Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 54, Issue 2Feb. 2021
Publisher:
  • IEEE Computer Society Press
  • Washington
  • DC
  • United States
ISSN:0018-9162
Reflects downloads up to 16 Oct 2024Bibliometrics
Skip Table Of Content Section
discussion
Secure V2V and V2I Technologies for the Next-Generation Intelligent Transportation Systems

This installment of Computer’s series highlighting the work published in IEEE Computer Society journals comes from IEEE Transactions on Services Computing. The article focuses on next generation intelligent transportation systems.

abstract
Computer Highlights Society Magazines

Presents summarizes of articles from select CS Society publications.

other
Computing Through Time

Various puzzles, quizzes, games, humorous definitions, or mathematical that should engage the interest of readers.

discussion
Monetizing You

Presents the introductory editorial for this issue of the publication.

abstract
In This Issue

Presents a summary of articles included in this issue of the publication.

research-article
Open Access
A Taxonomy for Distributed Ledger Analytics

Over the past decade, blockchains and distributed ledger technologies have rapidly evolved. With increasing transaction volumes and the proliferation of decentralized applications based on smart contracts, a need for a deeper understanding arises. We ...

research-article
A Novel Reputation System for Mobile App Stores Using Blockchain

With thousands of mobile applications submitted to online application stores, the mobile application market has experienced significant growth. This growth is accompanied by an increase in malware presence. A possible solution would be to leverage those ...

research-article
A Secure and Flexible FPGA-Based Blockchain System for the IIoT

Blockchain is a promising solution for Industry 4.0; however, it does not guarantee input data integrity. We propose a field-programmable gate array (FPGA)-based private blockchain system for the industrial Internet of Things, where the transaction ...

discussion
There Is Still No Silver Bullet

Throughout its existence, Computer has been at the center of discussion over how software should be engineered and how it should be developed. No article has been so central to the discussion as “No Silver Bullet” by Frederick P. Brooks. Yet, almost 35 ...

discussion
Tomorrow's Call Center Will Be Neither: Not Call Focused, Nor Centralized

Unprecedented concurrent events, including a global pandemic, lockdowns, hypermobility, and economic uncertainty, are triggering industry-wide disruptions for call centers. Yet the call centers that evolve and leverage today’s emerging technologies will ...

discussion
Do Data Almost Always Eventually Leak?

Shannon’s information theory states that there is a maximum rate for transmitting data reliably, implying that data almost always inevitably leak. Although there has been advancement in data protection technologies, a lack of understanding about data ...

discussion
A Brief History of Free, Open Source Software and Its Communities

Free, open source software (FOSS) has a long history, beginning with the origins of software itself, when the terms free software and open source software were not yet defined. Learning about the milestones of this history may help to understand FOSS ...

research-article
To Improve Cyber Resilience, Measure It

Measuring cyber resilience is vital to our security. In this article, we examine the importance of measuring cyber resilience and potential approaches to improve its effectiveness.

discussion
Rearchitecting the Malls: The Shifting U.S. Retail Landscape

Retail shopping is being revolutionized by the Internet and e-commerce. Big data analytics, artificial intelligence, and Internet of Things devices have further fueled the transformation.

Comments