scispace - formally typeset
Search or ask a question

Showing papers in "IEEE Computer in 2007"


Journal ArticleDOI
Luiz Andre Barroso1, Urs Hölzle1
TL;DR: Energy-proportional designs would enable large energy savings in servers, potentially doubling their efficiency in real-life use, particularly the memory and disk subsystems.
Abstract: Energy-proportional designs would enable large energy savings in servers, potentially doubling their efficiency in real-life use. Achieving energy proportionality will require significant improvements in the energy usage profile of every system component, particularly the memory and disk subsystems.

2,499 citations


Journal ArticleDOI
TL;DR: A service-oriented computing promotes the idea of assembling application components into a network of services that can be loosely coupled to create flexible, dynamic business processes and agile applications that span organizations and computing platforms.
Abstract: Service-oriented computing promotes the idea of assembling application components into a network of services that can be loosely coupled to create flexible, dynamic business processes and agile applications that span organizations and computing platforms An SOC research road map provides a context for exploring ongoing research activities

2,030 citations


Journal ArticleDOI
TL;DR: A science of service systems could provide theory and practice around service innovation in the service sector.
Abstract: The service sector accounts for most of the world's economic activity, but it's the least-studied part of the economy. A service system comprises people and technologies that adaptively compute and adjust to a system's changing value of knowledge. A science of service systems could provide theory and practice around service innovation

1,282 citations


Journal ArticleDOI
TL;DR: The goal of immersive virtual environments was to let the user experience a computer-generated world as if it were real - producing a sense of presence, or "being there," in the user's mind.
Abstract: Solid evidence of virtual reality's benefits has graduated from impressive visual demonstrations to producing results in practical applications. Further, a realistic experience is no longer immersion's sole asset. Empirical studies show that various components of immersion provide other benefits - full immersion is not always necessary. The goal of immersive virtual environments (VEs) was to let the user experience a computer-generated world as if it were real - producing a sense of presence, or "being there," in the user's mind.

981 citations


Journal ArticleDOI
TL;DR: Business intelligence (BI) has become a strategic initiative and is now recognized by CIOs and business leaders as instrumental in driving business effectiveness and innovation.
Abstract: Business intelligence (BI) is now widely used, especially in the world of practice, to describe analytic applications. BI is currently the top-most priority of many chief information officers. BI has become a strategic initiative and is now recognized by CIOs and business leaders as instrumental in driving business effectiveness and innovation. BI is a process that includes two primary activities: getting data in and getting data out. Getting data in, traditionally referred to as data warehousing, involves moving data from a set of source systems into an integrated data warehouse. Getting data in delivers limited value to an enterprise; only when users and applications access the data and use it to make decisions does the organization realize the full value from its data warehouse. Thus, getting data out receives most attention from organizations. This second activity, which is commonly referred to as BI, consists of business users and applications accessing data from the data warehouse to perform enterprise reporting, OLAP, querying, and predictive analytics.

612 citations


Journal ArticleDOI
TL;DR: A recent National Science Foundation workshop brought together domain, computer, and social scientists to discuss requirements of future scientific applications and the challenges they present to current workflow technologies.
Abstract: Workflows have emerged as a paradigm for representing and managing complex distributed computations and are used to accelerate the pace of scientific progress. A recent National Science Foundation workshop brought together domain, computer, and social scientists to discuss requirements of future scientific applications and the challenges they present to current workflow technologies.

563 citations


Journal ArticleDOI
TL;DR: The Green500 List effort will encourage the HPC community and operators of Internet data centers to design more power-efficient supercomputers and large-scale data centers and to supplement the TOP500 List.
Abstract: The performance-at-any-cost design mentality ignores supercomputers' excessive power consumption and need for heat dissipation and will ultimately limit their performance. Without fundamental change in the design of supercomputing systems, the performance advances common over the past two decades won't continue. The HPC community needs a Green500 List to rank supercomputers on speed and power requirements and to supplement the TOP500 List. Vendors and system architects worldwide take substantial pride and invest tremendous effort toward making the biannual TOP500 List. We anticipate that the Green500 List effort will do the same and encourage the HPC community and operators of Internet data centers to design more power-efficient supercomputers and large-scale data centers.

276 citations


Journal ArticleDOI
TL;DR: Even if software developers don't fully understand the faults or know their location in the code, software rejuvenation can help avoid failures in the presence of aging-related bugs.
Abstract: Even if software developers don't fully understand the faults or know their location in the code, software rejuvenation can help avoid failures in the presence of aging-related bugs This is good news because reproducing and isolating an aging-related bug can be quite involved, similar to other Mandelbugs Moreover, monitoring for signs of software aging can even help detect software faults that were missed during the development and testing phases If, on the other hand, a developer can detect a specific aging-related bug in the code, fixing it and distributing a software update might be worthwhile In the case of the Patriot missile-defense system, a modified version of the software was indeed prepared and deployed to users It arrived at Dhahran on 26 February 1991 - a day after the fatal incident

258 citations


Journal ArticleDOI
TL;DR: AQUA, an amphibious robot that swims via the motion of its legs rather than using thrusters and control surfaces for propulsion, can walk along the shore, swim along the surface in open water, or walk on the bottom of the ocean.
Abstract: AQUA, an amphibious robot that swims via the motion of its legs rather than using thrusters and control surfaces for propulsion, can walk along the shore, swim along the surface in open water, or walk on the bottom of the ocean. The vehicle uses a variety of sensors to estimate its position with respect to local visual features and provide a global frame of reference

217 citations


Journal ArticleDOI
TL;DR: To optimize the system design and allow for plug and play of subsystems, automotive electronic system architecture evaluation and development must be supported with a robust design flow based on virtual platforms.
Abstract: To optimize the system design and allow for plug and play of subsystems, automotive electronic system architecture evaluation and development must be supported with a robust design flow based on virtual platforms.

214 citations


Journal ArticleDOI
TL;DR: Different trust models are presented for distributed systems such as the Internet, peer-to-peer networks, and mobile ad hoc networks and also discusses trust management in P2P system.
Abstract: Distributed systems such as the Internet, peer-to-peer networks, and mobile ad hoc networks involve numerous entities, many of which haven't previously interacted. Trust management can help minimize risk and ensure the network activity of benign entities in distributed systems. This article presents different trust models. It also discusses trust management in P2P system

Journal ArticleDOI
TL;DR: The authors describe nine best practices for implementing effective automated traceability, sharply reducing the effort of manual approaches to build and maintain a requirements trace matrix.
Abstract: Automated traceability applies information-retrieval techniques to generate candidate links, sharply reducing the effort of manual approaches to build and maintain a requirements trace matrix as well as providing after-the-fact traceability in legacy documents.The authors describe nine best practices for implementing effective automated traceability.

Journal ArticleDOI
TL;DR: A search engine can use training data extracted from the logs to automatically tailor ranking functions to a particular user group or collection, and machine-learning techniques can harness to improve search quality.
Abstract: Search-engine logs provide a wealth of information that machine-learning techniques can harness to improve search quality. With proper interpretations that avoid inherent biases, a search engine can use training data extracted from the logs to automatically tailor ranking functions to a particular user group or collection.

Journal ArticleDOI
TL;DR: A stored or transmitted bit's state can deteriorate quite badly before a processing device will be mistaken in deciding which of the two possible values is the original.
Abstract: Digital technology works so well because at the heart of digital representation, there are only a few basic components. Nowadays, these basic components usually are binary digits, bits for short, called binary because they are designed to stand for only two different values, conveniently called zero and one. A stored or transmitted bit's state can deteriorate quite badly before a processing device will be mistaken in deciding which of the two possible values is the original.

Journal ArticleDOI
TL;DR: The wall between computer science and electrical engineering has kept the potential of embedded systems at bay, so it is time to build a new scientific foundation with embedded systems design as the cornerstone, which will ensure a systematic and even-handed integration of the two fields.
Abstract: The wall between computer science and electrical engineering has kept the potential of embedded systems at bay. It is time to build a new scientific foundation with embedded systems design as the cornerstone, which will ensure a systematic and even-handed integration of the two fields. The embedded systems design problem certainly raises technology questions, but more important, it requires building a new scientific foundation that will systematically and even-handedly integrate computation and physicality from the bottom up. Support for this foundation will require enriching computer science paradigms to encompass models and methods traditionally found in electrical engineering.

Journal ArticleDOI
TL;DR: Swarm intelligence as mentioned in this paper is a meta-heuristic approach to solving a variety of problems in which the collective behavior of relatively simple individuals arises from their local interactions with their environment to produce functional global patterns.
Abstract: Nature-inspired intelligent swarm technologies deals with complex problems that might be impossible to solve using traditional technologies and approaches. Swarm intelligence techniques (note the difference from intelligent swarms) are population-based stochastic methods used in combinatorial optimization problems in which the collective behavior of relatively simple individuals arises from their local interactions with their environment to produce functional global patterns. Swarm intelligence represents a meta heuristic approach to solving a variety of problems

Journal ArticleDOI
TL;DR: A multitude of existing and evolving cell phone standards, coupled with the need to react quickly to market requirements, is radically changing the system architect's task.
Abstract: A multitude of existing and evolving cell phone standards, coupled with the need to react quickly to market requirements, is radically changing the system architect's task.Two alternative approaches to classic ASIC-centered and DSP-assisted designs have emerged: reconfigurable architectures and DSP-centered and accelerator-assisted architectures.

Journal ArticleDOI
TL;DR: Open source software has enabled large system integrators to increase their profits through cost savings and reach more customers due to flexible pricing, resulting in the emergence of firms providing consulting services to open source projects.
Abstract: Open source software has enabled large system integrators to increase their profits through cost savings and reach more customers due to flexible pricing. This has upset existing ecosystems and shuffled structural relationships, resulting in the emergence of firms providing consulting services to open source projects. This new breed of service firm in turn lives or dies by its ability to recruit and retain appropriate talent. For such talent, in particular for software developers, life has become more difficult and exciting at once. Developers face new career prospects and paths, since their formal position in an open source project, in addition to their experience and capabilities, determines their value to an employer. Economically rational developers strive to become commiters to high-profile open source projects to further their careers, which in turn generates more recognition, independence, and job security

Journal ArticleDOI
TL;DR: The integrated mobile surveillance and wireless sensor system (iMouse) uses static and mobile wireless sensors to detect and then analyze unusual events in the environment.
Abstract: Incorporating the environment-sensing capability of wireless sensor networks into video- based surveillance systems can provide advanced services at a lower cost than traditional surveillance systems.The integrated mobile surveillance and wireless sensor system (iMouse) uses static and mobile wireless sensors to detect and then analyze unusual events in the environment.

Journal ArticleDOI
TL;DR: The GPU is the first widely deployed commodity desktop parallel computer that can implement many parallel algorithms directly using graphics hardware.
Abstract: GPUs have moved away from the traditional fixed-function 3D graphics pipeline toward a flexible general-purpose computational engine. Today, GPUs can implement many parallel algorithms directly using graphics hardware. Well-suited algorithms that leverage all the underlying computational horsepower often achieve tremendous speedups. Truly, the GPU is the first widely deployed commodity desktop parallel computer

Journal ArticleDOI
TL;DR: 3D body-surface scanners are transforming the ability to accurately measure and visualize a person's body size, shape, and skin-surface area and offer even greater potential for healthcare applications.
Abstract: Developed largely for the clothing industry, 3D body-surface scanners are transforming our ability to accurately measure and visualize a person's body size, shape, and skin-surface area. Advancements in 3D whole-body scanning seem to offer even greater potential for healthcare applications.

Journal ArticleDOI
TL;DR: The challenge is identifying the design techniques that can extract high performance potential from the FPGA fabric.
Abstract: Numerous application areas, including bioinformatics and computational biology, demand increasing amounts of processing capability. In many cases, the computation cores and data types are suited to field-programmable gate arrays. The challenge is identifying the design techniques that can extract high performance potential from the FPGA fabric

Journal ArticleDOI
Suman Nath1, Jie Liu1, Feng Zhao1
TL;DR: A new class of applications that relies on real-time sensor data and its mash-up with the geocentric Web to provide instantaneous environmental visibility and timely decision support is envisioned.
Abstract: Geocentric Web interfaces such as Microsoft Virtual Earth and Google Maps are useful for visualizing spatially and geographically related data such as driving directions, directory entries, and weather and traffic conditions, to name a few. The desire to add useful information to these interfaces has led developers to create custom applications that overlay housing prices, crime rates, bus locations, and other data on top of browsable maps. These applications are possible due to useful APIs that Google Maps and Microsoft Virtual Earth publish to overlay location data on maps. We envision a new class of applications that relies on real-time sensor data and its mash-up with the geocentric Web to provide instantaneous environmental visibility and timely decision support.

Journal ArticleDOI
Ron Kohavi1, Roger Longbotham1
TL;DR: The Web provides an unprecedented opportunity to evaluate proposed changes or new features quickly using controlled experiments, which generate insights that can bring a quick return on investment and promote innovation.
Abstract: The Web provides an unprecedented opportunity to evaluate proposed changes or new features quickly using controlled experiments. The simplest experiments randomly assign live users to one of two variants: the control, which is commonly the existing version, and the treatment, which is usually a new version being evaluated. The overall evaluation criterion can be a simple metric that summarizes important business goals or a weighted combination of metrics, as is often used in credit scores. Randomization is too important to be left to chance. A common way to maintain user experience consistency is to employ a hashing function on a user ID stored in a cookie. Cryptographic hashes such as MD5 are generally the best. Failure to randomize properly can confound results when running multiple tests simultaneously. The other common mistakes in online experiments are launching a feature that is statistically significantly different but has little business value and launching a feature because it doesn't negatively impact users. Online experiments, whether they fail or succeed, generate insights that can bring a quick return on investment and promote innovation.

Journal ArticleDOI
TL;DR: In this paper, the authors discuss how reflective educators develop and share with their peers to drive advances in the use of tablets in education and communities that form around platforms such as Classroom Presenter and Group Scribbles should provide an excellent forum for such advances.
Abstract: Instructional models that reflective educators develop and share with their peers can primarily drive advances in the use of tablets in education. Communities that form around platforms such as Classroom Presenter and Group Scribbles should provide an excellent forum for such advances.

Journal ArticleDOI
John Krumm1, Eric Horvitz1
TL;DR: The predestination algorithm predicts a driver's destination based on both general trends, such as the likelihood that people will choose various types of destinations, and personalized data such as a list of previously visited locations.
Abstract: Mobile computers have the potential to provide a new array of location-based services to drivers as they travel around. The predestination algorithm predicts a driver's destination based on both general trends, such as the likelihood that people will choose various types of destinations, and personalized data such as a list of previously visited locations. We designed the algorithm to run on a vehicle's navigation system and learn a driver's habits based on logged GPS measurements. Predictions about destination can be an important component of ubiquitous computing, and we hope that such predictions might one day enhance the provision of information and services to people as they move through the world

Journal ArticleDOI
TL;DR: SMS technology evolved out of the global system for mobile communications standard, an internationally accepted cell phone network specification the European Telecommunications Standards Institute created and the 3rd Generation Partnership Project maintains the SMS standard.
Abstract: Although it is a widely used communication mechanism for cell phone users, SMS is far more than just a technology for teenage chat. SMS technology evolved out of the global system for mobile communications standard, an internationally accepted cell phone network specification the European Telecommunications Standards Institute created. The 3rd Generation Partnership Project maintains the SMS standard. SMS messages are handled via a short message service center that the cellular provider maintains for the end devices. The SMSC can send SMS messages to the end device using a maximum payload of 140 octets. This defines the upper bound of an SMS message to be 160 characters using 7-bit encoding. It is possible to specify other schemes such as 8-bit or 16-bit encoding, which decreases the maximum message length to 140 and 70 characters, respectively.

Journal ArticleDOI
TL;DR: Initial deployments show that using the technology can achieve a wide range of educational goals and foster a more participatory classroom environment.
Abstract: Classroom Presenter is a Tablet PC-based interaction system that supports the sharing of digital ink on slides between instructors and students. Initial deployments show that using the technology can achieve a wide range of educational goals and foster a more participatory classroom environment.

Journal ArticleDOI
TL;DR: Competisoft provides the Latin American software industry with a reference framework for improvement and certification of its software processes, including the MoProSoft model that four Mexican software companies applied to increase their processes' capacity level.
Abstract: Competisoft provides the Latin American software industry with a reference framework for improvement and certification of its software processes.The project is based on proven solutions, including the MoProSoft model that four Mexican software companies applied to increase their processes' capacity level.

Journal ArticleDOI
TL;DR: The collaborative Web search approach that promotes the idea that community search activities can provide valuable form of search knowledge and sharing of this knowledge makes adapting traditional search-engine results possible is discussed.
Abstract: Researchers can leverage the latent knowledge created within search communities by recording users' search activities - the queries they submit and results they select - at the community level. They can use this data to build a relevance model that guides the promotion of community-relevant results during regular Web search. This discusses the collaborative Web search approach that promotes the idea that community search activities can provide valuable form of search knowledge and sharing of this knowledge makes adapting traditional search-engine results possible.