Computer

Volume 38 Issue 11 • Nov. 2005

Filter Results

Displaying Results 1 - 24 of 24
  • [Front cover]

    Publication Year: 2005, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (581 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2005, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (3121 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2005, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • Article summaries

    Publication Year: 2005, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (47 KB) | HTML iconHTML
    Freely Available from IEEE
  • Letters

    Publication Year: 2005, Page(s): 6
    Request permission for commercial reuse | PDF file iconPDF (72 KB) | HTML iconHTML
    Freely Available from IEEE
  • Books Engineers Should Read

    Publication Year: 2005, Page(s):7 - 10
    Request permission for commercial reuse | PDF file iconPDF (297 KB) | HTML iconHTML
    Freely Available from IEEE
  • 32 & 16 Years Ago

    Publication Year: 2005, Page(s):11 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (51 KB) | HTML iconHTML

    The more we know about yesterday, the better we will be able to deal with today. Computer offers this column providing excerpts from past issues to serve as a memory jogger for older members and as a perspective creator for newer members. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Society Information

    Publication Year: 2005, Page(s): 13
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • Building converged networks with IMS technology

    Publication Year: 2005, Page(s):14 - 16
    Cited by:  Papers (10)  |  Patents (8)
    Request permission for commercial reuse | PDF file iconPDF (167 KB) | HTML iconHTML
    Freely Available from IEEE
  • E-mail authentication is here, but has it arrived yet?

    Publication Year: 2005, Page(s):17 - 19
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | PDF file iconPDF (111 KB) | HTML iconHTML
    Freely Available from IEEE
  • News Briefs

    Publication Year: 2005, Page(s):20 - 22
    Cited by:  Patents (2)
    Request permission for commercial reuse | PDF file iconPDF (229 KB) | HTML iconHTML
    Freely Available from IEEE
  • Opportunities and obligations for physical computing systems

    Publication Year: 2005, Page(s):23 - 31
    Cited by:  Papers (74)
    Request permission for commercial reuse | PDF file iconPDF (2816 KB) | HTML iconHTML
    Freely Available from IEEE
  • Heterogeneous chip multiprocessors

    Publication Year: 2005, Page(s):32 - 38
    Cited by:  Papers (157)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (202 KB) | HTML iconHTML

    Heterogeneous (or asymmetric) chip multiprocessors present unique opportunities for improving system throughput, reducing processor power, and mitigating Amdahl's law. On-chip heterogeneity allow the processor to better match execution resources to each application's needs and to address a much wider spectrum of system loads - from low to high thread parallelism - with high efficiency. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High-performance, power-aware distributed computing for scientific applications

    Publication Year: 2005, Page(s):40 - 47
    Cited by:  Papers (44)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (902 KB) | HTML iconHTML

    The PowerPack framework enables distributed systems to profile, analyze, and conserve energy in scientific applications using dynamic voltage scaling. For one common benchmark, the framework achieves more than 30 percent energy savings with minimal performance impact. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Battery sensing for energy-aware system design

    Publication Year: 2005, Page(s):48 - 54
    Cited by:  Papers (14)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB) | HTML iconHTML

    The battery lifetime of small, powerful, portable devices can determine their viability. Developers can use mathematical models derived from battery energy measurements to infer a battery's state-of-charge (SoC) and then use the results to implement fuel gauging techniques in real electronic designs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scientific approach to cyberattack detection

    Publication Year: 2005, Page(s):55 - 61
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (127 KB) | HTML iconHTML

    Attack-norm separation uses rigorous signal detection models to isolate attack signals from normal data before attack identification. By drawing from science instead of heuristics, this approach promises more efficient, accurate, and inclusive attack identification. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Society Magazines Set Coverage for 2006

    Publication Year: 2005, Page(s):81 - 86
    Request permission for commercial reuse | PDF file iconPDF (380 KB) | HTML iconHTML
    Freely Available from IEEE
  • Call and Calendar

    Publication Year: 2005, Page(s):87 - 90
    Request permission for commercial reuse | PDF file iconPDF (190 KB) | HTML iconHTML
    Freely Available from IEEE
  • Products

    Publication Year: 2005, Page(s): 95
    Request permission for commercial reuse | PDF file iconPDF (189 KB) | HTML iconHTML
    Freely Available from IEEE
  • Bookshelf

    Publication Year: 2005, Page(s): 96
    Request permission for commercial reuse | PDF file iconPDF (75 KB) | HTML iconHTML
    Freely Available from IEEE
  • Creating the ultimate research assistant

    Publication Year: 2005, Page(s):97 - 99
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (625 KB) | HTML iconHTML
    Freely Available from IEEE
  • An IEEE standard for symbolic music

    Publication Year: 2005, Page(s):100 - 102
    Request permission for commercial reuse | PDF file iconPDF (490 KB) | HTML iconHTML
    Freely Available from IEEE
  • Revisiting public-key cryptography for wireless sensor networks

    Publication Year: 2005, Page(s):103 - 105
    Cited by:  Papers (13)
    Request permission for commercial reuse | PDF file iconPDF (1198 KB) | HTML iconHTML
    Freely Available from IEEE
  • Digital Technology, Age, and Gaming

    Publication Year: 2005, Page(s):108 - 107
    Cited by:  Papers (2)
    Request permission for commercial reuse | PDF file iconPDF (395 KB) | HTML iconHTML
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org