Computer

Issue 11 • Nov. 2005

Filter Results

Displaying Results 1 - 24 of 24
  • [Front cover]

    Publication Year: 2005, Page(s): c1
    Request permission for commercial reuse | |PDF file iconPDF (581 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2005, Page(s): 1
    Request permission for commercial reuse | |PDF file iconPDF (3121 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2005, Page(s): 2
    Request permission for commercial reuse | |PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • Article summaries

    Publication Year: 2005, Page(s): 4
    Request permission for commercial reuse | |PDF file iconPDF (47 KB) | HTML iconHTML
    Freely Available from IEEE
  • Letters

    Publication Year: 2005, Page(s): 6
    Request permission for commercial reuse | |PDF file iconPDF (72 KB) | HTML iconHTML
    Freely Available from IEEE
  • Books Engineers Should Read

    Publication Year: 2005, Page(s):7 - 10
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (312 KB) | HTML iconHTML

    A recommended reading list includes books that offer wisdom on how to think about the task of engineering. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 32 & 16 Years Ago

    Publication Year: 2005, Page(s):11 - 12
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (51 KB) | HTML iconHTML

    The more we know about yesterday, the better we will be able to deal with today. Computer offers this column providing excerpts from past issues to serve as a memory jogger for older members and as a perspective creator for newer members. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Society Information

    Publication Year: 2005, Page(s): 13
    Request permission for commercial reuse | |PDF file iconPDF (67 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building converged networks with IMS technology

    Publication Year: 2005, Page(s):14 - 16
    Cited by:  Papers (10)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (176 KB) | HTML iconHTML

    For several years, telecommunications providers have touted the potential of converged networks that offer a wide range of voice, data, and multimedia services, all over a single IP infrastructure. These networks - which differ from today's disparate voice, data, signaling, and control networks - would be based on open standards rather than proprietary approaches and let users work with applicatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • E-mail authentication is here, but has it arrived yet?

    Publication Year: 2005, Page(s):17 - 19
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (120 KB) | HTML iconHTML

    The explosion in spam and phishing attacks has cost victims time and money. The attacks have also dented public confidence in e-mail. Attempts to solve the problem by the multimillion-dollar mail-filtering industry or via legislation have failed. In light of this, companies such as Cisco Systems, Microsoft, and Yahoo are pursuing e-mail authentication, designed to determine whether mail has come f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • News Briefs

    Publication Year: 2005, Page(s):20 - 22
    Request permission for commercial reuse | |PDF file iconPDF (229 KB) | HTML iconHTML
    Freely Available from IEEE
  • Opportunities and obligations for physical computing systems

    Publication Year: 2005, Page(s):23 - 31
    Cited by:  Papers (69)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2832 KB) | HTML iconHTML

    The recent confluence of embedded and real-time systems with wireless, sensor, and networking technologies is creating a nascent infrastructure for a technical, economic, and social revolution. Based on the seamless integration of computing with the physical world via sensors and actuators, this revolution will accrue many benefits. Potentially, its impact could be similar to that of the current I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Heterogeneous chip multiprocessors

    Publication Year: 2005, Page(s):32 - 38
    Cited by:  Papers (150)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (216 KB) | HTML iconHTML

    Heterogeneous (or asymmetric) chip multiprocessors present unique opportunities for improving system throughput, reducing processor power, and mitigating Amdahl's law. On-chip heterogeneity allow the processor to better match execution resources to each application's needs and to address a much wider spectrum of system loads - from low to high thread parallelism - with high efficiency. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High-performance, power-aware distributed computing for scientific applications

    Publication Year: 2005, Page(s):40 - 47
    Cited by:  Papers (42)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (912 KB) | HTML iconHTML

    The PowerPack framework enables distributed systems to profile, analyze, and conserve energy in scientific applications using dynamic voltage scaling. For one common benchmark, the framework achieves more than 30 percent energy savings with minimal performance impact. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Battery sensing for energy-aware system design

    Publication Year: 2005, Page(s):48 - 54
    Cited by:  Papers (14)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (384 KB) | HTML iconHTML

    The battery lifetime of small, powerful, portable devices can determine their viability. Developers can use mathematical models derived from battery energy measurements to infer a battery's state-of-charge (SoC) and then use the results to implement fuel gauging techniques in real electronic designs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scientific approach to cyberattack detection

    Publication Year: 2005, Page(s):55 - 61
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (136 KB) | HTML iconHTML

    Attack-norm separation uses rigorous signal detection models to isolate attack signals from normal data before attack identification. By drawing from science instead of heuristics, this approach promises more efficient, accurate, and inclusive attack identification. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Society Magazines Set Coverage for 2006

    Publication Year: 2005, Page(s):81 - 86
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (392 KB) | HTML iconHTML

    In 2006, Computer Society publications will address broad trends, emerging issues, historical perspectives, and recent developments in all aspects of the computing profession.Fred Brooks, Jr. Receives 2004 IEEE/ACM Eckert-Mauchly AwardFrederick P. Brooks, Jr. received the 2004 IEEE/ACM Eckert-Mauchly Award in recognition of his outstanding contributions to the field of computer and digital systems... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call and Calendar

    Publication Year: 2005, Page(s):87 - 90
    Request permission for commercial reuse | |PDF file iconPDF (190 KB) | HTML iconHTML
    Freely Available from IEEE
  • Products

    Publication Year: 2005, Page(s): 95
    Request permission for commercial reuse | |PDF file iconPDF (200 KB) | HTML iconHTML
    Freely Available from IEEE
  • Bookshelf

    Publication Year: 2005, Page(s): 96
    Request permission for commercial reuse | |PDF file iconPDF (76 KB) | HTML iconHTML
    Freely Available from IEEE
  • Creating the ultimate research assistant

    Publication Year: 2005, Page(s):97 - 99
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (640 KB) | HTML iconHTML

    Looks at the custom tool developed by the author that leverages the Google Web search API (or a similar search service) to discover a list of Web pages matching a given topic; identify and extract trends and patterns from these Web pages' text; and transform those trends and patterns into an understandable, useful, and well-organized information resource. The tool accomplishes these tasks using fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An IEEE standard for symbolic music

    Publication Year: 2005, Page(s):100 - 102
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (504 KB) | HTML iconHTML

    Looks at P1599, a new IEEE music standard, which recommends representing and encoding with symbols expressed in XML, thus creating a readable, open, extensible, and durable format. This standard strives to represent all aspects of music, namely, the whole musical experience, which is similar to understanding a narration and recognizing images, and may also consist of exploring how the music itself... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Revisiting public-key cryptography for wireless sensor networks

    Publication Year: 2005, Page(s):103 - 105
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1208 KB) | HTML iconHTML

    The lack of a fixed infrastructure and the ad hoc nature of wireless sensor networks deployments suggest that the ability to encrypt and decrypt confidential data among arbitrary sensor nodes while enabling undisputed authentication of all parties will be a fundamental prerequisite for achieving security. To do this, nodes must be able to establish a secret key and know who their counterparts are.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital Technology, Age, and Gaming

    Publication Year: 2005, Page(s):108 - 107
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (408 KB) | HTML iconHTML

    Educators could use video gaming technology to deliver the drill and practice that helps students develop the basic academic skills that are essential to the computing profession. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org