Secure V2V and V2I Technologies for the Next-Generation Intelligent Transportation Systems
This installment of Computer’s series highlighting the work published in IEEE Computer Society journals comes from IEEE Transactions on Services Computing. The article focuses on next generation intelligent transportation systems.
Computer Highlights Society Magazines
Presents summarizes of articles from select CS Society publications.
Computing Through Time
Various puzzles, quizzes, games, humorous definitions, or mathematical that should engage the interest of readers.
Monetizing You
Presents the introductory editorial for this issue of the publication.
In This Issue
Presents a summary of articles included in this issue of the publication.
A Taxonomy for Distributed Ledger Analytics
Over the past decade, blockchains and distributed ledger technologies have rapidly evolved. With increasing transaction volumes and the proliferation of decentralized applications based on smart contracts, a need for a deeper understanding arises. We ...
A Novel Reputation System for Mobile App Stores Using Blockchain
With thousands of mobile applications submitted to online application stores, the mobile application market has experienced significant growth. This growth is accompanied by an increase in malware presence. A possible solution would be to leverage those ...
A Secure and Flexible FPGA-Based Blockchain System for the IIoT
Blockchain is a promising solution for Industry 4.0; however, it does not guarantee input data integrity. We propose a field-programmable gate array (FPGA)-based private blockchain system for the industrial Internet of Things, where the transaction ...
There Is Still No Silver Bullet
Throughout its existence, Computer has been at the center of discussion over how software should be engineered and how it should be developed. No article has been so central to the discussion as “No Silver Bullet” by Frederick P. Brooks. Yet, almost 35 ...
Tomorrow's Call Center Will Be Neither: Not Call Focused, Nor Centralized
Unprecedented concurrent events, including a global pandemic, lockdowns, hypermobility, and economic uncertainty, are triggering industry-wide disruptions for call centers. Yet the call centers that evolve and leverage today’s emerging technologies will ...
Do Data Almost Always Eventually Leak?
Shannon’s information theory states that there is a maximum rate for transmitting data reliably, implying that data almost always inevitably leak. Although there has been advancement in data protection technologies, a lack of understanding about data ...
A Brief History of Free, Open Source Software and Its Communities
Free, open source software (FOSS) has a long history, beginning with the origins of software itself, when the terms free software and open source software were not yet defined. Learning about the milestones of this history may help to understand FOSS ...
To Improve Cyber Resilience, Measure It
Measuring cyber resilience is vital to our security. In this article, we examine the importance of measuring cyber resilience and potential approaches to improve its effectiveness.
Rearchitecting the Malls: The Shifting U.S. Retail Landscape
Retail shopping is being revolutionized by the Internet and e-commerce. Big data analytics, artificial intelligence, and Internet of Things devices have further fueled the transformation.