Computer

Volume 47 Issue 8 • Aug. 2014

Filter Results

Displaying Results 1 - 25 of 29
  • House Advertisement 
  • Fuel your imagination [Advertisement]

    Publication Year: 2014, Page(s): c2
    Request permission for reuse | PDF file iconPDF (1425 KB)
    Freely Available from IEEE
  • Masthead 
  • [Masthead]

    Publication Year: 2014, Page(s): 1
    Request permission for reuse | PDF file iconPDF (159 KB)
    Freely Available from IEEE
  • Table of Contents 
  • Table of contents

    Publication Year: 2014, Page(s):2 - 3
    Request permission for reuse | PDF file iconPDF (755 KB)
    Freely Available from IEEE
  • Elsewhere in the CS 
  • Computer Highlights Society Magazines

    Publication Year: 2014, Page(s):4 - 5
    Request permission for reuse | PDF file iconPDF (916 KB)
    Freely Available from IEEE
  • Spotlight on Transactions 
  • Determining the Cause of Design Model Inconsistencies

    Publication Year: 2014, Page(s): 6
    Request permission for reuse | PDF file iconPDF (382 KB) | HTML iconHTML
    Freely Available from IEEE
  • Computing Conversations 
  • Elizabeth Fong: Creating the SQL Database Standards

    Publication Year: 2014, Page(s):7 - 8
    Request permission for reuse | PDF file iconPDF (564 KB) | HTML iconHTML
    Freely Available from IEEE
  • Computing and the Law 
  • The Significance of Prior Art

    Publication Year: 2014, Page(s):9 - 11
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1306 KB) | HTML iconHTML

    An understanding of prior art is critical whether you're writing a patent application or embroiled in patent litigation. The Web extra at http://youtu.be/r_9cAMf_7xM is an audio recording from the Computing and the Law column, in which author Brian M. Gaff discusses the significance of prior art, an understanding of which is critical whether you're writing a patent application or embroiled in pate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 32 & 16 Years Ago 
  • 32 & 16 Years Ago

    Publication Year: 2014, Page(s):12 - 13
    Request permission for reuse | PDF file iconPDF (488 KB) | HTML iconHTML
    Freely Available from IEEE
  • News Briefs 
  • News Briefs

    Publication Year: 2014, Page(s):14 - 18
    Request permission for reuse | PDF file iconPDF (1115 KB) | HTML iconHTML
    Freely Available from IEEE
  • House Advertisement 
  • 2015 Richard E. Merwin Distinguished Service Award [Call for award nominations]

    Publication Year: 2014, Page(s): 19
    Request permission for reuse | PDF file iconPDF (6649 KB)
    Freely Available from IEEE
  • Guest Editor's Introduction 
  • Technology Commercialization in the Innovation Economy [Guest editor's introduction]

    Publication Year: 2014, Page(s):20 - 21
    Request permission for reuse | PDF file iconPDF (874 KB) | HTML iconHTML
    Freely Available from IEEE
  • Cover Feature 
  • The Role of Public Comprehensive Universities in Closing the Innovation Deficit

    Publication Year: 2014, Page(s):22 - 27
    Cited by:  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1161 KB) | HTML iconHTML

    An ambitious initiative by the University of North Carolina Wilmington demonstrates how public nonresearch universities can help close the US innovation deficit by encouraging local entrepreneurship and regional economic development. The Web extra at http://youtu.be/-FOmleTOlak is a video interview in which Computer magazine Advisory Panel member Alf Weaver interviews Chancellor Gary L. Miller abo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • University Commercialization Models: The University of Akron

    Publication Year: 2014, Page(s):28 - 36
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (2594 KB) | HTML iconHTML

    The University of Akron Research Foundation provides an example of how a university-affiliated research foundation can benefit both its institution and community through increased partnerships, shared services, engagement with area business leaders, and support for entrepreneurship and commercialization. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • tekMountain: A Community-Driven Corporate Incubator

    Publication Year: 2014, Page(s):37 - 39
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1629 KB) | HTML iconHTML

    A model business incubator in Wilmington, North Carolina, fosters entrepreneurial spirit by providing a physical space and work atmosphere conducive to interaction and innovation. The Web extra at http://youtu.be/SzbjN2rg-rE is a video interview in which Computer magazine Advisory Panel member Alf Weaver interviews Audrey Speicher about a model business incubator in Wilmington, North Carolina, tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Venture Capital: Fueling the Innovation Economy

    Publication Year: 2014, Page(s):40 - 47
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (931 KB) | HTML iconHTML

    Venture capital experts explore current opportunities to fuel and benefit from the innovation economy. Venture capital remains a vibrant force in the US, funding a broad array of disruptive technologies and playing a major role in fueling a startup-based economy. A survey of Austin Technology Incubator's recent startup portfolio suggests promising trends for venture investment in the innovation ec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computing Practices 
  • Cyberinfrastructures: Bridging the Divide between Scientific Research and Software Engineering

    Publication Year: 2014, Page(s):48 - 55
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (4389 KB) | HTML iconHTML

    Cyberinfrastructures--scientific research environments that span multiple institutions--require careful crafting and collaboration among domain specialists and software engineers, but several factors impede this collaboration. Recognizing five rules of thumb can help facilitate successful cyberinfrastructure creation and accelerate science in the disciplines they support. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Invisible Computing 
  • The Dark Patterns of Proxemic Sensing

    Publication Year: 2014, Page(s):56 - 60
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (2882 KB) | HTML iconHTML

    To be accepted and trusted by the public, proxemic sensing systems must respect people's conception of physical space, make it easy to opt in or out, and benefit users as well as advertisers and other vendors. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • House Advertisement 
  • Rock Stars of Cybersecurity [Advertisement]

    Publication Year: 2014, Page(s): 61
    Request permission for reuse | PDF file iconPDF (2606 KB)
    Freely Available from IEEE
  • Cloud Cover 
  • Architectural Options for Cloud Migration

    Publication Year: 2014, Page(s):62 - 66
    Cited by:  Papers (8)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1062 KB) | HTML iconHTML

    Identifying and examining potential cloud migration constraints and adopting a suitable architectural solution are important steps to facilitate successful application migration to the cloud. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computing Education 
  • The Future of Cybersecurity Education

    Publication Year: 2014, Page(s):67 - 69
    Cited by:  Papers (7)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1826 KB) | HTML iconHTML

    By fostering public-private partnerships in cybersecurity education, the US government is motivating federal agencies, industry, and academia to work more closely together to defend cyberspace. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Out of Band 
  • The Future of Digital Money Laundering

    Publication Year: 2014, Page(s):70 - 75
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (622 KB) | HTML iconHTML

    Banks got networked, and money laundering went digital. This is as close to cause and effect as you can get. In the future, successful money launderers will demonstrate a closer affinity to tax cheats than bank robbers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Technologies 
  • Organizational Effort Estimation

    Publication Year: 2014, Page(s):76 - 79
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (828 KB) | HTML iconHTML

    Despite improvements in single-task software effort estimation, IT projects routinely exceed estimates. Guidelines for organization-wide estimation can help overcome challenges involving governance, people, processes, and tools. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security 
  • Preventing Heartbleed

    Publication Year: 2014, Page(s):80 - 83
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (924 KB) | HTML iconHTML

    OpenSSL's recently disclosed Heartbleed vulnerability underscores the need for concrete methods to counter such vulnerabilities in future software development. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Entertainment Computing 
  • Teaching Game Programming in Family Workshops

    Publication Year: 2014, Page(s):84 - 87
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (3432 KB) | HTML iconHTML

    An initiative in Brazil teaches computing to young people alongside their parents in family workshops through game programming using Scratch - with benefits that reach beyond the classroom and into the community. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CS Election 
  • IEEE Computer Society Election

    Publication Year: 2014, Page(s):88 - 97
    Request permission for reuse | PDF file iconPDF (1870 KB)
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
David Alan Grier
Djaghe LLC
grier@email.gwu.edu