- Vol: 31 Issue: 1
- Vol: 31 Issue: 2
- Vol: 31 Issue: 3
- Vol: 31 Issue: 4
- Vol: 31 Issue: 5
- Vol: 31 Issue: 6
- Vol: 30 Issue: 1
- Vol: 30 Issue: 2
- Vol: 30 Issue: 3
- Vol: 30 Issue: 4
- Vol: 30 Issue: 5
- Vol: 30 Issue: 6
- Vol: 29 Issue: 1
- Vol: 29 Issue: 2
- Vol: 29 Issue: 3
- Vol: 29 Issue: 4
- Vol: 29 Issue: 5
- Vol: 29 Issue: 6
- Vol: 28 Issue: 1
- Vol: 28 Issue: 2
- Vol: 28 Issue: 3
- Vol: 28 Issue: 4
- Vol: 28 Issue: 5
- Vol: 28 Issue: 6
- Vol: 17 Issue: 1
- Vol: 17 Issue: 2
- Vol: 17 Issue: 2 Part: Supplement
- Vol: 17 Issue: 3
- Vol: 17 Issue: 4
- Vol: 17 Issue: 5
- Vol: 27 Issue: 1
- Vol: 27 Issue: 2
- Vol: 27 Issue: 3
- Vol: 27 Issue: 4
- Vol: 27 Issue: 5
- Vol: 27 Issue: 6
- Vol: 16 Issue: 1
- Vol: 16 Issue: 2 Part: 1
- Vol: 16 Issue: 2 Part: 2
- Vol: 16 Issue: 3
- Vol: 16 Issue: 4
- Vol: 16 Issue: 5
- Vol: 26 Issue: 1
- Vol: 26 Issue: 2
- Vol: 26 Issue: 3
- Vol: 26 Issue: 4
- Vol: 26 Issue: 5
- Vol: 26 Issue: 6
- Vol: 15 Issue: 1
- Vol: 15 Issue: 2 Part: 1
- Vol: 15 Issue: 2 Part: 2
- Vol: 15 Issue: 3
- Vol: 15 Issue: 4
- Vol: 15 Issue: 5
- Vol: 25 Issue: 1
- Vol: 25 Issue: 2
- Vol: 25 Issue: 3
- Vol: 25 Issue: 4
- Vol: 25 Issue: 5
- Vol: 25 Issue: 6
- Vol: 23 Issue: 5
- Vol: 24 Issue: 1
- Vol: 24 Issue: 2
- Vol: 24 Issue: 2 Part: Supplement
- Vol: 24 Issue: 3
- Vol: 24 Issue: 4
- Vol: 24 Issue: 5
- Vol: 23 Issue: 1
- Vol: 23 Issue: 2
- Vol: 23 Issue: 2 Part: supplement
- Vol: 23 Issue: 3
- Vol: 23 Issue: 4
- Vol: 23 Issue: 5
- Vol: 22 Issue: 1
- Vol: 22 Issue: 2
- Vol: 22 Issue: 2 Part: Supplement
- Vol: 22 Issue: 3
- Vol: 22 Issue: 4
- Vol: 21 Issue: 1
- Vol: 21 Issue: 2
- Vol: 21 Issue: 2 Part: supplement
- Vol: 21 Issue: 3
- Vol: 21 Issue: 4
- Vol: 21 Issue: 5
- Vol: 18 Issue: 1
- Vol: 18 Issue: 2
- Vol: 18 Issue: 2 Part: Supplement
- Vol: 18 Issue: 3
- Vol: 18 Issue: 4
- Vol: 18 Issue: 5
- Vol: 20 Issue: 1
- Vol: 20 Issue: 2
- Vol: 20 Issue: 2 Part: Supplement
- Vol: 20 Issue: 3
- Vol: 20 Issue: 4
- Vol: 20 Issue: 5
- Vol: 19 Issue: 1
- Vol: 19 Issue: 2
- Vol: 19 Issue: 2 Part: Supplement
- Vol: 19 Issue: 3
- Vol: 19 Issue: 4
- Vol: 19 Issue: 5
- Vol: 36 Issue: 1
- Vol: 36 Issue: 2
- Vol: 36 Issue: 3
- Vol: 36 Issue: 4
- Vol: 36 Issue: 5
- Vol: 36 Issue: 6
- Vol: 35 Issue: 1
- Vol: 35 Issue: 2
- Vol: 35 Issue: 3
- Vol: 35 Issue: 4
- Vol: 35 Issue: 5
- Vol: 35 Issue: 6
- Vol: 34 Issue: 1
- Vol: 34 Issue: 2
- Vol: 34 Issue: 3
- Vol: 34 Issue: 4
- Vol: 34 Issue: 5
- Vol: 34 Issue: 6
- Vol: 33 Issue: 1
- Vol: 33 Issue: 2
- Vol: 33 Issue: 3
- Vol: 33 Issue: 4
- Vol: 33 Issue: 5
- Vol: 33 Issue: 6
- Vol: 31 Issue: 1
- Vol: 31 Issue: 2
- Vol: 31 Issue: 3
- Vol: 31 Issue: 4
- Vol: 31 Issue: 5
- Vol: 31 Issue: 6
- Vol: 30 Issue: 1
- Vol: 30 Issue: 2
- Vol: 30 Issue: 3
- Vol: 30 Issue: 4
- Vol: 30 Issue: 5
- Vol: 30 Issue: 6
- Vol: 29 Issue: 1
- Vol: 29 Issue: 2
- Vol: 29 Issue: 3
- Vol: 29 Issue: 4
- Vol: 29 Issue: 5
- Vol: 29 Issue: 6
- Vol: 28 Issue: 1
- Vol: 28 Issue: 2
- Vol: 28 Issue: 3
- Vol: 28 Issue: 4
- Vol: 28 Issue: 5
- Vol: 28 Issue: 6
- Vol: 17 Issue: 1
- Vol: 17 Issue: 2
- Vol: 17 Issue: 2 Part: Supplement
- Vol: 17 Issue: 3
- Vol: 17 Issue: 4
- Vol: 17 Issue: 5
- Vol: 27 Issue: 1
- Vol: 27 Issue: 2
- Vol: 27 Issue: 3
- Vol: 27 Issue: 4
- Vol: 27 Issue: 5
- Vol: 27 Issue: 6
- Vol: 16 Issue: 1
- Vol: 16 Issue: 2 Part: 1
- Vol: 16 Issue: 2 Part: 2
- Vol: 16 Issue: 3
- Vol: 16 Issue: 4
- Vol: 16 Issue: 5
- Vol: 26 Issue: 1
- Vol: 26 Issue: 2
- Vol: 26 Issue: 3
- Vol: 26 Issue: 4
- Vol: 26 Issue: 5
- Vol: 26 Issue: 6
- Vol: 15 Issue: 1
- Vol: 15 Issue: 2 Part: 1
- Vol: 15 Issue: 2 Part: 2
- Vol: 15 Issue: 3
- Vol: 15 Issue: 4
- Vol: 15 Issue: 5
- Vol: 25 Issue: 1
- Vol: 25 Issue: 2
- Vol: 25 Issue: 3
- Vol: 25 Issue: 4
- Vol: 25 Issue: 5
- Vol: 25 Issue: 6
- Vol: 23 Issue: 5
- Vol: 24 Issue: 1
- Vol: 24 Issue: 2
- Vol: 24 Issue: 2 Part: Supplement
- Vol: 24 Issue: 3
- Vol: 24 Issue: 4
- Vol: 24 Issue: 5
- Vol: 23 Issue: 1
- Vol: 23 Issue: 2
- Vol: 23 Issue: 2 Part: supplement
- Vol: 23 Issue: 3
- Vol: 23 Issue: 4
- Vol: 23 Issue: 5
- Vol: 22 Issue: 1
- Vol: 22 Issue: 2
- Vol: 22 Issue: 2 Part: Supplement
- Vol: 22 Issue: 3
- Vol: 22 Issue: 4
- Vol: 21 Issue: 1
- Vol: 21 Issue: 2
- Vol: 21 Issue: 2 Part: supplement
- Vol: 21 Issue: 3
- Vol: 21 Issue: 4
- Vol: 21 Issue: 5
- Vol: 18 Issue: 1
- Vol: 18 Issue: 2
- Vol: 18 Issue: 2 Part: Supplement
- Vol: 18 Issue: 3
- Vol: 18 Issue: 4
- Vol: 18 Issue: 5
- Vol: 20 Issue: 1
- Vol: 20 Issue: 2
- Vol: 20 Issue: 2 Part: Supplement
- Vol: 20 Issue: 3
- Vol: 20 Issue: 4
- Vol: 20 Issue: 5
- Vol: 19 Issue: 1
- Vol: 19 Issue: 2
- Vol: 19 Issue: 2 Part: Supplement
- Vol: 19 Issue: 3
- Vol: 19 Issue: 4
- Vol: 19 Issue: 5
- Vol: 36 Issue: 1
- Vol: 36 Issue: 2
- Vol: 36 Issue: 3
- Vol: 36 Issue: 4
- Vol: 36 Issue: 5
- Vol: 36 Issue: 6
- Vol: 35 Issue: 1
- Vol: 35 Issue: 2
- Vol: 35 Issue: 3
- Vol: 35 Issue: 4
- Vol: 35 Issue: 5
- Vol: 35 Issue: 6
- Vol: 34 Issue: 1
- Vol: 34 Issue: 2
- Vol: 34 Issue: 3
- Vol: 34 Issue: 4
- Vol: 34 Issue: 5
- Vol: 34 Issue: 6
- Vol: 33 Issue: 1
- Vol: 33 Issue: 2
- Vol: 33 Issue: 3
- Vol: 33 Issue: 4
- Vol: 33 Issue: 5
- Vol: 33 Issue: 6
Volume 18 Issue 1 • Feb.-March 1999
Filter Results
-
Looking back: a history of marine seismic exploration
Publication Year: 1999, Page(s):36 - 38Seismic exploration instruments and geophysical techniques developed in the 20th century have dramatically expanded our knowledge of the oceanic crust. This article is a review of the history, development and implementation of these tools. View full abstract»
-
Site investigations function better with seismic waves
Publication Year: 1999, Page(s):33 - 35Discusses the spectral analysis of surface waves (SASW) method in seismic sounding. The characteristics of the method are described together with the uses that it can be put View full abstract»
-
Secure database management systems
Publication Year: 1999, Page(s):17 - 19
Cited by: Papers (1)Information is a very critical asset in today's organizations. Organizations use database systems and the information within them to automate various functions. Due to its importance, information protection is a critical component of the database management system (DBMS). Information protection is the goal of a secure DBMS. When designing such a system, tradeoffs between operating environment, eco... View full abstract»
-
Internet architectural alternatives
Publication Year: 1999, Page(s):29 - 32Diverse architectural approaches have been taken to support Internet infrastructures within various countries around the world. The different methods are often based on the individual country's circumstances and goals. We review the technical components and the technologies central to all Internet architectures before looking at how, why and what architectures are used in the USA, the Netherlands ... View full abstract»
-
Visual cryptography and threshold schemes
Publication Year: 1999, Page(s):13 - 16
Cited by: Papers (10) | Patents (1)Visual cryptography is a secret sharing scheme that uses the human visual system to perform computations. In this article, we present some background to traditional secret-sharing schemes, then explain visual schemes, describing some of the basic construction techniques used. topics discussed include: two out of two scheme, two out of n schemes, and graph access structures View full abstract»
-
Optical networking
Publication Year: 1999, Page(s):26 - 28The author discusses the history of telecommunication networks and the development of fiber networks. The expansion of capacity is considered as is the introduction of DWDM (dense wave division multiplexing) View full abstract»
-
Steganography: the art of hiding information in plain sight
Publication Year: 1999, Page(s):10 - 12
Cited by: Papers (8)Steganography is the art (as well as the science) of communicating in a hidden way. It is referred to as “transmission security”, or TRANSEC in military literature. Its goal is to hide messages inside other “harmless” messages in such a way that an “enemy” would not even know a second secret message was present. The history of steganography is discussed as is th... View full abstract»
-
Chasing after “petty” computer crime
Publication Year: 1999, Page(s):20 - 22
Cited by: Papers (2)Non-violent crime has found a goldmine of opportunity in the computer world. What constitutes a crime and how it impacts people as a society and individually is very slowly being worked out. The next few years will surely bring changes and decisions that will affect everyone. The pace in which the legal system currently moves is slow. This is to try to ensure fairness to all the parties involved: ... View full abstract»
-
SUNSAT
Publication Year: 1999, Page(s):39 - 40In 1989, university lecturers started planning for the Stellenbosch University Satellite (SUNSAT), South Africa's first microsatellite. Students have designed and tested virtually all the electronics and much of the mechanics. The goals of the project are: enrichment of the graduate training program, promoting international cooperation and recognition for the university and country, and stimulatin... View full abstract»
-
Turbo codes
Publication Year: 1999, Page(s):23 - 25
Cited by: Papers (1)Turbo codes which represent a breakthrough in coding for wireless transmission are discussed. They can achieve very low error rates (in the range of 10-5) while operating at less than 1 dB above the Shannon bound. In contrast, most current systems using conventional codes operate at 3 to 6 dB away from this bound. View full abstract»
-
EE education in Spain
Publication Year: 1999, Page(s):41 - 44Engineering education in Spain has a long tradition exceeding 150 years. Its traditional character has always been complemented by an effort to work with the social, industrial and international environment of each era. The last great change has taken place in the last ten years (1986-1996) by: (1) expanding the number of engineering degrees offered; and (2) profoundly changing the various curricu... View full abstract»
Aims & Scope
IEEE Potentials is the magazine dedicated to undergraduate and graduate students and young professionals.
Meet Our Editors
Sachin Seth