December 2002 - Vol. 45 No. 12
Features
Opinion Editorial pointers
Ubiquitous computing is intangible—physically, figuratively, literally. In the continuing evolution of computing technologies we’re not supposed to see or sense, technical advances have been swift, but the surface is barely scuffed. Many challenges and obstacles still stand between us and the promise of living and working environments embedded with computing devices in a seamless, invisible […]
News News track
A simulation computer program designed to prevent terrorist attacks was shown at the White House to demonstrate the program’s homeland defense applications. Two professors at Purdue University’s e-Business Research Center improved on the technology, which was originally built for telecommunications and business, by incorporating two IBM supercomputers to build a "synthetic" model of the U.S. […]
Opinion Forum
Thanks for Robert Glass’s delightfully written history ("The Proof of Correctness Wars," "Practical Programmer," Aug. 2002). As a mathematician and a computer scientist, I have always been saddened that proof-of-correctness methodology never worked out, but as a practical programmer I understand why. I remember discussing the proof-of-correctness effort to verify the correctness of the INMOS […]
Opinion International perspectives
Cyberspace Across Sub-Saharan Africa
Moving from technological desert toward emergent sustainable growth.
News On site
Teaching Reviewing to Graduate Students
Incorporating the principles and practices of formal review into a Ph.D. education, smoothly and inexpensively, as part of the existing coursework.
Opinion Viewpoint
Could it be that computing itself is just too unwieldy a field for any theory of substance?
Multicast Over Wireless Networks
How to ensure the participation of mobile users (no matter how disruptive the circumstances), especially for mobile commerce applications distributed over multiple networks.
Security Considerations For Remote Electronic Voting
Introducing state-of-the art technology into the election process implies new risks that may not be worth taking.
The Value of Seller Trustworthiness in C2c Online Markets
Trust has value in online markets, and individual and company actions can improve or impair how trustworthy they are perceived in these markets.
Emergent Patterns of Integration in Electronic Channel Systems
What should producers and consumers alike make of the emerging class of middlemen and intermediaries in electronic channels?
Strategic It Applications in Health Care
Information technology plays an increasingly central role in the U.S. health care industry. A survey by Sheldon I. Dorenfest & Associates of Chicago estimated IT spending on health care in 2002 would be $21.6 billion [9]. Further exponential growth can be expected as the industry implements further large-scale electronic medical record keeping; provides remote diagnostics […]
Research and Advances Issues and challenges in ubiquitous computing
A fundamental measure of progress in computing involves rendering it as an inseparable part of our everyday experience while simultaneously making it disappear [2]. Radical improvements in microprocessor cost-performance ratios have pushed this process forward while drastically reducing computing-device form factors, enabling us to embed computers in many parts of our environments. In 40 years […]
Research and Advances Issues and challenges in ubiquitous computing
Anytime/anyplace Computing and the Future of Knowledge Work
Considering the implications and consequences of the always-connected lifestyle.
Research and Advances Issues and challenges in ubiquitous computing
Group Dynamics and Ubiquitous Computing
From "Here and Now" to "Everywhere and Forever."
Research and Advances Issues and challenges in ubiquitous computing
New Frontiers of Application Design
Applying the lessons learned from wearable and context-aware computers.
Research and Advances Issues and challenges in ubiquitous computing
The Future of Business Services in the Age of Ubiquitous Computing
Redefining the key aspects of the business-customer relationship.
Research and Advances Issues and challenges in ubiquitous computing
The Relevance of Social Issues in Ubiquitous Computing Environments
New forms of social interaction and organization require modifying existing models.
Research and Advances Issues and challenges in ubiquitous computing
Software Infrastructure and Design Challenges For -biquitous Computing Applications
Striving to integrate computing into everyday activities in a seamless manner.
Opinion Inside risks
Why Security Standards Sometimes Fail
Security experts have long been saying that secure systems, and especially security standards, need to be designed through an open process, allowing review by anyone. Unfortunately, even openly designed standards sometimes result in flawed cryptographic systems. A recent example is the IEEE 802.11 wireless LAN standard, in which several serious cryptographic failures were found (see […]