Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 57, Issue 1Jan. 2024
Publisher:
  • IEEE Computer Society Press
  • Washington
  • DC
  • United States
ISSN:0018-9162
Reflects downloads up to 21 Sep 2024Bibliometrics
Skip Table Of Content Section
discussion
Make Your Mark

IEEE Computer Society President, Jyotika Athavale, kicks off the New Year with an overview of the Society’s priorities, and encourages members to make connections by engaging with the Society’s many activities and offerings.

abstract
<italic>Computer</italic> Highlights Society Magazines

Summary form only: Summaries of articles presented in this issue of the publication.

abstract
50 &amp; 25 Years Ago

Summary form only: Summaries of articles presented in this issue of the publication.

discussion
Niceties, Necessities, Antiquities, and Ubiquities

Every technology can be classified as a nicety, necessity, antiquity, or ubiquity, or in some combination. This short message defines the interplay between these four terms.

discussion
Outlook 2024

In this Outlook issue, we look at emerging trends and technologies that promise to have major impacts on computing in the future. Topics covered include generative artificial intelligence, threatcasting, biometrics, semiconductor manufacturing, and ...

discussion
Experts Speak Out About Artificial Intelligence in Education: First of Two Roundtables

Interactive artificial intelligence empowering education requires that teachers and their students alike be prepared for unpredicted levels of critical and mathematical thinking.

discussion
Generative Artificial Intelligence and the Future of Software Testing

This virtual roundtable focuses on applications of generative artificial intelligence (GenAI) to software testing with four leading experts from the field. Our experts reflect on transforming the work of software testing with GenAI, its impact on quality ...

research-article
The Future of Threatcasting

The year 2024 is the 10-year anniversary of the first article about threatcasting. But what is the future of threatcasting? We explore both the history and the future of the method by reviewing how people across industries and domains are adopting and ...

research-article
Soft Biometrics for Cybersecurity: Ongoing Revolution for Industry 4.0

The industrial sector faces significant cyberthreats due to the vast data exchange in Industry 4.0. Soft biometrics offer a suitable tradeoff by enhancing security through additional layers of recognition, mitigating privacy concerns through the ...

research-article
How Lithography and Metrology Are Enabling Yield in the Next Generation of Semiconductor Patterning

This article highlights the state of the art and critical challenges with lithography and patterning in metrology in enabling yield in next-generation high-volume manufacturing of semiconductors. Each of these technology sectors are presented with respect ...

research-article
Open Access
Interlinked Computing in 2040: Safety, Truth, Ownership, and Accountability

Computer systems are increasingly interconnected, magnifying benefits and risks, especially with AI integration. Using a Delphi-based method, we interviewed technology futurists about potential trends towards 2040 and their societal impacts. Our findings ...

discussion
Feature Stores: A Key Enabler for Feature Reusability and Availability Across Machine Learning Pipelines

This article presents a technical analysis of the feature store (FS) from the perspective of machine learning (ML) model development and highlights its potential benefits. We propose key considerations in developing a workable and efficient FS for ML ...

discussion
Universal Chiplet Interconnect Express: An Open Industry Standard for Memory and Storage Applications

Continuing advances in computing will require chiplets connected by the Universal Chiplet Interconnect Express (UCIe) to create cost-effective high-performance customized applications and new memory hierarchies. The optical UCIe can expand this ...

discussion
Data Centers in Your Backyard?

Northern Virginia holds the distinction of being recognized as the global hub of the Internet. Although the region’s data centers have yielded significant economic advantages, skeptics have voiced sustainability issues.

research-article
Forming Adversarial Example Attacks Against Deep Neural Networks With Reinforcement Learning

We propose a novel reinforcement learning-based adversarial example attack, Adversarial Reinforcement Learning Agent, designed to learn imperceptible perturbation that causes misclassification when added to the input of a deep learning classifier.

discussion
The Case for Femwork: Feminist Design Principles in Tech and Tech-Enabled Work

We propose the notion of “Femwork.” By integrating this framework into the building of databases and digital systems, we can make inclusivity a default and not an afterthought in our mandates on the future of work.

discussion
Understanding the Impact of Artificial Intelligence in Academic Writing: Metadata to the Rescue

This column advocates for including artificial intelligence (AI)-specific metadata on those academic papers that are written with the help of AI in an attempt to analyze the use of such tools for disseminating research.

discussion
Deception and Intuition in Software Engineering

Deception poses threats but also opportunities in software engineering, and we must learn to recognize and manage these. Our intuition can save us from these threats and unlock the opportunities, but takes time and practice.

discussion
How to Create a Games Industry in Your Country

The desire for the founding of a games industry in unserved parts of the world is growing dramatically. In this article, I discuss how to create a games industry where there is none.

research-article
Resilient Without Zero Trust

Electric power grids are vulnerable to unintentional cyber incidents and cyberattacks, but their control systems make them resilient. The electric power grids can continue to function despite degradation, denial, or destruction of their OT networks.

research-article
Industrial Internet of Things: Trends and Challenges

Industry is a leading application domain for the Internet of Things. The wide availability of industrial control systems (operational technology) combined with the Internet revolutionizes infrastructures and services, especially critical ones, providing ...

opinion
Generative Artificial Intelligence, Semantic Entropy, and the Big Sort

While artificial intelligence (AI) presents several threats, the threat generative AI poses is immediate and existential.

opinion
Predicting Heterogeneity and Serverless Principles of Converged High-Performance Computing, Artificial Intelligence, and Workflows

Traditional high-performance computing and modern artificial intelligence computing are converging with workflows as a common paradigm. We predict nine principles of heterogeneity and serverless computing for this convergence, from high-level programming ...

Comments