Vol. 30, No. 2, February 1997
Table of Contents
Wearable Computing:
A First Step Toward Personal Imaging
Steve Mann
Linked to full text and imagesInvestigating
the Influence of Formal Methods
Shari Lawrence Pfleeger and Les Hatton
Trends in Mobile Satellite Technology
Gary Comparetto and Rafols Ramirez
Global Teleporting with Java: Toward Ubiquitous Personalized Computing
Kenneth R. Wood, Tristan Richardson, Frazer Bennett, Andy Harter, and Andy HopperTrusting Mobile User Devices and Security Modules
Andreas Pfitzmann, Birgit Pfitzmann, and Michael WaidnerCustomizing System Software Using OO Frameworks
Nayeem IslamNeural and Fuzzy Methods in Handwriting Recognition
Paul D. Gader, James M. Keller, Raghu Krishnapuram,
Jung-Hsien Chiang, and Magdi MohamedDEPARTMENTS
Internet Watch
Internet Job Search
Dwaine Maltais
Linked to full text
Letters//Open Channel
Challenges for Processor Designers
Maurice Wilkes
Up Front
Breaking the Teraflops Barrier
David Clark
Industry Trends
The Internet in Space: Problems and Solutions
Lee Goldberg
News Briefs
Digital TV v Key-Recovery Compromise v Unix Flaw
CSUpdate//Technical Activities Forum//Call and Calendar
CS Members Become IEEE Fellows v 1997 Election Timetable v Embedded Networked Systems
Standards
Linking Computers and Consumer Electronics
Charles Severance
New Products//New Books
Integrated Engineering
Integrated Engineering of Computer-Based Systems
Jerzy Rosenblit and Sanjaya Kumar
Software Realities
The Hard Road from Method to Practice
James Bach
Binary Critic
Report from Comdex Dimension
Sorel Reisman
| Computer Magazine page | Publications page | Computer Society home page |
Send general comments and questions about the IEEE Computer Society's Web site to: webmaster@computer.org
Copyright © 1997 Institute of Electrical and Electronics Engineers, Inc. All rights reserved.
Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.