default search action
IEEE Computer, Volume 52
Volume 52, Number 1, January 2019
- Cecilia Metra:
The 2019 IEEE Computer Society: Targeting Member Satisfaction and Technical Excellence. 4-6 - Lori Cameron:
Computer Highlights Society Magazines. 7-9 - Erich J. Neuhold:
50 & 25 Years Ago. 10-12 - David Alan Grier:
A revolutionary outlook [EIC's Message]. 13-14 - Elisa Bertino, Shawn Merrill, Alina Nesen, Christine Utz:
Redefining Data Transparency: A Multidimensional Approach. 16-26 - Ben Shneiderman, Catherine Plaisant:
Interactive Visual Event Analytics: Opportunities and Challenges. 27-35 - Dong Wang, Boleslaw K. Szymanski, Tarek F. Abdelzaher, Heng Ji, Lance M. Kaplan:
The Age of Social Sensing. 36-45 - Jiangtao Wang, Yasha Wang, Qin Lv:
Crowd-Assisted Machine Learning: Current Issues and Future Directions. 46-53 - Marilyn Wolf:
Computer Security as Civil Defense. 54-57 - Nir Kshetri, Jeffrey M. Voas:
Online Advertising Fraud. 58-61 - Lu Dai, Stan Krolikoski:
A unique collaboration: revitalizing existing standards while preparing for the future. 62-65 - Hal Berghel:
Vehicle Telematics: The Good, Bad and Ugly. 66-70 - Hironori Kasahara:
Collaboration for the Future. 72-76
Volume 52, Number 2, February 2019
- Björn W. Schuller:
Microexpressions: A Chance for Computers to Beat Humans at Detecting Hidden Emotions? 4-5 - Lori Cameron:
Computer Highlights Society Magazines. 6-8 - Erich J. Neuhold:
50 & 25 Years Ago. 9-11 - David Alan Grier:
Holding Us Together. 12-13 - Vard Antinyan, Anna Börjesson Sandberg, Miroslaw Staron:
A Pragmatic View on Code Complexity Management. 14-22 - Kjell Jørgen Hole, Christian Otterstad:
Software Systems With Antifragility to Downtime. 23-31 - Philip C. Treleaven, Jeremy Barnett, Adriano S. Koshiyama:
Algorithms: Law and Regulation. 32-40 - Kamran Siddique, Zahid Akhtar, Farrukh Aslam Khan, Yangwoo Kim:
KDD Cup 99 Data Sets: A Perspective on the Role of Data Sets in Network Intrusion Detection Research. 41-51 - Kirk M. Bresniker, Paolo Faraboschi, Avi Mendelson, Dejan S. Milojicic, Timothy Roscoe, Robert N. M. Watson:
Rack-Scale Capabilities: Fine-Grained Protection for Large-Scale Memories. 52-62 - Amitangshu Pal, Krishna Kant:
NFMI: Connectivity for Short-Range IoT Applications. 63-67 - Rick Kuhn, Dylan Yaga, Jeffrey M. Voas:
Rethinking Distributed Ledger Technology. 68-72
Volume 52, Number 3, March 2019
- Albert Y. Zomaya:
A Novel Hierarchical Two-Tier Node-Deployment Strategy for Sustainable Wireless Sensor Networks. 4-5 - Erich J. Neuhold:
50 & 25 Years Ago. 9-11 - David Alan Grier:
Learning to Live in an Insecure World. 12-13 - Ann E. Kelley Sobel, Allen Parrish, Rajendra K. Raj:
Curricular Foundations for Cybersecurity. 14-17 - Matthew Hudnall:
Educational and Workforce Cybersecurity Frameworks: Comparing, Contrasting, and Mapping. 18-28 - Diana L. Burley, Alfred H. Lewis Jr.:
Cybersecurity Curricula 2017 and Boeing: Linking Curricular Guidance to Professional Practice. 29-37 - David S. Gibson, Vijay Anand, Josh Dehlinger, Charles Dierbach, Tracy Emmersen, Andrew Phillips:
Accredited Undergraduate Cybersecurity Degrees: Four Approaches. 38-47 - Tracy Emmersen, Joseph M. Hatfield, Jeff Kosseff, Steven R. Orr IV:
The USNA's Interdisciplinary Approach to Cybersecurity Education. 48-57 - Jean R. S. Blair, Andrew O. Hall, Edward Sobiesk:
Educating Future Multidisciplinary Cybersecurity Teams. 58-66 - Jessica Ivy, Sarah B. Lee, Dana Franz, Joseph Crumpton:
Seeding Cybersecurity Workforce Pathways With Secondary Education. 67-75 - Hal Berghel:
Codes of Ethics in a Post-Truth World. 76-80 - Robert N. Charette:
Evolving From Know-How to Know-What. 81-86 - Nir Kshetri, Jeffrey M. Voas:
Trusting Pirated Software. 87-90
Volume 52, Number 4, April 2019
- Erich J. Neuhold:
50 & 25 Years Ago. 7-9 - David Alan Grier:
The Path Across the Great Deep. 10-11 - Nitish Nag, Ramesh C. Jain:
A Navigational Approach to Health: Actionable Guidance for Improved Quality of Life. 12-20 - Jose M. Such, Pierre Ciholas, Awais Rashid, John Vidler, Timothy Seabrook:
Basic Cyber Hygiene: Does It Work? 21-31 - Giuseppe Pino De Francesco:
The General Data Protection Regulation's Practical Impact on Software Architecture. 32-39 - Kassem Fawaz, Kang G. Shin:
Security and Privacy in the Internet of Things. 40-49 - Fariborz Farahmand, Firoozeh Farahmand:
Privacy Decision Making: The Brain Approach. 50-58 - Dirk Riehle:
The Innovations of Open Source. 59-63 - Nir Kshetri, Jeffrey M. Voas:
Thoughts on Cyberbullying. 64-68 - John C. Havens, Ali Hessami:
From Principles and Standards to Certification. 69-72
Volume 52, Number 5, May 2019
- Erich J. Neuhold:
50 & 25 Years Ago. 7-10 - David Alan Grier:
A Familiar Vision. 11-12 - Venkat N. Gudivada, Sharath Pankanti, Guna Seetharaman, Yu Zhang:
Cognitive Computing Systems: Their Potential and the Future. 13-18 - Michael V. DeBole, Brian Taba, Arnon Amir, Filipp Akopyan, Alexander Andreopoulos, William P. Risk, Jeff Kusnitz, Carlos Ortega Otero, Tapan K. Nayak, Rathinakumar Appuswamy, Peter J. Carlson, Andrew S. Cassidy, Pallab Datta, Steven K. Esser, Guillaume Garreau, Kevin L. Holland, Scott Lekuch, Michael Mastro, Jeffrey L. McKinstry, Carmelo di Nolfo, Brent Paulovicks, Jun Sawada, Kai Schleupen, Benjamin G. Shaw, Jennifer L. Klamo, Myron D. Flickner, John V. Arthur, Dharmendra S. Modha:
TrueNorth: Accelerating From Zero to 64 Million Neurons in 10 Years. 20-29 - Steven D. Pyle, Justin D. Sapp, Ronald F. DeMara:
Leveraging Stochasticity for In Situ Learning in Binarized Deep Neural Networks. 30-39 - Nikhil Rasiwasia:
Perspectives on Becoming an Applied Machine Learning Scientist. 40-47 - Zheng Ma, Jiaxin Wu, Sheng-hua Zhong, Jianmin Jiang, Stephen J. Heinen:
Human Eye Movements Reveal Video Frame Importance. 48-57 - Seong Oun Hwang, Asif Mehmood:
Blockchain-Based Resource Syndicate. 58-66 - Bernhard Rinner:
Can We Trust Smart Cameras? 67-70 - Louise M. Morman:
How Do We Prepare the Next Generation for a Career in Our Digital Era? 72-74
Volume 52, Number 6, June 2019
- Jaideep Vaidya:
Advances in Hardware Trojan Detection. 4-5 - Erich J. Neuhold:
50 & 25 Years Ago. 9-11 - David Alan Grier:
Exploring the Current State of Quantum Computing. 12 - Travis S. Humble, Erik P. DeBenedictis:
Quantum Realism. 13-17 - Ruslan Shaydulin, Hayato Ushijima-Mwesigwa, Christian F. A. Negre, Ilya Safro, Susan M. Mniszewski, Yuri Alexeev:
A Hybrid Approach for Solving Optimization Problems on Small Quantum Computers. 18-26 - Alexandru Paler, Daniel Herr, Simon J. Devitt:
Really Small Shoe Boxes: On Realistic Quantum Resource Estimation. 27-37 - Catherine C. McGeoch, Richard Harris, Steven P. Reinhardt, Paul I. Bunyk:
Practical Annealing-Based Quantum Computing. 38-46 - Shaohan Hu, Peng Liu, Chun-Fu (Richard) Chen, Marco Pistoia, Jay M. Gambetta:
Reduction-Based Problem Mapping for Quantum Computing. 47-57 - Peng Liu, Shaohan Hu, Marco Pistoia, Chun-Fu (Richard) Chen, Jay M. Gambetta:
Stochastic Optimization of Quantum Programs. 58-67 - George F. Hurlburt:
The Tyranny of Urgency. 68-72 - Phillip A. Laplante, Sohpia Applebaum:
NIST's 18 Internet of Things Trust Concerns. 73-76 - Dimitrios Serpanos:
There Is No Safety Without Security and Dependability. 78-81 - Miriam Ballhausen:
Free and Open Source Software Licenses Explained. 82-86 - Don Wright:
Meeting Industry's Standardization Needs. 88-92
Volume 52, Number 7, July 2019
- Erich J. Neuhold:
50 & 25 Years Ago. 7-9 - David Alan Grier:
Transforming the Field. 10-11 - Moustafa Youssef, Fahim Kawsar:
Transformative Computing and Communication. 12-14 - Mohammed Alloulah, Howard Huang:
Future Millimeter-Wave Indoor Systems: A Blueprint for Joint Communication and Sensing. 16-24 - Stefano Savazzi, Stephan Sigg, Federico Vicentini, Sanaz Kianoush, Rainhard D. Findling:
On the Use of Stray Wireless Signals for Sensing: A Look Beyond 5G for the Next Generation of Industry. 25-36 - Mahadev Satyanarayanan, Nigel Davies:
Augmenting Cognition Through Edge Computing. 37-46 - Nan Gao, Wei Shao, Flora D. Salim:
Predicting Personality Traits From Physical Activity Intensity. 47-56 - Lourdes Moreno, Paloma Martínez:
The Harmonization of Accessibility Standards for Public Policies. 57-66 - Geoffrey C. Bowker:
The Computerization Time Crunch. 67-71 - Muhammad Taimoor Khan, Howard E. Shrobe:
Security of Cyberphysical Systems: Chaining Induction and Deduction. 72-75 - John D. Roth, Corey E. Lutton, James Bret Michael:
Security Through Simplicity: A Case Study in Logical Segmentation Inference. 76-79
Volume 52, Number 8, August 2019
- Klaus Mueller:
Advances in Visualization Recommender Systems. 4-5 - Erich J. Neuhold:
50 & 25 Years Ago. 9-11 - Ergun Akleman:
Computing Through Time. 10 - David Alan Grier:
Go/No Go. 12-13 - Massimo Villari, Maria Fazio, Schahram Dustdar, Omer F. Rana, Devki Nandan Jha, Rajiv Ranjan:
Osmosis: The Osmotic Computing Platform for Microelements in the Cloud, Edge, and Internet of Things. 14-26 - Hudson Silva Borges, Marco Túlio Valente:
How Do Developers Promote Open Source Projects? 27-33 - Alejandro Figueroa, John Atkinson:
Dual-View Learning for Detecting Web Query Intents. 34-42 - Hokeun Kim, Edward A. Lee, Schahram Dustdar:
Creating a Resilient IoT With Edge Computing. 43-53 - Gary McGraw, Richie Bonett, Harold Figueroa, Victor Shepardson:
Security Engineering for Machine Learning. 54-57 - Hassan Habibi Gharakheili, Arunan Sivanathan, Ayyoob Hamza, Vijay Sivaraman:
Network-Level Security for the Internet of Things: Opportunities and Challenges. 58-62 - Hendrik Schöttle:
Open Source License Compliance-Why and How? 63-67 - Robby Simpson:
The IEEE Standards Association Corporate Program: Engaging Industry in Standards Development. 68-71 - Kjell Jørgen Hole, Subutai Ahmad:
Biologically Driven Artificial Intelligence. 72-75
Volume 52, Number 9, September 2019
- Quintin Fettes, Mark Clark, Razvan C. Bunescu, Avinash Karanth, Ahmed Louri:
Dynamic Voltage and Frequency Scaling in NoCs With Supervised and Reinforcement Learning Techniques. 4-5 - Erich J. Neuhold:
50 & 25 Years Ago. 9-11 - David Alan Grier:
Translational Computing: What Needs the Translation? 12-14 - David Abramson, Manish Parashar:
Translational Research in Computer Science. 16-23 - Rick Kuhn, Jeffrey M. Voas, Phillip A. Laplante:
Taking Score on the Success of Blockchain, So Far. 24-34 - Anna Zamansky, Dirk van der Linden, Irit Hadar, Stephane Bleuer-Elsner:
Log My Dog: Perceived Impact of Dog Activity Tracking. 35-43 - Mark Salisbury:
When Computers Advise Us: How to Represent the Types of Knowledge Users Seek for Expert Advice. 44-51 - Philipp Hukal, Nicholas Berente, Matt Germonprez, Aaron Schecter:
Bots Coordinating Work in Open Source Software Projects. 52-60 - Cheng-Kui Huang, Tawei Wang, Chia-Yu Lin:
Early Results on the Business Value of Internet of Things Initiatives. 61-67 - Blesson Varghese, Philipp Leitner, Suprio Ray, Kyle Chard, Adam Barker, Yehia Elkhatib, Herry Herry, Cheol-Ho Hong, Jeremy Singer, Fung Po Tso, Eiko Yoneki, Mohamed Faten Zhani:
Cloud Futurology. 68-77 - Apostolos P. Fournaris, Aris S. Lalos, Dimitrios Serpanos:
Generative Adversarial Networks in AI-Enabled Safety-Critical Systems: Friend or Foe? 78-81 - Robin Bloomfield, Heidy Khlaaf, Philippa Ryan Conmy, Gareth Fletcher:
Disruptive Innovations and Disruptive Assurance: Assuring Machine Learning and Autonomy. 82-89
Volume 52, Number 10, October 2019
- Paolo Montuschi:
New and Emerging Topics in Computing. 7-8 - Ergun Akleman:
Computing Through Time. 11 - David Alan Grier:
A Good Party. 12-13 - Stephen D. Crocker:
The Arpanet and Its Impact on the State of Networking. 14-23 - Paul Stimers:
The U.S. National Quantum Initiative. 24-29 - Yung-Hsiang Lu, George K. Thiruvathukal, Ahmed S. Kaseb, Kent Gauen, Damini Rijhwani, Ryan Dailey, Deeptanshu Malik, Yutong Huang, Sarah Aghajanzadeh, Minghao Guo:
See the World Through Network Cameras. 30-40 - Admela Jukan, Francisco Carpio, Xavi Masip, Ana Juan Ferrer, Nicole Kemper, Birgit U. Stetina:
Fog-to-Cloud Computing for Farming: Low-Cost Technologies, Data Exchange, and Animal Welfare. 41-51 - Flavio Bertini, Stefano Giovanni Rizzo, Danilo Montesi:
Can Information Hiding in Social Media Posts Represent a Threat? 52-60 - Xingya Wang, Weisong Sun, Linghuan Hu, Yuan Zhao, W. Eric Wong, Zhenyu Chen:
Software-Testing Contests: Observations and Lessons Learned. 61-69 - Tae Wan Kim, Santiago Mejia:
From Artificial Intelligence to Artificial Wisdom: What Socrates Teaches Us. 70-74 - Apostol Vassilev:
Can Deep Learning Save Us and Itself From the Avalanche of Threats in Cyberspace? 76-82 - Pei Zhang, Shijia Pan, Mostafa Mirshekari, Jonathon Fagert, Hae Young Noh:
Structures as Sensors: Indirect Sensing for Inferring Users and Environments. 84-88 - Mark Campbell:
Synthetic Data: How AI Is Transitioning From Data Consumer to Data Producer... and Why That's Important. 89-91 - Jeff McAffer:
Getting Started With Open Source Governance. 92-96 - Ann E. K. Sobel:
A New (?) Educational View of Computing. 97-98