Deforming With Sparsity
This installment of Computer’s series highlighting the work published in IEEE Computer Society journals comes from IEEE Transactions on Visualization and Computer Graphics.
<italic>Computer</italic> Highlights Society Magazines
The IEEE Computer Society’s lineup of 12 peer-reviewed technical magazines covers cutting-edge topics ranging from software design and computer graphics to Internet computing and security, from scientific applications and machine intelligence to ...
50 & 25 Years Ago
www.computer.org/csdl/mags/co/1971/06/index.html
Is Anybody Listening?
Science often tends to get stuck when people opt to disregard the work of others who have already addressed the same or similar problem.
In This Issue
Cybersecurity and trust are topics that have become staples in most computer- and IT-related magazines, journals, and conference proceedings. And I don’t see that ending, ever. Although cybersecurity and trust are just a few of the topics of interest to ...
Autonomous Systems Design—A Virtual Roundtable
We present an extensive roundtable discussion among industry leaders and distinguished researchers to give readers insight into the emerging challenges of designing autonomous systems in the era of artificial intelligence. The panelists also explore the ...
Zero Trust: The What, How, Why, and When
Trust is a critical characteristic of computer systems, but the traditional approach of evaluating systems has failed to deliver the required levels of confidence. We review the emerging zero trust paradigm and propose a new set of zero trust tenets and ...
A Comparative Study of Design Paradigms for PUF-Based Security Protocols for IoT Devices: Current Progress, Challenges, and Future Expectation
Device authentication is an essential security feature for the Internet of Things (IoT). Physical unclonable functions (PUFs) are a promising technology for developing lightweight authentication protocols in these environments. This article presents the ...
Cloud-Native Application Security: Risks, Opportunities, and Challenges in Securing the Evolving Attack Surface
Insecure cloud-native applications (CNAs) will continue to experience security compromises including data breaches due to their dynamic, complex, and varied threat landscape. We review current application security techniques, examine their benefits and ...
Hack3D: Crowdsourcing the Assessment of Cybersecurity in Digital Manufacturing
This article summarizes lessons from the past three Hack3D events, including ways in which engineers can launch surprise attacks on digital manufacturing (DM) designs. A key outcome is a taxonomy-guided security benchmark for the DM community.
Toward a Formal Traceability Model for Efficient Security Validation
A formal traceability model is presented with a real-world application of a gray-box penetration test. Such formal traceability improves test effectiveness and efficiency, thus underlining the applicability and value of formal methods in an industry ...
Objects in the Mirror Are Closer Than They Appear
Ideas emerge into the field of computer science in different ways. Sometimes they are carried forward by a single prominent publication. However, some important ideas, such as object-oriented programming, are promoted by a stream of articles.
Software Labels
There is a real need to (metaphorically) label software, but in what way—like a food, drug, hazardous material, or something else? The reasons for labeling software and how to do this are discussed.
IEEE Standard 1838 Is on the Move
IEEE Standard 1838-2019 was developed for testing multidie products, enabling design automation tools to add design-for-test facilities and designers to focus on functional innovation.
Colors of Artificial Intelligence
On the color spectrum, energy-hungry artificial intelligence (AI) is red, and energy-efficient AI is green. How will the colors of AI be represented in the future?
Pushing the Limits of Autonomy for Enabling the Next Generation of Space Robotics Exploration Missions
The never-ending human curiosity about exploring the universe is pushing the limits of robotic autonomy from remote-controlled to fully autonomous systems characterized by advanced learning, cognition, and reasoning for operating in completely unknown and ...
Trusting Human–Machine Teaming
Equipping humanoid robots with software-intensive artificial intelligence and machine learning systems introduces opportunities for enhancing human–machine teaming and challenges for placing trust in those relationships.
Hear, Now, and in the Future: Transforming Hearing Aids Into Multipurpose Devices
New technologies are helping modern hearing aids to better assist those in need and evolve from devices some people need to wear into personal assistants that anyone will want to wear.