


default search action
IEEE Transactions on Emerging Topics in Computing, Volume 8
Volume 8, Number 1, January - March 2020
- Paolo Montuschi

:
Thank-you State of the Journal Editorial by the 2019 Outgoing (Acting) Editor-in-Chief. 3 - Mianxiong Dong

, Nirwan Ansari
:
Guest Editorial: Special Section on Cyber-Physical Social Systems - Integrating Human into Computing. 4-5 - Ognjen Scekic

, Tommaso Schiavinotto, Svetoslav Videnov, Michael Rovatsos, Hong Linh Truong, Daniele Miorandi
, Schahram Dustdar
:
A Programming Model for Hybrid Collaborative Adaptive Systems. 6-19 - Gai-Ge Wang

, Xingjuan Cai, Zhihua Cui, Geyong Min
, Jinjun Chen
:
High Performance Computing for Cyber Physical Social Systems by Using Evolutionary Multi-Objective Optimization Algorithm. 20-30 - Tanveer Ahmed

, Abhishek Srivastava:
A Prototype Model to Predict Human Interest: Data Based Design to Combine Humans and Machines. 31-44 - Baris Aksanli

, Tajana Simunic Rosing:
Human Behavior Aware Energy Management in Residential Cyber-Physical Systems. 45-57 - Chun-Cheng Lin

, Der-Jiunn Deng
, Shun-Yu Jhong:
A Triangular NodeTrix Visualization Interface for Overlapping Social Community Structures of Cyber-Physical-Social Systems in Smart Factories. 58-68 - Yaliang Zhao

, Laurence T. Yang
, Ronghao Zhang:
Tensor-Based Multiple Clustering Approaches for Cyber-Physical-Social Applications. 69-81 - Shangguang Wang

, Ao Zhou, Mingzhe Yang, Lei Sun, Ching-Hsien Hsu
, Fangchun Yang:
Service Composition in Cyber-Physical-Social Systems. 82-91 - Zhou Su

, Qifan Qi, Qichao Xu
, Song Guo, Xiaowei Wang
:
Incentive Scheme for Cyber Physical Social Systems Based on User Behaviors. 92-103 - Nei Kato, Song Guo:

Guest Editor's Introduction: Special Section on Emerging Technologies for Disaster Management. 104-105 - Amjad Mehmood

, Zhihan Lv
, Jaime Lloret
, Muhammad Muneer Umar
:
ELDC: An Artificial Neural Network Based Energy-Efficient and Robust Routing Scheme for Pollution Monitoring in WSNs. 106-114 - Guangjie Han

, Xuan Yang, Li Liu
, Wenbo Zhang
, Mohsen Guizani
:
A Disaster Management-Oriented Path Planning for Mobile Anchor Node-Based Localization in Wireless Sensor Networks. 115-125 - Jiaxing Ye

, Takumi Kobayashi, Xiaoyan Wang, Hiroshi Tsuda, Masahiro Murakawa:
Audio Data Mining for Anthropogenic Disaster Identification: An Automatic Taxonomy Approach. 126-136 - Lei Shu, Yuanfang Chen

, Zhihong Sun, Fei Tong
, Mithun Mukherjee
:
Detecting the Dangerous Area of Toxic Gases with Wireless Sensor Networks. 137-147 - Qianlong Wang

, Yifan Guo
, Lixing Yu
, Pan Li
:
Earthquake Prediction Based on Spatio-Temporal Data Mining: An LSTM Network Approach. 148-158 - Shigenori Tani

, Katsuyuki Motoyoshi, Hiroyasu Sano, Atsushi Okamura, Hiroki Nishiyama
, Nei Kato
:
Flexibility-Enhanced HTS System for Disaster Management: Responding to Communication Demand Explosion in a Disaster. 159-167 - Kazuya Ogasawara, Tomo Miyazaki

, Yoshihiro Sugaya
, Shinichiro Omachi
:
Object-Based Video Coding by Visual Saliency and Temporal Correlation. 168-178 - Fabrizio Lamberti

, Gwo-Jen Hwang, Baltasar Fernández-Manjón, Wenping Wang:
Guest Editorial: Joint Special Issue on "Innovation in Technologies for Educational Computing". 179-181 - Austin Cory Bart

, Javier Tibau
, Dennis G. Kafura, Clifford A. Shaffer
, Eli Tilevich
:
Design and Evaluation of a Block-based Environment with a Data Science Context. 182-192 - Jesús Moreno-León

, Gregorio Robles
, Marcos Román-González
:
Towards Data-Driven Learning Paths to Develop Computational Thinking with Scratch. 193-205 - I-Han Hsiao

, Po-Kai Huang, Hannah E. Murphy:
Integrating Programming Learning Analytics Across Physical and Digital Space. 206-217 - Robert Shewaga, Alvaro Uribe-Quevedo, Bill Kapralos

, Fahad Alam:
A Comparison of Seated and Room-Scale Virtual Reality in a Serious Game for Epidural Preparation. 218-232 - Maria Roussou

, Mel Slater:
Comparison of the Effect of Interactive versus Passive Virtual Reality Learning Activities in Evoking and Sustaining Conceptual Change. 233-244 - Laila Shoukry

, Stefan Göbel:
Reasons and Responses: A Multimodal Serious Games Evaluation Framework. 245-255 - Andoni Eguíluz

, Mariluz Guenaga
, Pablo Garaizar
, Cristian Olivares-Rodríguez
:
Exploring the Progression of Early Programmers in a Set of Computational Thinking Challenges via Clickstream Analysis. 256-261
Volume 8, Number 2, April - June 2020
- Zhe Liu

, Kim-Kwang Raymond Choo
, Weiqiang Liu
, Muhammad Khurram Khan
:
Guest Editorial: Introduction to the Special Section on Cyber Security Threats and Defense Advance. 264-266 - Fu Xiao

, Letian Sha, Zai-Ping Yuan, Ruchuan Wang:
VulHunter: A Discovery for Unknown Bugs Based on Analysis for Known Patches in Industry Internet of Things. 267-279 - Jian Shen

, Dengzhi Liu, Md. Zakirul Alam Bhuiyan
, Jun Shen, Xingming Sun, Aniello Castiglione
:
Secure Verifiable Database Supporting Efficient Dynamic Operations in Cloud Computing. 280-290 - Jinhua Ma

, Jianghua Liu
, Xinyi Huang
, Yang Xiang
, Wei Wu
:
Authenticated Data Redaction with Fine-Grained Control. 291-302 - Lu Zhou, Chunhua Su

, Wayne Chiu
, Kuo-Hui Yeh
:
You Think, Therefore You Are: Transparent Authentication System with Brainwave-Oriented Bio-Features for IoT Networks. 303-312 - Muhammad Ajmal Azad

, Samiran Bag
, Shazia Tabassum
, Feng Hao
:
privy: Privacy Preserving Collaboration Across Multiple Service Providers to Combat Telecom Spams. 313-327 - Mauro Conti

, Fabio De Gaspari
, Luigi V. Mancini
:
A Novel Stealthy Attack to Gather SDN Configuration-Information. 328-340 - Sajad Homayoun

, Ali Dehghantanha
, Marzieh Ahmadzadeh, Sattar Hashemi
, Raouf Khayami
:
Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence. 341-351 - Xiaoqiang Sun, Peng Zhang, Joseph K. Liu, Jianping Yu, Weixin Xie:

Private Machine Learning Classification Based on Fully Homomorphic Encryption. 352-364 - Yunhui Zhuang, Anjia Yang

, Gerhard P. Hancke
, Duncan S. Wong, Guomin Yang
:
Energy-Efficient Distance-Bounding with Residual Charge Computation. 365-376 - Yong Yu

, Yannan Li
, Bo Yang, Willy Susilo
, Guomin Yang
, Jian Bai
:
Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage. 377-390 - Thomas Dullien

:
Weird Machines, Exploitability, and Provable Unexploitability. 391-403 - Giovanni Apruzzese

, Fabio Pierazzi
, Michele Colajanni
, Mirco Marchetti
:
Detection and Threat Prioritization of Pivoting Attacks in Large Networks. 404-415 - Cecilia Metra, Matteo Sonza Reorda

:
Guest Editor's Introduction: Special Section on High Dependability Systems. 416-417 - Eberle A. Rambo

, Christoph Seitz, Selma Saidi, Rolf Ernst
:
Bridging the Gap between Resilient Networks-on-Chip and Real-Time Systems. 418-430 - Farshad Baharvand

, Seyed Ghassem Miremadi
:
LEXACT: Low Energy N-Modular Redundancy Using Approximate Computing for Real-Time Multicore Processors. 431-441 - Doohwang Chang

, Jennifer N. Kitchen
, Sayfe Kiaei, Sule Ozev
:
In-Field Recovery of RF Circuits from Wearout Based Performance Degradation. 442-452 - Francisco E. Rangel-Patino

, Andres Viveros-Wacher
, José Ernesto Rayas-Sánchez
, Ismael Duron-Rosales, Edgar-Andrei Vega-Ochoa, Nagib Hakim, Enrique Lopez-Miralrio
:
A Holistic Formulation for System Margining and Jitter Tolerance Optimization in Industrial Post-Silicon Validation. 453-463 - Paolo Bernardi

, Riccardo Cantoro
, Sergio de Luca, Ernesto Sánchez
, Alessandro Sansonetti, Giovanni Squillero
:
Software-Based Self-Test Techniques for Dual-Issue Embedded Processors. 464-477 - Wenjian Luo

, Zhenglong Yan, Chenyang Bu
, Daofu Zhang:
Community Detection by Fuzzy Relations. 478-492 - Seiji Kasuya

, Xiaokang Zhou
, Kiichi Tago
, Shoji Nishimura
, Qun Jin
:
Cyber-Enabled Well-Being Oriented Daily Living Support Based on Personal Data Analysis. 493-502 - Yong Chen

, Emil Matús, Sadia Moriam, Gerhard P. Fettweis
:
High Performance Dynamic Resource Allocation for Guaranteed Service in Network-on-Chips. 503-516 - Muhammad Yasin

, Bodhisatwa Mazumdar
, Ozgur Sinanoglu
, Jeyavijayan Rajendran:
Removal Attacks on Logic Locking and Camouflaging Techniques. 517-532 - Achraf Ben Ahmed

, Tsutomu Yoshinaga
, Abderazek Ben Abdallah
:
Scalable Photonic Networks-on-Chip Architecture Based on a Novel Wavelength-Shifting Mechanism. 533-544 - Jintao Yu

, Razvan Nane
, Imran Ashraf
, Mottaqiallah Taouil
, Said Hamdioui
, Henk Corporaal
, Koen Bertels
:
Skeleton-Based Synthesis Flow for Computation-in-Memory Architectures. 545-558
Volume 8, Number 3, July - September 2020
- Antonio Miele

, Qiaoyan Yu
, Maria K. Michael
:
Guest Editor's Introduction: Special Section on Reliability-Aware Design and Analysis Methods for Digital Systems: From Gate to System Level. 561-563 - Aitzan Sari, Mihalis Psarakis

:
Scrubbing-Aware Placement for Reliable FPGA Systems. 564-576 - Khanh N. Dang

, Akram Ben Ahmed
, Yuichi Okuyama
, Abderazek Ben Abdallah
:
Scalable Design Methodology and Online Algorithm for TSV-Cluster Defects Recovery in Highly Reliable 3D-NoC Systems. 577-590 - Takaaki Kato

, Senling Wang, Yasuo Sato, Seiji Kajihara, Xiaoqing Wen:
A Flexible Scan-in Power Control Method in Logic BIST and Its Evaluation with TEG Chips. 591-601 - Nicoleta Cucu Laurenciu

, Sorin Dan Cotofana
:
Reliability Aware Design and Lifetime Management of Computing Platforms. 602-615 - Adam Watkins

, Spyros Tragoudas:
Radiation Hardened Latch Designs for Double and Triple Node Upsets. 616-626 - Somayeh Sadeghi Kohan

, Mehdi Kamal
, Zainalabedin Navabi:
Self-Adjusting Monitor for Measuring Aging Rate and Advancement. 627-641 - Amir Charif

, Alexandre Coelho
, Nacer-Eddine Zergainoh, Michael Nicolaidis
:
A Dynamic Sufficient Condition of Deadlock-Freedom for High-Performance Fault-Tolerant Routing in Networks-on-Chips. 642-654 - Chen Liu

, Patrick Cronin
, Chengmo Yang:
Securing Cyber-Physical Systems from Hardware Trojan Collusion. 655-667 - Vadim Geurkov

:
On the Theory and Design of Polynomial Division Circuits. 668-687 - Vijaypal Singh Rathor

, Bharat Garg, G. K. Sharma:
A Novel Low Complexity Logic Encryption Technique for Design-for-Trust. 688-699 - Gurgen Harutyunyan

, Suren Martirosyan
, Samvel K. Shoukourian, Yervant Zorian:
Memory Physical Aware Multi-Level Fault Diagnosis Flow. 700-711 - Hamzeh Ahangari

, Funda Atik
, Yusuf Ibrahim Ozkok, Asil Yildirim, Serdar Oguz Ata, Özcan Özturk
:
Analysis of Design Parameters in Safety-Critical Computers. 712-723 - Soheil Salehi

, Navid Khoshavi
, Ronald F. DeMara
:
Mitigating Process Variability for Non-Volatile Cache Resilience and Yield. 724-737 - Shilpa Pendyala

, Sheikh Ariful Islam
, Srinivas Katkoori
:
Gate Level NBTI and Leakage Co-Optimization in Combinational Circuits with Input Vector Cycling. 738-749 - Haijun Zhang, Didier El Baz

, Victor C. M. Leung
:
Guest Editor's Introduction: Special Section on Green Computing in Internet of Things. 750-751 - Fu Xiao

, Jing Chen, Xiaohui Xie, Linqing Gui
, Lijuan Sun, Ruchuan Wang:
SEARE: A System for Exercise Activity Recognition and Quality Evaluation Based on Green Sensing. 752-761 - John Panneerselvam

, Lu Liu
, Nick Antonopoulos:
An Approach to Optimise Resource Provision with Energy-Awareness in Datacentres by Combating Task Heterogeneity. 762-780 - Xiaoming He, Kun Wang

, Huawei Huang
, Toshiaki Miyazaki
, Yixuan Wang, Song Guo
:
Green Resource Allocation Based on Deep Reinforcement Learning in Content-Centric IoT. 781-796 - Zhetao Li

, Yuxin Liu
, Anfeng Liu
, Shiguo Wang
, Haolin Liu:
Minimizing Convergecast Time and Energy Consumption in Green Internet of Things. 797-813 - Maryam Sajjad, Aakash Ahmad

, Asad Waqar Malik
, Ahmed B. Altamimi
, Ibrahim Alseadoon:
Classification and Mapping of Adaptive Security for Mobile Computing. 814-832 - Jian Shen

, Anxi Wang
, Chen Wang
, Jiguo Li
, Yan Zhang
:
Content-Centric Group User Authentication for Secure Social Networks. 833-844 - Jianwen Xu

, Kaoru Ota
, Mianxiong Dong
:
Fast Networking for Disaster Recovery. 845-854 - Xiang Li

, J. David Smith, Tianyi Pan
, Thang N. Dinh
, My T. Thai
:
Quantifying Privacy Vulnerability to Socialbot Attacks: An Adaptive Non-Submodular Model. 855-868 - Giovanni Piumatti, Fabrizio Lamberti

, Andrea Sanna
, Paolo Montuschi
:
Robust Robot Tracking for Next-Generation Collaborative Robotics-Based Gaming Environments. 869-882
Volume 8, Number 4, October - December 2020
- Cecilia Metra

:
Message from the Editor-in-Chief. 885-886 - Ozgur Sinanoglu, Ümit Y. Ogras

:
Guest Editors' Introduction: Special Issue on Emerging Technologies in Computer Design. 887-888 - Madiha Gul, Mohamed F. Chouikha, Mamadou I. Wade:

Joint Crosstalk Aware Burst Error Fault Tolerance Mechanism for Reliable on-Chip Communication. 889-896 - Mohammad Khavari Tavana, Yunsi Fei

, David R. Kaeli:
Nacre**Nacre, or mother-of-pearl, is one of nature's remarkable examples of a durable and break-resistant structure.: Durable, Secure and Energy-Efficient Non-Volatile Memory Utilizing Data Versioning. 897-906 - Kamran Rahmani, Prabhat Mishra

:
Feature-Based Signal Selection for Post-Silicon Debug Using Machine Learning. 907-915 - Hao Liu, Linpeng Huang, Yanmin Zhu, Yanyan Shen:

LibreKV: A Persistent in-Memory Key-Value Store. 916-927 - Thomas Fehmel, Dominik Stoffel, Wolfgang Kunz:

Generation of Abstract Driver Models for IP Integration Verification. 938-947 - Pranesh Das

, Dushmanta Kumar Das
, Shouvik Dey:
A New Class Topper Optimization Algorithm with an Application to Data Clustering. 948-959 - Xiaotong Cui

, Samah Mohamed Saeed, Alwin Zulehner, Robert Wille, Kaijie Wu
, Rolf Drechsler
, Ramesh Karri
:
On the Difficulty of Inserting Trojans in Reversible Computing Architectures. 960-972 - Prasanna Kansakar

, Arslan Munir
:
Selecting Microarchitecture Configuration of Processors for Internet of Things. 973-985 - Prabal Basu, Pramesh Pandey, Aatreyi Bal, Chidhambaranathan Rajamanikkam, Koushik Chakraborty

, Sanghamitra Roy
:
TITAN: Uncovering the Paradigm Shift in Security Vulnerability at Near-Threshold Computing. 986-997

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














