2,042 results on '"Computers"'
Search Results
2. The Merit of Regional Computing Networks
- Author
-
Neilsen, Norman R.
- Abstract
A report on a regional computing network constructed in the San Francisco Bay Area as a means for stimulating the spread of computing capabilities in institutions of higher learning." (Author/AK)
- Published
- 1971
3. The First Computer Program.
- Author
-
Rojas, Raúl
- Subjects
- *
COMPUTER software , *COMPUTERS , *ANALYTICAL Engine , *ALGORITHMS - Abstract
This article details Charles Babbage’s theoretical computer program, the first attempt to specific how to mechanize complex algorithms with a computer, written in 1837. The article also discusses his theoretical computer, the Analytical Engine, that his program would have run on. Topics include Babbage’s first and second code tables and the design of the Analytical Engine.
- Published
- 2024
- Full Text
- View/download PDF
4. Heads-Up Computing: Moving Beyond the Device-Centered Paradigm.
- Author
-
SHENGDONG ZHAO, TAN, FELICIA, and FENNEDY, KATHERINE
- Subjects
- *
USER-centered system design , *WEARABLE technology , *COMPUTERS , *SMART devices , *HUMAN-computer interaction - Abstract
This article explores the concept of human-centered design for computing devices. The article focuses on heads-up computing which would provide transparent information display on wearable devices. Topics include the utilization of body-compatible hardware, multi-modal voice and gesture interaction, and resource-aware interaction in heads-up devices as well as a hypothetical case study of how a heads-up device can aid in a busy working mother’s morning.
- Published
- 2023
- Full Text
- View/download PDF
5. Achieving Green AI with Energy-Efficient Deep Learning Using Neuromorphic Computing.
- Author
-
TAO LUO, WENG-FAI WONG, SIOW MONG GOH, RICK, ANH TUAN DO, ZHIXIAN CHEN, HAIZHOU LI, WENYU JIANG, and WEIYUN YAU
- Subjects
- *
NEUROMORPHICS , *DEEP learning , *MIDDLEWARE , *COMPUTER software , *COMPUTER input-output equipment , *COMPUTERS - Abstract
This article details a neuromorphic computing projects program in Singapore, a collaboration between the Agency for Science, Technology and Research, A*STAR, and the National University of Singapore (NUS). The ultimate goal of the program is attainment of energy-efficient deep learning practices. Topics include a description of all areas of the neuromorphic computing program with a look at the hardware, middleware, software and system integration implementation.
- Published
- 2023
- Full Text
- View/download PDF
6. Computing and Assistive Technology Solutions for the Visually Impaired.
- Author
-
BALAKRISHNAN, M.
- Subjects
- *
SMART devices , *VISION disorders , *COMPUTERS , *BRAILLERS , *STAFFS (Sticks, canes, etc.) - Abstract
The article reviews several smart computing and assistive technologies for people with vision disorders, developed by the Assistech company, including the SmartCane, the OnBoard bus identification system and the refreshable Braille display device known as DotBook.
- Published
- 2022
- Full Text
- View/download PDF
7. Please Report Your Compute: Seeking consistent means of measure.
- Author
-
Sevilla, Jaime, Ho, Anson, and Besiroglu, Tamay
- Subjects
- *
MACHINE learning , *ARTIFICIAL intelligence , *COMPUTERS , *ELECTRONIC data processing - Abstract
The authors look at the development of machine learning (ML) models, explaining their view that research studies on the training of ML models should report the quantity of computer usage, or compute, and discussing the need for standardization in the measurement of compute. They cite the number of floating point operations (FLOP) as a basic measurement of compute. They offer reasons for the importance of measuring compute including enabling reproducibility of ML research and aiding in the forecasting of new artificial intelligence (AI) capabilities.
- Published
- 2023
- Full Text
- View/download PDF
8. hXDP: Efficient Software Packet Processing on FPGA NICs.
- Author
-
Brunella, Marco Spaziani, Belocchi, Giacomo, Bonola, Marco, Pontarelli, Salvatore, Siracusano, Giuseppe, Bianchi, Giuseppe, Cammarano, Aniello, Palumbo, Alessandro, Petrucci, Luca, and Bifulco, Roberto
- Subjects
- *
NETWORK interface devices , *COMPUTER networks , *MOTHERBOARDS , *ELECTRONIC data processing , *COMPUTERS , *TECHNOLOGICAL innovations - Abstract
The network interface cards (NICs) of modern computers are changing to adapt to faster data rates and to help with the scaling issues of general-purpose CPU technologies. Among the ongoing innovations, the inclusion of programmable accelerators on the NIC's data path is particularly interesting, since it provides the opportunity to offload some of the CPU's network packet processing tasks to the accelerator. Given the strict latency constraints of packet processing tasks, accelerators are often implemented leveraging platforms such as Field-Programmable Gate Arrays (FPGAs). FPGAs can be re-programmed after deployment, to adapt to changing application requirements, and can achieve both high throughput and low latency when implementing packet processing tasks. However, they have limited resources that may need to be shared among diverse applications, and programming them is difficult and requires hardware design expertise. We present hXDP, a solution to run on FPGAs software packet processing tasks described with the eBPF technology and targeting the Linux's eXpress Data Path. hXDP uses only a fraction of the available FPGA resources, while matching the performance of high-end CPUs. The iterative execution model of eBPF is not a good fit for FPGA accelerators. Nonetheless, we show that many of the instructions of an eBPF program can be compressed, parallelized, or completely removed, when targeting a purpose-built FPGA design, thereby significantly improving performance. We implement hXDP on an FPGA NIC and evaluate it running real-world unmodified eBPF programs. Our implementation runs at 156.25MHz and uses about 15% of the FPGA resources. Despite these modest requirements, it can run dynamically loaded programs, achieves the packet processing throughput of a high-end CPU core, and provides a 10× lower packet forwarding latency. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
9. Research for Practice: Crash Consistency: Keeping data safe in the presence of crashes is a fundamental problem.
- Author
-
ALAGAPPAN, RAMNATTHAN
- Subjects
- *
COMPUTER system failures , *COMPUTER system failure prevention , *COMPUTER storage capacity , *APPLICATION software , *ELECTRONIC file management , *COMPUTERS - Abstract
This article discusses system crashes and how each level of the system needs to be implemented correctly and the system component interfaces need to be used correctly by applications in order to prevent crashes. Several papers are cited within this article exploring the file system, a lower level component within the system, an exploration of interface-level guarantees with bug-finders, crash-consistent programs, and how the newer concept of persistent memory interacts with system crashes.
- Published
- 2023
- Full Text
- View/download PDF
10. The Hardware Lottery.
- Author
-
HOOKER, SARA
- Subjects
- *
COMPUTERS , *COMPUTER software , *COMPUTER algorithms , *COOPERATIVE research - Abstract
The author discusses the development of computer hardware and its isolation from computer software and algorithms. She mentions the early history of computers when computers were single use, how the time and cost of hardware development present barriers to software development, and the need for collaborative research.
- Published
- 2021
- Full Text
- View/download PDF
11. Linear Address Spaces.
- Author
-
KAMP, POUL-HENNING
- Subjects
- *
COMPUTER architecture , *COMPUTER storage capacity , *OBJECT-oriented methods (Computer science) , *MOTHERBOARDS , *COMPUTERS - Abstract
The article discusses various aspects of computer-related linear physical and virtual addresses, and it mentions Cambridge University’s CHERI computer architecture platform and the computer memory-based difficulties that are associated with translating from linear virtual to linear physical addresses. The ARM and x64 types of central processing units (CPUs) are examined, along with object-oriented computing and the Rational R1000/s400 computer.
- Published
- 2022
- Full Text
- View/download PDF
12. Counterpoint: Parallel Programming Wall and Multicore Software Spiral: Denial Hence Crisis.
- Author
-
Vishkin, Uzi
- Subjects
- *
RANDOM access memory , *COMPUTER storage devices , *CENTRAL processing units , *COMPUTERS , *COMPUTER programming , *ELECTRONIC data processing - Abstract
The author argues that computational models do not need to change to adjust for cost and technological change. He claims that random access machine, or model (RAM) is the best for algorithms and data structures, discusses the software spiral (SWS) for single central processing units (CPUs), and notes that cost-effective programming is critical for performance programming.
- Published
- 2022
- Full Text
- View/download PDF
13. Viewpoint Let Us Not Put All Our Eggs in One Basket: Toward new research directions in computer science.
- Author
-
Maraninchi, Florence
- Subjects
- *
COMPUTER science research , *ENVIRONMENTAL impact analysis , *CLIMATE change , *DIGITAL technology , *COMPUTERS , *COMPUTER software - Abstract
This article looks at future research into computer science with an emphasis on preventing further climate change. The author details how future computer technology, both hardware and software, should have limits in place to minimize environmental impact. As well, the existing digital world needs to be evaluated and potentially modified significantly if there is proof it is negatively impacting the environment.
- Published
- 2022
- Full Text
- View/download PDF
14. What Do Computing and Economics Have to Say to Each Other?
- Author
-
Vardi, Moshe Y.
- Subjects
- *
TECHNOLOGY & economics , *TECHNOLOGY & civilization , *COMPUTERS , *COMPUTERS & civilization , *ARTIFICIAL intelligence , *GROSS domestic product , *INDUSTRIAL productivity - Abstract
The article focuses on the relationship between computing and economics. He examines the ratio known as the "Price of Anarchy," explores predictions relating to the impact of artificial intelligence (AI) on global gross domestic product (GDP), and discusses the economic pessimism about computing called the "Productivity Paradox."
- Published
- 2024
- Full Text
- View/download PDF
15. Biomedical Computing in the Arab World: Unlocking the Potential of a Growing Research Community.
- Author
-
ELDAWLATLY, SEIF, ABOUELHODA, MOHAMED, AL-KADI, OMAR S., TAKASHI GOJOBORI, JANKOVIC, BORIS, KHALIL, MOHAMAD, KHANDOKER, AHSAN H., and MORSY, AHMED
- Subjects
- *
MEDICAL sciences , *COMPUTERS , *ENTREPRENEURSHIP - Abstract
The article discusses significant research projects and programs in Arab countries in the field of biomedical computing, with particular focus upon medical care and how such research is motivating a culture of entrepreneurship and startup companies.
- Published
- 2021
- Full Text
- View/download PDF
16. Dependability in Edge Computing.
- Author
-
BAGCHI, SAURABH, SIDDIQUI, MUHAMMAD-BILAL, WOOD, PAUL, and HENG ZHANG
- Subjects
- *
COMPUTERS , *COMPUTER science - Abstract
The article discusses the benefits and drawbacks of edge computing, particularly the hurdles in deploying edge computing. It examines edge computing and deadlines, authentication and physical security, and standardization.
- Published
- 2020
- Full Text
- View/download PDF
17. Moore's Law: What Comes Next?
- Author
-
Edwards, Chris
- Subjects
- *
MOORE'S law , *COMPUTER circuits , *COMPUTER engineering , *COMPUTER architecture , *COMPUTERS - Abstract
The article discusses concern among computer designers and computer scientists regarding the conclusion of the observation known as Moore's Law. It also discusses the concept of circuit cleverness, 3D (three-dimensional) integration, and the term Turing tariff."
- Published
- 2021
- Full Text
- View/download PDF
18. Accelerating AI: Specialized hardware to boost the speed of machine learning also saves energy.
- Author
-
Monroe, Don
- Subjects
- *
ARTIFICIAL intelligence , *MACHINE learning , *ENERGY consumption , *ENERGY conservation , *COMPUTERS - Abstract
The article examines potential reductions in energy consumption of computer hardware in machine learning systems. The design of devices used in artificially intelligent systems is scrutinized and information is provided on industry innovations for the development of energy-efficient hardware and software.
- Published
- 2022
- Full Text
- View/download PDF
19. Lessons Learned from 30 Years of MINIX.
- Author
-
TANENBAUM, ANDREW S.
- Subjects
- *
COMPUTER operating systems , *MARKETING , *COMPUTER input-output equipment , *APPLICATION software porting , *COMPUTERS - Abstract
The article discusses the lessons learned from the development of the computer operating system called MINIX. Topics covered include how MINIX was created in 1984, how the author distributed the codes in developing MINIX, and the importance of determining how to market or distribute MINIX. It also discusses the different modes of the MINIX, how MINIX was made appropriate for hardware, and details relating to the porting system of MINIX.
- Published
- 2016
- Full Text
- View/download PDF
20. Future Tense World of Hackcraft: An obsessive gamer's quest for the absolutely most significant computer ever.
- Author
-
Bainbridge, William Sims
- Subjects
- *
COMPUTERS , *COMPUTER science , *MASSIVELY multiplayer online role-playing games - Abstract
A personal narrative is presented in which the author discusses his interest in massively multiplayer online role-playing games (MMORPGs) and in searching for the most historically significant computer.
- Published
- 2021
- Full Text
- View/download PDF
21. Technical Perspective hXDP: Light and Efficient Packet Processing Offload.
- Author
-
Zilberman, Noa
- Subjects
- *
COMPUTER science , *CENTRAL processing units , *COMPUTER programming , *COMPUTER programmers , *COMPUTERS - Abstract
The article describes solutions to bridging the performance gap between CPUs (central processing units) and networks. These solutions can be either software or hardware based and include Linux’s eXpress Data Path—XDP and Field Programmable Gate Arrays—FPGA. The author suggests that by using XDP programmers will be free from learning new programming languages, design paradigms or hardware architectures.
- Published
- 2022
- Full Text
- View/download PDF
22. Pure Randomness Extracted from Two Poor Sources.
- Author
-
Monroe, Don
- Subjects
- *
RANDOM numbers , *RANDOM number generators , *COMPUTER science , *COMPUTERS - Abstract
The article discusses the generators of imperfect sources to develop random numbers, including through referencing the computer scientist Avi Wigderson's perspective on generating random numbers. The use of random numbers in computation, cryptography, computer science and computing is discussed. The article references research on random number generators by computer scientist David Zuckerman and graduate student Eshan Chattopadhyay.
- Published
- 2017
- Full Text
- View/download PDF
23. Historical Reflections: Actually, Turing Did Not Invent the Computer.
- Author
-
Haigh, Thomas
- Subjects
- *
COMPUTER science , *COMPUTERS , *TURING machines , *COMPUTER systems , *COMPUTER scientists - Abstract
The article provides information on the origins of computer science and technology, in light of the 100th anniversary of the birth of computer scientist Alan Turing in 2012. The author emphasizes that Turing did not invent the computer. In 1936, Turing launched the concept called the Turing Machine, which has become the main abstract model of computation used by computer scientists. After the Second World War, he designed an electronic computer called the automatic computing engine (ACE) for the National Physical Laboratory in London, England. It discusses the role of Turing in the founding of theoretical computer science.
- Published
- 2014
- Full Text
- View/download PDF
24. Intermediate Representation.
- Author
-
CHOW, FRED
- Subjects
- *
COMPUTER networks , *PROGRAMMING languages , *COMPUTER software execution , *COMPUTER systems , *COMPUTERS , *ELECTRONIC systems - Abstract
The article focuses on intermediate representations (IRs), or intermediate languages, which are designed to manage the complexity of the process of computer program compilation. Features of a well-designed IR are discussed including its ability to be translated into different forms for execution on multiple platforms. The different forms of IR are also highlighted including hierarchical and flat IRs. Applications of IRs for program delivery across networked computers are also discussed. The use of just-in-time (JIT) compilation as a method for speeding up program execution is also mentioned.
- Published
- 2013
- Full Text
- View/download PDF
25. The Challenge of Cross- Language Interoperability.
- Author
-
CHISNALL, DAVID
- Subjects
- *
PROGRAMMING languages , *COMPUTER software , *HOMOGENEITY , *OBJECT-oriented programming languages , *INTERNETWORKING , *COMPUTERS - Abstract
The article discusses the challenge of interoperability between computer programming languages as of December 2013. It highlights the increase in difficulty of ensuring interoperability due to the increase in software complexity and decline in homogeneity among computer hardware products. The author says that at present the division between high-level languages and low-level languages no longer applies. The growing prevalence of domain-specific computer programming languages is also mentioned. Features and applications of object-oriented languages are also highlighted.
- Published
- 2013
- Full Text
- View/download PDF
26. A Blueprint for Building a Quantum Computer.
- Author
-
VAN METER, RODNEY and HORSMAN, CLARE
- Subjects
- *
QUANTUM computers , *QUANTUM computing , *COMPUTERS , *COMPUTER architecture , *COMPUTER engineering , *COMPUTER systems - Abstract
The article discusses developments that have been made in building architectures for full-scale quantum computers. These computers are expected to be large enough, fast enough, and accurate enough to solve problems that are intractable for classical systems. When built, a quantum computer will be a hybrid device. The process of integrating the basic elements that have already been developed is described. The challenges faced by researchers in delivering on the promise of quantum computing are highlighted. INSET: Approaches to Quantum Information Processing.
- Published
- 2013
- Full Text
- View/download PDF
27. Software and Souls; Programs and Packages.
- Author
-
Haigh, Thomas
- Subjects
- *
COMPUTER software , *HISTORIANS , *MUSEUM curators , *COMPUTER input-output equipment , *COMPUTERS - Abstract
The author discusses the challenges software poses to historians. Topics covered include the divide between hardware and software, the display of computer software in museums and archives, the problems being faced by curators and archivists in exhibiting computer software in museums, the platform studies launched by historians Ian Bogost and Nick Montfort which are found in their book "Racing the Beam," the idea of software as a package, and the history of the practice of sharing computer programs.
- Published
- 2013
- Full Text
- View/download PDF
28. Keeping Computers Cool From the Inside.
- Author
-
Shein, Esther
- Subjects
- *
COMPUTERS , *MICROELECTRONICS , *MINIATURE electronic equipment , *ELECTRONIC equipment , *ELECTRONIC materials , *THERMAL resistance ,SAFETY measures - Abstract
The article discusses techniques that could reduce the power needed to prevent computers from overheating. Topics covered include the advances in micro-miniaturization of electronic components, how the thermal issue has hindered the progress of the computer industry, and the progress made by several computer technology companies and research institutes. Also mentioned are Purdue University's projects that focus on high-conductivity thermal heat spreaders, the thermal resistance inherent to contact between system components, and the availability of products aimed at cutting the heat load of electronics.
- Published
- 2013
- Full Text
- View/download PDF
29. Where Do People Draw Lines?
- Author
-
Cole, Forrester, Golovinskiy, Aleksey, Limpaecher, Alex, Barros, Heather Stoddart, Finkelstein, Adam, Funkhouser, Thomas, and Rusinkiewicz, Szymon
- Subjects
- *
COMPUTER graphics , *DIGITAL image processing , *COMPUTERS , *DECISION making , *VISUAL perception , *GRAPHIC methods , *DRAWING techniques - Abstract
This paper presents the results of a study in which artists made line drawings intended to convey specific 3D shapes. The study was designed so that drawings could be registered with rendered images of 3D models, supporting an analysis of how well the locations of the artists' lines correlate with other artists', with current computer graphics (CG) line definitions, and with the underlying differential properties of the 3D surface. Lines drawn by artists in this study largely overlapped one another, particularly along the occluding contours of the object. Most lines that do not overlap contours overlap large gradients of the image intensity and correlate strongly with predictions made by recent line-drawing algorithms in CG. A few were not well described by any of the local properties considered in this study. The result of our work is a publicly available data set of aligned drawings, an analysis of where lines appear in that data set based on local properties of 3D models, and algorithms to predict where artists will draw lines for new scenes. [ABSTRACT FROM AUTHOR]
- Published
- 2012
- Full Text
- View/download PDF
30. From Blitzkrieg to Bitskrieg: The Military Encounter with Computers.
- Author
-
ARQUILLA, JOHN
- Subjects
- *
MILITARY electronics , *INFORMATION warfare , *CYBERTERRORISM , *COMPUTERS , *MILITARY engineering , *MILITARY intelligence - Abstract
The article discusses the use of computers in military contexts, examining electronic warfare, cyberterrorism perpetrated against civilian infrastructure, and military intelligence. The author argues that advanced information systems have allowed military forces to break codes, guide weapons, and maintain lateral communications with units and commanders while gathering information and provides the example of Operation Enduring Freedom, an initiative in the Afghan War which was carried out in 2001. Other topics include cyberwarfare for deterrence and arms control, the need to balance offensive and defensive capabilities, and ethical formulations about conflicts.
- Published
- 2011
- Full Text
- View/download PDF
31. Computing for the Masses.
- Author
-
Zhiwei Xu and Guojie Li
- Subjects
- *
COMPUTER science , *INFORMATION technology , *TECHNOLOGICAL innovations , *COMPUTERS - Abstract
The article discusses computer science (CS), looking at a study by the Chinese Academy of Sciences (CAS) which examined the need for computing for the masses in China. The authors examine the stagnation of information technology (IT) market growth, technological progress, and perceptions of the field of CS in China and worldwide as well as the increasing computer literacy of younger people. They argue that it is necessary to create increased value, affordability, and sustainability through Ternary computing, which they term VAST computing. Five principles for VAST computing, which include national information accounts, universal compute accounts (UCA), and efficient systems, are presented.
- Published
- 2011
- Full Text
- View/download PDF
32. Gender and Computing Conference Papers.
- Subjects
- *
GENDER , *CONFERENCE papers , *SCHOLARLY publishing , *COMPUTERS , *WOMEN in computer science - Abstract
The article reports on research which was conducted to investigate papers which were submitted to conferences of the Association for Computing Machinery (ACM) between 1996 and 2009 and to evaluate trends and influences on women’s authorship of computing-conference papers. Researchers found that the number of ACM conference papers grew from 1966 to 2009. They also found that while women remain severely underrepresented in computing, there was a substantial increase in their share of papers that they published. They concluded that the increase may be due to the fact that women earned more Ph.D. degrees in computing.
- Published
- 2011
- Full Text
- View/download PDF
33. Agent-Oriented Embedded Electronic Measuring Systems.
- Author
-
HING KAI CHAN
- Subjects
- *
INTELLIGENT agents , *MEASUREMENT , *EMBEDDED computer systems , *COMPUTERS , *EMBEDDED computer systems -- Programming , *COMPUTER programming - Abstract
The article describes two real-life examples of agent-oriented applications, both of which are embedded electronic measuring systems. In each case the author discusses the constituent parts and significant issues raised concerning agent-oriented design including software development and matters related to cost. From his analysis he concludes that it is easier to manage software development for any individual agent than for the entire product as a whole. He also notes that individual automated testers are a more cost-effective alternative than one complex tester.
- Published
- 2010
- Full Text
- View/download PDF
34. Virtual Computing Initiative at a Small Public University.
- Author
-
SEAY, CAMERON and TUCKER, GARY
- Subjects
- *
ELECTRONIC data processing , *VIRTUAL machine systems , *COMPUTERS , *DIGITAL computer simulation , *VIRTUAL storage (Computer science) - Abstract
The article presents an overview of a virtual computing initiative which was developed at the virtual computing laboratory at North Carolina State University, which was established in August of 2004. The initiative focused on the concept of a highly scaleable, high performance computing resource which provides on demand applications to students anywhere and at anytime. The laboratory allows students to gain access to several computing configurations without having to maintain each one separately.
- Published
- 2010
- Full Text
- View/download PDF
35. Delegation as Art.
- Author
-
MATSUDAIRA, KATE
- Subjects
- *
COMPUTERS , *DELEGATION of authority , *TEAMS in the workplace , *LEADERSHIP , *PROBLEM solving , *MANAGEMENT - Abstract
The article suggests techniques for delegating tasks in the computer machinery sector. Strategies recommended include change of mindset, starting with small things, leading people to figure out solutions to problems, helping people come up with a plan and making them more responsible, setting up guardrails, being open to differences, and creating a team of leaders.
- Published
- 2016
- Full Text
- View/download PDF
36. Statistical Analysis of Circuit Timing Using Majorization.
- Author
-
Orshansky, Michael and Wei-Shen Wang
- Subjects
- *
INTEGRATED circuits , *COMPUTER reliability , *COMPUTER circuits , *COMPUTERS , *DISTRIBUTION (Probability theory) , *STATISTICS - Abstract
Future miniaturization of silicon transistors following Moore's Law may be in jeopardy as it becomes harder to precisely define the behavior and shape of nanoscale transistors. One fundamental challenge is overcoming the variability in key integrated circuit parameters. In this paper, we discuss the development of electronic design automation tools that predict the impact of process variability on circuit behavior, with particular emphasis on verifying timing correctness. We present a new analytical technique for solving the central mathematical challenge of the statistical formulation of timing analysis which is the computation of the circuit delay distribution when delays of circuit elements are correlated. Our approach derives the bounds for the exact distribution using the theory of stochastic majorization. Across the benchmarks, the root-mean-square difference between the exact distribution and the bounds is 1.7-4.5% for the lower bound and 0.9-6.2% for the upper bound. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
37. Non-work related computing (NWRC).
- Author
-
Gee-Woo Bock and Swee Ling Ho
- Subjects
- *
BUSINESS enterprise digital resources , *PERSONAL Internet use in the workplace , *JOB performance , *COMPUTERS , *PERFORMANCE , *EFFECT of technological innovations on employees - Abstract
The article discusses non-work related computing (NWRC), examining the impact of NWRC on the job performance of employees. Although there is more than one proposed definition of NWRC, the authors state, the central concept in several proposed NWRC terminologies includes the use of organizational resources for non-work or personal purposes. Topics include how employee time spent engaging in NWRC activities affects job performance and whether NWRC has a positive or negative effect on job performance.
- Published
- 2009
- Full Text
- View/download PDF
38. The Many Facets of Natural Computing.
- Author
-
KARI, LILA and ROZENBERG, GRZEGORZ
- Subjects
- *
NATURAL computation , *ELECTRONIC data processing , *PHYSICAL sciences research , *COMPUTER science , *COMPUTERS , *COMPUTER scientists - Abstract
The article discusses natural computing, where the authors define natural computing as a research field which investigates computational techniques and models that come from nature and, at the same time, seeks to know the world in terms of information processing. Natural computing connects computing science with the natural sciences, the authors state. Topics include pure theoretical research, software applications, and experimental physics laboratory research. Also discussed are computing paradigms abstracted from natural phenomena including self-reproduction.
- Published
- 2008
- Full Text
- View/download PDF
39. BELL'S LAW FOR THE BIRTH AND DEATH OF COMPUTER CLASSES.
- Author
-
Bell, Gordon
- Subjects
- *
FORECASTING technological innovation , *TECHNOLOGICAL innovations , *COMPUTERS , *MAINFRAME computers , *SUPERCOMPUTERS , *PERSONAL computers - Abstract
The article discusses Bell's Law for computer classes. A computer class is a set of computers that share a price range, programming environment, and applications. Bell's Law declares that each decade a new industry comes into being through the creation and doubling of a new computer class. Over time one class may kill off or absorb another. From 1951 to the present this law has manifested itself in the evolution of such classes as mainframe computers, supercomputers, workstations, and minicomputers.
- Published
- 2008
- Full Text
- View/download PDF
40. An Empirical Investigation of the Effectiveness of Systems Modeling and Verification Tools.
- Author
-
Jeyaraj, Anand and Sauter, Vicki L.
- Subjects
- *
ELECTRONIC systems , *DESIGN , *COMPUTER systems , *COMPUTERS , *DIGITAL electronics , *METHODOLOGY - Abstract
The article presents an empirical investigation of the effectiveness of systems modeling and verification tools. The authors believe that the biggest reason that best practices and tools do not deter system failure rates is that needs are often misinterpreted by designers and users. Projects often fail because their are poor specifications of user requirements. Software design can not be completed properly until designers understand a system and its needs and can translate those needs into technical requirements.
- Published
- 2007
- Full Text
- View/download PDF
41. Computing Versus Human Thinking.
- Author
-
Naur, Peter
- Subjects
- *
THOUGHT & thinking , *ELECTRONIC data processing , *MACHINE theory , *COMPUTER programming , *COMPUTERS - Abstract
The article discusses computing versus human thinking. In the article, the author works to develop a new form of description that continues the work of John Backus. The article discusses human knowing as it applies to computer programming. The author concludes that computing presents a form of description, and that this form useful in describing many things about the world, but it is not valuable in describing human thinking. The article discusses the works of William James and Alan Turing.
- Published
- 2007
- Full Text
- View/download PDF
42. What Do DDT and Computing Have in Common?
- Author
-
Chien, Andrew A.
- Subjects
- *
DDT (Insecticide) , *COMPUTERS , *COMPUTERS & the environment , *ELECTRONIC waste , *ECOLOGICAL impact - Abstract
The author discusses the 50th Earth Day in 2020 and draws comparisons between the insecticide DDT and computing. He examines various aspects of computing to the environment, particularly carbon emissions and electronic waste (e-waste). He argues that a goal of zero carbon emissions from computing should be set, in addition to mitigating e-waste by creating computing hardware that has double the current lifetime.
- Published
- 2020
- Full Text
- View/download PDF
43. FORMAL VERIFICATION AND SOFTWARE PRODUCT LINES.
- Author
-
Kishi, Tomoji and Noda, Natsuko
- Subjects
- *
EMBEDDED computer systems , *COMPUTERS , *PRODUCT management , *COMMERCIAL products , *PRODUCT lines , *CONSUMER goods , *CONFIRMATION (Logic) - Abstract
This article discusses verification techniques in software product lines. The article examines the importance of embedded software, and notes that techniques for producing quality embedded has evolved over time. The authors also note that an important objective of product line development is the timely delivery of products, and advocate for the reduction of time taken for both the derivation and verification of products. The article then provides a new technique for developing embedded software, utilizing a scientific model checking technique to design the verification.
- Published
- 2006
- Full Text
- View/download PDF
44. EXTERNALLY VERIFIABLE CODE EXECUTION.
- Subjects
- *
COMPUTER software , *COMPUTER input-output equipment , *SPYWARE (Computer software) , *COMPUTER security , *COMPUTER users , *COMPUTERS - Abstract
This article reports on a new primitive called externally verifiable code execution. This primitive allows an external entity (the verifier) with the assurance that any piece of code, referred to as the target executable, executes untampered by any malware that may exist on an external computing device. The article examines both software- and hardware-based techniques for externally verifiable code execution. Both techniques require a root of trust. The root of trust is a computing base that can be trusted with the responsibility of enforcing externally verifiable code execution.
- Published
- 2006
- Full Text
- View/download PDF
45. Next-Generation: DIGITAL FORENSICS.
- Author
-
Richard, III, Golden G. and Roussev, Vassil
- Subjects
- *
COMPUTER-generated imagery evidence , *FORENSIC sciences , *TECHNOLOGY , *FORENSIC scientists , *CRIMINOLOGY , *COMPUTERS , *CRIMINAL investigation , *LAW enforcement , *CRIME laboratories , *LAW - Abstract
The article reports that digital forensics investigators are experiencing an increase in both the number and complexity of cases that require their attention. The number of cases is rising for a variety of reasons, including better awareness of the capabilities of digital forensics techniques at all levels of law enforcement and in the private sector. The complexity of cases is growing because forensic targets with hundreds of gigabytes or terabytes of storage are becoming common and cases routinely involve more than a single computer. This leaves digital forensics investigators in need of tools that are significantly better, both in richness of features and in speed. Providing practitioners with these tools will require a critical look at current offerings and significant levels of innovation on the part of researchers. Most current digital forensics tools are designed to run on a single workstation, with the investigator issuing queries against copies of the acquired digital evidence. A typical digital forensics investigation consists of several major steps, including acquisition and duplication of digital evidence, analysis of evidence, and presentation of results.
- Published
- 2006
- Full Text
- View/download PDF
46. Does AVATAR EMAIL IMPROVE COMMUNICATION?
- Author
-
Lee, Younghwa, Kozar, Kenneth A., and Larsen, Kai R.
- Subjects
- *
BUSINESS communication , *LANGUAGE & languages , *EMAIL , *COMPUTERS , *AVATARS (Virtual reality) - Abstract
This article examines the lack of use of email as a tool of business communication. The authors speculate that this is due to the lack of communication cues, language varieties and the limited scope for personalization. The use of avatar emails, email systems that have features that can enhance communication, are recommended. These systems have additions that reflect body movement and can record the sender's voice.
- Published
- 2005
- Full Text
- View/download PDF
47. As Simple as Possible, but Not Simpler.
- Author
-
Gorry, G. Anthony
- Subjects
- *
INFORMATION technology , *KNOWLEDGE management , *ORGANIZATIONAL learning , *MULTIMEDIA systems , *COMPUTERS , *TECHNOLOGY - Abstract
Presents the author's opinion on the use of information technology (IT) to enhance knowledge sharing in organizations. Issues related to the proliferation of IT; Implications of continued advance of multimedia technology; Ways in which people and technology interact.
- Published
- 2005
- Full Text
- View/download PDF
48. WiFi Attack Vectors.
- Author
-
Berghel, Hal and Uecker, Jacob
- Subjects
- *
COMPUTER security , *IEEE 802.11 (Standard) , *COMPUTER network protocols , *COMPUTER hackers , *ETHERNET , *COMPUTERS - Abstract
The article presents information on security risks of WiFi connectivity. While many users may know that WiFi is vulnerable to hacking, far fewer know why. The genesis of the wireless insecurity problem was the 802.11 standard. The vulnerabilities were built into the protocols. Nowhere is this more evident than in the bungled implementation of the RC4 symmetric, stream cipher algorithm in the implementation of Wired Equivalent Privacy (WEP). The WEP implementation of RC4 is flawed in several ways. It should be noted that even if the implementation of RC4 was corrected, WEP would still be vulnerable to replay attacks, checksum forging, message integrity check forging, and sundry authentication attacks resulting from the fact that both the plaintext challenge and cipher text response are broadcast. IEEE standard for IV selection was ambiguous, so many wireless vendors use sequential IV generators that begin with 00:00:00 and wrap with FF:FF:FF. Other WEP weaknesses that may be exploited include defective key-generation implementations. INSET: URL Pearls.
- Published
- 2005
- Full Text
- View/download PDF
49. "Silver Bullet" Milestones in Software History.
- Author
-
Glass, Robert L.
- Subjects
- *
COMPUTER software , *APPLICATION software , *PROGRAMMING languages , *ASSEMBLY languages (Electronic computers) , *COMPILERS (Computer programs) , *COMPUTERS - Abstract
Presents the author's comments on the earliest creative milestone in software history. Development of business applications software and an application-specific computer called LEO in 1951; Excitement in the field of computing; Discussion on the history of computing; Reference of computers that were coded in machine language; Ideas in the field of computer software, Emergence of assembly language; Utility of tools called compilers.
- Published
- 2005
- Full Text
- View/download PDF
50. THE CHALLENGES OF IDC: WHAT HAVE WE LEARNED FROM OUR PAST?
- Author
-
Kestenbaum, David
- Subjects
- *
EDUCATIONAL change , *COMPUTERS , *ARTIFICIAL intelligence , *COMPUTER science , *KNOWLEDGE management , *COMPUTER programming , *MATHEMATICAL programming , *MATHEMATICS education - Abstract
The article presents a conversation with educationists Seymour Papert, Marvin Minsky and Alan Kay on educational reform, artificial intelligence, computer science and human-computer interaction. The importance of the computer is how you learn mathematics, and how it allows children to think about powerful ideas in mathematics. Children are capable of learning plenty more mathematics than anyone gives them credit for with or without a computer. The most important thing in learning is copying how other people think. The way to learn something hard is by getting new ideas. Programming is the most powerful medium of developing the sophisticated and rigorous thinking needed for mathematics, for grammar, for physics, for statistics, and all the hard subjects. Programming should be a key part of the intellectual development of people growing up. The idea of programming itself is something in evolution so it will not mean exactly what it is thought to mean.
- Published
- 2005
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.