


default search action
IEEE Computer, Volume 51
Volume 51, Number 1, January 2018
- Hironori Kasahara:
Satisfaction and Sustainability. 4-6 - Sumi Helal:
2018 Outlook: The Emerging Web and Information Sciences. 14-16 - Wendy Hall, Ramine Tinati, Will Jennings:
From Brexit to Trump: Social Media's Role in Democracy. 18-27 - Wojciech Szpankowski, Ananth Grama:
Frontiers of Science of Information: Shannon Meets Turing. 28-38 - C. Gordon Bell, Ike Nassi
:
Revisiting Scalable Coherent Shared Memory. 40-49 - Hong Mei, Yao Guo
:
Toward Ubiquitous Operating Systems: A Software-Defined Perspective. 50-56 - Dario Bruneo, Salvatore Distefano, Francesco Longo, Giovanni Merlino, Antonio Puliafito:
I/Ocloud: Adding an IoT Dimension to Cloud Infrastructures. 57-65 - Tanusree Chatterjee, Sushmita Ruj
, Sipra Das Bit
:
Security Issues in Named Data Networks. 66-75 - Connor Tingley, George Serwin, Rohan Tuli, Jenya Kirsch Posner, Celvi Lisy, Lily Bresee, Keaton Viadro, Chip Morimoto:
Turning an International Competition into a Valuable Learning Experience. 76-79 - Jeffrey M. Voas, Rick Kuhn, Celia Paulsen
, Kim Schaffer:
Educating Next-Gen Computer Scientists. 80-88 - Hal Berghel:
Disinformatics: The Discipline behind Grand Deceptions. 89-93 - Apostol Vassilev, Nicky Mouha, Luís T. A. N. Brandão:
Psst, Can You Keep a Secret? 94-97 - Nathan Shedroff:
Self-Managing Real Estate. 104
Volume 51, Number 2, February 2018
- Bruce M. McMillin:
Software Engineering. 10-12 - David Harel, Guy Katz, Rami Marelly, Assaf Marron:
Wise Computing: Toward Endowing System Development with Proactive Wisdom. 14-26 - Alexander Egyed, Klaus Zeman, Peter Hehenberger, Andreas Demuth:
Maintaining Consistency across Engineering Artifacts. 28-35 - Ivan Handler:
Data Sharing Defined - Really! 36-42 - Stergios Papadimitriou, Lefteris Moussiades:
Mac OS versus FreeBSD: A Comparative Evaluation. 44-53 - Roman Beck
:
Beyond Bitcoin: The Rise of Blockchain World. 54-58 - Gary McGraw:
The New Killer App for Security: Software Inventory. 60-62 - Hal Berghel:
Bruce Schneier on Future Digital Threats. 64-67 - Erik P. DeBenedictis:
A Future with Quantum Machine Learning. 68-71 - Rajendra K. Raj, Allen Parrish:
Toward Standards in Undergraduate Cybersecurity Education in 2018. 72-75 - Amitangshu Pal, Krishna Kant:
IoT-Based Sensing and Communications Infrastructure for the Fresh Food Supply Chain. 76-80 - F. D. Wright:
Standards: Engaging for the Future. 81-83
Volume 51, Number 3, March 2018
- Daniel J. Sorin:
Low-Power Content Addressable Memory. 8-9 - Oresti Banos
, Christopher Nugent:
E-Coaching for Health. 12-15 - Sergio F. Ochoa, Francisco J. Gutierrez
:
Architecting E-Coaching Systems: A First Step for Dealing with Their Intrinsic Design Complexity. 16-23 - Julie M. Robillard
, Jesse Hoey:
Emotion and Motivation in Cognitive Assistive Technologies for Dementia. 24-34 - Paolo Pilloni
, Luca Piras
, Salvatore Carta, Gianni Fenu, Fabrizio Mulas, Ludovico Boratto
:
Recommender System Lets Coaches Identify and Help Athletes Who Begin Losing Motivation. 36-42 - Mario O. Parra
, Jesús Favela, Luís A. Castro
, Arturo Morales:
Monitoring Eating Behaviors for a Nutritionist E-Assistant Using Crowdsourcing. 43-51 - Chit-Kwan Lin, Andreas Wild, Gautham N. Chinya, Yongqiang Cao, Mike Davies, Daniel M. Lavery, Hong Wang:
Programming Spiking Neural Networks on Intel's Loihi. 52-61 - Scooter Willis:
The Maker Revolution. 62-65 - Hal Berghel:
Trolling Pathologies. 66-69 - Dimitrios Serpanos:
The Cyber-Physical Systems Revolution. 70-73 - Nir Kshetri, Jeffrey M. Voas:
Hackings Brand-Equity Nexus. 74-77
Volume 51, Number 4, April 2018
- Ronald F. DeMara
, Paolo Montuschi:
Non-Volatile Memory Trends: Toward Improving Density and Energy Profiles across the System Stack. 12-13 - Daniel Prince:
Cybersecurity: The Security and Protection Challenges of Our Digital World. 16-19 - Sulabh Bhattarai, Yong Wang:
End-to-End Trust and Security for Internet of Things Applications. 20-27 - Zhen Ni, Qianmu Li
, Gang Liu:
Game-Model-Based Network Security Risk Control. 28-38 - Yongsuk Lee, Gyungho Lee:
Detecting Code Reuse Attacks with Branch Prediction. 40-47 - Kristofer E. Bouchard, James B. Aimone
, Miyoung Chun, Thomas Dean, Michael Denker, Markus Diesmann, David Donofrio, Loren M. Frank
, Narayanan Kasthuri, Christof Koch, Oliver Rübel, Horst D. Simon
, Friedrich T. Sommer, Prabhat:
International Neuroscience Initiatives through the Lens of High-Performance Computing. 50-59 - Konstantin Rubinov, Luciano Baresi
:
What Are We Missing When Testing Our Android Apps? 60-68 - Hal Berghel:
Weaponizing Twitter Litter: Abuse-Forming Networks and Social Media. 70-73 - Thomas M. Conte
, Erik P. DeBenedictis, Avi Mendelson, Dejan S. Milojicic
:
Rebooting Computers to Avoid Meltdown and Spectre. 74-77 - Mina J. Hanna:
Net Neutrality: A Brief Overview of the Policy and the FCC's Ruling to Upend It. 78-81 - Chung-Kuan Chen, Zhi-Kai Zhang, Shan-Hsin Lee, Shiuhpyng Shieh:
Penetration Testing in the IoT Age. 82-85 - Jeffrey M. Voas, Phillip A. Laplante:
IoT's Certification Quagmire. 86-89 - Jon Rosdahl:
Computer Society Standards Drive Industry. 90-94
Volume 51, Number 5, May 2018
- Leila De Floriani:
Globe Browsing in OpenSpace. 8-9 - Erich J. Neuhold:
Computer, 1968 and 1993. 10-11 - Nicholas D. Lane, Pete Warden:
The Deep (Learning) Transformation of Mobile and Embedded Computing. 12-16 - Andreas Moshovos, Jorge Albericio, Patrick Judd, Alberto Delmas Lascorz, Sayeh Sharify, Zissis Poulos, Tayler H. Hetherington, Tor M. Aamodt, Natalie D. Enright Jerger
:
Exploiting Typical Values to Accelerate Deep Learning. 18-30 - Shuochao Yao, Yiran Zhao, Aston Zhang, Shaohan Hu, Huajie Shao, Chao Zhang
, Lu Su, Tarek F. Abdelzaher:
Deep Learning for the Internet of Things. 32-41 - Seyed Ali Ossia, Ali Shahin Shamsabadi, Ali Taheri, Hamid R. Rabiee, Hamed Haddadi:
Private and Scalable Personal Data Analytics Using Hybrid Edge-to-Cloud Deep Learning. 42-49 - Thomas Plötz, Yu Guan:
Deep Learning for Human Activity Recognition in Mobile Computing. 50-59 - Jagmohan Chauhan, Suranga Seneviratne, Yining Hu, Archan Misra
, Aruna Seneviratne, Youngki Lee:
Breathing-Based Authentication on Resource-Constrained IoT Devices using Recurrent Neural Networks. 60-67 - Jungmo Ahn, Huynh Nguyen Loc, Rajesh Krishna Balan, Youngki Lee, JeongGil Ko:
Finding Small-Bowel Lesions: Challenges in Endoscopy-Image-Based Learning Systems. 68-76 - Robert N. Charette:
Puncturing Pernicious Project Pufferies. 78-83 - Hal Berghel:
Malice Domestic: The Cambridge Analytica Dystopia. 84-89 - Marilyn Wolf:
Computing in the Real World Is the Grandest of Challenges. 90-91 - Nir Kshetri, Jeffrey M. Voas:
Cyberthreats under the Bed. 92-95
Volume 51, Number 6, June 2018
- Björn W. Schuller
:
What Affective Computing Reveals about Autistic Children's Facial Expressions of Joy or Fear. 7-8 - James A. Hendler
, Wendy Hall, Noshir Contractor:
Web Science: Now More Than Ever. 12-17 - Kyungsik Han
, Hyunggu Jung
, Jin Yea Jang, Dongwon Lee
:
Understanding Users' Privacy Attitudes through Subjective and Objective Assessments: An Instagram Case Study. 18-28 - John Gastil
, Sascha D. Meinrath
:
Bringing Citizens and Policymakers Together Online: Imagining the Possibilities and Taking Stock of Privacy and Transparency Hazards. 30-40 - Daye Nam, Mayank Kejriwal:
How Do Organizations Publish Semantic Markup? Three Case Studies Using Public Schema.org Crawls. 42-51 - Jun Sun, Steffen Staab, Jérôme Kunegis:
Understanding Social Networks Using Transfer Learning. 52-60 - Carleen F. Maitland:
Now You See It, Now You Don't: Digital Connectivity in Marginalized Communities. 62-71 - Toru Ishida, Yohei Murakami
, Donghui Lin, Takao Nakaguchi, Masayuki Otani:
Language Service Infrastructure on the Web: The Language Grid. 72-81 - Erik P. DeBenedictis:
Accelerated Architectures Create Programming Opportunities. 82-85 - Kristen K. Greene, Michelle Steves, Mary Theofanos:
No Phishing beyond This Point. 86-89 - Trevor Pering, Kathy Farrington, Thorsten Dahm:
Taming the IoT: Operationalized Testing to Secure Connected Devices. 90-94 - Richard Vedder:
Benefits of College - By Degrees. 96-99 - F. D. Wright, Thomas M. Conte
:
Standards: Roadmapping Computer Technology Trends Enlightens Industry. 100-103
Volume 51, Number 7, July 2018
- Ayten Ozge Akmandor, Niraj K. Jha:
Detecting and Alleviating Stress with SoDA. 4-5 - Jeffrey M. Voas, Rick Kuhn, Constantinos Kolias, Angelos Stavrou
, Georgios Kambourakis:
Cybertrust in the IoT Age. 12-15 - Rodrigo Roman Castro
, Javier López, Stefanos Gritzalis
:
Evolution and Trends in IoT Security. 16-25 - Natalija Vlajic, Daiwei Zhou:
IoT as a Land of Opportunity for DDoS Hackers. 26-34 - Weizhi Meng
:
Intrusion Detection in the Era of IoT: Building Trust via Traffic Filtering and Sampling. 36-43 - José María de Fuentes, Lorena González-Manzano
, Agusti Solanas, Fatbardh Veseli
:
Attribute-Based Credentials for Privacy-Aware Smart Health Services in IoT-Based Smart Cities. 44-53 - Jatinder Singh, Christopher Millard, Chris Reed, Jennifer Cobbe, Jon Crowcroft:
Accountability in the IoT: Systems, Law, and Ways Forward. 54-65 - Ryan Gary Kim
, Janardhan Rao Doppa, Partha Pratim Pande, Diana Marculescu
, Radu Marculescu:
Machine Learning and Manycore Systems Design: A Serendipitous Symbiosis. 66-77 - Timothy Buzzelli:
University of Central Florida Takes the Bronze at Annual International Programming Competition. 78-81 - Rick Kuhn, M. S. Raunak, Raghu Kacker:
Can Reducing Faults Prevent Vulnerabilities? 82-85 - Hal Berghel:
Newton's Great Insight. 86-90 - Yoshihiro Shiroishi, Kunio Uchiyama, Norihiro Suzuki
:
Society 5.0: For Human Security and Well-Being. 91-95
Volume 51, Number 8, August 2018
- Patrick Schaumont
, Paolo Montuschi:
The Rise of Hardware Security in Computer Architectures. 4-5 - Oresti Banos
, Chris D. Nugent:
M-Coaching: Towards the Next Generation of Mobile-Driven Healthcare Support Services. 14-17 - Mauro Tschanz, Tim Lucas Dorner, Jürgen Holm, Kerstin Denecke
:
Using eMMA to Manage Medication. 18-25 - Haolin Wang
, Qingpeng Zhang
, Mary Ip, Joseph Tak Fai Lau:
Social Media-based Conversational Agents for Health Management and Interventions. 26-33 - Simo Hosio
, Jaro Karppinen, Niels van Berkel
, Jonas Oppenlaender
, Jorge Gonçalves
:
Mobile Decision Support and Data Provisioning for Low Back Pain. 34-43 - Hal Berghel, Daniel Berleant:
The Online Trolling Ecosystem. 44-51 - Erik P. DeBenedictis:
A Role for IEEE in Quantum Computing. 52-55 - Jim Isaak, Mina J. Hanna:
User Data Privacy: Facebook, Cambridge Analytica, and Privacy Protection. 56-59 - Robin Bloomfield, Peter Bishop
, Eoin Butler, Robert J. Stroud:
Security-Informed Safety: Supporting Stakeholders with Codes of Practice. 60-65 - Roy Want, Wei Wang, Stan Chesnutt:
Accurate Indoor Location for the IoT. 66-70
Volume 51, Number 9, September 2018
- Jaideep Vaidya:
Privacy-Preserving Statistics. 8-9 - Sumi Helal
:
The Expanding Frontier of Artificial Intelligence. 14-17 - Plamen P. Angelov
, Xiaowei Gu
:
Toward Anthropomorphic Machine Learning. 18-27 - Hani Hagras
:
Toward Human-Understandable, Explainable AI. 28-36 - Dagmar Schuller, Björn W. Schuller
:
The Age of Artificial Emotional Intelligence. 38-46 - Thang N. Dinh, My T. Thai:
AI and Blockchain: A Disruptive Integration. 48-53 - Wasim Ahmad Bhat
:
Is a Data-Capacity Gap Inevitable in Big Data Storage? 54-62 - Mahbub Hassan, Wen Hu
, Guohao Lan
, Aruna Seneviratne, Sara Khalifa
, Sajal K. Das
:
Kinetic-Powered Health Wearables: Challenges and Opportunities. 64-74 - Rolf Ernst:
Automated Driving: The Cyber-Physical Perspective. 76-79 - George F. Hurlburt
:
Toward Applied Cyberethics. 80-84 - Florence D. Hudson
, Chris Clark:
Wearables and Medical Interoperability: The Evolving Frontier. 86-90
Volume 51, Number 10, October 2018
- Robert N. Charette, John Leslie King:
Winning and Losing in IT. 10-15 - Stefan Seidel
, Nicholas Berente, Benoit Martinez, Aron Lindberg, Kalle Lyytinen, Jeffrey V. Nickerson
:
Autonomous Tools in System Design: Reflective Practice in Ubisofts Ghost Recon Wildlands Project. 16-23 - Telle Whitney, Valerie Taylor:
Increasing Women and Underrepresented Minorities in Computing: The Landscape and What You Can Do. 24-31 - Peter J. Denning:
Winning at Innovation. 32-39 - Jonathan Grudin:
Innovation and Inertia: Information Technology and Education in the United States. 40-47 - Marie Hicks:
When Winning Is Losing: Why the Nation that Invented the Computer Lost Its Lead. 48-57 - Walt Scacchi:
Winning and Losing in Large-Scale Software Development: A Multi-Decade Perspective. 58-65 - Lynn Conway:
The Disappeared: Beyond Winning and Losing. 66-73 - Jack J. Dongarra, Vladimir Getov, Kevin Walsh:
The 30th Anniversary of the Supercomputing Conference: Bringing the Future Closer - Supercomputing History and the Immortality of Now. 74-85 - Erik P. DeBenedictis, Travis S. Humble, Paolo A. Gargini:
Quantum Computer Scale-up. 86-89 - Scooter Willis:
Make Learning Fun and Get Out of the Way of the Smartphone Generation. 90-92 - Ashutosh Dhekne, Umberto Ravaioli
, Romit Roy Choudhury:
P2PLoc: Peer-to-Peer Localization of Fast-Moving Entities. 94-98 - Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo:
Access Control for Emerging Distributed Systems. 100-103
Volume 51, Number 11, November 2018
- James Joshi:
Front Cover. 1- - Lori Cameron:
[Elsewhere in the CS]. 4-6 - Erich J. Neuhold:
[50 & 25 Years Ago]. 7-9 - Oleg Sokolsky
, Nicola Bezzo:
Resiliency in Cyber-Physical Systems [Guest Editors' Introduction]. 10-12 - Darren D. Cofer, Andrew Gacek, John Backes, Michael W. Whalen, Lee Pike, Adam Foltzer, Michal Podhradsky, Gerwin Klein, Ihor Kuz, June Andronick, Gernot Heiser, Douglas Stuart:
A Formal Approach to Constructing Secure Air Vehicle Software. 14-23 - Tarek F. Abdelzaher
, Nora Ayanian
, Tamer Basar
, Suhas N. Diggavi, Jana Diesner, Deepak Ganesan, Ramesh Govindan, Susmit Jha, Tancrède Lepoint, Benjamin M. Marlin
, Klara Nahrstedt
, David M. Nicol, Raj Rajkumar, Stephen Russell, Sanjit A. Seshia
, Fei Sha, Prashant J. Shenoy
, Mani B. Srivastava
, Gaurav S. Sukhatme, Ananthram Swami, Paulo Tabuada
, Don Towsley
, Nitin H. Vaidya, Venugopal V. Veeravalli:
Toward an Internet of Battlefield Things: A Resilience Perspective. 24-36 - Varun Badrinath Krishna, Ziping Wu, Vaidehi V. Ambardekar, Richard Macwan, William H. Sanders:
Cyberattacks on Primary Frequency Response Mechanisms in Power Grids. 37-45 - Yuchang Won, Buyeon Yu, Jaegeun Park, In-Hee Park, Haegeon Jeong, Jeanseong Baik, Kyungtae Kang, Insup Lee, Sang Hyuk Son, Kyung-Joon Park
, Yongsoon Eun:
An Attack-Resilient CPS Architecture for Hierarchical Control: A Case Study on Train Control Systems. 46-55 - Mohammad Shihabul Haque, Daniel Jun Xian Ng, Arvind Easwaran
, Karthikeyan Thangamariappan:
Contract-Based Hierarchical Resilience Management for Cyber-Physical Systems. 56-65 - Tanesh Kumar
, Pawani Porambage, Ijaz Ahmad
, Madhusanka Liyanage
, Erkki Harjula, Mika Ylianttila:
Securing Gadget-Free Digital Services. 66-77 - Sylvain Hallé
, Raphaël Khoury, Mewena Awesso:
Streamlining the Inclusion of Computer Experiments In a Research Paper. 78-89 - Hal Berghel:
Election Integrity 2018: Are We Better Off Than We Were in 2016? [Aftershock]. 90-94 - Christos Koulamas
, Athanasios P. Kalogeras
:
Cyber-Physical Systems and Digital Twins in the Industrial Internet of Things [Cyber-Physical Systems]. 95-98 - Nir Kshetri:
Cryptocurrencies: Transparency Versus Privacy [Cybertrust]. 99-111 - Hal Berghel:
The Genesis of Postmodern Disinformatics [Out of Band]. 102-105 - Claudio Lima:
Developing Open and Interoperable DLT\/Blockchain Standards [Standards]. 106-111
Volume 51, Number 12, December 2018
- Lori Cameron:
[Elsewhere in the CS]. 4-6 - Erich J. Neuhold:
Computer, December 1968 and 1993 [50 & 25 Years Ago]. 7-9 - Yasha Wang, Katsuyuki Yamazaki:
Governments in the Age of Big Data and Smart Cities [Guest Editors' Introduction]. 10-12 - Takahiro Sumitomo
, Noboru Koshizuka:
Progress and Initiatives for Open Data Policy in Japan. 14-23 - Hui Gao, Chi Harold Liu, Wendong Wang:
Hybrid Vehicular Crowdsourcing With Driverless Cars: Challenges and a Solution. 24-31 - Leye Wang
, Bin Guo
, Qiang Yang:
Smart City Development With Urban Transfer Learning. 32-41 - Jiangtao Wang
, Junfeng Zhao, Yong Zhang, Xin Peng, Ying Li, Yun Xie:
Enabling Human-Centric Smart Cities: Crowdsourcing-Based Practice in China. 42-49 - Noboru Koshizuka
, Stephan Haller
, Ken Sakamura:
CPaaS.io: An EU-Japan Collaboration on Open Smart-City Platforms. 50-58 - Nir Kshetri
:
Blockchain and Electronic Healthcare Records [Cybertrust]. 59-63 - Ju Wang
, Xiaojiang Chen, Dingyi Fang, Jie Xiong, Hongbo Jiang, Rajesh Krishna Balan:
Material Identification and Target Imaging with RFIDs [IoT Connection]. 64-68 - Erik P. DeBenedictis
, Michael P. Frank:
The National Quantum Initiative Will Also Benefit Classical Computers [Rebooting Computing]. 69-73

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.