Stop the war!
Остановите войну!
for scientists:
default search action
IEEE Computer, Volume 51
Volume 51, Number 1, January 2018
- Hironori Kasahara:
Satisfaction and Sustainability. 4-6 - Sumi Helal:
2018 Outlook: The Emerging Web and Information Sciences. 14-16 - Wendy Hall, Ramine Tinati, Will Jennings:
From Brexit to Trump: Social Media's Role in Democracy. 18-27 - Wojciech Szpankowski, Ananth Grama:
Frontiers of Science of Information: Shannon Meets Turing. 28-38 - C. Gordon Bell, Ike Nassi:
Revisiting Scalable Coherent Shared Memory. 40-49 - Hong Mei, Yao Guo:
Toward Ubiquitous Operating Systems: A Software-Defined Perspective. 50-56 - Dario Bruneo, Salvatore Distefano, Francesco Longo, Giovanni Merlino, Antonio Puliafito:
I/Ocloud: Adding an IoT Dimension to Cloud Infrastructures. 57-65 - Tanusree Chatterjee, Sushmita Ruj, Sipra Das Bit:
Security Issues in Named Data Networks. 66-75 - Connor Tingley, George Serwin, Rohan Tuli, Jenya Kirsch Posner, Celvi Lisy, Lily Bresee, Keaton Viadro, Chip Morimoto:
Turning an International Competition into a Valuable Learning Experience. 76-79 - Jeffrey M. Voas, Rick Kuhn, Celia Paulsen, Kim Schaffer:
Educating Next-Gen Computer Scientists. 80-88 - Hal Berghel:
Disinformatics: The Discipline behind Grand Deceptions. 89-93 - Apostol Vassilev, Nicky Mouha, Luis Brandao:
Psst, Can You Keep a Secret? 94-97 - Nathan Shedroff:
Self-Managing Real Estate. 104
Volume 51, Number 2, February 2018
- Bruce M. McMillin:
Software Engineering. 10-12 - David Harel, Guy Katz, Rami Marelly, Assaf Marron:
Wise Computing: Toward Endowing System Development with Proactive Wisdom. 14-26 - Alexander Egyed, Klaus Zeman, Peter Hehenberger, Andreas Demuth:
Maintaining Consistency across Engineering Artifacts. 28-35 - Ivan Handler:
Data Sharing Defined - Really! 36-42 - Stergios Papadimitriou, Lefteris Moussiades:
Mac OS versus FreeBSD: A Comparative Evaluation. 44-53 - Roman Beck:
Beyond Bitcoin: The Rise of Blockchain World. 54-58 - Gary McGraw:
The New Killer App for Security: Software Inventory. 60-62 - Hal Berghel:
Bruce Schneier on Future Digital Threats. 64-67 - Erik P. DeBenedictis:
A Future with Quantum Machine Learning. 68-71 - Rajendra K. Raj, Allen Parrish:
Toward Standards in Undergraduate Cybersecurity Education in 2018. 72-75 - Amitangshu Pal, Krishna Kant:
IoT-Based Sensing and Communications Infrastructure for the Fresh Food Supply Chain. 76-80 - F. D. Wright:
Standards: Engaging for the Future. 81-83
Volume 51, Number 3, March 2018
- Daniel J. Sorin:
Low-Power Content Addressable Memory. 8-9 - Oresti Banos, Christopher Nugent:
E-Coaching for Health. 12-15 - Sergio F. Ochoa, Francisco J. Gutierrez:
Architecting E-Coaching Systems: A First Step for Dealing with Their Intrinsic Design Complexity. 16-23 - Julie M. Robillard, Jesse Hoey:
Emotion and Motivation in Cognitive Assistive Technologies for Dementia. 24-34 - Paolo Pilloni, Luca Piras, Salvatore Carta, Gianni Fenu, Fabrizio Mulas, Ludovico Boratto:
Recommender System Lets Coaches Identify and Help Athletes Who Begin Losing Motivation. 36-42 - Mario O. Parra, Jesús Favela, Luís A. Castro, Arturo Morales:
Monitoring Eating Behaviors for a Nutritionist E-Assistant Using Crowdsourcing. 43-51 - Chit-Kwan Lin, Andreas Wild, Gautham N. Chinya, Yongqiang Cao, Mike Davies, Daniel M. Lavery, Hong Wang:
Programming Spiking Neural Networks on Intel's Loihi. 52-61 - Scooter Willis:
The Maker Revolution. 62-65 - Hal Berghel:
Trolling Pathologies. 66-69 - Dimitrios Serpanos:
The Cyber-Physical Systems Revolution. 70-73 - Nir Kshetri, Jeffrey M. Voas:
Hackings Brand-Equity Nexus. 74-77
Volume 51, Number 4, April 2018
- Ronald F. DeMara, Paolo Montuschi:
Non-Volatile Memory Trends: Toward Improving Density and Energy Profiles across the System Stack. 12-13 - Daniel Prince:
Cybersecurity: The Security and Protection Challenges of Our Digital World. 16-19 - Sulabh Bhattarai, Yong Wang:
End-to-End Trust and Security for Internet of Things Applications. 20-27 - Zhen Ni, Qianmu Li, Gang Liu:
Game-Model-Based Network Security Risk Control. 28-38 - Yongsuk Lee, Gyungho Lee:
Detecting Code Reuse Attacks with Branch Prediction. 40-47 - Kristofer E. Bouchard, James B. Aimone, Miyoung Chun, Thomas Dean, Michael Denker, Markus Diesmann, David Donofrio, Loren M. Frank, Narayanan Kasthuri, Christof Koch, Oliver Rübel, Horst D. Simon, Friedrich T. Sommer, Prabhat:
International Neuroscience Initiatives through the Lens of High-Performance Computing. 50-59 - Konstantin Rubinov, Luciano Baresi:
What Are We Missing When Testing Our Android Apps? 60-68 - Hal Berghel:
Weaponizing Twitter Litter: Abuse-Forming Networks and Social Media. 70-73 - Thomas M. Conte, Erik P. DeBenedictis, Avi Mendelson, Dejan S. Milojicic:
Rebooting Computers to Avoid Meltdown and Spectre. 74-77 - Mina J. Hanna:
Net Neutrality: A Brief Overview of the Policy and the FCC's Ruling to Upend It. 78-81 - Chung-Kuan Chen, Zhi-Kai Zhang, Shan-Hsin Lee, Shiuhpyng Shieh:
Penetration Testing in the IoT Age. 82-85 - Jeffrey M. Voas, Phillip A. Laplante:
IoT's Certification Quagmire. 86-89 - Jon Rosdahl:
Computer Society Standards Drive Industry. 90-94
Volume 51, Number 5, May 2018
- Leila De Floriani:
Globe Browsing in OpenSpace. 8-9 - Erich J. Neuhold:
Computer, 1968 and 1993. 10-11 - Nicholas D. Lane, Pete Warden:
The Deep (Learning) Transformation of Mobile and Embedded Computing. 12-16 - Andreas Moshovos, Jorge Albericio, Patrick Judd, Alberto Delmas Lascorz, Sayeh Sharify, Zissis Poulos, Tayler H. Hetherington, Tor M. Aamodt, Natalie D. Enright Jerger:
Exploiting Typical Values to Accelerate Deep Learning. 18-30 - Shuochao Yao, Yiran Zhao, Aston Zhang, Shaohan Hu, Huajie Shao, Chao Zhang, Lu Su, Tarek F. Abdelzaher:
Deep Learning for the Internet of Things. 32-41 - Seyed Ali Ossia, Ali Shahin Shamsabadi, Ali Taheri, Hamid R. Rabiee, Hamed Haddadi:
Private and Scalable Personal Data Analytics Using Hybrid Edge-to-Cloud Deep Learning. 42-49 - Thomas Plötz, Yu Guan:
Deep Learning for Human Activity Recognition in Mobile Computing. 50-59 - Jagmohan Chauhan, Suranga Seneviratne, Yining Hu, Archan Misra, Aruna Seneviratne, Youngki Lee:
Breathing-Based Authentication on Resource-Constrained IoT Devices using Recurrent Neural Networks. 60-67 - Jungmo Ahn, Huynh Nguyen Loc, Rajesh Krishna Balan, Youngki Lee, JeongGil Ko:
Finding Small-Bowel Lesions: Challenges in Endoscopy-Image-Based Learning Systems. 68-76 - Robert N. Charette:
Puncturing Pernicious Project Pufferies. 78-83 - Hal Berghel:
Malice Domestic: The Cambridge Analytica Dystopia. 84-89 - Marilyn Wolf:
Computing in the Real World Is the Grandest of Challenges. 90-91 - Nir Kshetri, Jeffrey M. Voas:
Cyberthreats under the Bed. 92-95
Volume 51, Number 6, June 2018
- Björn W. Schuller:
What Affective Computing Reveals about Autistic Children's Facial Expressions of Joy or Fear. 7-8 - James A. Hendler, Wendy Hall, Noshir Contractor:
Web Science: Now More Than Ever. 12-17 - Kyungsik Han, Hyunggu Jung, Jin Yea Jang, Dongwon Lee:
Understanding Users' Privacy Attitudes through Subjective and Objective Assessments: An Instagram Case Study. 18-28 - John Gastil, Sascha D. Meinrath:
Bringing Citizens and Policymakers Together Online: Imagining the Possibilities and Taking Stock of Privacy and Transparency Hazards. 30-40 - Daye Nam, Mayank Kejriwal:
How Do Organizations Publish Semantic Markup? Three Case Studies Using Public Schema.org Crawls. 42-51 - Jun Sun, Steffen Staab, Jérôme Kunegis:
Understanding Social Networks Using Transfer Learning. 52-60 - Carleen F. Maitland:
Now You See It, Now You Don't: Digital Connectivity in Marginalized Communities. 62-71 - Toru Ishida, Yohei Murakami, Donghui Lin, Takao Nakaguchi, Masayuki Otani:
Language Service Infrastructure on the Web: The Language Grid. 72-81 - Erik P. DeBenedictis:
Accelerated Architectures Create Programming Opportunities. 82-85 - Kristen K. Greene, Michelle Steves, Mary Theofanos:
No Phishing beyond This Point. 86-89 - Trevor Pering, Kathy Farrington, Thorsten Dahm:
Taming the IoT: Operationalized Testing to Secure Connected Devices. 90-94 - Richard Vedder:
Benefits of College - By Degrees. 96-99 - F. D. Wright, Thomas M. Conte:
Standards: Roadmapping Computer Technology Trends Enlightens Industry. 100-103
Volume 51, Number 7, July 2018
- Ayten Ozge Akmandor, Niraj K. Jha:
Detecting and Alleviating Stress with SoDA. 4-5 - Jeffrey M. Voas, Rick Kuhn, Constantinos Kolias, Angelos Stavrou, Georgios Kambourakis:
Cybertrust in the IoT Age. 12-15 - Rodrigo Roman Castro, Javier López, Stefanos Gritzalis:
Evolution and Trends in IoT Security. 16-25 - Natalija Vlajic, Daiwei Zhou:
IoT as a Land of Opportunity for DDoS Hackers. 26-34 - Weizhi Meng:
Intrusion Detection in the Era of IoT: Building Trust via Traffic Filtering and Sampling. 36-43 - José María de Fuentes, Lorena González-Manzano, Agusti Solanas, Fatbardh Veseli:
Attribute-Based Credentials for Privacy-Aware Smart Health Services in IoT-Based Smart Cities. 44-53 - Jatinder Singh, Christopher Millard, Chris Reed, Jennifer Cobbe, Jon Crowcroft:
Accountability in the IoT: Systems, Law, and Ways Forward. 54-65 - Ryan Gary Kim, Janardhan Rao Doppa, Partha Pratim Pande, Diana Marculescu, Radu Marculescu:
Machine Learning and Manycore Systems Design: A Serendipitous Symbiosis. 66-77 - Timothy Buzzelli:
University of Central Florida Takes the Bronze at Annual International Programming Competition. 78-81 - Rick Kuhn, Mohammad S. Raunak, Raghu Kacker:
Can Reducing Faults Prevent Vulnerabilities? 82-85 - Hal Berghel:
Newton's Great Insight. 86-90 - Yoshihiro Shiroishi, Kunio Uchiyama, Norihiro Suzuki:
Society 5.0: For Human Security and Well-Being. 91-95
Volume 51, Number 8, August 2018
- Patrick Schaumont, Paolo Montuschi:
The Rise of Hardware Security in Computer Architectures. 4-5 - Oresti Banos, Chris D. Nugent:
M-Coaching: Towards the Next Generation of Mobile-Driven Healthcare Support Services. 14-17 - Mauro Tschanz, Tim Lucas Dorner, Jürgen Holm, Kerstin Denecke:
Using eMMA to Manage Medication. 18-25 - Haolin Wang, Qingpeng Zhang, Mary Ip, Joseph Tak Fai Lau:
Social Media-based Conversational Agents for Health Management and Interventions. 26-33 - Simo Hosio, Jaro Karppinen, Niels van Berkel, Jonas Oppenlaender, Jorge Gonçalves:
Mobile Decision Support and Data Provisioning for Low Back Pain. 34-43 - Hal Berghel, Daniel Berleant:
The Online Trolling Ecosystem. 44-51 - Erik P. DeBenedictis:
A Role for IEEE in Quantum Computing. 52-55 - Jim Isaak, Mina J. Hanna:
User Data Privacy: Facebook, Cambridge Analytica, and Privacy Protection. 56-59 - Robin Bloomfield, Peter Bishop, Eoin Butler, Robert J. Stroud:
Security-Informed Safety: Supporting Stakeholders with Codes of Practice. 60-65 - Roy Want, Wei Wang, Stan Chesnutt:
Accurate Indoor Location for the IoT. 66-70
Volume 51, Number 9, September 2018
- Jaideep Vaidya:
Privacy-Preserving Statistics. 8-9 - Sumi Helal:
The Expanding Frontier of Artificial Intelligence. 14-17 - Plamen P. Angelov, Xiaowei Gu:
Toward Anthropomorphic Machine Learning. 18-27 - Hani Hagras:
Toward Human-Understandable, Explainable AI. 28-36 - Dagmar Schuller, Björn W. Schuller:
The Age of Artificial Emotional Intelligence. 38-46 - Thang N. Dinh, My T. Thai:
AI and Blockchain: A Disruptive Integration. 48-53 - Wasim Ahmad Bhat:
Is a Data-Capacity Gap Inevitable in Big Data Storage? 54-62 - Mahbub Hassan, Wen Hu, Guohao Lan, Aruna Seneviratne, Sara Khalifa, Sajal K. Das:
Kinetic-Powered Health Wearables: Challenges and Opportunities. 64-74 - Rolf Ernst:
Automated Driving: The Cyber-Physical Perspective. 76-79 - George F. Hurlburt:
Toward Applied Cyberethics. 80-84 - Florence D. Hudson, Chris Clark:
Wearables and Medical Interoperability: The Evolving Frontier. 86-90
Volume 51, Number 10, October 2018
- Robert N. Charette, John Leslie King:
Winning and Losing in IT. 10-15 - Stefan Seidel, Nicholas Berente, Benoit Martinez, Aron Lindberg, Kalle Lyytinen, Jeffrey V. Nickerson:
Autonomous Tools in System Design: Reflective Practice in Ubisofts Ghost Recon Wildlands Project. 16-23 - Telle Whitney, Valerie Taylor:
Increasing Women and Underrepresented Minorities in Computing: The Landscape and What You Can Do. 24-31 - Peter J. Denning:
Winning at Innovation. 32-39 - Jonathan Grudin:
Innovation and Inertia: Information Technology and Education in the United States. 40-47 - Marie Hicks:
When Winning Is Losing: Why the Nation that Invented the Computer Lost Its Lead. 48-57 - Walt Scacchi:
Winning and Losing in Large-Scale Software Development: A Multi-Decade Perspective. 58-65 - Lynn Conway:
The Disappeared: Beyond Winning and Losing. 66-73 - Jack J. Dongarra, Vladimir Getov, Kevin Walsh:
The 30th Anniversary of the Supercomputing Conference: Bringing the Future Closer - Supercomputing History and the Immortality of Now. 74-85 - Erik P. DeBenedictis, Travis S. Humble, Paolo A. Gargini:
Quantum Computer Scale-up. 86-89 - Scooter Willis:
Make Learning Fun and Get Out of the Way of the Smartphone Generation. 90-92 - Ashutosh Dhekne, Umberto Ravaioli, Romit Roy Choudhury:
P2PLoc: Peer-to-Peer Localization of Fast-Moving Entities. 94-98 - Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo:
Access Control for Emerging Distributed Systems. 100-103
Volume 51, Number 11, November 2018
- James Joshi:
Front Cover. 1- - Lori Cameron:
[Elsewhere in the CS]. 4-6 - Erich J. Neuhold:
[50 & 25 Years Ago]. 7-9 - Oleg Sokolsky, Nicola Bezzo:
Resiliency in Cyber-Physical Systems [Guest Editors' Introduction]. 10-12 - Darren D. Cofer, Andrew Gacek, John Backes, Michael W. Whalen, Lee Pike, Adam Foltzer, Michal Podhradsky, Gerwin Klein, Ihor Kuz, June Andronick, Gernot Heiser, Douglas Stuart:
A Formal Approach to Constructing Secure Air Vehicle Software. 14-23 - Tarek F. Abdelzaher, Nora Ayanian, Tamer Basar, Suhas N. Diggavi, Jana Diesner, Deepak Ganesan, Ramesh Govindan, Susmit Jha, Tancrède Lepoint, Benjamin M. Marlin, Klara Nahrstedt, David M. Nicol, Raj Rajkumar, Stephen Russell, Sanjit A. Seshia, Fei Sha, Prashant J. Shenoy, Mani B. Srivastava, Gaurav S. Sukhatme, Ananthram Swami, Paulo Tabuada, Don Towsley, Nitin H. Vaidya, Venugopal V. Veeravalli:
Toward an Internet of Battlefield Things: A Resilience Perspective. 24-36 - Varun Badrinath Krishna, Ziping Wu, Vaidehi V. Ambardekar, Richard Macwan, William H. Sanders:
Cyberattacks on Primary Frequency Response Mechanisms in Power Grids. 37-45 - Yuchang Won, Buyeon Yu, Jaegeun Park, In-Hee Park, Haegeon Jeong, Jeanseong Baik, Kyungtae Kang, Insup Lee, Sang Hyuk Son, Kyung-Joon Park, Yongsoon Eun:
An Attack-Resilient CPS Architecture for Hierarchical Control: A Case Study on Train Control Systems. 46-55 - Mohammad Shihabul Haque, Daniel Jun Xian Ng, Arvind Easwaran, Karthikeyan Thangamariappan:
Contract-Based Hierarchical Resilience Management for Cyber-Physical Systems. 56-65 - Tanesh Kumar, Pawani Porambage, Ijaz Ahmad, Madhusanka Liyanage, Erkki Harjula, Mika Ylianttila:
Securing Gadget-Free Digital Services. 66-77 - Sylvain Hallé, Raphaël Khoury, Mewena Awesso:
Streamlining the Inclusion of Computer Experiments In a Research Paper. 78-89 - Hal Berghel:
Election Integrity 2018: Are We Better Off Than We Were in 2016? [Aftershock]. 90-94 - Christos Koulamas, Athanasios P. Kalogeras:
Cyber-Physical Systems and Digital Twins in the Industrial Internet of Things [Cyber-Physical Systems]. 95-98 - Nir Kshetri:
Cryptocurrencies: Transparency Versus Privacy [Cybertrust]. 99-111 - Hal Berghel:
The Genesis of Postmodern Disinformatics [Out of Band]. 102-105 - Claudio Lima:
Developing Open and Interoperable DLT\/Blockchain Standards [Standards]. 106-111
Volume 51, Number 12, December 2018
- Lori Cameron:
[Elsewhere in the CS]. 4-6 - Erich J. Neuhold:
Computer, December 1968 and 1993 [50 & 25 Years Ago]. 7-9 - Yasha Wang, Katsuyuki Yamazaki:
Governments in the Age of Big Data and Smart Cities [Guest Editors' Introduction]. 10-12 - Takahiro Sumitomo, Noboru Koshizuka:
Progress and Initiatives for Open Data Policy in Japan. 14-23 - Hui Gao, Chi Harold Liu, Wendong Wang:
Hybrid Vehicular Crowdsourcing With Driverless Cars: Challenges and a Solution. 24-31 - Leye Wang, Bin Guo, Qiang Yang:
Smart City Development With Urban Transfer Learning. 32-41 - Jiangtao Wang, Junfeng Zhao, Yong Zhang, Xin Peng, Ying Li, Yun Xie:
Enabling Human-Centric Smart Cities: Crowdsourcing-Based Practice in China. 42-49 - Noboru Koshizuka, Stephan Haller, Ken Sakamura:
CPaaS.io: An EU-Japan Collaboration on Open Smart-City Platforms. 50-58 - Nir Kshetri:
Blockchain and Electronic Healthcare Records [Cybertrust]. 59-63 - Ju Wang, Xiaojiang Chen, Dingyi Fang, Jie Xiong, Hongbo Jiang, Rajesh Krishna Balan:
Material Identification and Target Imaging with RFIDs [IoT Connection]. 64-68 - Erik P. DeBenedictis, Michael P. Frank:
The National Quantum Initiative Will Also Benefit Classical Computers [Rebooting Computing]. 69-73
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.