Search dblp for Publications

export results for "toc:db/journals/computer/computer49.bht:"

 download as .bib file

@article{DBLP:journals/computer/0002GR16,
  author       = {Robert Koch and
                  Mario Golling and
                  Gabi Dreo Rodosek},
  title        = {How Anonymous Is the Tor Network? {A} Long-Term Black-Box Investigation},
  journal      = {Computer},
  volume       = {49},
  number       = {3},
  pages        = {42--49},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.73},
  doi          = {10.1109/MC.2016.73},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/0002GR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Abowd16,
  author       = {Gregory D. Abowd},
  title        = {Beyond Weiser: From Ubiquitous to Collective Computing},
  journal      = {Computer},
  volume       = {49},
  number       = {1},
  pages        = {17--23},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.22},
  doi          = {10.1109/MC.2016.22},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Abowd16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/AcunLMMSTK16,
  author       = {Bilge Acun and
                  Akhil Langer and
                  Esteban Meneses and
                  Harshitha Menon and
                  Osman Sarood and
                  Ehsan Totoni and
                  Laxmikant V. Kal{\'{e}}},
  title        = {Power, Reliability, and Performance: One System to Rule them All},
  journal      = {Computer},
  volume       = {49},
  number       = {10},
  pages        = {30--37},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.310},
  doi          = {10.1109/MC.2016.310},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/AcunLMMSTK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/AgarwalD16,
  author       = {Yuvraj Agarwal and
                  Anind K. Dey},
  title        = {Toward Building a Safe, Secure, and Easy-to-Use Internet of Things
                  Infrastructure},
  journal      = {Computer},
  volume       = {49},
  number       = {4},
  pages        = {88--91},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.111},
  doi          = {10.1109/MC.2016.111},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/AgarwalD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/AliIRSC16,
  author       = {Sk Subidh Ali and
                  Mohamed Ibrahim and
                  Jeyavijayan Rajendran and
                  Ozgur Sinanoglu and
                  Krishnendu Chakrabarty},
  title        = {Supply-Chain Security of Digital Microfluidic Biochips},
  journal      = {Computer},
  volume       = {49},
  number       = {8},
  pages        = {36--43},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.224},
  doi          = {10.1109/MC.2016.224},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/AliIRSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Atherton16,
  author       = {Evan Atherton},
  title        = {Science Fiction Prototyping at Work},
  journal      = {Computer},
  volume       = {49},
  number       = {8},
  pages        = {109--111},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.229},
  doi          = {10.1109/MC.2016.229},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Atherton16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/AtluriMLK16,
  author       = {Gowtham Atluri and
                  Angus W. MacDonald III and
                  Kelvin O. Lim and
                  Vipin Kumar},
  title        = {The Brain-Network Paradigm: Using Functional Imaging Data to Study
                  How the Brain Works},
  journal      = {Computer},
  volume       = {49},
  number       = {10},
  pages        = {65--71},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.307},
  doi          = {10.1109/MC.2016.307},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/AtluriMLK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/AvvenutiCVT16,
  author       = {Marco Avvenuti and
                  Stefano Cresci and
                  Fabio Del Vigna and
                  Maurizio Tesconi},
  title        = {Impromptu Crisis Mapping to Prioritize Emergency Response},
  journal      = {Computer},
  volume       = {49},
  number       = {5},
  pages        = {28--37},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.134},
  doi          = {10.1109/MC.2016.134},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/AvvenutiCVT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Bader16,
  author       = {David A. Bader},
  title        = {Evolving {MPI+X} Toward Exascale},
  journal      = {Computer},
  volume       = {49},
  number       = {8},
  pages        = {10},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.232},
  doi          = {10.1109/MC.2016.232},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Bader16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BajcsyVACMB16,
  author       = {Peter Bajcsy and
                  Antoine Vandecreme and
                  Julien Amelot and
                  Joe Chalfoun and
                  Michael Majurski and
                  Mary Brady},
  title        = {Enabling Stem Cell Characterization from Large Microscopy Images},
  journal      = {Computer},
  volume       = {49},
  number       = {7},
  pages        = {70--79},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.191},
  doi          = {10.1109/MC.2016.191},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/BajcsyVACMB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BalELNRSSW16,
  author       = {Henri E. Bal and
                  Dick H. J. Epema and
                  Cees de Laat and
                  Rob van Nieuwpoort and
                  John W. Romein and
                  Frank J. Seinstra and
                  Cees Snoek and
                  Harry A. G. Wijshoff},
  title        = {A Medium-Scale Distributed System for Computer Science Research: Infrastructure
                  for the Long Term},
  journal      = {Computer},
  volume       = {49},
  number       = {5},
  pages        = {54--63},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.127},
  doi          = {10.1109/MC.2016.127},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/BalELNRSSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BanifatemiG16,
  author       = {Amir Banifatemi and
                  Jean{-}Luc Gaudiot},
  title        = {Engineering the New Boundaries of {AI}},
  journal      = {Computer},
  volume       = {49},
  number       = {11},
  pages        = {77--79},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.328},
  doi          = {10.1109/MC.2016.328},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/BanifatemiG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BarhamgiBYBN16,
  author       = {Mahmoud Barhamgi and
                  Arosha K. Bandara and
                  Yijun Yu and
                  Khalid Belhajjame and
                  Bashar Nuseibeh},
  title        = {Protecting Privacy in the Cloud: Current Practices, Future Directions},
  journal      = {Computer},
  volume       = {49},
  number       = {2},
  pages        = {68--72},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.59},
  doi          = {10.1109/MC.2016.59},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/BarhamgiBYBN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Bartleson16,
  author       = {Karen Bartleson},
  title        = {Practical Insights from the Peculiar World of Standards},
  journal      = {Computer},
  volume       = {49},
  number       = {3},
  pages        = {92--96},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.66},
  doi          = {10.1109/MC.2016.66},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Bartleson16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BellovinB016,
  author       = {Steven M. Bellovin and
                  Matt Blaze and
                  Susan Landau},
  title        = {Insecure Surveillance: Technical Issues with Remote Computer Searches},
  journal      = {Computer},
  volume       = {49},
  number       = {3},
  pages        = {14--24},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.68},
  doi          = {10.1109/MC.2016.68},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/BellovinB016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Bennett16,
  author       = {Michael Bennett},
  title        = {Afrofuturism},
  journal      = {Computer},
  volume       = {49},
  number       = {4},
  pages        = {92--93},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.99},
  doi          = {10.1109/MC.2016.99},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Bennett16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel16,
  author       = {Hal Berghel},
  title        = {Digital Politics 2016},
  journal      = {Computer},
  volume       = {49},
  number       = {1},
  pages        = {75--79},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.23},
  doi          = {10.1109/MC.2016.23},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel16a,
  author       = {Hal Berghel},
  title        = {Secretocracy},
  journal      = {Computer},
  volume       = {49},
  number       = {2},
  pages        = {63--67},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.61},
  doi          = {10.1109/MC.2016.61},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel16b,
  author       = {Hal Berghel},
  title        = {Net Neutrality vs. Net Neutering},
  journal      = {Computer},
  volume       = {49},
  number       = {3},
  pages        = {73--77},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.84},
  doi          = {10.1109/MC.2016.84},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel16c,
  author       = {Hal Berghel},
  title        = {The Bogus Science Theorem (and the Junk Science Wager)},
  journal      = {Computer},
  volume       = {49},
  number       = {4},
  pages        = {74--78},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.112},
  doi          = {10.1109/MC.2016.112},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel16c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel16d,
  author       = {Hal Berghel},
  title        = {Attenuated FAQs},
  journal      = {Computer},
  volume       = {49},
  number       = {5},
  pages        = {73--77},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.132},
  doi          = {10.1109/MC.2016.132},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel16d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel16e,
  author       = {Hal Berghel},
  title        = {The Dictator's (False) Dilemma},
  journal      = {Computer},
  volume       = {49},
  number       = {7},
  pages        = {84--87},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.189},
  doi          = {10.1109/MC.2016.189},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel16e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel16f,
  author       = {Hal Berghel},
  title        = {The Pollyanna Delusion},
  journal      = {Computer},
  volume       = {49},
  number       = {8},
  pages        = {98--102},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.252},
  doi          = {10.1109/MC.2016.252},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel16f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel16g,
  author       = {Hal Berghel},
  title        = {Coda in the Key of F2654hD4},
  journal      = {Computer},
  volume       = {49},
  number       = {9},
  pages        = {104--109},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.273},
  doi          = {10.1109/MC.2016.273},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel16g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel16h,
  author       = {Hal Berghel},
  title        = {Douglas Jones on Today's Voting Machines},
  journal      = {Computer},
  volume       = {49},
  number       = {10},
  pages        = {84--89},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.306},
  doi          = {10.1109/MC.2016.306},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel16h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel16i,
  author       = {Hal Berghel},
  title        = {Chasing Elbridge's Ghost: The Digital Gerrymander},
  journal      = {Computer},
  volume       = {49},
  number       = {11},
  pages        = {91--95},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.330},
  doi          = {10.1109/MC.2016.330},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel16i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Bertino16,
  author       = {Elisa Bertino},
  title        = {Securing Mobile Applications},
  journal      = {Computer},
  volume       = {49},
  number       = {2},
  pages        = {9},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.34},
  doi          = {10.1109/MC.2016.34},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Bertino16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Bertino16a,
  author       = {Elisa Bertino},
  title        = {Security Threats: Protecting the New Cyberfrontier},
  journal      = {Computer},
  volume       = {49},
  number       = {6},
  pages        = {11--14},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.188},
  doi          = {10.1109/MC.2016.188},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Bertino16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BesalevaW16,
  author       = {Liliya I. Besaleva and
                  Alfred C. Weaver},
  title        = {Applications of Social Networks and Crowdsourcing for Disaster Management
                  Improvement},
  journal      = {Computer},
  volume       = {49},
  number       = {5},
  pages        = {47--53},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.133},
  doi          = {10.1109/MC.2016.133},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/BesalevaW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BozkurtLS16,
  author       = {Alper Bozkurt and
                  Edgar J. Lobaton and
                  Mihail L. Sichitiu},
  title        = {A Biobotic Distributed Sensor Network for Under-Rubble Search and
                  Rescue},
  journal      = {Computer},
  volume       = {49},
  number       = {5},
  pages        = {38--46},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.136},
  doi          = {10.1109/MC.2016.136},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/BozkurtLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Bulling16,
  author       = {Andreas Bulling},
  title        = {Pervasive Attentive User Interfaces},
  journal      = {Computer},
  volume       = {49},
  number       = {1},
  pages        = {94--98},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.32},
  doi          = {10.1109/MC.2016.32},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Bulling16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BuresPKTH16,
  author       = {Tom{\'{a}}s Bures and
                  Frantisek Pl{\'{a}}sil and
                  Michal Kit and
                  Petr Tuma and
                  Nicklas Hoch},
  title        = {Software Abstractions for Component Interaction in the Internet of
                  Things},
  journal      = {Computer},
  volume       = {49},
  number       = {12},
  pages        = {50--59},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.377},
  doi          = {10.1109/MC.2016.377},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/BuresPKTH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Byrd16,
  author       = {Greg Byrd},
  title        = {{IEEE/IBM} Watson Student Showcase},
  journal      = {Computer},
  volume       = {49},
  number       = {1},
  pages        = {102--104},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.13},
  doi          = {10.1109/MC.2016.13},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Byrd16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Byrd16a,
  author       = {Greg Byrd},
  title        = {Immortal Bits: Managing Our Digital Legacies},
  journal      = {Computer},
  volume       = {49},
  number       = {3},
  pages        = {100--103},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.71},
  doi          = {10.1109/MC.2016.71},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Byrd16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Byrd16b,
  author       = {Greg Byrd},
  title        = {Home Sweet Mind-Controlled Home},
  journal      = {Computer},
  volume       = {49},
  number       = {5},
  pages        = {98--101},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.140},
  doi          = {10.1109/MC.2016.140},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Byrd16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Byrd16c,
  author       = {Greg Byrd},
  title        = {Let the Sun Shine},
  journal      = {Computer},
  volume       = {49},
  number       = {7},
  pages        = {94--97},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.205},
  doi          = {10.1109/MC.2016.205},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Byrd16c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Byrd16d,
  author       = {Greg Byrd},
  title        = {Seeing Is Understanding},
  journal      = {Computer},
  volume       = {49},
  number       = {9},
  pages        = {94--97},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.266},
  doi          = {10.1109/MC.2016.266},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Byrd16d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Byrd16e,
  author       = {Greg Byrd},
  title        = {Tactile Digital Braille Display},
  journal      = {Computer},
  volume       = {49},
  number       = {11},
  pages        = {88--90},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.327},
  doi          = {10.1109/MC.2016.327},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Byrd16e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Campbell16,
  author       = {Scott Campbell},
  title        = {Teaching Cloud Computing},
  journal      = {Computer},
  volume       = {49},
  number       = {9},
  pages        = {91--93},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.286},
  doi          = {10.1109/MC.2016.286},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Campbell16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Carroll16,
  author       = {Noel Carroll},
  title        = {Key Success Factors for Smart and Connected Health Software Solutions},
  journal      = {Computer},
  volume       = {49},
  number       = {11},
  pages        = {22--28},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.340},
  doi          = {10.1109/MC.2016.340},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Carroll16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/CarrollCYH16,
  author       = {John M. Carroll and
                  Jiawei Chen and
                  Tina Chien{-}Wen Yuan and
                  Benjamin V. Hanrahan},
  title        = {In Search of Coproduction: Smart Services as Reciprocal Activities},
  journal      = {Computer},
  volume       = {49},
  number       = {7},
  pages        = {26--32},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.194},
  doi          = {10.1109/MC.2016.194},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/CarrollCYH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/CerfS16,
  author       = {Vint Cerf and
                  Max Senges},
  title        = {Taking the Internet to the Next Physical Level},
  journal      = {Computer},
  volume       = {49},
  number       = {2},
  pages        = {80--86},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.51},
  doi          = {10.1109/MC.2016.51},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/CerfS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/CervantesKRCJ16,
  author       = {Humberto Cervantes and
                  Rick Kazman and
                  Jungwoo Ryoo and
                  Duyoung Choi and
                  Duksung Jang},
  title        = {Architectural Approaches to Security: Four Case Studies},
  journal      = {Computer},
  volume       = {49},
  number       = {11},
  pages        = {60--67},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.332},
  doi          = {10.1109/MC.2016.332},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/CervantesKRCJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Chang16,
  author       = {Carl K. Chang},
  title        = {Situation Analytics: {A} Foundation for a New Software Engineering
                  Paradigm},
  journal      = {Computer},
  volume       = {49},
  number       = {1},
  pages        = {24--33},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.21},
  doi          = {10.1109/MC.2016.21},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Chang16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Charette16,
  author       = {Robert N. Charette},
  title        = {The {STEM} Anxiety Business},
  journal      = {Computer},
  volume       = {49},
  number       = {3},
  pages        = {82--87},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.91},
  doi          = {10.1109/MC.2016.91},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Charette16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Charette16a,
  author       = {Robert N. Charette},
  title        = {Dragging Government Legacy Systems Out of the Shadows},
  journal      = {Computer},
  volume       = {49},
  number       = {9},
  pages        = {114--119},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.289},
  doi          = {10.1109/MC.2016.289},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Charette16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ChenKMSTVZ16,
  author       = {Tsong Yueh Chen and
                  Fei{-}Ching Kuo and
                  Wenjuan Ma and
                  Willy Susilo and
                  Dave Towey and
                  Jeffrey M. Voas and
                  Zhi Quan Zhou},
  title        = {Metamorphic Testing for Cybersecurity},
  journal      = {Computer},
  volume       = {49},
  number       = {6},
  pages        = {48--55},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.176},
  doi          = {10.1109/MC.2016.176},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ChenKMSTVZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/CherubiniJV16,
  author       = {Giovanni Cherubini and
                  Jens Jelitto and
                  Vinodh Venkatesan},
  title        = {Cognitive Storage for Big Data},
  journal      = {Computer},
  volume       = {49},
  number       = {4},
  pages        = {43--51},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.117},
  doi          = {10.1109/MC.2016.117},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/CherubiniJV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Coleman16,
  author       = {Victoria Coleman},
  title        = {Embodied Molecular Computation: Potential and Challenges},
  journal      = {Computer},
  volume       = {49},
  number       = {9},
  pages        = {43--51},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.295},
  doi          = {10.1109/MC.2016.295},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Coleman16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/DastjerdiB16,
  author       = {Amir Vahid Dastjerdi and
                  Rajkumar Buyya},
  title        = {Fog Computing: Helping the Internet of Things Realize Its Potential},
  journal      = {Computer},
  volume       = {49},
  number       = {8},
  pages        = {112--116},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.245},
  doi          = {10.1109/MC.2016.245},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/DastjerdiB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/DeBenedictis16,
  author       = {Erik P. DeBenedictis},
  title        = {The Boolean Logic Tax},
  journal      = {Computer},
  volume       = {49},
  number       = {4},
  pages        = {79--82},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.103},
  doi          = {10.1109/MC.2016.103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/DeBenedictis16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/DeBenedictis16a,
  author       = {Erik P. DeBenedictis},
  title        = {Rebooting Computers as Learning Machines},
  journal      = {Computer},
  volume       = {49},
  number       = {6},
  pages        = {84--87},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.156},
  doi          = {10.1109/MC.2016.156},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/DeBenedictis16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/DeBenedictis16b,
  author       = {Erik P. DeBenedictis},
  title        = {The Search for Computing's Secretariat},
  journal      = {Computer},
  volume       = {49},
  number       = {8},
  pages        = {88--91},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.240},
  doi          = {10.1109/MC.2016.240},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/DeBenedictis16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/DeBenedictis16c,
  author       = {Erik P. DeBenedictis},
  title        = {Computational Complexity and New Computing Approaches},
  journal      = {Computer},
  volume       = {49},
  number       = {12},
  pages        = {76--79},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.353},
  doi          = {10.1109/MC.2016.353},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/DeBenedictis16c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/DeBenedictisW16,
  author       = {Erik P. DeBenedictis and
                  R. Stanley Williams},
  title        = {Help Wanted: {A} Modern-Day Turing},
  journal      = {Computer},
  volume       = {49},
  number       = {10},
  pages        = {76--79},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.299},
  doi          = {10.1109/MC.2016.299},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/DeBenedictisW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Dhar16,
  author       = {Vasant Dhar},
  title        = {Equity, Safety, and Privacy in the Autonomous Vehicle Era},
  journal      = {Computer},
  volume       = {49},
  number       = {11},
  pages        = {80--83},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.326},
  doi          = {10.1109/MC.2016.326},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Dhar16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Dustdar16,
  author       = {Schahram Dustdar},
  title        = {Cloud Computing},
  journal      = {Computer},
  volume       = {49},
  number       = {2},
  pages        = {12--13},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.46},
  doi          = {10.1109/MC.2016.46},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Dustdar16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Dwyer16,
  author       = {Matthew B. Dwyer},
  title        = {Finding Flaws in Natural Language Requirements},
  journal      = {Computer},
  volume       = {49},
  number       = {11},
  pages        = {10},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.342},
  doi          = {10.1109/MC.2016.342},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/Dwyer16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ElbadrawyPRSKR16,
  author       = {Asmaa Elbadrawy and
                  Agoritsa Polyzou and
                  Zhiyun Ren and
                  Mackenzie Sweeney and
                  George Karypis and
                  Huzefa Rangwala},
  title        = {Predicting Student Performance Using Personalized Analytics},
  journal      = {Computer},
  volume       = {49},
  number       = {4},
  pages        = {61--69},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.119},
  doi          = {10.1109/MC.2016.119},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/ElbadrawyPRSKR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Farrell16,
  author       = {Stephen Farrell},
  title        = {Requirements Analysis Required-Otherwise Targeted Monitoring Enables
                  Pervasive Monitoring},
  journal      = {Computer},
  volume       = {49},
  number       = {3},
  pages        = {34--40},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.69},
  doi          = {10.1109/MC.2016.69},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Farrell16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Floriani16,
  author       = {Leila De Floriani},
  title        = {Using 2D Maps for 3D Localization},
  journal      = {Computer},
  volume       = {49},
  number       = {3},
  pages        = {5},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.87},
  doi          = {10.1109/MC.2016.87},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Floriani16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/FortePKB16,
  author       = {Domenic Forte and
                  Ron Perez and
                  Yongdae Kim and
                  Swarup Bhunia},
  title        = {Supply-Chain Security for Cyberinfrastructure [Guest editors' introduction]},
  journal      = {Computer},
  volume       = {49},
  number       = {8},
  pages        = {12--16},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.260},
  doi          = {10.1109/MC.2016.260},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/FortePKB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Fujii16,
  author       = {Roger U. Fujii},
  title        = {Raising the Bar: Ensuring Quality Products and Services for Our Members},
  journal      = {Computer},
  volume       = {49},
  number       = {1},
  pages        = {4},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.6},
  doi          = {10.1109/MC.2016.6},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Fujii16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Fujii16a,
  author       = {Roger U. Fujii},
  title        = {Our Journey to the Future},
  journal      = {Computer},
  volume       = {49},
  number       = {12},
  pages        = {6--9},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.365},
  doi          = {10.1109/MC.2016.365},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Fujii16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Gaff16,
  author       = {Brian M. Gaff},
  title        = {The Need for Speed},
  journal      = {Computer},
  volume       = {49},
  number       = {4},
  pages        = {10--12},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.104},
  doi          = {10.1109/MC.2016.104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Gaff16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/GayerHKRA16,
  author       = {Sebastian Gayer and
                  Andrea Herrmann and
                  Thorsten Keuler and
                  Matthias Riebisch and
                  Pablo Oliveira Antonino},
  title        = {Lightweight Traceability for the Agile Architect},
  journal      = {Computer},
  volume       = {49},
  number       = {5},
  pages        = {64--71},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.150},
  doi          = {10.1109/MC.2016.150},
  timestamp    = {Fri, 25 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/GayerHKRA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/GetovHB16,
  author       = {Vladimir Getov and
                  Adolfy Hoisie and
                  Pradip Bose},
  title        = {New Frontiers in Energy-Efficient Computing [Guest editors' introduction]},
  journal      = {Computer},
  volume       = {49},
  number       = {10},
  pages        = {14--18},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.315},
  doi          = {10.1109/MC.2016.315},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/GetovHB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/GrantLODPL16,
  author       = {Ryan E. Grant and
                  Michael J. Levenhagen and
                  Stephen L. Olivier and
                  David Debonis and
                  Kevin T. Pedretti and
                  James H. Laros III},
  title        = {Standardizing Power Monitoring and Control at Exascale},
  journal      = {Computer},
  volume       = {49},
  number       = {10},
  pages        = {38--46},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.308},
  doi          = {10.1109/MC.2016.308},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/GrantLODPL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier16,
  author       = {David Alan Grier},
  title        = {New Cycles of Technology},
  journal      = {Computer},
  volume       = {49},
  number       = {1},
  pages        = {120},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.31},
  doi          = {10.1109/MC.2016.31},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier16a,
  author       = {David Alan Grier},
  title        = {The Post-MOOC World},
  journal      = {Computer},
  volume       = {49},
  number       = {2},
  pages        = {104},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.39},
  doi          = {10.1109/MC.2016.39},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier16b,
  author       = {David Alan Grier},
  title        = {Go, Stop, Go, Stop},
  journal      = {Computer},
  volume       = {49},
  number       = {3},
  pages        = {128},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.64},
  doi          = {10.1109/MC.2016.64},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier16c,
  author       = {David Alan Grier},
  title        = {The Global Profession},
  journal      = {Computer},
  volume       = {49},
  number       = {4},
  pages        = {120},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.100},
  doi          = {10.1109/MC.2016.100},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier16c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier16d,
  author       = {David Alan Grier},
  title        = {Technological Improvisation},
  journal      = {Computer},
  volume       = {49},
  number       = {5},
  pages        = {128},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.155},
  doi          = {10.1109/MC.2016.155},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier16d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier16e,
  author       = {David Alan Grier},
  title        = {Scientific Conversations},
  journal      = {Computer},
  volume       = {49},
  number       = {6},
  pages        = {120},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.163},
  doi          = {10.1109/MC.2016.163},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier16e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier16f,
  author       = {David Alan Grier},
  title        = {Free Tuition for Community College: {A} Role for the Tech Community?},
  journal      = {Computer},
  volume       = {49},
  number       = {7},
  pages        = {80--82},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.214},
  doi          = {10.1109/MC.2016.214},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier16f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier16g,
  author       = {David Alan Grier},
  title        = {Aware of the Situation},
  journal      = {Computer},
  volume       = {49},
  number       = {7},
  pages        = {120},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.199},
  doi          = {10.1109/MC.2016.199},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier16g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier16h,
  author       = {David Alan Grier},
  title        = {Changing Trust},
  journal      = {Computer},
  volume       = {49},
  number       = {8},
  pages        = {156},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.244},
  doi          = {10.1109/MC.2016.244},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier16h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier16i,
  author       = {David Alan Grier},
  title        = {The Means of Production},
  journal      = {Computer},
  volume       = {49},
  number       = {9},
  pages        = {144},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.281},
  doi          = {10.1109/MC.2016.281},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier16i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier16j,
  author       = {David Alan Grier},
  title        = {Innovating for Tomorrow},
  journal      = {Computer},
  volume       = {49},
  number       = {10},
  pages        = {112},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.316},
  doi          = {10.1109/MC.2016.316},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier16j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier16k,
  author       = {David Alan Grier},
  title        = {"I'm Not a Computer Scientist, but ..."},
  journal      = {Computer},
  volume       = {49},
  number       = {11},
  pages        = {104},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.331},
  doi          = {10.1109/MC.2016.331},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier16k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier16l,
  author       = {David Alan Grier},
  title        = {Fifteen Years to Open Source},
  journal      = {Computer},
  volume       = {49},
  number       = {12},
  pages        = {96},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.360},
  doi          = {10.1109/MC.2016.360},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier16l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/GudivadaR016,
  author       = {Venkat N. Gudivada and
                  Dhana Rao and
                  Vijay V. Raghavan},
  title        = {Renaissance in Database Management: Navigating the Landscape of Candidate
                  Systems},
  journal      = {Computer},
  volume       = {49},
  number       = {4},
  pages        = {31--42},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.115},
  doi          = {10.1109/MC.2016.115},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/GudivadaR016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Helal16,
  author       = {Sumi Helal},
  title        = {2016 Outlook: Humans in the Technology Loop},
  journal      = {Computer},
  volume       = {49},
  number       = {1},
  pages        = {7--9},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.25},
  doi          = {10.1109/MC.2016.25},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Helal16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HijaziPKS16,
  author       = {Shurouq Hijazi and
                  Alex Page and
                  Burak Kantarci and
                  Tolga Soyata},
  title        = {Machine Learning in Cardiac Health Monitoring and Decision Support},
  journal      = {Computer},
  volume       = {49},
  number       = {11},
  pages        = {38--48},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.339},
  doi          = {10.1109/MC.2016.339},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/HijaziPKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Hole16,
  author       = {Kjell J{\o}rgen Hole},
  title        = {Building Trust in E-Government Services},
  journal      = {Computer},
  volume       = {49},
  number       = {1},
  pages        = {66--74},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.4},
  doi          = {10.1109/MC.2016.4},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Hole16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Holmes16,
  author       = {W. Neville Holmes},
  title        = {32 {\&} 16 Years Ago},
  journal      = {Computer},
  volume       = {49},
  number       = {4},
  pages        = {16--17},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.101},
  doi          = {10.1109/MC.2016.101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Holmes16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HuK16,
  author       = {Vincent C. Hu and
                  Rick Kuhn},
  title        = {Access Control Policy Verification},
  journal      = {Computer},
  volume       = {49},
  number       = {12},
  pages        = {80--83},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.368},
  doi          = {10.1109/MC.2016.368},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/HuK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HuMOK16,
  author       = {Wei Hu and
                  Baolei Mao and
                  Jason Oberg and
                  Ryan Kastner},
  title        = {Detecting Hardware Trojans with Gate-Level Information-Flow Tracking},
  journal      = {Computer},
  volume       = {49},
  number       = {8},
  pages        = {44--52},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.225},
  doi          = {10.1109/MC.2016.225},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/HuMOK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Hurlburt16,
  author       = {George F. Hurlburt},
  title        = {"Good Enough" Security: The Best We'll Ever Have},
  journal      = {Computer},
  volume       = {49},
  number       = {7},
  pages        = {98--101},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.212},
  doi          = {10.1109/MC.2016.212},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/Hurlburt16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/IbrahimC16,
  author       = {Mohamed Ibrahim and
                  Krishnendu Chakrabarty},
  title        = {Digital-Microfluidic Biochips},
  journal      = {Computer},
  volume       = {49},
  number       = {6},
  pages        = {8--9},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.187},
  doi          = {10.1109/MC.2016.187},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/IbrahimC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Jacucci16,
  author       = {Giulio Jacucci},
  title        = {Beyond Search Queries},
  journal      = {Computer},
  volume       = {49},
  number       = {10},
  pages        = {90--93},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.298},
  doi          = {10.1109/MC.2016.298},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Jacucci16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Jadbabaie16,
  author       = {Ali Jadbabaie},
  title        = {Defining Data Clusters},
  journal      = {Computer},
  volume       = {49},
  number       = {12},
  pages        = {15},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.369},
  doi          = {10.1109/MC.2016.369},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Jadbabaie16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/JiangAJM16,
  author       = {Zhihao Jiang and
                  Houssam Abbas and
                  Kuk Jin Jang and
                  Rahul Mangharam},
  title        = {The Challenges of High-Confidence Medical Device Software},
  journal      = {Computer},
  volume       = {49},
  number       = {1},
  pages        = {34--42},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.20},
  doi          = {10.1109/MC.2016.20},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/JiangAJM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Johnson16,
  author       = {Brian David Johnson},
  title        = {Beyond Science Fiction: The American Dream},
  journal      = {Computer},
  volume       = {49},
  number       = {1},
  pages        = {91--93},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.16},
  doi          = {10.1109/MC.2016.16},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Johnson16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Johnson16a,
  author       = {Brian David Johnson},
  title        = {Science Fiction and the Coming Age of Sentient Tools},
  journal      = {Computer},
  volume       = {49},
  number       = {6},
  pages        = {95--97},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.171},
  doi          = {10.1109/MC.2016.171},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Johnson16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Johnson16b,
  author       = {Brian David Johnson},
  title        = {So Long, and Thanks for All the Robots},
  journal      = {Computer},
  volume       = {49},
  number       = {12},
  pages        = {84--85},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.372},
  doi          = {10.1109/MC.2016.372},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Johnson16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/JohnsonG16,
  author       = {Brian David Johnson and
                  David H. Guston},
  title        = {Futures We Want to Inhabit},
  journal      = {Computer},
  volume       = {49},
  number       = {2},
  pages        = {78--79},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.52},
  doi          = {10.1109/MC.2016.52},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/JohnsonG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Jones16,
  author       = {Lynette A. Jones},
  title        = {Designing Effective Refreshable Braille Displays},
  journal      = {Computer},
  volume       = {49},
  number       = {1},
  pages        = {14},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.12},
  doi          = {10.1109/MC.2016.12},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Jones16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KatoIG16,
  author       = {Jun Kato and
                  Takeo Igarashi and
                  Masataka Goto},
  title        = {Programming with Examples to Develop Data-Intensive User Interfaces},
  journal      = {Computer},
  volume       = {49},
  number       = {7},
  pages        = {34--42},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.217},
  doi          = {10.1109/MC.2016.217},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KatoIG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Khoshkbarforoushha16,
  author       = {Alireza Khoshkbarforoushha and
                  Meisong Wang and
                  Rajiv Ranjan and
                  Lizhe Wang and
                  Leila Alem and
                  Samee Ullah Khan and
                  Boualem Benatallah},
  title        = {Dimensions for Evaluating Cloud Resource Orchestration Frameworks},
  journal      = {Computer},
  volume       = {49},
  number       = {2},
  pages        = {24--33},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.56},
  doi          = {10.1109/MC.2016.56},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Khoshkbarforoushha16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KingG16,
  author       = {John Leslie King and
                  Jonathan Grudin},
  title        = {Will Computers Put Us Out of Work?},
  journal      = {Computer},
  volume       = {49},
  number       = {5},
  pages        = {82--85},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.126},
  doi          = {10.1109/MC.2016.126},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KingG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KnightDNHC16,
  author       = {John C. Knight and
                  Jack W. Davidson and
                  Anh Nguyen{-}Tuong and
                  Jason Hiser and
                  Michele Co},
  title        = {Diversity in Cybersecurity},
  journal      = {Computer},
  volume       = {49},
  number       = {4},
  pages        = {94--98},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.102},
  doi          = {10.1109/MC.2016.102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KnightDNHC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KogiasXP16,
  author       = {Dimitrios G. Kogias and
                  Michael G. Xevgenis and
                  Charalampos Z. Patrikakis},
  title        = {Cloud Federation and the Evolution of Cloud Computing},
  journal      = {Computer},
  volume       = {49},
  number       = {11},
  pages        = {96--99},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.344},
  doi          = {10.1109/MC.2016.344},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KogiasXP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KottSW16,
  author       = {Alexander Kott and
                  Ananthram Swami and
                  Bruce J. West},
  title        = {The Fog of War in Cyberspace},
  journal      = {Computer},
  volume       = {49},
  number       = {11},
  pages        = {84--87},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.333},
  doi          = {10.1109/MC.2016.333},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KottSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KottSW16a,
  author       = {Alexander Kott and
                  Ananthram Swami and
                  Bruce J. West},
  title        = {The Internet of Battle Things},
  journal      = {Computer},
  volume       = {49},
  number       = {12},
  pages        = {70--75},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.355},
  doi          = {10.1109/MC.2016.355},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KottSW16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KotzGKW16,
  author       = {David Kotz and
                  Carl A. Gunter and
                  Santosh Kumar and
                  Jonathan P. Weiner},
  title        = {Privacy and Security in Mobile Health: {A} Research Agenda},
  journal      = {Computer},
  volume       = {49},
  number       = {6},
  pages        = {22--30},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.185},
  doi          = {10.1109/MC.2016.185},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KotzGKW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KounevHBZ16,
  author       = {Samuel Kounev and
                  Nikolaus Huber and
                  Fabian Brosig and
                  Xiaoyun Zhu},
  title        = {A Model-Based Approach to Designing Self-Aware {IT} Systems and Infrastructures},
  journal      = {Computer},
  volume       = {49},
  number       = {7},
  pages        = {53--61},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.198},
  doi          = {10.1109/MC.2016.198},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KounevHBZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Kshetri16,
  author       = {Nir Kshetri},
  title        = {Gambling with Source Code},
  journal      = {Computer},
  volume       = {49},
  number       = {2},
  pages        = {74--77},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.45},
  doi          = {10.1109/MC.2016.45},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/Kshetri16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/LaneF16,
  author       = {H. Chad Lane and
                  David A. Forsyth},
  title        = {Virtual Learning and Object Reconstruction},
  journal      = {Computer},
  volume       = {49},
  number       = {5},
  pages        = {14--15},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.152},
  doi          = {10.1109/MC.2016.152},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/LaneF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/LaplanteVL16,
  author       = {Phillip A. Laplante and
                  Jeffrey M. Voas and
                  Nancy L. Laplante},
  title        = {Standards for the Internet of Things: {A} Case Study in Disaster Response},
  journal      = {Computer},
  volume       = {49},
  number       = {5},
  pages        = {87--90},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.137},
  doi          = {10.1109/MC.2016.137},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/LaplanteVL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/LaporteO16,
  author       = {Claude Y. Laporte and
                  Rory V. O'Connor},
  title        = {Systems and Software Engineering Standards for Very Small Entities:
                  Accomplishments and Overview},
  journal      = {Computer},
  volume       = {49},
  number       = {8},
  pages        = {84--87},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.242},
  doi          = {10.1109/MC.2016.242},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/LaporteO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Lee16,
  author       = {Ryan Lee},
  title        = {Threatcasting},
  journal      = {Computer},
  volume       = {49},
  number       = {10},
  pages        = {94--95},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.305},
  doi          = {10.1109/MC.2016.305},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Lee16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/LeppanenPGHNT16,
  author       = {Jarno Leppanen and
                  Mikko Pelkonen and
                  Haipeng Guo and
                  Samuli Hemminki and
                  Petteri Nurmi and
                  Sasu Tarkoma},
  title        = {Collaborative and Energy-Efficient Speech Monitoring on Smart Devices},
  journal      = {Computer},
  volume       = {49},
  number       = {12},
  pages        = {22--30},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.380},
  doi          = {10.1109/MC.2016.380},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/LeppanenPGHNT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/LinLWLK16,
  author       = {Po{-}Ching Lin and
                  Ying{-}Dar Lin and
                  Cheng{-}Ying Wu and
                  Yuan{-}Cheng Lai and
                  Yi{-}Chih Kao},
  title        = {Balanced Service Chaining in Software-Defined Networks with Network
                  Function Virtualization},
  journal      = {Computer},
  volume       = {49},
  number       = {11},
  pages        = {68--76},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.349},
  doi          = {10.1109/MC.2016.349},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/LinLWLK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/LinVPM16,
  author       = {Ying{-}Dar Lin and
                  Jeffrey M. Voas and
                  Antonio Pescap{\`{e}} and
                  Peter Mueller},
  title        = {Communications and Privacy under Surveillance},
  journal      = {Computer},
  volume       = {49},
  number       = {3},
  pages        = {10--13},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.65},
  doi          = {10.1109/MC.2016.65},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/LinVPM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Linthicum16,
  author       = {David S. Linthicum},
  title        = {Responsive Data Architecture for the Internet of Things},
  journal      = {Computer},
  volume       = {49},
  number       = {10},
  pages        = {72--75},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.302},
  doi          = {10.1109/MC.2016.302},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Linthicum16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/LouiL16,
  author       = {Ronald Prescott Loui and
                  Terrence D. Loui},
  title        = {How to Survive a Cyber Pearl Harbor},
  journal      = {Computer},
  volume       = {49},
  number       = {6},
  pages        = {31--37},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.186},
  doi          = {10.1109/MC.2016.186},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/LouiL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/LuoXMLCZ16,
  author       = {Qiuming Luo and
                  Feng Xiao and
                  Zhong Ming and
                  Hao Li and
                  Jianyong Chen and
                  Jianhua Zhang},
  title        = {Optimizing the Memory Management of a Virtual Machine Monitor on a
                  {NUMA} System},
  journal      = {Computer},
  volume       = {49},
  number       = {6},
  pages        = {66--74},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.169},
  doi          = {10.1109/MC.2016.169},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/LuoXMLCZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/LysneHOYAT16,
  author       = {Olav Lysne and
                  Kjell J{\o}rgen Hole and
                  Christian Otterstad and
                  {\O}yvind Ytrehus and
                  Raymond Aarseth and
                  Jorgen Tellnes},
  title        = {Vendor Malware: Detection Limits and Mitigation},
  journal      = {Computer},
  volume       = {49},
  number       = {8},
  pages        = {62--69},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.227},
  doi          = {10.1109/MC.2016.227},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/LysneHOYAT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Madria16,
  author       = {Sanjay Kumar Madria},
  title        = {Security and Risk Assessment in the Cloud},
  journal      = {Computer},
  volume       = {49},
  number       = {9},
  pages        = {110--113},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.280},
  doi          = {10.1109/MC.2016.280},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Madria16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Maresca16,
  author       = {Massimo Maresca},
  title        = {The Spreadsheet Space: Eliminating the Boundaries of Data Cross-Referencing},
  journal      = {Computer},
  volume       = {49},
  number       = {9},
  pages        = {78--85},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.272},
  doi          = {10.1109/MC.2016.272},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Maresca16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Matloff16,
  author       = {Norman S. Matloff},
  title        = {The {H-1B} Visa Controversy},
  journal      = {Computer},
  volume       = {49},
  number       = {7},
  pages        = {88--93},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.216},
  doi          = {10.1109/MC.2016.216},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Matloff16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/McGraw16,
  author       = {Gary McGraw},
  title        = {Four Software Security Findings},
  journal      = {Computer},
  volume       = {49},
  number       = {1},
  pages        = {84--87},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.30},
  doi          = {10.1109/MC.2016.30},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/McGraw16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/MerkelHSKTAM16,
  author       = {Cory E. Merkel and
                  Raqibul Hasan and
                  Nicholas Soures and
                  Dhireesha Kudithipudi and
                  Tarek M. Taha and
                  Sapan Agarwal and
                  Matthew J. Marinella},
  title        = {Neuromemristive Systems: Boosting Efficiency through Brain-Inspired
                  Computing},
  journal      = {Computer},
  volume       = {49},
  number       = {10},
  pages        = {56--64},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.312},
  doi          = {10.1109/MC.2016.312},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/MerkelHSKTAM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/MeterD16,
  author       = {Rodney Van Meter and
                  Simon J. Devitt},
  title        = {The Path to Scalable Distributed Quantum Computing},
  journal      = {Computer},
  volume       = {49},
  number       = {9},
  pages        = {31--42},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.291},
  doi          = {10.1109/MC.2016.291},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/MeterD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/MetwalleyTM16,
  author       = {Hassan Metwalley and
                  Stefano Traverso and
                  Marco Mellia},
  title        = {Using Passive Measurements to Demystify Online Trackers},
  journal      = {Computer},
  volume       = {49},
  number       = {3},
  pages        = {50--55},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.74},
  doi          = {10.1109/MC.2016.74},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/MetwalleyTM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/MilojicicR16,
  author       = {Dejan S. Milojicic and
                  Timothy Roscoe},
  title        = {Outlook on Operating Systems},
  journal      = {Computer},
  volume       = {49},
  number       = {1},
  pages        = {43--51},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.19},
  doi          = {10.1109/MC.2016.19},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/MilojicicR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/MisraS16,
  author       = {Gaurav Misra and
                  Jose M. Such},
  title        = {How Socially Aware Are Social Media Privacy Controls?},
  journal      = {Computer},
  volume       = {49},
  number       = {3},
  pages        = {96--99},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.83},
  doi          = {10.1109/MC.2016.83},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/MisraS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/MontuschiM16,
  author       = {Paolo Montuschi and
                  Jean{-}Michel Muller},
  title        = {Modern Computer Arithmetic},
  journal      = {Computer},
  volume       = {49},
  number       = {9},
  pages        = {12},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.277},
  doi          = {10.1109/MC.2016.277},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/MontuschiM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Murdoch16,
  author       = {Steven J. Murdoch},
  title        = {Insecure by Design: Protocols for Encrypted Phone Calls},
  journal      = {Computer},
  volume       = {49},
  number       = {3},
  pages        = {25--33},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.70},
  doi          = {10.1109/MC.2016.70},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Murdoch16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Murphy16,
  author       = {Robin R. Murphy},
  title        = {Emergency Informatics: Using Computing to Improve Disaster Management},
  journal      = {Computer},
  volume       = {49},
  number       = {5},
  pages        = {19--27},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.135},
  doi          = {10.1109/MC.2016.135},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Murphy16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/MurugesanC16,
  author       = {San Murugesan and
                  Bob Colwell},
  title        = {Next-Generation Computing Paradigms},
  journal      = {Computer},
  volume       = {49},
  number       = {9},
  pages        = {14--20},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.265},
  doi          = {10.1109/MC.2016.265},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/MurugesanC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/MyersKLY16,
  author       = {Brad A. Myers and
                  Amy J. Ko and
                  Thomas D. LaToza and
                  YoungSeok Yoon},
  title        = {Programmers Are Users Too: Human-Centered Methods for Improving Programming
                  Tools},
  journal      = {Computer},
  volume       = {49},
  number       = {7},
  pages        = {44--52},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.200},
  doi          = {10.1109/MC.2016.200},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/MyersKLY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/NeateJE16,
  author       = {Timothy Neate and
                  Matt Jones and
                  Michael Evans},
  title        = {Interdevice Media: Choreographing Content to Maximize Viewer Engagement},
  journal      = {Computer},
  volume       = {49},
  number       = {12},
  pages        = {42--49},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.375},
  doi          = {10.1109/MC.2016.375},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/NeateJE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/NetkachovaB16,
  author       = {Kateryna Netkachova and
                  Robin E. Bloomfield},
  title        = {Security-Informed Safety},
  journal      = {Computer},
  volume       = {49},
  number       = {6},
  pages        = {98--102},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.158},
  doi          = {10.1109/MC.2016.158},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/NetkachovaB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/NiamutMDR16,
  author       = {Omar Niamut and
                  Mu Mu and
                  Spyros G. Denazis and
                  Nicholas J. P. Race},
  title        = {Social Telemedia: The Relationship between Social Information and
                  Networked Media},
  journal      = {Computer},
  volume       = {49},
  number       = {5},
  pages        = {92--97},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.146},
  doi          = {10.1109/MC.2016.146},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/NiamutMDR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/NikolichCC16,
  author       = {Paul Nikolich and
                  Kenneth J. Christensen and
                  Lori Cameron},
  title        = {802 Standards},
  journal      = {Computer},
  volume       = {49},
  number       = {1},
  pages        = {10},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.7},
  doi          = {10.1109/MC.2016.7},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/NikolichCC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/NoorSMZ16,
  author       = {Talal H. Noor and
                  Quan Z. Sheng and
                  Zakaria Maamar and
                  Sherali Zeadally},
  title        = {Managing Trust in the Cloud: State of the Art and Research Challenges},
  journal      = {Computer},
  volume       = {49},
  number       = {2},
  pages        = {34--45},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.57},
  doi          = {10.1109/MC.2016.57},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/NoorSMZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/OlshanskyCYMABR16,
  author       = {S. Jay Olshansky and
                  Bruce A. Carnes and
                  Yang Claire Yang and
                  Norvell Miller and
                  Janet Anderson and
                  Hiram Beltran{-}Sanchez and
                  Karl Ricanek},
  title        = {The Future of Smart Health},
  journal      = {Computer},
  volume       = {49},
  number       = {11},
  pages        = {14--21},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.336},
  doi          = {10.1109/MC.2016.336},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/OlshanskyCYMABR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/OulasvirtaA16,
  author       = {Antti Oulasvirta and
                  Gregory D. Abowd},
  title        = {User Interface Design in the 21st Century},
  journal      = {Computer},
  volume       = {49},
  number       = {7},
  pages        = {11--13},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.201},
  doi          = {10.1109/MC.2016.201},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/OulasvirtaA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Parhami16,
  author       = {Behrooz Parhami},
  title        = {Low Acceptance Rates of Conference Papers Considered Harmful},
  journal      = {Computer},
  volume       = {49},
  number       = {4},
  pages        = {70--73},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.106},
  doi          = {10.1109/MC.2016.106},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Parhami16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Patel16,
  author       = {Jignesh M. Patel},
  title        = {Operational NoSQL Systems: What's New and What's Next?},
  journal      = {Computer},
  volume       = {49},
  number       = {4},
  pages        = {23--30},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.118},
  doi          = {10.1109/MC.2016.118},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Patel16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Paulsen16,
  author       = {Celia Paulsen},
  title        = {Cybersecuring Small Businesses},
  journal      = {Computer},
  volume       = {49},
  number       = {8},
  pages        = {92--97},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.223},
  doi          = {10.1109/MC.2016.223},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Paulsen16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/PereraLRWZ16,
  author       = {Charith Perera and
                  Chang Liu and
                  Rajiv Ranjan and
                  Lizhe Wang and
                  Albert Y. Zomaya},
  title        = {Privacy-Knowledge Modeling for the Internet of Things: {A} Look Back},
  journal      = {Computer},
  volume       = {49},
  number       = {12},
  pages        = {60--68},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.366},
  doi          = {10.1109/MC.2016.366},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/PereraLRWZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Petkovic16,
  author       = {Dragutin Petkovic},
  title        = {Using Learning Analytics to Assess Capstone Project Teams},
  journal      = {Computer},
  volume       = {49},
  number       = {1},
  pages        = {80--83},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.3},
  doi          = {10.1109/MC.2016.3},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Petkovic16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/PinciroliB16,
  author       = {Carlo Pinciroli and
                  Giovanni Beltrame},
  title        = {Swarm-Oriented Programming of Distributed Robot Networks},
  journal      = {Computer},
  volume       = {49},
  number       = {12},
  pages        = {32--41},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.376},
  doi          = {10.1109/MC.2016.376},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/PinciroliB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/RajputSK16,
  author       = {Hitesh Rajput and
                  Tanmoy Som and
                  Soumitra Kar},
  title        = {Using Radon Transform to Recognize Skewed Images of Vehicular License
                  Plates},
  journal      = {Computer},
  volume       = {49},
  number       = {1},
  pages        = {59--65},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.14},
  doi          = {10.1109/MC.2016.14},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/RajputSK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/RalstonFSWKK16,
  author       = {Parrish Ralston and
                  David Fry and
                  Scott Suko and
                  Bryce Winters and
                  Matthew King and
                  Robert Kober},
  title        = {Defeating counterfeiters with microscopic dielets embedded in electronic
                  components},
  journal      = {Computer},
  volume       = {49},
  number       = {8},
  pages        = {18--26},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.262},
  doi          = {10.1109/MC.2016.262},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/RalstonFSWKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/RamakrishnanK16,
  author       = {Naren Ramakrishnan and
                  Ravi Kumar},
  title        = {Big Data},
  journal      = {Computer},
  volume       = {49},
  number       = {4},
  pages        = {20--22},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.109},
  doi          = {10.1109/MC.2016.109},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/RamakrishnanK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ReismanS16,
  author       = {Sorel Reisman and
                  Eli Shmueli},
  title        = {Opening the Instructional Doors to Computer Science and IT-Finally},
  journal      = {Computer},
  volume       = {49},
  number       = {6},
  pages        = {77--79},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.175},
  doi          = {10.1109/MC.2016.175},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ReismanS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Ren16,
  author       = {Xiangshi Ren},
  title        = {Rethinking the Relationship between Humans and Computers},
  journal      = {Computer},
  volume       = {49},
  number       = {8},
  pages        = {104--108},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.253},
  doi          = {10.1109/MC.2016.253},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Ren16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/RioSS16,
  author       = {Fernando D{\'{\i}}az{-}del{-}R{\'{\i}}o and
                  Javier J. Salmer{\'{o}}n{-}Garc{\'{\i}}a and
                  Jos{\'{e}} Luis Sevillano},
  title        = {Extending Amdahl's Law for the Cloud Computing Era},
  journal      = {Computer},
  volume       = {49},
  number       = {2},
  pages        = {14--22},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.49},
  doi          = {10.1109/MC.2016.49},
  timestamp    = {Fri, 25 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/RioSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/RotemWMGWA16,
  author       = {Efraim Rotem and
                  Uri C. Weiser and
                  Avi Mendelson and
                  Ran Ginosar and
                  Eliezer Weissmann and
                  Yoni Aizik},
  title        = {H-EARtH: Heterogeneous Multicore Platform Energy Management},
  journal      = {Computer},
  volume       = {49},
  number       = {10},
  pages        = {47--55},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.309},
  doi          = {10.1109/MC.2016.309},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/RotemWMGWA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SakamotoSII16,
  author       = {Daisuke Sakamoto and
                  Yuta Sugiura and
                  Masahiko Inami and
                  Takeo Igarashi},
  title        = {Graphical Instruction for Home Robots},
  journal      = {Computer},
  volume       = {49},
  number       = {7},
  pages        = {20--25},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.195},
  doi          = {10.1109/MC.2016.195},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/SakamotoSII16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SaprooFSSWBLLJ16,
  author       = {Sameer Saproo and
                  Josef Faller and
                  Victor Shih and
                  Paul Sajda and
                  Nicholas R. Waytowich and
                  Addison W. Bohannon and
                  Vernon J. Lawhern and
                  Brent J. Lance and
                  David C. Jangraw},
  title        = {Cortically Coupled Computing: {A} New Paradigm for Synergistic Human-Machine
                  Interaction},
  journal      = {Computer},
  volume       = {49},
  number       = {9},
  pages        = {60--68},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.294},
  doi          = {10.1109/MC.2016.294},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/SaprooFSSWBLLJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SchafferV16,
  author       = {Kim Schaffer and
                  Jeffrey M. Voas},
  title        = {What Happened to Formal Methods for Security?},
  journal      = {Computer},
  volume       = {49},
  number       = {8},
  pages        = {70--79},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.228},
  doi          = {10.1109/MC.2016.228},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/SchafferV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SchullerP16,
  author       = {Bj{\"{o}}rn W. Schuller and
                  Jian Pei},
  title        = {Using Computer Intelligence for Depression Diagnosis and Crowdsourcing},
  journal      = {Computer},
  volume       = {49},
  number       = {7},
  pages        = {8--9},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.206},
  doi          = {10.1109/MC.2016.206},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/SchullerP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Sethumadhavan16,
  author       = {Simha Sethumadhavan},
  title        = {Hardware-Enforced Privacy},
  journal      = {Computer},
  volume       = {49},
  number       = {10},
  pages        = {10},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.318},
  doi          = {10.1109/MC.2016.318},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Sethumadhavan16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Severance16,
  author       = {Charles R. Severance},
  title        = {Bruce Schneier: The Security Mindset},
  journal      = {Computer},
  volume       = {49},
  number       = {2},
  pages        = {7--8},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.38},
  doi          = {10.1109/MC.2016.38},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Severance16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Severance16a,
  author       = {Charles R. Severance},
  title        = {Bruce Schneier: Building Cryptographic Systems},
  journal      = {Computer},
  volume       = {49},
  number       = {4},
  pages        = {13--15},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.114},
  doi          = {10.1109/MC.2016.114},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Severance16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Severance16b,
  author       = {Charles R. Severance},
  title        = {The Living Computer Museum},
  journal      = {Computer},
  volume       = {49},
  number       = {10},
  pages        = {12--13},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.324},
  doi          = {10.1109/MC.2016.324},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Severance16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ShaCMKYPYKPAB16,
  author       = {Lui Sha and
                  Marco Caccamo and
                  Renato Mancuso and
                  Jung{-}Eun Kim and
                  Man{-}Ki Yoon and
                  Rodolfo Pellizzoni and
                  Heechul Yun and
                  Russell Kegley and
                  Dennis R. Perlman and
                  Greg Arundale and
                  Richard M. Bradford},
  title        = {Real-Time Computing on Multicore Processors},
  journal      = {Computer},
  volume       = {49},
  number       = {9},
  pages        = {69--77},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.271},
  doi          = {10.1109/MC.2016.271},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ShaCMKYPYKPAB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ShethAH16,
  author       = {Amit P. Sheth and
                  Pramod Anantharam and
                  Cory A. Henson},
  title        = {Semantic, Cognitive, and Perceptual Computing: Paradigms That Shape
                  Human Experience},
  journal      = {Computer},
  volume       = {49},
  number       = {3},
  pages        = {64--72},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.75},
  doi          = {10.1109/MC.2016.75},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ShethAH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ShiD16,
  author       = {Weisong Shi and
                  Schahram Dustdar},
  title        = {The Promise of Edge Computing},
  journal      = {Computer},
  volume       = {49},
  number       = {5},
  pages        = {78--81},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.145},
  doi          = {10.1109/MC.2016.145},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ShiD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SimosKVK16,
  author       = {Dimitris E. Simos and
                  Rick Kuhn and
                  Artemios G. Voyiatzis and
                  Raghu Kacker},
  title        = {Combinatorial Methods in Security Testing},
  journal      = {Computer},
  volume       = {49},
  number       = {10},
  pages        = {80--83},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.314},
  doi          = {10.1109/MC.2016.314},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/SimosKVK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SinghVT16,
  author       = {Lalit Kumar Singh and
                  Gopika Vinod and
                  Anil Kumar Tripathi},
  title        = {Early Prediction of Software Reliability: {A} Case Study with a Nuclear
                  Power Plant System},
  journal      = {Computer},
  volume       = {49},
  number       = {1},
  pages        = {52--58},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.15},
  doi          = {10.1109/MC.2016.15},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/SinghVT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SkudlarekKC16,
  author       = {Joseph P. Skudlarek and
                  Tom Katsioulas and
                  Michael Chen},
  title        = {A Platform Solution for Secure Supply-Chain and Chip Life-Cycle Management},
  journal      = {Computer},
  volume       = {49},
  number       = {8},
  pages        = {28--34},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.243},
  doi          = {10.1109/MC.2016.243},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/SkudlarekKC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Spring16,
  author       = {Michael B. Spring},
  title        = {The Future of Standardization: Are We Destined to Repeat History?},
  journal      = {Computer},
  volume       = {49},
  number       = {1},
  pages        = {99--101},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.17},
  doi          = {10.1109/MC.2016.17},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Spring16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SprintCFS16,
  author       = {Gina Sprint and
                  Diane J. Cook and
                  Roschelle Fritz and
                  Maureen Schmitter{-}Edgecombe},
  title        = {Using Smart Homes to Detect and Analyze Health Events},
  journal      = {Computer},
  volume       = {49},
  number       = {11},
  pages        = {29--37},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.338},
  doi          = {10.1109/MC.2016.338},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/SprintCFS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/StavrouFK16,
  author       = {Angelos Stavrou and
                  Daniel Fleck and
                  Constantinos Kolias},
  title        = {On the Move: Evading Distributed Denial-of-Service Attacks},
  journal      = {Computer},
  volume       = {49},
  number       = {3},
  pages        = {104--107},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.85},
  doi          = {10.1109/MC.2016.85},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/StavrouFK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Steimle16,
  author       = {J{\"{u}}rgen Steimle},
  title        = {Skin-The Next User Interface},
  journal      = {Computer},
  volume       = {49},
  number       = {4},
  pages        = {83--87},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.93},
  doi          = {10.1109/MC.2016.93},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Steimle16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SuHRRSMHLH16,
  author       = {Xiang Su and
                  Jarkko Hyysalo and
                  Mika Rautiainen and
                  Jukka Riekki and
                  Jaakko J. Sauvola and
                  Altti Ilari Maarala and
                  Harri Hirvonsalo and
                  Pingjiang Li and
                  Harri Honko},
  title        = {Privacy as a Service: Protecting the Individual in Healthcare Data
                  Processing},
  journal      = {Computer},
  volume       = {49},
  number       = {11},
  pages        = {49--59},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.337},
  doi          = {10.1109/MC.2016.337},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/SuHRRSMHLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SubrahmanianADK16,
  author       = {V. S. Subrahmanian and
                  Amos Azaria and
                  Skylar Durst and
                  Vadim Kagan and
                  Aram Galstyan and
                  Kristina Lerman and
                  Linhong Zhu and
                  Emilio Ferrara and
                  Alessandro Flammini and
                  Filippo Menczer},
  title        = {The {DARPA} Twitter Bot Challenge},
  journal      = {Computer},
  volume       = {49},
  number       = {6},
  pages        = {38--46},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.183},
  doi          = {10.1109/MC.2016.183},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/SubrahmanianADK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SugiuraII16,
  author       = {Yuta Sugiura and
                  Takeo Igarashi and
                  Masahiko Inami},
  title        = {Cuddly User Interfaces},
  journal      = {Computer},
  volume       = {49},
  number       = {7},
  pages        = {14--19},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.196},
  doi          = {10.1109/MC.2016.196},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/SugiuraII16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SvoreT16,
  author       = {Krysta M. Svore and
                  Matthias Troyer},
  title        = {The Quantum Future of Computation},
  journal      = {Computer},
  volume       = {49},
  number       = {9},
  pages        = {21--30},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.293},
  doi          = {10.1109/MC.2016.293},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/SvoreT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Terry16,
  author       = {Doug Terry},
  title        = {Toward a New Approach to IoT Fault Tolerance},
  journal      = {Computer},
  volume       = {49},
  number       = {8},
  pages        = {80--83},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.238},
  doi          = {10.1109/MC.2016.238},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Terry16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/UllrichB16,
  author       = {Daniel Ullrich and
                  Andreas Butz},
  title        = {Social Robots for the 21st Century},
  journal      = {Computer},
  volume       = {49},
  number       = {6},
  pages        = {88--92},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.172},
  doi          = {10.1109/MC.2016.172},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/UllrichB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/VarshneyC16,
  author       = {Upkar Varshney and
                  Carl K. Chang},
  title        = {Smart Health and Well-Being},
  journal      = {Computer},
  volume       = {49},
  number       = {11},
  pages        = {11--13},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.351},
  doi          = {10.1109/MC.2016.351},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/VarshneyC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/VassilevS16,
  author       = {Apostol Vassilev and
                  Robert Staples},
  title        = {Entropy as a Service: Unlocking Cryptography's Full Potential},
  journal      = {Computer},
  volume       = {49},
  number       = {9},
  pages        = {98--102},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.275},
  doi          = {10.1109/MC.2016.275},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/VassilevS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/VecchiatoVM16,
  author       = {Daniel Vecchiato and
                  Marco Vieira and
                  Eliane Martins},
  title        = {The Perils of Android Security Configuration},
  journal      = {Computer},
  volume       = {49},
  number       = {6},
  pages        = {15--21},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.184},
  doi          = {10.1109/MC.2016.184},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/VecchiatoVM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Voas16,
  author       = {Jeffrey M. Voas},
  title        = {Demystifying the Internet of Things},
  journal      = {Computer},
  volume       = {49},
  number       = {6},
  pages        = {80--83},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.162},
  doi          = {10.1109/MC.2016.162},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Voas16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/VoasS16,
  author       = {Jeffrey M. Voas and
                  Kim Schaffer},
  title        = {Insights on Formal Methods in Cybersecurity},
  journal      = {Computer},
  volume       = {49},
  number       = {5},
  pages        = {102--105},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.131},
  doi          = {10.1109/MC.2016.131},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/VoasS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Walrad16,
  author       = {Charlene Chuck Walrad},
  title        = {The {IEEE} Computer Society and ACM's Collaboration on Computing Education},
  journal      = {Computer},
  volume       = {49},
  number       = {3},
  pages        = {88--91},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.67},
  doi          = {10.1109/MC.2016.67},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Walrad16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/WantPA16,
  author       = {Roy Want and
                  Trevor Pering and
                  Yuvraj Agarwal},
  title        = {Multidevice Interaction},
  journal      = {Computer},
  volume       = {49},
  number       = {12},
  pages        = {16--20},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.370},
  doi          = {10.1109/MC.2016.370},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/WantPA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/WeaverBB16,
  author       = {Alfred C. Weaver and
                  Greg Byrd and
                  Ren{\'{e}}e C. Bryce},
  title        = {Computing Tools and Techniques for Emergency Response},
  journal      = {Computer},
  volume       = {49},
  number       = {5},
  pages        = {16--18},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.128},
  doi          = {10.1109/MC.2016.128},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/WeaverBB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Wild16,
  author       = {Fridolin Wild},
  title        = {The Future of Learning at the Workplace Is Augmented Reality},
  journal      = {Computer},
  volume       = {49},
  number       = {10},
  pages        = {96--98},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.301},
  doi          = {10.1109/MC.2016.301},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Wild16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Wolf16,
  author       = {Marilyn Wolf},
  title        = {Embedded Software in Crisis},
  journal      = {Computer},
  volume       = {49},
  number       = {1},
  pages        = {88--90},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.18},
  doi          = {10.1109/MC.2016.18},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Wolf16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/WuTCM16,
  author       = {Xingfu Wu and
                  Valerie E. Taylor and
                  Jeanine E. Cook and
                  Philip J. Mucci},
  title        = {Using Performance-Power Modeling to Improve Energy Efficiency of {HPC}
                  Applications},
  journal      = {Computer},
  volume       = {49},
  number       = {10},
  pages        = {20--29},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.311},
  doi          = {10.1109/MC.2016.311},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/WuTCM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/XiaoNT16,
  author       = {Kan Xiao and
                  Adib Nahiyan and
                  Mark M. Tehranipoor},
  title        = {Security Rule Checking in {IC} Design},
  journal      = {Computer},
  volume       = {49},
  number       = {8},
  pages        = {54--61},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.226},
  doi          = {10.1109/MC.2016.226},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/XiaoNT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/XuJCWR16,
  author       = {Lei Xu and
                  Chunxiao Jiang and
                  Yan Chen and
                  Jian Wang and
                  Yong Ren},
  title        = {A Framework for Categorizing and Applying Privacy-Preservation Techniques
                  in Big Data Mining},
  journal      = {Computer},
  volume       = {49},
  number       = {2},
  pages        = {54--62},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.43},
  doi          = {10.1109/MC.2016.43},
  timestamp    = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/XuJCWR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Yang16,
  author       = {Qiang Yang},
  title        = {Cross-Domain Data Fusion},
  journal      = {Computer},
  volume       = {49},
  number       = {4},
  pages        = {18},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.113},
  doi          = {10.1109/MC.2016.113},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Yang16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/YangDFHZ16,
  author       = {Xin{-}She Yang and
                  Suash Deb and
                  Simon Fong and
                  Xingshi He and
                  Yuxin Zhao},
  title        = {From Swarm Intelligence to Metaheuristics: Nature-Inspired Optimization
                  Algorithms},
  journal      = {Computer},
  volume       = {49},
  number       = {9},
  pages        = {52--59},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.292},
  doi          = {10.1109/MC.2016.292},
  timestamp    = {Wed, 18 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/YangDFHZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/YangSSZA16,
  author       = {Xia Yang and
                  Peng Shi and
                  Haiyong Sun and
                  Wenxuan Zheng and
                  Jim Alves{-}Foss},
  title        = {A Fast Boot, Fast Shutdown Technique for Android {OS} Devices},
  journal      = {Computer},
  volume       = {49},
  number       = {7},
  pages        = {62--68},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.210},
  doi          = {10.1109/MC.2016.210},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/YangSSZA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/YuHYVD16,
  author       = {Hsiang{-}Fu Yu and
                  Cho{-}Jui Hsieh and
                  Hyokun Yun and
                  S. V. N. Vishwanathan and
                  Inderjit S. Dhillon},
  title        = {Nomadic Computing for Big Data Analytics},
  journal      = {Computer},
  volume       = {49},
  number       = {4},
  pages        = {52--60},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.116},
  doi          = {10.1109/MC.2016.116},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/YuHYVD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/YusofP16,
  author       = {Imran Yusof and
                  Al{-}Sakib Khan Pathan},
  title        = {Mitigating Cross-Site Scripting Attacks with a Content Security Policy},
  journal      = {Computer},
  volume       = {49},
  number       = {3},
  pages        = {56--63},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.76},
  doi          = {10.1109/MC.2016.76},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/YusofP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ZawoadH16,
  author       = {Shams Zawoad and
                  Ragib Hasan},
  title        = {Trustworthy Digital Forensics in the Cloud},
  journal      = {Computer},
  volume       = {49},
  number       = {3},
  pages        = {78--81},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.89},
  doi          = {10.1109/MC.2016.89},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ZawoadH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Zemrowski16,
  author       = {Kenneth M. Zemrowski},
  title        = {{NIST} Bases Flagship Security Engineering Publication on {ISO/IEC/IEEE}
                  15288: 2015},
  journal      = {Computer},
  volume       = {49},
  number       = {12},
  pages        = {86--88},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.373},
  doi          = {10.1109/MC.2016.373},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Zemrowski16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ZhangS16,
  author       = {Quan Zhang and
                  Weisong Shi},
  title        = {Energy-Efficient Workload Placement in Enterprise Datacenters},
  journal      = {Computer},
  volume       = {49},
  number       = {2},
  pages        = {46--52},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.58},
  doi          = {10.1109/MC.2016.58},
  timestamp    = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/ZhangS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ZhangYYMWEMZ16,
  author       = {Xing Zhang and
                  Zhenglei Yi and
                  Zhi Yan and
                  Geyong Min and
                  Wenbo Wang and
                  Ahmed Elmokashfi and
                  Sabita Maharjan and
                  Yan Zhang},
  title        = {Social Computing for Mobile Big Data},
  journal      = {Computer},
  volume       = {49},
  number       = {9},
  pages        = {86--90},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.267},
  doi          = {10.1109/MC.2016.267},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ZhangYYMWEMZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ZhangZWBH16,
  author       = {Qingpeng Zhang and
                  Daniel Dajun Zeng and
                  Fei{-}Yue Wang and
                  Ronald L. Breiger and
                  James A. Hendler},
  title        = {Brokers or Bridges? Exploring Structural Holes in a Crowdsourcing
                  System},
  journal      = {Computer},
  volume       = {49},
  number       = {6},
  pages        = {56--64},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.166},
  doi          = {10.1109/MC.2016.166},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ZhangZWBH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics