (413)  |  Patents (78)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB) | HTML iconHTML

    The Internet architecture has proven its worth by the vast array of applications it now supports and the wide variety of network technologies over which it currently runs. Most current Internet research involves either empirical measurement studies or incremental modifications that can be deployed without major architectural changes. Easy access to virtual testbeds could foster a renaissance in ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Emerging grid standards

    Publication Year: 2005, Page(s):43 - 50
    Cited by:  Papers (14)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB) | HTML iconHTML

    The Grid can be seen as a framework for "flexible, secure, coordinated resource sharing among dynamic collections of individuals, institutions, and resources." It allows researchers in different administrative domains to use multiple resources for problem solving and provides an infrastructure for developing larger and more complex applications potentially faster than with existing systems. Indivi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Leveraging social networks to fight spam

    Publication Year: 2005, Page(s):61 - 68
    Cited by:  Papers (90)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (379 KB) | HTML iconHTML

    Social networks are useful for judging the trustworthiness of outsiders. An automated antispam tool exploits the properties of social networks to distinguish between unsolicited commercial e-mail - spam - and messages associated with people the user knows. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bookshelf

    Publication Year: 2005, Page(s): 71
    Request permission for commercial reuse | PDF file iconPDF (135 KB) | HTML iconHTML
    Freely Available from IEEE
  • Call and Calendar

    Publication Year: 2005, Page(s):72 - 74
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • Products

    Publication Year: 2005, Page(s): 75
    Request permission for commercial reuse | PDF file iconPDF (94 KB) | HTML iconHTML
    Freely Available from IEEE
  • Game engine virtual reality with CaveUT

    Publication Year: 2005, Page(s):79 - 82
    Cited by:  Papers (16)
    Request permission for commercial reuse | PDF file iconPDF (528 KB) | HTML iconHTML
    Freely Available from IEEE
  • Computer Society Information

    Publication Year: 2005, Page(s): 83
    Request permission for commercial reuse | PDF file iconPDF (65 KB)
    Freely Available from IEEE
  • Social-mobile applications

    Publication Year: 2005, Page(s):84 - 85
    Cited by:  Papers (19)  |  Patents (1)
    Request permission for commercial reuse | PDF file iconPDF (151 KB) | HTML iconHTML
    Freely Available from IEEE
  • In Defense of Spam

    Publication Year: 2005, Page(s):88 - 87
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (225 KB) | HTML iconHTML
    Freely Available from IEEE
  • Masthead

    Publication Year: 2005, Page(s): 2
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (57 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2005, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (666 KB)
    Freely Available from IEEE
  • Letters

    Publication Year: 2005, Page(s):8 - 9
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (118 KB) | HTML iconHTML
    Freely Available from IEEE
  • Computer Society Connection

    Publication Year: 2005, Page(s):76 - 78
    Request permission for commercial reuse | PDF file iconPDF (1693 KB) | HTML iconHTML
    Freely Available from IEEE
  • Scaling network services using programmable network devices

    Publication Year: 2005, Page(s):52 - 60
    Cited by:  Papers (2)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (169 KB) | HTML iconHTML

    The NEon system offers an integrated approach to architecting, operating, and managing network services. NEon uses policy rules defining the operation of individual network services and produces a unified set of rules that generic packet-processing engines enforce. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org