


default search action
IEEE Computer, Volume 30, 1997
Volume 30, Number 1, January 1997
- David G. Stork:

Happy Birthday, HAL! 24-25
- Sara Reese Hedberg:

HP's International Cryptography Framework: Compromise or Threat? 28-30
- Steven J. Vaughan-Nichols:

Switching to a Faster Internet. 31-32
- Derek Partridge:

The Case for Inductive Programming. 36-41
- Barry G. Silverman:

Computer Reminders and Alerts. 42-49
- Marjory S. Blumenthal:

Unpredictable Certainty: The Internet and the Information Infrastructure. 50-56 - Randall J. Atkinson:

Towards a More Secure Internet. 57-61 - Michael Bieber, Fabio Vitali

:
Toward Support for Hypermedia on the World Wide Web. 62-70 - Daniel E. O'Leary

:
The Internet, Intranets, and the AI Renaissance. 71-78
- Alan H. Karp, Al Geist, David H. Bailey:

1996 Gordon Bell Prize Winners. 80-85
- Charles R. Severance:

Taking a High-tech Approach to Standards. 114-116
- Ken Whitaker:

Motivating and Keeping Software Developers. 126-128
- Jean-Marc Jézéquel, Bertrand Meyer

:
Design by Contract: The Lessons of Ariane. 129-130
- Upkar Varshney:

Supporting Mobility with Wireless ATM. 131-133
- Ted G. Lewis:

The Year I Shoot My TV. Computer 30(1): 134-136 (1997)
Volume 30, Number 2, February 1997
- Steve Mann:

Wearable Computing: A First Step Toward Personal Imaging. 25-32
- Shari Lawrence Pfleeger, Les Hatton:

Investigating the Influence of Formal Methods. 33-43
- Gary Comparetto, Rafols Ramirez:

Trends in Mobile Satellite Technology. 44-52 - Kenneth R. Wood, Tristan Richardson, Frazer Bennett, Andy Harter, Andy Hopper:

Global Teleporting with Java: Toward Ubiquitous Personalized Computing. 53-59 - Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner

:
Trusting Mobile User Devices and Security Modules. 61-68
- Nayeem Islam:

Customizing System Software Using OO Frameworks. 69-78 - Paul D. Gader, James M. Keller, Raghu Krishnapuram, Jung-Hsien Chiang

, Magdi A. Mohamed:
Neural and Fuzzy Methods in Handwriting Recognition. 79-86
- Charles R. Severance:

Linking Computers and Consumer Electronics. 119-121
Volume 30, Number 3, March 1997
- Norris Parker Smith:

Computing in Japan: From Cocoon to Competition. 26-33
- Eric Wegscheider:

Toward Code-Free Business Application Development. 35-43
- Robert A. Martin:

Dealing with Dates: Solutions for the Year 2000. 44-51 - Philip Newcomb, Melvin R. Scott:

Requirements for Advanced Year 2000 Maintenance Tools. 52-57
- Nicholas Zvegintzov:

A Resource Guide to Year 2000 Tools. 58-63
- W. Neville Holmes:

Composite Arithmetic: Proposal for a New Standard. 65-73 - Michael Franz:

Dynamic Linking of Software Components. 74-81 - Sivarama P. Dandamudi:

Reducing Run Queue Contention in Shared Memory Multiprocessors. 82-89
- James Schoening, Thomas Wheeler:

Standards - The Key to Education Reform. 116-117
Volume 30, Number 4, April 1997
- Dirk Riehle:

The Human Side of Architectural Styles. 10
- Scott Hamilton, Janet Wilson:

Andrew Grove's Vision for the Internet. 14-15
- Lee Garber:

Students Stumble onto Internet Explorer Flaw. 18-20
- Ben Smith:

Tomorrow's Internet is Here Today. 22-23
- D. Richard Kuhn:

Sources of Failure in the Public Switched Telephone Network. 31-36
- Muhammad F. Mudawwar

:
Multicode: A Truly Multilingual Approach to text Encoding. 37-43
- Arun K. Somani, Nitin H. Vaidya:

Understanding Fault Tolerance and Reliability - Guest Editors' Indroduction. 45-46, 50 - Timothy C. K. Chou:

Beyond Fault Tolerance. Computer 30(4): 47-49 (1997) - Algirdas Avizienis:

Toward Systematic Design of Fault-Tolerant Systems. 51-58 - Silvano Maffeis:

Prianha: A CORBA Tool For High Availability. 59-66 - Rachid Guerraoui

, André Schiper:
Software-Based Replication for Fault Tolerance. 68-74 - Mei-Chen Hsueh, Timothy K. Tsai, Ravishankar K. Iyer:

Fault Injection Techniques and Tools. 75-82 - Biao Chen, Sanjay Kamat, Wei Zhao

:
Fault-Tolerant, Real-Time Communication in FDDI-Based Networks. 83-90
- Richard Wiggins:

The Top-Level Domain Name Controversy. 105-106
- Janos Sztipanovits, Gabor Karsai:

Model-Integrated Computing. 110-111
- Cem Kaner:

Pitfalls and Strategies in Automated Testing. 114-116
- Andrew Kingoff:

Comparing Internet Search Engines. 117-118
- Ware Myers:

Software Reuse: Ostriches Beware. 119-120
Volume 30, Number 5, May 1997
- W. Neville Holmes:

What Can Computers Do? 11
- Stephen Barlas:

How Critical I the Shortage of IT Workers? 14-16
- George Lawton:

Extranets: Next Step for the Internet. 17
- Pat Ferguson, Watts S. Humphrey, Soheil Khajenoori, Susan Macke, Annette Matvya:

Results of Applying the Personal Software Process. 24-31
- Art Gemmer:

Risk Management: Moving Beyond Process. 33-43
- Scott Hamilton:

E-Commerce for the 21st Century. 44-47 - Jay M. Tenenbaum, Tripatinder S. Chowdhry, Kevin Hughes:

Eco System: An Internet Commerce Architecture. 48-55 - Ajit Kambil:

Doing Business in the Wired World. 56-61
- Danny B. Lange, Yuichi Nakamura:

Object-Oriented Program Tracing and Visualization. 63-70 - Augustus K. Uht, Vijay Sindagi, Sajee Somanathan:

Branch Effect Reduction Techniques. 71-81
- Geoffrey O. Thompson:

Work Progresses on Gigabit Ethernet. 95-96
- Bertrand Meyer

:
Practice To Perfect: The Quality First Model. 102-106
- William S. Maki, Ruth H. Maki:

Learning Without Lectures: A Case Study. 107-108
- Ted G. Lewis:

Absorb and Extend: Resistance is Futile! Computer 30(5): 109-112 (1997)
Volume 30, Number 6, June 1997
- Richard Marlon Stein:

On Pyramidal Exploitation and Equal Punishment. 10
- David Clark:

PC and TV Makers Battle Over Convergence. 14-16
- Lee Goldberg:

Software Modems: A New Way to Communicate. 20
- Jeffrey M. Voas, Gary McGraw, Lora Kassab, Larry Voas:

A 'Crystal Ball' for Software Liability. 29-36
- Krithi Ramamritham:

Computer Science Research in India. 40-47
- Kankanahalli Srinivas, Vasudevan Jagannathan, Y. V. Ramana Reddy, Raghu Karinthi:

Java and Beyond: Executable Content - Guest Editors' Introduction. 49-52 - James Gosling:

The Feel of Java. 53-57 - Jonathan P. Munson, Prasun Dewan:

Sync: A Java Framework for Mobil Collaborative Applications. 59-66 - Cheng-Hsueh A. Hsieh, Marie T. Conte, Teresa L. Johnson, John C. Gyllenhaal, Wen-mei W. Hwu:

Optimizing NET Compilers for Improved Java Performance. 67-75 - X. Nick Zhang:

Secure Code Distribution. 76-79
- Kuhanandha Mahalingam, Michael N. Huhns:

A Tool for Organizing Web Information. 80-83 - Mika Leppinen, Pekka Pulkkinen, Aapo Rautiainen:

Java- and CORBA-Based Network Management. 83-87 - Siddhartha Chatterjee, M. Paramasivam, William J. Yakowenko:

Architecture for a Web-Accessible Simulation Environment. 88-91
- Joan Sullivan:

SQL Test Suite Goes Online. 103-105
- William Fornaciari

, Donatella Sciuto:
A Two-Level Cosimulation Environment. 109-111
- Judy Bamberger:

Essence of the Capability Maturity Model. 112-114
- Prabhu Ram, Robert M. Abarbanel:

Enterprise Computing: The Java Factor. 115-117
- Francis McInerney, Sean White:

The Internet's Sustainable Advantage. 118-120
Volume 30, Number 7, July 1997
- W. Neville Holmes:

The Myth of the Intelligent Computer. 8
- Lee Garber, Paul Korzeniowski:

Internet Splits over Domain Name Controversy. 12-14
- Udo Flohr:

Interactive Online 3D's Future. 15-16
- Steven P. Vanderwiel, David J. Lilja:

When Caches Aren't Enough: Data Prefetching Techniques. 23-30
- David Harel, Eran Gery:

Executable Object Modeling with Statecharts. 31-42 - Richard W. Conners, D. Earl Kline, Philip A. Araman, Thomas H. Drayer:

Machine Vision Technology for the Forest Products Industry. 43-48 - Massimo Bertozzi

, Alberto Broggi
:
Vision-Based Vehicle Guidance. 49-54 - Bahram Parvin, John R. Taylor, Daniel E. Callahan, William E. Johnston, Ulrich Dahmen:

Visual Servoing for Online Facilities. 56-62 - Per Stenström, Mats Brorsson, Fredrik Dahlgren, Håkan Grahn

, Michel Dubois:
Boosting the Performance of Shared Memory Multiprocessors. 63-70 - Eric van der Deijl, Gerco Kanbier, Olivier Temam, Elana D. Granston:

A Cache Visualization Tool. 71-78
- Dave Crocker:

Domain Name Expansion Plan Deserves Support. 104-105
- David W. Oliver:

Optimizing the Organization's Structure. 110-112
- Bertrand Meyer

:
The Next Software Breakthrough. 113-114
- Patrick J. Lynch, Sarah Horton

:
Imprudent Linking Weaves a Tangled Web. 115-117
- Ted G. Lewis:

Emergent Behavior, Emergent Profits. Computer 30(7): 118-120 (1997)
Volume 30, Number 8, August 1997
- Carlo Pescio:

Seven Aphorisms of Software Development. 9
- John Edwards:

Voice-Based Interfaces Make PCs Better Listeners. 14-16
- Steven J. Vaughan-Nichols:

Making the PC Easier to Use. 17-25
- Gail C. Murphy, David Notkin:

Reengineering with Reflection Models: A Case Study. 29-36
- Diane M. Strong, Yang W. Lee, Richard Y. Wang:

10 Potholes in the Road to Information Quality. 38-46
- Alexander D. Stoyen:

Fighting Complexity in Computer Systems - Guest Editor's Introduction. 47-48 - David M. Dikel, David Kane, Steve Ornburn, William Loftus, Jim Wilson:

Applying Software Product-Line Architecture. 49-55 - King-Tim Ko

, Kit-Sang Tang
, Cheung-Yau Chan, Kim-Fung Man
, Sam Kwong
:
Using Genetic Algorithms to Design Mesh Networks. 56-61 - K. H. Kim:

Object Structures for Real-Time Systems and Simulators. 62-70
- Charles R. Severance:

Could LDAP Be the Next Killer DAP? 88-89
- Michael Mrva:

Reuse Factors in Embedded Systems Design. 93-95
- James Bach:

Good Enough Quality: Beyond the Buzzword. 96-98
- Theresa-Marie Rhyne, Donald P. Brutzman, Michael R. Macedonia:

Internetworked Graphics and the Web. 99-101
- Mark E. Sampson:

The Allegory of the Humidifier: POI for Systems Engineering. 102-104
Volume 30, Number 9, September 1997
- Victor J. Duvanenko:

Two Writes Make a Read. 8
- David Sims:

Vendors Struggle with Costs, Benefits of Shrinking Cycle Times. 12-14
- Joe Mullich:

Data Mining: Making Data Meaningful. 18
- N. Asokan

, Philippe A. Janson, Michael Steiner, Michael Waidner
:
The State of the Art in Electronic Payment Systems. 28-35
- Doug Matzke:

Will Physical Scalability Sabotage Performance Gains? 37-39 - Joseph A. Fisher:

Walk-Time Techniques: Catalyst for Architectural Change. 40-42 - Keith Diefendorff, Pradeep K. Dubey:

How Multimedia Workloads Will Change Processor Design. 43-45
- Doug Burger, James R. Goodman:

Billion-Transistor Architectures - Guest Editors' Introduction. 46-49 - Yale N. Patt, Sanjay J. Patel, Marius Evers, Daniel H. Friendly, Jared Stark:

One Billion Transistors, One Uniprocessor, One Chip. 51-57 - Mikko H. Lipasti, John Paul Shen:

Superspeculative Microarchitecture for Beyond AD 2000. 59-66 - James E. Smith, Sriram Vajapeyam:

Trace Processors: Moving to Fourth-Generation Microarchitectures. 68-74 - Christoforos E. Kozyrakis, Stylianos Perissakis, David A. Patterson, Thomas E. Anderson, Krste Asanovic, Neal Cardwell, Richard Fromm, Jason Golbus, Benjamin Gribstad, Kimberly Keeton

, Randi Thomas, Noah Treuhaft, Katherine A. Yelick
:
Scalable Processors in the Billion-Transistor Era: IRAM. 75-78 - Lance Hammond, Basem A. Nayfeh, Kunle Olukotun:

A Single-Chip Multiprocessor. 79-85 - Elliot Waingold, Michael B. Taylor, Devabhaktuni Srikrishna, Vivek Sarkar

, Walter Lee, Victor Lee, Jang Kim, Matthew I. Frank, Peter Finch, Rajeev Barua, Jonathan Babb, Saman P. Amarasinghe, Anant Agarwal:
Baring It All to Software: Raw Machines. 86-93
- Jerry Foley, Charles R. Severance:

OSI Retrospect and Prospect. 123-124
- Vijay Gurbaxani, Janet Wilson:

Bridging IT and Business: Techno MBAs. 128-129
- Carlo Pescio:

Principles Versus Patterns. 130-131
- L. John Mason:

Stress and the Ultimate Luddite Survival Mechanism. 132-133
- Ted G. Lewis:

Digitopolis Meets Encalming Technology. 134-136
Volume 30, Number 10, October 1997
- Lawrence T. Hardiman:

Personality Types and Software Engineers. 10
- David Clark:

Will New Fiber Technology Quench the Thrist for Bandwidth? 14-15
- George Lawton:

Dawn of the Internet Appliance. 16-18
- Scott Hamilton, Lee Garber:

Deep Blue's Hardware-Software Synergy. 29-35
- Ivar Jacobson, Martin L. Griss, Patrik Jonsson:

Making the Reuse Business Work. 36-42
- David C. Rine:

Supporting Reuse with Object Technology - Guest Editor's Introduction. 43-45 - Robert G. Fichman, Chris F. Kemerer:

Object Technology and Reuse: Lessons from Early Adopters. 47-59 - John C. Zubeck:

Implementing Reuse with RAD Tools' Native Objects. 60-65 - Letha H. Etzkorn, Carl G. Davis:

Automatically Identifying Reusable OO Legacy Code. 66-71 - Ernesto Damiani

, Maria Grazia Fugini
, Enrico Fusaschi:
A Descriptor-Based Approach to OO Code Reuse. 73-80
- Vir V. Phoha

:
A Standard for Software Documentation. 97-98
- William H. Mangione-Smith:

Application Design for Configurable Computing. 115-117
- Luke Hohmann:

In Methods We Trust? 119-121
- Reed Hundt:

The Internet: From Here to Ubiquity. 122-124
- Terry Bollinger:

The Interplay of Art and Science in Software. 125-128
Volume 30, Number 11, November 1997
- Dwayne Phillips:

Is Your Project a Dilbert Cartoon? 6
- George Lawton:

In Search of Real-Time Internet Service. 14-16
- Sixto Ortiz Jr.:

Virtual Private Networks: Leveraging the Internet. 18-20
- Huaiqing Wang, Chen Wang:

Intelligent Agents in the Nuclear Industry. 28-34
- David Maulsby, Ian H. Witten

:
Teaching Agents to Learn: From User Study to Implementation. 36-44
- Hesham El-Rewini, Michael C. Mulder, Peter A. Freeman, Gordon E. Stokes, Innes Jelly, Lillian N. Cassel, Doris K. Lidtke, Stefano Russo, Bernd J. Krämer, Jimmie E. Haines, A. Joe Turner:

Keeping Pace with an Information Society. 46-57 - David Garlan, David P. Gluch, James E. Tomayko:

Agents of Change: Educating Software Engineering Leaders. 59-65
- Tony Werner, Venkatesh Akella:

Asynchronous Processor Survey. 67-76 - Nabil N. Kamel:

Predicate Caching for Data-Intensive Autonomous Systems. 77-83
- Roger Howe:

ISO 14001: The Green Standard. 133-134
- Jerry Porras:

Building the Vision: Lessons for All Leaders (interview). 135-136
- Christopher Creel, Bertrand Meyer

, Philippe Stephan:
The Opportunity of a Millennium. 137-138
- Ronald J. Vetter, Charles R. Severance:

Web-Based Education Experiences. 139-141
- Ted G. Lewis:

Cars, Phones, and Tamagotchi Tribes. 142-144
Volume 30, Number 12, December 1997
- K. V. K. K. Prasad:

Matching People and Jobs: The I-CMM Proposal. 10
- John Edwards:

New Interfaces: Making Computers More Accessible. 12-14
- Chris Herringshaw:

Detecting Attacks on Networks. 16-17
- Niels Ole Bernsen, Hans Dybkjær, Laila Dybkjær:

What Should Your Speech System Say? 25-31
- Yale N. Patt:

Identifiying Obstacles in the Path to More. 32 - Thomas M. Conte

, Pradeep K. Dubey, Matthew D. Jennings, Ruby B. Lee, Alex Peleg, Salliah Rathnam, Michael S. Schlansker, Peter Song, Andrew Wolfe:
Challenges to Combining General-Purpose and Multimedia Processors. 33-37 - William H. Mangione-Smith, Brad Hutchins, David L. Andrews

, André DeHon, Carl Ebeling, Reiner W. Hartenstein, Oskar Mencer, John Morris, Krishna V. Palem, Viktor K. Prasanna, Henk A. E. Spaanenburg:
Seeking Solutions in Configurable Computing. 38-43 - Per Stenström, Erik Hagersten, David J. Lilja, Margaret Martonosi, Madan Venugopal:

Trends in Shared Memory Multiprocessing. 44-50 - Sarita V. Adve, Doug Burger, Rudolf Eigenmann, Alasdair Rawsthorne, Michael D. Smith, Catherine H. Gebotys, Mahmut T. Kandemir, David J. Lilja, Alok N. Choudhary, Jesse Zhixi Fang, Pen-Chung Yew

:
Changing Interaction of Compiler and Architecture. 51-58 - Hasan Alkhatib, Chase Bailey, Mario Gerla, James McCrae:

Wireless Data Networks: Reaching the Extra Mile. 59-62 - Michael S. Schlansker, Thomas M. Conte

, James C. Dehnert, Kemal Ebcioglu, Jesse Zhixi Fang, Carol L. Thompson:
Compilers for Instruction-Level Parallelism. 63-69
- Frank Dawson:

Emerging Calendaring and Scheduling Standards. 126-128
- Jeffrey M. Voas:

Fault Injection for the Masses. 129-130
- Kenneth I. Magel:

Is It Too Late to Put the User Back into HTML? 131-132
- W. Neville Holmes:

Converging on Program Simplicity. 134-136

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














