default search action
IEEE Computer, Volume 30, 1997
Volume 30, Number 1, January 1997
- David G. Stork:
Happy Birthday, HAL! 24-25
- Sara Reese Hedberg:
HP's International Cryptography Framework: Compromise or Threat? 28-30
- Steven J. Vaughan-Nichols:
Switching to a Faster Internet. 31-32
- Derek Partridge:
The Case for Inductive Programming. 36-41
- Barry G. Silverman:
Computer Reminders and Alerts. 42-49
- Marjory S. Blumenthal:
Unpredictable Certainty: The Internet and the Information Infrastructure. 50-56 - Randall J. Atkinson:
Towards a More Secure Internet. 57-61 - Michael Bieber, Fabio Vitali:
Toward Support for Hypermedia on the World Wide Web. 62-70 - Daniel E. O'Leary:
The Internet, Intranets, and the AI Renaissance. 71-78
- Alan H. Karp, Al Geist, David H. Bailey:
1996 Gordon Bell Prize Winners. 80-85
- Charles R. Severance:
Taking a High-tech Approach to Standards. 114-116
- Ken Whitaker:
Motivating and Keeping Software Developers. 126-128
- Jean-Marc Jézéquel, Bertrand Meyer:
Design by Contract: The Lessons of Ariane. 129-130
- Upkar Varshney:
Supporting Mobility with Wireless ATM. 131-133
- Ted G. Lewis:
The Year I Shoot My TV. Computer 30(1): 134-136 (1997)
Volume 30, Number 2, February 1997
- Steve Mann:
Wearable Computing: A First Step Toward Personal Imaging. 25-32
- Shari Lawrence Pfleeger, Les Hatton:
Investigating the Influence of Formal Methods. 33-43
- Gary Comparetto, Rafols Ramirez:
Trends in Mobile Satellite Technology. 44-52 - Kenneth R. Wood, Tristan Richardson, Frazer Bennett, Andy Harter, Andy Hopper:
Global Teleporting with Java: Toward Ubiquitous Personalized Computing. 53-59 - Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner:
Trusting Mobile User Devices and Security Modules. 61-68
- Nayeem Islam:
Customizing System Software Using OO Frameworks. 69-78 - Paul D. Gader, James M. Keller, Raghu Krishnapuram, Jung-Hsien Chiang, Magdi A. Mohamed:
Neural and Fuzzy Methods in Handwriting Recognition. 79-86
- Charles R. Severance:
Linking Computers and Consumer Electronics. 119-121
Volume 30, Number 3, March 1997
- Norris Parker Smith:
Computing in Japan: From Cocoon to Competition. 26-33
- Eric Wegscheider:
Toward Code-Free Business Application Development. 35-43
- Robert A. Martin:
Dealing with Dates: Solutions for the Year 2000. 44-51 - Philip Newcomb, Melvin R. Scott:
Requirements for Advanced Year 2000 Maintenance Tools. 52-57
- Nicholas Zvegintzov:
A Resource Guide to Year 2000 Tools. 58-63
- W. Neville Holmes:
Composite Arithmetic: Proposal for a New Standard. 65-73 - Michael Franz:
Dynamic Linking of Software Components. 74-81 - Sivarama P. Dandamudi:
Reducing Run Queue Contention in Shared Memory Multiprocessors. 82-89
- James Schoening, Thomas Wheeler:
Standards - The Key to Education Reform. 116-117
Volume 30, Number 4, April 1997
- Dirk Riehle:
The Human Side of Architectural Styles. 10
- Scott Hamilton, Janet Wilson:
Andrew Grove's Vision for the Internet. 14-15
- Lee Garber:
Students Stumble onto Internet Explorer Flaw. 18-20
- Ben Smith:
Tomorrow's Internet is Here Today. 22-23
- D. Richard Kuhn:
Sources of Failure in the Public Switched Telephone Network. 31-36
- Muhammad F. Mudawwar:
Multicode: A Truly Multilingual Approach to text Encoding. 37-43
- Arun K. Somani, Nitin H. Vaidya:
Understanding Fault Tolerance and Reliability - Guest Editors' Indroduction. 45-46, 50 - Timothy C. K. Chou:
Beyond Fault Tolerance. Computer 30(4): 47-49 (1997) - Algirdas Avizienis:
Toward Systematic Design of Fault-Tolerant Systems. 51-58 - Silvano Maffeis:
Prianha: A CORBA Tool For High Availability. 59-66 - Rachid Guerraoui, André Schiper:
Software-Based Replication for Fault Tolerance. 68-74 - Mei-Chen Hsueh, Timothy K. Tsai, Ravishankar K. Iyer:
Fault Injection Techniques and Tools. 75-82 - Biao Chen, Sanjay Kamat, Wei Zhao:
Fault-Tolerant, Real-Time Communication in FDDI-Based Networks. 83-90
- Richard Wiggins:
The Top-Level Domain Name Controversy. 105-106
- Janos Sztipanovits, Gabor Karsai:
Model-Integrated Computing. 110-111
- Cem Kaner:
Pitfalls and Strategies in Automated Testing. 114-116
- Andrew Kingoff:
Comparing Internet Search Engines. 117-118
- Ware Myers:
Software Reuse: Ostriches Beware. 119-120
Volume 30, Number 5, May 1997
- W. Neville Holmes:
What Can Computers Do? 11
- Stephen Barlas:
How Critical I the Shortage of IT Workers? 14-16
- George Lawton:
Extranets: Next Step for the Internet. 17
- Pat Ferguson, Watts S. Humphrey, Soheil Khajenoori, Susan Macke, Annette Matvya:
Results of Applying the Personal Software Process. 24-31
- Art Gemmer:
Risk Management: Moving Beyond Process. 33-43
- Scott Hamilton:
E-Commerce for the 21st Century. 44-47 - Jay M. Tenenbaum, Tripatinder S. Chowdhry, Kevin Hughes:
Eco System: An Internet Commerce Architecture. 48-55 - Ajit Kambil:
Doing Business in the Wired World. 56-61
- Danny B. Lange, Yuichi Nakamura:
Object-Oriented Program Tracing and Visualization. 63-70 - Augustus K. Uht, Vijay Sindagi, Sajee Somanathan:
Branch Effect Reduction Techniques. 71-81
- Geoffrey O. Thompson:
Work Progresses on Gigabit Ethernet. 95-96
- Bertrand Meyer:
Practice To Perfect: The Quality First Model. 102-106
- William S. Maki, Ruth H. Maki:
Learning Without Lectures: A Case Study. 107-108
- Ted G. Lewis:
Absorb and Extend: Resistance is Futile! Computer 30(5): 109-112 (1997)
Volume 30, Number 6, June 1997
- Richard Marlon Stein:
On Pyramidal Exploitation and Equal Punishment. 10
- David Clark:
PC and TV Makers Battle Over Convergence. 14-16
- Lee Goldberg:
Software Modems: A New Way to Communicate. 20
- Jeffrey M. Voas, Gary McGraw, Lora Kassab, Larry Voas:
A 'Crystal Ball' for Software Liability. 29-36
- Krithi Ramamritham:
Computer Science Research in India. 40-47
- Kankanahalli Srinivas, Vasudevan Jagannathan, Y. V. Ramana Reddy, Raghu Karinthi:
Java and Beyond: Executable Content - Guest Editors' Introduction. 49-52 - James Gosling:
The Feel of Java. 53-57 - Jonathan P. Munson, Prasun Dewan:
Sync: A Java Framework for Mobil Collaborative Applications. 59-66 - Cheng-Hsueh A. Hsieh, Marie T. Conte, Teresa L. Johnson, John C. Gyllenhaal, Wen-mei W. Hwu:
Optimizing NET Compilers for Improved Java Performance. 67-75 - X. Nick Zhang:
Secure Code Distribution. 76-79
- Kuhanandha Mahalingam, Michael N. Huhns:
A Tool for Organizing Web Information. 80-83 - Mika Leppinen, Pekka Pulkkinen, Aapo Rautiainen:
Java- and CORBA-Based Network Management. 83-87 - Siddhartha Chatterjee, M. Paramasivam, William J. Yakowenko:
Architecture for a Web-Accessible Simulation Environment. 88-91
- Joan Sullivan:
SQL Test Suite Goes Online. 103-105
- William Fornaciari, Donatella Sciuto:
A Two-Level Cosimulation Environment. 109-111
- Judy Bamberger:
Essence of the Capability Maturity Model. 112-114
- Prabhu Ram, Robert M. Abarbanel:
Enterprise Computing: The Java Factor. 115-117
- Francis McInerney, Sean White:
The Internet's Sustainable Advantage. 118-120
Volume 30, Number 7, July 1997
- W. Neville Holmes:
The Myth of the Intelligent Computer. 8
- Lee Garber, Paul Korzeniowski:
Internet Splits over Domain Name Controversy. 12-14
- Udo Flohr:
Interactive Online 3D's Future. 15-16
- Steven P. Vanderwiel, David J. Lilja:
When Caches Aren't Enough: Data Prefetching Techniques. 23-30
- David Harel, Eran Gery:
Executable Object Modeling with Statecharts. 31-42 - Richard W. Conners, D. Earl Kline, Philip A. Araman, Thomas H. Drayer:
Machine Vision Technology for the Forest Products Industry. 43-48 - Massimo Bertozzi, Alberto Broggi:
Vision-Based Vehicle Guidance. 49-54 - Bahram Parvin, John R. Taylor, Daniel E. Callahan, William E. Johnston, Ulrich Dahmen:
Visual Servoing for Online Facilities. 56-62 - Per Stenström, Mats Brorsson, Fredrik Dahlgren, Håkan Grahn, Michel Dubois:
Boosting the Performance of Shared Memory Multiprocessors. 63-70 - Eric van der Deijl, Gerco Kanbier, Olivier Temam, Elana D. Granston:
A Cache Visualization Tool. 71-78
- Dave Crocker:
Domain Name Expansion Plan Deserves Support. 104-105
- David W. Oliver:
Optimizing the Organization's Structure. 110-112
- Bertrand Meyer:
The Next Software Breakthrough. 113-114
- Patrick J. Lynch, Sarah Horton:
Imprudent Linking Weaves a Tangled Web. 115-117
- Ted G. Lewis:
Emergent Behavior, Emergent Profits. Computer 30(7): 118-120 (1997)
Volume 30, Number 8, August 1997
- Carlo Pescio:
Seven Aphorisms of Software Development. 9
- John Edwards:
Voice-Based Interfaces Make PCs Better Listeners. 14-16
- Steven J. Vaughan-Nichols:
Making the PC Easier to Use. 17-25
- Gail C. Murphy, David Notkin:
Reengineering with Reflection Models: A Case Study. 29-36
- Diane M. Strong, Yang W. Lee, Richard Y. Wang:
10 Potholes in the Road to Information Quality. 38-46
- Alexander D. Stoyen:
Fighting Complexity in Computer Systems - Guest Editor's Introduction. 47-48 - David M. Dikel, David Kane, Steve Ornburn, William Loftus, Jim Wilson:
Applying Software Product-Line Architecture. 49-55 - King-Tim Ko, Kit-Sang Tang, Cheung-Yau Chan, Kim-Fung Man, Sam Kwong:
Using Genetic Algorithms to Design Mesh Networks. 56-61 - K. H. Kim:
Object Structures for Real-Time Systems and Simulators. 62-70
- Charles R. Severance:
Could LDAP Be the Next Killer DAP? 88-89
- Michael Mrva:
Reuse Factors in Embedded Systems Design. 93-95
- James Bach:
Good Enough Quality: Beyond the Buzzword. 96-98
- Theresa-Marie Rhyne, Donald P. Brutzman, Michael R. Macedonia:
Internetworked Graphics and the Web. 99-101
- Mark E. Sampson:
The Allegory of the Humidifier: POI for Systems Engineering. 102-104
Volume 30, Number 9, September 1997
- Victor J. Duvanenko:
Two Writes Make a Read. 8
- David Sims:
Vendors Struggle with Costs, Benefits of Shrinking Cycle Times. 12-14
- Joe Mullich:
Data Mining: Making Data Meaningful. 18
- N. Asokan, Philippe A. Janson, Michael Steiner, Michael Waidner:
The State of the Art in Electronic Payment Systems. 28-35
- Doug Matzke:
Will Physical Scalability Sabotage Performance Gains? 37-39 - Joseph A. Fisher:
Walk-Time Techniques: Catalyst for Architectural Change. 40-42 - Keith Diefendorff, Pradeep K. Dubey:
How Multimedia Workloads Will Change Processor Design. 43-45
- Doug Burger, James R. Goodman:
Billion-Transistor Architectures - Guest Editors' Introduction. 46-49 - Yale N. Patt, Sanjay J. Patel, Marius Evers, Daniel H. Friendly, Jared Stark:
One Billion Transistors, One Uniprocessor, One Chip. 51-57 - Mikko H. Lipasti, John Paul Shen:
Superspeculative Microarchitecture for Beyond AD 2000. 59-66 - James E. Smith, Sriram Vajapeyam:
Trace Processors: Moving to Fourth-Generation Microarchitectures. 68-74 - Christoforos E. Kozyrakis, Stylianos Perissakis, David A. Patterson, Thomas E. Anderson, Krste Asanovic, Neal Cardwell, Richard Fromm, Jason Golbus, Benjamin Gribstad, Kimberly Keeton, Randi Thomas, Noah Treuhaft, Katherine A. Yelick:
Scalable Processors in the Billion-Transistor Era: IRAM. 75-78 - Lance Hammond, Basem A. Nayfeh, Kunle Olukotun:
A Single-Chip Multiprocessor. 79-85 - Elliot Waingold, Michael B. Taylor, Devabhaktuni Srikrishna, Vivek Sarkar, Walter Lee, Victor Lee, Jang Kim, Matthew I. Frank, Peter Finch, Rajeev Barua, Jonathan Babb, Saman P. Amarasinghe, Anant Agarwal:
Baring It All to Software: Raw Machines. 86-93
- Jerry Foley, Charles R. Severance:
OSI Retrospect and Prospect. 123-124
- Vijay Gurbaxani, Janet Wilson:
Bridging IT and Business: Techno MBAs. 128-129
- Carlo Pescio:
Principles Versus Patterns. 130-131
- L. John Mason:
Stress and the Ultimate Luddite Survival Mechanism. 132-133
- Ted G. Lewis:
Digitopolis Meets Encalming Technology. 134-136
Volume 30, Number 10, October 1997
- Lawrence T. Hardiman:
Personality Types and Software Engineers. 10
- David Clark:
Will New Fiber Technology Quench the Thrist for Bandwidth? 14-15
- George Lawton:
Dawn of the Internet Appliance. 16-18
- Scott Hamilton, Lee Garber:
Deep Blue's Hardware-Software Synergy. 29-35
- Ivar Jacobson, Martin L. Griss, Patrik Jonsson:
Making the Reuse Business Work. 36-42
- David C. Rine:
Supporting Reuse with Object Technology - Guest Editor's Introduction. 43-45 - Robert G. Fichman, Chris F. Kemerer:
Object Technology and Reuse: Lessons from Early Adopters. 47-59 - John C. Zubeck:
Implementing Reuse with RAD Tools' Native Objects. 60-65 - Letha H. Etzkorn, Carl G. Davis:
Automatically Identifying Reusable OO Legacy Code. 66-71 - Ernesto Damiani, Maria Grazia Fugini, Enrico Fusaschi:
A Descriptor-Based Approach to OO Code Reuse. 73-80
- Vir V. Phoha:
A Standard for Software Documentation. 97-98
- William H. Mangione-Smith:
Application Design for Configurable Computing. 115-117
- Luke Hohmann:
In Methods We Trust? 119-121
- Reed Hundt:
The Internet: From Here to Ubiquity. 122-124
- Terry Bollinger:
The Interplay of Art and Science in Software. 125-128
Volume 30, Number 11, November 1997
- Dwayne Phillips:
Is Your Project a Dilbert Cartoon? 6
- George Lawton:
In Search of Real-Time Internet Service. 14-16
- Sixto Ortiz Jr.:
Virtual Private Networks: Leveraging the Internet. 18-20
- Huaiqing Wang, Chen Wang:
Intelligent Agents in the Nuclear Industry. 28-34
- David Maulsby, Ian H. Witten:
Teaching Agents to Learn: From User Study to Implementation. 36-44
- Hesham El-Rewini, Michael C. Mulder, Peter Freeman, Gordon E. Stokes, Innes Jelly, Lillian N. Cassel, Doris K. Lidtke, Stefano Russo, Bernd J. Krämer, Jimmie E. Haines, A. Joe Turner:
Keeping Pace with an Information Society. 46-57 - David Garlan, David P. Gluch, James E. Tomayko:
Agents of Change: Educating Software Engineering Leaders. 59-65
- Tony Werner, Venkatesh Akella:
Asynchronous Processor Survey. 67-76 - Nabil N. Kamel:
Predicate Caching for Data-Intensive Autonomous Systems. 77-83
- Roger Howe:
ISO 14001: The Green Standard. 133-134
- Jerry Porras:
Building the Vision: Lessons for All Leaders (interview). 135-136
- Christopher Creel, Bertrand Meyer, Philippe Stephan:
The Opportunity of a Millennium. 137-138
- Ronald J. Vetter, Charles R. Severance:
Web-Based Education Experiences. 139-141
- Ted G. Lewis:
Cars, Phones, and Tamagotchi Tribes. 142-144
Volume 30, Number 12, December 1997
- K. V. K. K. Prasad:
Matching People and Jobs: The I-CMM Proposal. 10
- John Edwards:
New Interfaces: Making Computers More Accessible. 12-14
- Chris Herringshaw:
Detecting Attacks on Networks. 16-17
- Niels Ole Bernsen, Hans Dybkjær, Laila Dybkjær:
What Should Your Speech System Say? 25-31
- Yale N. Patt:
Identifiying Obstacles in the Path to More. 32 - Thomas M. Conte, Pradeep K. Dubey, Matthew D. Jennings, Ruby B. Lee, Alex Peleg, Salliah Rathnam, Michael S. Schlansker, Peter Song, Andrew Wolfe:
Challenges to Combining General-Purpose and Multimedia Processors. 33-37 - William H. Mangione-Smith, Brad Hutchins, David L. Andrews, André DeHon, Carl Ebeling, Reiner W. Hartenstein, Oskar Mencer, John Morris, Krishna V. Palem, Viktor K. Prasanna, Henk A. E. Spaanenburg:
Seeking Solutions in Configurable Computing. 38-43 - Per Stenström, Erik Hagersten, David J. Lilja, Margaret Martonosi, Madan Venugopal:
Trends in Shared Memory Multiprocessing. 44-50 - Sarita V. Adve, Doug Burger, Rudolf Eigenmann, Alasdair Rawsthorne, Michael D. Smith, Catherine H. Gebotys, Mahmut T. Kandemir, David J. Lilja, Alok N. Choudhary, Jesse Zhixi Fang, Pen-Chung Yew:
Changing Interaction of Compiler and Architecture. 51-58 - Hasan Alkhatib, Chase Bailey, Mario Gerla, James McCrae:
Wireless Data Networks: Reaching the Extra Mile. 59-62 - Michael S. Schlansker, Thomas M. Conte, James C. Dehnert, Kemal Ebcioglu, Jesse Zhixi Fang, Carol L. Thompson:
Compilers for Instruction-Level Parallelism. 63-69
- Frank Dawson:
Emerging Calendaring and Scheduling Standards. 126-128
- Jeffrey M. Voas:
Fault Injection for the Masses. 129-130
- Kenneth I. Magel:
Is It Too Late to Put the User Back into HTML? 131-132
- W. Neville Holmes:
Converging on Program Simplicity. 134-136
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.