Computer

Issue 1 • Jan. 2006

Filter Results

Displaying Results 1 - 25 of 28
  • [Front cover]

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | |PDF file iconPDF (1208 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2006, Page(s): 1
    Request permission for commercial reuse | |PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2006, Page(s):2 - 3
    Request permission for commercial reuse | |PDF file iconPDF (2320 KB)
    Freely Available from IEEE
  • Article summaries

    Publication Year: 2006, Page(s): 4
    Request permission for commercial reuse | |PDF file iconPDF (233 KB) | HTML iconHTML
    Freely Available from IEEE
  • Letters

    Publication Year: 2006, Page(s):6 - 7
    Request permission for commercial reuse | |PDF file iconPDF (490 KB) | HTML iconHTML
    Freely Available from IEEE
  • Celebrating the Past, Looking to the Future

    Publication Year: 2006, Page(s):8 - 10
    Request permission for commercial reuse | |PDF file iconPDF (2560 KB) | HTML iconHTML
    Freely Available from IEEE
  • George Stibitz's values and R.C. Archibald's slide rule

    Publication Year: 2006, Page(s):11 - 15
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (744 KB) | HTML iconHTML

    This article is about history, innovation, organizations, and people. Although the author largely constrains himself to topics that have been developed during the past few years, like George Stibitz did in 1946, he returns to older stories to illuminate the fundamental themes and values of the computer age. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 32 & 16 Years Ago

    Publication Year: 2006, Page(s):14 - 15
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (49 KB) | HTML iconHTML

    Highlights new technologies being written about in Computer Magazine in 1974 and 1990. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved flash memory grows in popularity

    Publication Year: 2006, Page(s):16 - 18
    Cited by:  Papers (18)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (704 KB) | HTML iconHTML

    In the past, two key storage technologies, hard drives and flash chips, each had distinct uses. The bigger-selling hard drive technology was used in machines requiring high storage volumes, such as servers, PCs, laptops, and even digital music players. Flash memory was used in machines that needed less storage capacity, such as digital cameras, cell phones, and embedded controllers. Now, though, t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Information

    Publication Year: 2006, Page(s): 19
    Request permission for commercial reuse | |PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • Security of critical control systems sparks concern

    Publication Year: 2006, Page(s):20 - 23
    Cited by:  Papers (8)
    Request permission for commercial reuse | |PDF file iconPDF (856 KB) | HTML iconHTML
    Freely Available from IEEE
  • News briefs

    Publication Year: 2006, Page(s):24 - 26
    Request permission for commercial reuse | |PDF file iconPDF (777 KB) | HTML iconHTML
    Freely Available from IEEE
  • Good ideas, through the looking glass [computing history]

    Publication Year: 2006, Page(s):28 - 39
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (800 KB) | HTML iconHTML

    Computing's history has been driven by many good and original ideas, but a few turned out to be less brilliant than they first appeared. In many cases, changes in the technological environment reduced their importance. Often, commercial factors also influenced a good idea's importance. Some ideas simply turned out to be less effective and glorious when reviewed in retrospect or after proper analys... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ten commandments of formal methods... ten years later

    Publication Year: 2006, Page(s):40 - 48
    Cited by:  Papers (30)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1024 KB) | HTML iconHTML

    More than a decade ago, in "Ten Commandments of Formal Methods", we offered practical guidelines for projects that sought to use formal methods. Over the years, the article, which was based on our knowledge of successful industrial projects, has been widely cited and has generated much positive feedback. However, despite this apparent enthusiasm, formal methods use has not greatly increased, and s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Pentium Chronicles: introduction

    Publication Year: 2006, Page(s):49 - 54
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (3680 KB) | HTML iconHTML

    An excerpt from The Pentium Chronicles: The People, Passion, and Politics Behind the Landmark Chips offers a project manager's firsthand account of the technical and management challenges facing the team that conceived Intel's P6 microarchitecture. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Successfully outsourcing embedded software development

    Publication Year: 2006, Page(s):55 - 61
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2512 KB) | HTML iconHTML

    A large US company, UIC successfully outsources embedded software development after applying people- and project-focused practices developed from a prior failed attempt. In this article the author describes 10 practices that have helped UIC create an offshore development strategy that produces embedded software at a lower cost while maintaining quality. These lessons show how both the people invol... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NASA's exploration agenda and capability engineering

    Publication Year: 2006, Page(s):63 - 73
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (227 KB) | HTML iconHTML

    NASA is using model-based languages and risk analysis methodologies to raise software development to the level of hardware development. Ultimately, it hopes to achieve a fusion of systems and software engineering by replacing conventional software development techniques with capability engineering, which focuses on a system's full set of functionalities. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A layered software architecture for quantum computing design tools

    Publication Year: 2006, Page(s):74 - 83
    Cited by:  Papers (38)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1139 KB) | HTML iconHTML

    Compilers and computer-aided design tools are essential for fine-grained control of nanoscale quantum-mechanical systems. A proposed four-phase design flow assists with computations by transforming a quantum algorithm from a high-level language program into precisely scheduled physical actions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Society Offers Full Slate of Programs in 2006

    Publication Year: 2006, Page(s):87 - 91
    Request permission for commercial reuse | |PDF file iconPDF (878 KB)
    Freely Available from IEEE
  • Call and Calendar

    Publication Year: 2006, Page(s):92 - 95
    Request permission for commercial reuse | |PDF file iconPDF (448 KB)
    Freely Available from IEEE
  • Bookshelf

    Publication Year: 2006, Page(s): 96
    Request permission for commercial reuse | |PDF file iconPDF (320 KB) | HTML iconHTML
    Freely Available from IEEE
  • Products

    Publication Year: 2006, Page(s): 97
    Request permission for commercial reuse | |PDF file iconPDF (296 KB) | HTML iconHTML
    Freely Available from IEEE
  • Petascale computational systems

    Publication Year: 2006, Page(s):110 - 112
    Cited by:  Papers (36)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1016 KB) | HTML iconHTML

    A balanced cyberinfrastructure is necessary to meet growing data-intensitive scientific needs. We believe that available resources should be allocated to benefit the broadest cross-section of the scientific community. Given the power-law distribution of problem sizes, this means that about half of funding agency resources should be spent on tier-1 centers at the petascale level and the other half ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A developmental view of system security

    Publication Year: 2006, Page(s):113 - 114
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (560 KB) | HTML iconHTML

    Security policy can't be timeless, static, and universal. Security is more of a developmental problem than a technical one. Security should be integrated into an organization in such a way as to enhance and safeguard each facet in the least intrusive yet most effective way possible at a given time. Gradually, as the organization and the technology it uses "grow up together," security should become... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enabling simulation interoperability

    Publication Year: 2006, Page(s):115 - 117
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (688 KB) | HTML iconHTML

    Over the past years a series of architectures have addressed the need to link multiple simulations. These efforts have been driven primarily by the desire to reuse existing "best of breed" simulations in new combinations to avoid developing any single, monolithic architecture with the impossible goal of meeting all simulation needs. The US Department of Defense began developing the high level arch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org