Computer

Volume 39 Issue 3 • March 2006

Filter Results

Displaying Results 1 - 25 of 34
  • [Front cover]

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (785 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2006, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (659 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2006, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (71 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2006, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (1478 KB)
    Freely Available from IEEE
  • Article summaries

    Publication Year: 2006, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (158 KB) | HTML iconHTML
    Freely Available from IEEE
  • [Advertisement]

    Publication Year: 2006, Page(s): 5
    Request permission for commercial reuse | PDF file iconPDF (401 KB)
    Freely Available from IEEE
  • Letters

    Publication Year: 2006, Page(s):6 - 7
    Request permission for commercial reuse | PDF file iconPDF (289 KB) | HTML iconHTML
    Freely Available from IEEE
  • [Advertisement]

    Publication Year: 2006, Page(s): 8
    Request permission for commercial reuse | PDF file iconPDF (750 KB)
    Freely Available from IEEE
  • The lay of the land [pervasive computing system]

    Publication Year: 2006, Page(s):9 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (689 KB) | HTML iconHTML

    A pervasive computing system is usually built upon a familiar set of technologies that have matured in the past two decades: microprocessors, high-speed data communication, sensors, pattern recognition, and sophisticated human interfaces. Yet, the ideas behind their application in a pervasive setting can be traced back to the origins of mechanical computing. Modern pervasive computing differs from... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 32 & 16 Years Ago

    Publication Year: 2006, Page(s):12 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (50 KB) | HTML iconHTML

    Highlights new technologies being written about in Computer Magazine in 1974 and 1990. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Behavior-based network security goes mainstream

    Publication Year: 2006, Page(s):14 - 17
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (673 KB) | HTML iconHTML

    Traditional network-based security examines traffic for code patterns or signatures that have been part of past intrusions or virus attacks. If known malicious code is found, security systems stop the suspect transmission. Although this approach can be effective, it also has limitations. For example, signature-based security frequently has trouble recognizing new types of attacks or older kinds in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Is near-field communication close to success?

    Publication Year: 2006, Page(s):18 - 20
    Cited by:  Papers (17)  |  Patents (7)
    Request permission for commercial reuse | PDF file iconPDF (530 KB) | HTML iconHTML
    Freely Available from IEEE
  • News briefs

    Publication Year: 2006, Page(s):21 - 24
    Request permission for commercial reuse | PDF file iconPDF (458 KB) | HTML iconHTML
    Freely Available from IEEE
  • Enabling RFID in retail

    Publication Year: 2006, Page(s):25 - 30
    Cited by:  Papers (67)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1292 KB) | HTML iconHTML

    The past two years have witnessed an explosion of interest in radio-frequency identification and supporting technologies, due primarily to their rapidly expanding use in tracking grocery products through the supply chain. Currently such applications monitor store-keeping units (SKUs) rather than individual goods, as the relatively high cost of RFID deployment and the very low profit margin of supe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy-aware user interfaces and energy-adaptive displays

    Publication Year: 2006, Page(s):31 - 38
    Cited by:  Papers (17)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1302 KB) | HTML iconHTML

    This paper identifies, quantifies, and analyzes potential mismatch opportunities in workload, user needs, and current display properties. Across different usage classes, we consistently find that users typically do not stress the display's full properties, and they often associate screen usage with content that can be displayed with significantly lower energy consumption. We propose new display su... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Advertisement]

    Publication Year: 2006, Page(s): 39
    Request permission for commercial reuse | PDF file iconPDF (709 KB)
    Freely Available from IEEE
  • Visualizing information on mobile devices

    Publication Year: 2006, Page(s):40 - 45
    Cited by:  Papers (113)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (775 KB) | HTML iconHTML

    Visualization can make a wide range of mobile applications more intuitive and productive. The mobility context and technical limitations such as small screen size make it impossible to simply port visualization applications from desktop computers to mobile devices, but researchers are starting to address these challenges. From a purely technical point of view, building more sophisticated mobile vi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quantifying interactive user experience on thin clients

    Publication Year: 2006, Page(s):46 - 52
    Cited by:  Papers (92)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (690 KB) | HTML iconHTML

    We describe an approach to quantifying the impact of network latency on interactive response and show that the adequacy of thin-client computing is highly variable and depend on both the application and available network quality. If near ideal network conditions (low latency and high bandwidth) can be guaranteed, thin clients offer a good computing experience. As network quality degrades, interact... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Synchronization options for data warehouse designs

    Publication Year: 2006, Page(s):53 - 57
    Cited by:  Papers (15)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (661 KB) | HTML iconHTML

    Data warehouse use has increased significantly in recent years and now plays a fundamental role in many organizations' decision-support processes. A framework that uses parameter sets to define the most suitable synchronization option for a given transaction processing environment helps decrease the update time between the transactional and analytical systems and also reduces the hardware resource... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Key-exchange authentication using shared secrets

    Publication Year: 2006, Page(s):58 - 66
    Cited by:  Papers (14)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (669 KB) | HTML iconHTML

    Transport Layer Security standard provides connection security with peer entity authentication, data confidentiality and integrity, key generation and distribution, and security parameters negotiation. Its native integration in browsers and Web servers makes TLS the most frequently deployed security protocol. The TLS specifications use public-key certificates for mutual authentication and key esta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Organizers Announce Field for CSIDC 2006

    Publication Year: 2006, Page(s):67 - 70
    Request permission for commercial reuse | PDF file iconPDF (502 KB)
    Freely Available from IEEE
  • Call and Calendar

    Publication Year: 2006, Page(s):71 - 73
    Request permission for commercial reuse | PDF file iconPDF (286 KB)
    Freely Available from IEEE
  • Bookshelf

    Publication Year: 2006, Page(s): 74
    Cited by:  Patents (3)
    Request permission for commercial reuse | PDF file iconPDF (170 KB) | HTML iconHTML
    Freely Available from IEEE
  • Products

    Publication Year: 2006, Page(s): 75
    Request permission for commercial reuse | PDF file iconPDF (409 KB) | HTML iconHTML
    Freely Available from IEEE
  • Making a case for BPC [Broadening Participation in Computing]

    Publication Year: 2006, Page(s):83 - 86
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB) | HTML iconHTML

    BPC program aims to significantly increase the number of students who are US citizens and permanent residents receiving postsecondary degrees in the computing disciplines. The BPC program seeks to engage the computing community in developing and implementing innovative methods to improve recruitment and retention of these students at the undergraduate and graduate levels. The NSF programs take a r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org