The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Computer security has experienced important fundamental changes over the past decade. The most promising developments in security involve arming software developers and architects with the knowledge and tools they need to build more secure software. Among the many security tools available to software practitioners, static analysis tools for automated code review are the most effective. The paper presents...
A study examining data from 1993 through 2004 indicates that people of color and women are slowly assuming a larger percentage of faculty positions within the computer sciences.
To eliminate cables and provide installation flexibility, consumers want the various elements of their home-entertainment systems to communicate wirelessly. In response, vendors are developing wireless high-definition video technologies.
Middleware has incited a gold rush as developers stake their claims across the entertainment computing landscape. As they become more mature, most industries spawn specialized sub-industries. For example, automobile manufacturers don't make their own tires, and aircraft manufacturers don't even make their own jet engines. By aiming to amortize their costs over a wider customer base, specialized companies...
During the past year, hundreds of volunteers have given their time to review submitted manuscripts, offering comments on organization and clarity, checking accuracy and definitions, and scrutinizing visual aids or ancillary materials.
An academic team has developed a prototype system for providing antivirus protection via the Internet. This security-as-a-service approach is an example of cloud computing, an increasingly popular technique in which applications and services are offered via the Internet, rather than via programs loaded onto in-house PCs or servers. The University of Michigan team's CloudAV system would let users avoid...
Based on a preventive, development-before-the-fact philosophy that does not allow errors in the first place, the Universal Systems Language has evolved over several decades, offering system engineers and software developers a language they can use to solve problems previously considered next to impossible to solve with traditional approaches.
In recent decades, safety has emerged as a major issue in many embedded applications in the aerospace, aircraft, automobile, railways, nuclear, medical, and other industries. Safety in this context means avoiding harm to individuals or society due to malfunctioning computer equipment or software. The essential requirements for these systems are so strict that they are regulated by government agencies...
The IEEE Computer Society recently elected James D. Isaak to serve as president-elect for 2009. In addition, new Board of Governors members and vice presidents also have been selected.
The business community, especially that part involved with high technology, has long embraced the notion that progress is an evolutionary process that comes with markets, competition, and the survival of the fittest. In the world of the computer, the idea of evolutionary change has been applied to almost every aspect of the field. The software evolution metaphor offers a certain amount of insight...
Deduplication identifies and eliminates redundant information, thereby reducing volumes. Technology savvy industries such as financial services, pharmaceuticals, and telecommunications are already adopting deduplication. However, the technology can be costly, can consume a lot of processing resources and energy, and is not well suited to all users.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.