![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
IEEE Computer, Volume 49
Volume 49, Number 1, January 2016
- Roger U. Fujii:
Raising the Bar: Ensuring Quality Products and Services for Our Members. 4 - Sumi Helal
:
2016 Outlook: Humans in the Technology Loop. 7-9 - Paul Nikolich, Kenneth J. Christensen, Lori Cameron:
802 Standards. 10 - Lynette A. Jones:
Designing Effective Refreshable Braille Displays. 14 - Gregory D. Abowd:
Beyond Weiser: From Ubiquitous to Collective Computing. 17-23 - Carl K. Chang:
Situation Analytics: A Foundation for a New Software Engineering Paradigm. 24-33 - Zhihao Jiang
, Houssam Abbas, Kuk Jin Jang, Rahul Mangharam:
The Challenges of High-Confidence Medical Device Software. 34-42 - Dejan S. Milojicic
, Timothy Roscoe:
Outlook on Operating Systems. 43-51 - Lalit Kumar Singh, Gopika Vinod, Anil Kumar Tripathi:
Early Prediction of Software Reliability: A Case Study with a Nuclear Power Plant System. 52-58 - Hitesh Rajput, Tanmoy Som
, Soumitra Kar:
Using Radon Transform to Recognize Skewed Images of Vehicular License Plates. 59-65 - Kjell Jørgen Hole:
Building Trust in E-Government Services. 66-74 - Hal Berghel:
Digital Politics 2016. 75-79 - Dragutin Petkovic:
Using Learning Analytics to Assess Capstone Project Teams. 80-83 - Gary McGraw:
Four Software Security Findings. 84-87 - Marilyn Wolf:
Embedded Software in Crisis. 88-90 - Brian David Johnson:
Beyond Science Fiction: The American Dream. 91-93 - Andreas Bulling
:
Pervasive Attentive User Interfaces. 94-98 - Michael B. Spring:
The Future of Standardization: Are We Destined to Repeat History? 99-101 - Greg Byrd
:
IEEE/IBM Watson Student Showcase. 102-104 - David Alan Grier:
New Cycles of Technology. 120
Volume 49, Number 2, February 2016
- Charles R. Severance:
Bruce Schneier: The Security Mindset. 7-8 - Elisa Bertino:
Securing Mobile Applications. 9 - Schahram Dustdar
:
Cloud Computing. 12-13 - Fernando Díaz-del-Río
, Javier J. Salmerón-García, José Luis Sevillano
:
Extending Amdahl's Law for the Cloud Computing Era. 14-22 - Alireza Khoshkbarforoushha, Meisong Wang, Rajiv Ranjan
, Lizhe Wang, Leila Alem, Samee Ullah Khan
, Boualem Benatallah
:
Dimensions for Evaluating Cloud Resource Orchestration Frameworks. 24-33 - Talal H. Noor, Quan Z. Sheng
, Zakaria Maamar
, Sherali Zeadally:
Managing Trust in the Cloud: State of the Art and Research Challenges. 34-45 - Quan Zhang, Weisong Shi
:
Energy-Efficient Workload Placement in Enterprise Datacenters. 46-52 - Lei Xu, Chunxiao Jiang, Yan Chen, Jian Wang, Yong Ren:
A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining. 54-62 - Hal Berghel:
Secretocracy. 63-67 - Mahmoud Barhamgi
, Arosha K. Bandara
, Yijun Yu
, Khalid Belhajjame, Bashar Nuseibeh
:
Protecting Privacy in the Cloud: Current Practices, Future Directions. 68-72 - Nir Kshetri:
Gambling with Source Code. 74-77 - Brian David Johnson, David H. Guston:
Futures We Want to Inhabit. 78-79 - Vint Cerf, Max Senges:
Taking the Internet to the Next Physical Level. 80-86 - David Alan Grier:
The Post-MOOC World. 104
Volume 49, Number 3, March 2016
- Leila De Floriani:
Using 2D Maps for 3D Localization. 5 - Ying-Dar Lin, Jeffrey M. Voas, Antonio Pescapè, Peter Mueller
:
Communications and Privacy under Surveillance. 10-13 - Steven M. Bellovin, Matt Blaze, Susan Landau:
Insecure Surveillance: Technical Issues with Remote Computer Searches. 14-24 - Steven J. Murdoch
:
Insecure by Design: Protocols for Encrypted Phone Calls. 25-33 - Stephen Farrell:
Requirements Analysis Required-Otherwise Targeted Monitoring Enables Pervasive Monitoring. 34-40 - Robert Koch, Mario Golling, Gabi Dreo Rodosek:
How Anonymous Is the Tor Network? A Long-Term Black-Box Investigation. 42-49 - Hassan Metwalley, Stefano Traverso, Marco Mellia
:
Using Passive Measurements to Demystify Online Trackers. 50-55 - Imran Yusof, Al-Sakib Khan Pathan
:
Mitigating Cross-Site Scripting Attacks with a Content Security Policy. 56-63 - Amit P. Sheth, Pramod Anantharam, Cory A. Henson:
Semantic, Cognitive, and Perceptual Computing: Paradigms That Shape Human Experience. 64-72 - Hal Berghel:
Net Neutrality vs. Net Neutering. 73-77 - Shams Zawoad, Ragib Hasan
:
Trustworthy Digital Forensics in the Cloud. 78-81 - Robert N. Charette:
The STEM Anxiety Business. 82-87 - Charlene Chuck Walrad:
The IEEE Computer Society and ACM's Collaboration on Computing Education. 88-91 - Karen Bartleson:
Practical Insights from the Peculiar World of Standards. 92-96 - Gaurav Misra, Jose M. Such:
How Socially Aware Are Social Media Privacy Controls? 96-99 - Greg Byrd
:
Immortal Bits: Managing Our Digital Legacies. 100-103 - Angelos Stavrou
, Daniel Fleck, Constantinos Kolias:
On the Move: Evading Distributed Denial-of-Service Attacks. 104-107 - David Alan Grier:
Go, Stop, Go, Stop. 128
Volume 49, Number 4, April 2016
- Brian M. Gaff:
The Need for Speed. 10-12 - Charles R. Severance:
Bruce Schneier: Building Cryptographic Systems. 13-15 - W. Neville Holmes:
32 & 16 Years Ago. 16-17 - Qiang Yang:
Cross-Domain Data Fusion. 18 - Naren Ramakrishnan, Ravi Kumar:
Big Data. 20-22 - Jignesh M. Patel:
Operational NoSQL Systems: What's New and What's Next? 23-30 - Venkat N. Gudivada, Dhana Rao, Vijay V. Raghavan:
Renaissance in Database Management: Navigating the Landscape of Candidate Systems. 31-42 - Giovanni Cherubini, Jens Jelitto, Vinodh Venkatesan:
Cognitive Storage for Big Data. 43-51 - Hsiang-Fu Yu, Cho-Jui Hsieh, Hyokun Yun, S. V. N. Vishwanathan, Inderjit S. Dhillon:
Nomadic Computing for Big Data Analytics. 52-60 - Asmaa Elbadrawy, Agoritsa Polyzou
, Zhiyun Ren, Mackenzie Sweeney, George Karypis
, Huzefa Rangwala:
Predicting Student Performance Using Personalized Analytics. 61-69 - Behrooz Parhami:
Low Acceptance Rates of Conference Papers Considered Harmful. 70-73 - Hal Berghel:
The Bogus Science Theorem (and the Junk Science Wager). 74-78 - Erik P. DeBenedictis:
The Boolean Logic Tax. 79-82 - Jürgen Steimle
:
Skin-The Next User Interface. 83-87 - Yuvraj Agarwal, Anind K. Dey:
Toward Building a Safe, Secure, and Easy-to-Use Internet of Things Infrastructure. 88-91 - Michael Bennett:
Afrofuturism. 92-93 - John C. Knight, Jack W. Davidson, Anh Nguyen-Tuong, Jason Hiser, Michele Co:
Diversity in Cybersecurity. 94-98 - David Alan Grier:
The Global Profession. 120
Volume 49, Number 5, May 2016
- H. Chad Lane, David A. Forsyth:
Virtual Learning and Object Reconstruction. 14-15 - Alfred C. Weaver
, Greg Byrd
, Renée C. Bryce:
Computing Tools and Techniques for Emergency Response. 16-18 - Robin R. Murphy:
Emergency Informatics: Using Computing to Improve Disaster Management. 19-27 - Marco Avvenuti, Stefano Cresci
, Fabio Del Vigna
, Maurizio Tesconi
:
Impromptu Crisis Mapping to Prioritize Emergency Response. 28-37 - Alper Bozkurt, Edgar J. Lobaton
, Mihail L. Sichitiu
:
A Biobotic Distributed Sensor Network for Under-Rubble Search and Rescue. 38-46 - Liliya I. Besaleva, Alfred C. Weaver
:
Applications of Social Networks and Crowdsourcing for Disaster Management Improvement. 47-53 - Henri E. Bal, Dick H. J. Epema, Cees de Laat, Rob van Nieuwpoort
, John W. Romein, Frank J. Seinstra, Cees Snoek, Harry A. G. Wijshoff:
A Medium-Scale Distributed System for Computer Science Research: Infrastructure for the Long Term. 54-63 - Sebastian Gayer, Andrea Herrmann, Thorsten Keuler, Matthias Riebisch, Pablo Oliveira Antonino:
Lightweight Traceability for the Agile Architect. 64-71 - Hal Berghel:
Attenuated FAQs. 73-77 - Weisong Shi
, Schahram Dustdar
:
The Promise of Edge Computing. 78-81 - John Leslie King, Jonathan Grudin:
Will Computers Put Us Out of Work? 82-85 - Phillip A. Laplante, Jeffrey M. Voas, Nancy L. Laplante:
Standards for the Internet of Things: A Case Study in Disaster Response. 87-90 - Omar Niamut
, Mu Mu, Spyros G. Denazis, Nicholas J. P. Race
:
Social Telemedia: The Relationship between Social Information and Networked Media. 92-97 - Greg Byrd
:
Home Sweet Mind-Controlled Home. 98-101 - Jeffrey M. Voas, Kim Schaffer
:
Insights on Formal Methods in Cybersecurity. 102-105 - David Alan Grier:
Technological Improvisation. 128
Volume 49, Number 6, June 2016
- Mohamed Ibrahim, Krishnendu Chakrabarty
:
Digital-Microfluidic Biochips. 8-9 - Elisa Bertino:
Security Threats: Protecting the New Cyberfrontier. 11-14 - Daniel Vecchiato, Marco Vieira
, Eliane Martins:
The Perils of Android Security Configuration. 15-21 - David Kotz
, Carl A. Gunter, Santosh Kumar, Jonathan P. Weiner:
Privacy and Security in Mobile Health: A Research Agenda. 22-30 - Ronald Prescott Loui, Terrence D. Loui:
How to Survive a Cyber Pearl Harbor. 31-37 - V. S. Subrahmanian, Amos Azaria
, Skylar Durst, Vadim Kagan, Aram Galstyan, Kristina Lerman, Linhong Zhu, Emilio Ferrara
, Alessandro Flammini, Filippo Menczer:
The DARPA Twitter Bot Challenge. 38-46 - Tsong Yueh Chen
, Fei-Ching Kuo, Wenjuan Ma, Willy Susilo
, Dave Towey
, Jeffrey M. Voas, Zhi Quan Zhou
:
Metamorphic Testing for Cybersecurity. 48-55 - Qingpeng Zhang, Daniel Dajun Zeng, Fei-Yue Wang, Ronald L. Breiger
, James A. Hendler
:
Brokers or Bridges? Exploring Structural Holes in a Crowdsourcing System. 56-64 - Qiuming Luo, Feng Xiao, Zhong Ming, Hao Li, Jianyong Chen, Jianhua Zhang:
Optimizing the Memory Management of a Virtual Machine Monitor on a NUMA System. 66-74 - Sorel Reisman, Eli Shmueli:
Opening the Instructional Doors to Computer Science and IT-Finally. 77-79 - Jeffrey M. Voas:
Demystifying the Internet of Things. 80-83 - Erik P. DeBenedictis:
Rebooting Computers as Learning Machines. 84-87 - Daniel Ullrich, Andreas Butz:
Social Robots for the 21st Century. 88-92 - Brian David Johnson:
Science Fiction and the Coming Age of Sentient Tools. 95-97 - Kateryna Netkachova, Robin E. Bloomfield:
Security-Informed Safety. 98-102 - David Alan Grier:
Scientific Conversations. 120
Volume 49, Number 7, July 2016
- Björn W. Schuller
, Jian Pei
:
Using Computer Intelligence for Depression Diagnosis and Crowdsourcing. 8-9 - Antti Oulasvirta
, Gregory D. Abowd:
User Interface Design in the 21st Century. 11-13 - Yuta Sugiura, Takeo Igarashi, Masahiko Inami
:
Cuddly User Interfaces. 14-19 - Daisuke Sakamoto
, Yuta Sugiura, Masahiko Inami
, Takeo Igarashi:
Graphical Instruction for Home Robots. 20-25 - John M. Carroll, Jiawei Chen, Tina Chien-Wen Yuan, Benjamin V. Hanrahan:
In Search of Coproduction: Smart Services as Reciprocal Activities. 26-32 - Jun Kato
, Takeo Igarashi, Masataka Goto:
Programming with Examples to Develop Data-Intensive User Interfaces. 34-42 - Brad A. Myers, Amy J. Ko, Thomas D. LaToza, YoungSeok Yoon:
Programmers Are Users Too: Human-Centered Methods for Improving Programming Tools. 44-52 - Samuel Kounev, Nikolaus Huber, Fabian Brosig, Xiaoyun Zhu:
A Model-Based Approach to Designing Self-Aware IT Systems and Infrastructures. 53-61 - Xia Yang, Peng Shi, Haiyong Sun, Wenxuan Zheng, Jim Alves-Foss:
A Fast Boot, Fast Shutdown Technique for Android OS Devices. 62-68 - Peter Bajcsy
, Antoine Vandecreme, Julien Amelot, Joe Chalfoun, Michael Majurski, Mary Brady:
Enabling Stem Cell Characterization from Large Microscopy Images. 70-79 - David Alan Grier:
Free Tuition for Community College: A Role for the Tech Community? 80-82 - Hal Berghel:
The Dictator's (False) Dilemma. 84-87 - Norman S. Matloff:
The H-1B Visa Controversy. 88-93 - Greg Byrd
:
Let the Sun Shine. 94-97 - George F. Hurlburt
:
"Good Enough" Security: The Best We'll Ever Have. 98-101 - David Alan Grier:
Aware of the Situation. 120
Volume 49, Number 8, August 2016
- David A. Bader
:
Evolving MPI+X Toward Exascale. 10 - Domenic Forte
, Ron Perez, Yongdae Kim
, Swarup Bhunia
:
Supply-Chain Security for Cyberinfrastructure [Guest editors' introduction]. 12-16 - Parrish Ralston, David Fry, Scott Suko, Bryce Winters, Matthew King, Robert Kober:
Defeating counterfeiters with microscopic dielets embedded in electronic components. 18-26 - Joseph P. Skudlarek, Tom Katsioulas, Michael Chen:
A Platform Solution for Secure Supply-Chain and Chip Life-Cycle Management. 28-34 - Sk Subidh Ali
, Mohamed Ibrahim, Jeyavijayan Rajendran, Ozgur Sinanoglu
, Krishnendu Chakrabarty
:
Supply-Chain Security of Digital Microfluidic Biochips. 36-43 - Wei Hu
, Baolei Mao
, Jason Oberg, Ryan Kastner
:
Detecting Hardware Trojans with Gate-Level Information-Flow Tracking. 44-52 - Kan Xiao, Adib Nahiyan, Mark M. Tehranipoor:
Security Rule Checking in IC Design. 54-61 - Olav Lysne, Kjell Jørgen Hole, Christian Otterstad, Øyvind Ytrehus, Raymond Aarseth, Jorgen Tellnes:
Vendor Malware: Detection Limits and Mitigation. 62-69 - Kim Schaffer
, Jeffrey M. Voas:
What Happened to Formal Methods for Security? 70-79 - Doug Terry:
Toward a New Approach to IoT Fault Tolerance. 80-83 - Claude Y. Laporte, Rory V. O'Connor
:
Systems and Software Engineering Standards for Very Small Entities: Accomplishments and Overview. 84-87 - Erik P. DeBenedictis:
The Search for Computing's Secretariat. 88-91 - Celia Paulsen
:
Cybersecuring Small Businesses. 92-97 - Hal Berghel:
The Pollyanna Delusion. 98-102 - Xiangshi Ren
:
Rethinking the Relationship between Humans and Computers. 104-108 - Evan Atherton:
Science Fiction Prototyping at Work. 109-111 - Amir Vahid Dastjerdi, Rajkumar Buyya:
Fog Computing: Helping the Internet of Things Realize Its Potential. 112-116 - David Alan Grier:
Changing Trust. 156
Volume 49, Number 9, September 2016
- Paolo Montuschi, Jean-Michel Muller
:
Modern Computer Arithmetic. 12 - San Murugesan
, Bob Colwell:
Next-Generation Computing Paradigms. 14-20 - Krysta M. Svore, Matthias Troyer:
The Quantum Future of Computation. 21-30 - Rodney Van Meter
, Simon J. Devitt
:
The Path to Scalable Distributed Quantum Computing. 31-42 - Victoria Coleman:
Embodied Molecular Computation: Potential and Challenges. 43-51 - Xin-She Yang, Suash Deb, Simon Fong, Xingshi He, Yuxin Zhao:
From Swarm Intelligence to Metaheuristics: Nature-Inspired Optimization Algorithms. 52-59 - Sameer Saproo, Josef Faller, Victor Shih, Paul Sajda, Nicholas R. Waytowich, Addison W. Bohannon
, Vernon J. Lawhern, Brent J. Lance, David C. Jangraw:
Cortically Coupled Computing: A New Paradigm for Synergistic Human-Machine Interaction. 60-68 - Lui Sha, Marco Caccamo, Renato Mancuso
, Jung-Eun Kim, Man-Ki Yoon, Rodolfo Pellizzoni, Heechul Yun, Russell Kegley, Dennis R. Perlman, Greg Arundale, Richard M. Bradford:
Real-Time Computing on Multicore Processors. 69-77 - Massimo Maresca:
The Spreadsheet Space: Eliminating the Boundaries of Data Cross-Referencing. 78-85 - Xing Zhang, Zhenglei Yi, Zhi Yan, Geyong Min
, Wenbo Wang, Ahmed Elmokashfi, Sabita Maharjan, Yan Zhang:
Social Computing for Mobile Big Data. 86-90 - Scott Campbell:
Teaching Cloud Computing. 91-93 - Greg Byrd
:
Seeing Is Understanding. 94-97 - Apostol Vassilev, Robert Staples:
Entropy as a Service: Unlocking Cryptography's Full Potential. 98-102 - Hal Berghel:
Coda in the Key of F2654hD4. 104-109 - Sanjay Kumar Madria:
Security and Risk Assessment in the Cloud. 110-113 - Robert N. Charette:
Dragging Government Legacy Systems Out of the Shadows. 114-119 - David Alan Grier:
The Means of Production. 144
Volume 49, Number 10, October 2016
- Simha Sethumadhavan:
Hardware-Enforced Privacy. 10 - Charles R. Severance:
The Living Computer Museum. 12-13 - Vladimir Getov, Adolfy Hoisie, Pradip Bose:
New Frontiers in Energy-Efficient Computing [Guest editors' introduction]. 14-18 - Xingfu Wu, Valerie E. Taylor
, Jeanine E. Cook, Philip J. Mucci:
Using Performance-Power Modeling to Improve Energy Efficiency of HPC Applications. 20-29 - Bilge Acun, Akhil Langer, Esteban Meneses, Harshitha Menon, Osman Sarood, Ehsan Totoni, Laxmikant V. Kalé:
Power, Reliability, and Performance: One System to Rule them All. 30-37 - Ryan E. Grant, Michael J. Levenhagen, Stephen L. Olivier
, David Debonis
, Kevin T. Pedretti, James H. Laros III:
Standardizing Power Monitoring and Control at Exascale. 38-46 - Efraim Rotem, Uri C. Weiser, Avi Mendelson, Ran Ginosar, Eliezer Weissmann, Yoni Aizik:
H-EARtH: Heterogeneous Multicore Platform Energy Management. 47-55 - Cory E. Merkel, Raqibul Hasan, Nicholas Soures, Dhireesha Kudithipudi, Tarek M. Taha, Sapan Agarwal
, Matthew J. Marinella:
Neuromemristive Systems: Boosting Efficiency through Brain-Inspired Computing. 56-64 - Gowtham Atluri, Angus W. MacDonald III
, Kelvin O. Lim
, Vipin Kumar:
The Brain-Network Paradigm: Using Functional Imaging Data to Study How the Brain Works. 65-71 - David S. Linthicum:
Responsive Data Architecture for the Internet of Things. 72-75 - Erik P. DeBenedictis, R. Stanley Williams
:
Help Wanted: A Modern-Day Turing. 76-79 - Dimitris E. Simos, Rick Kuhn, Artemios G. Voyiatzis, Raghu Kacker:
Combinatorial Methods in Security Testing. 80-83 - Hal Berghel:
Douglas Jones on Today's Voting Machines. 84-89 - Giulio Jacucci
:
Beyond Search Queries. 90-93 - Ryan Lee:
Threatcasting. 94-95 - Fridolin Wild
:
The Future of Learning at the Workplace Is Augmented Reality. 96-98 - David Alan Grier:
Innovating for Tomorrow. 112
Volume 49, Number 11, November 2016
- Matthew B. Dwyer
:
Finding Flaws in Natural Language Requirements. 10 - Upkar Varshney, Carl K. Chang:
Smart Health and Well-Being. 11-13 - S. Jay Olshansky, Bruce A. Carnes, Yang Claire Yang, Norvell Miller, Janet Anderson, Hiram Beltran-Sanchez, Karl Ricanek:
The Future of Smart Health. 14-21 - Noel Carroll
:
Key Success Factors for Smart and Connected Health Software Solutions. 22-28 - Gina Sprint, Diane J. Cook, Roschelle Fritz, Maureen Schmitter-Edgecombe:
Using Smart Homes to Detect and Analyze Health Events. 29-37 - Shurouq Hijazi, Alex Page, Burak Kantarci, Tolga Soyata
:
Machine Learning in Cardiac Health Monitoring and Decision Support. 38-48 - Xiang Su, Jarkko Hyysalo, Mika Rautiainen, Jukka Riekki, Jaakko J. Sauvola, Altti Ilari Maarala, Harri Hirvonsalo, Pingjiang Li, Harri Honko:
Privacy as a Service: Protecting the Individual in Healthcare Data Processing. 49-59 - Humberto Cervantes
, Rick Kazman, Jungwoo Ryoo
, Duyoung Choi, Duksung Jang:
Architectural Approaches to Security: Four Case Studies. 60-67 - Po-Ching Lin, Ying-Dar Lin, Cheng-Ying Wu, Yuan-Cheng Lai, Yi-Chih Kao:
Balanced Service Chaining in Software-Defined Networks with Network Function Virtualization. 68-76 - Amir Banifatemi, Jean-Luc Gaudiot:
Engineering the New Boundaries of AI. 77-79 - Vasant Dhar:
Equity, Safety, and Privacy in the Autonomous Vehicle Era. 80-83 - Alexander Kott, Ananthram Swami, Bruce J. West:
The Fog of War in Cyberspace. 84-87 - Greg Byrd
:
Tactile Digital Braille Display. 88-90 - Hal Berghel:
Chasing Elbridge's Ghost: The Digital Gerrymander. 91-95 - Dimitrios G. Kogias
, Michael G. Xevgenis, Charalampos Z. Patrikakis
:
Cloud Federation and the Evolution of Cloud Computing. 96-99 - David Alan Grier:
"I'm Not a Computer Scientist, but ...". 104
Volume 49, Number 12, December 2016
- Roger U. Fujii:
Our Journey to the Future. 6-9 - Ali Jadbabaie:
Defining Data Clusters. 15 - Roy Want, Trevor Pering, Yuvraj Agarwal:
Multidevice Interaction. 16-20 - Jarno Leppanen, Mikko Pelkonen, Haipeng Guo, Samuli Hemminki, Petteri Nurmi
, Sasu Tarkoma:
Collaborative and Energy-Efficient Speech Monitoring on Smart Devices. 22-30 - Carlo Pinciroli, Giovanni Beltrame:
Swarm-Oriented Programming of Distributed Robot Networks. 32-41 - Timothy Neate, Matt Jones, Michael Evans:
Interdevice Media: Choreographing Content to Maximize Viewer Engagement. 42-49 - Tomás Bures
, Frantisek Plásil
, Michal Kit, Petr Tuma
, Nicklas Hoch:
Software Abstractions for Component Interaction in the Internet of Things. 50-59 - Charith Perera, Chang Liu, Rajiv Ranjan
, Lizhe Wang, Albert Y. Zomaya
:
Privacy-Knowledge Modeling for the Internet of Things: A Look Back. 60-68 - Alexander Kott, Ananthram Swami, Bruce J. West:
The Internet of Battle Things. 70-75 - Erik P. DeBenedictis:
Computational Complexity and New Computing Approaches. 76-79 - Vincent C. Hu
, Rick Kuhn:
Access Control Policy Verification. 80-83 - Brian David Johnson:
So Long, and Thanks for All the Robots. 84-85 - Kenneth M. Zemrowski:
NIST Bases Flagship Security Engineering Publication on ISO/IEC/IEEE 15288: 2015. 86-88 - David Alan Grier:
Fifteen Years to Open Source. 96
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.