


default search action
IEEE Computer, Volume 53
Volume 53, Number 1, January 2020
- Karl Ricanek
:
Kinship Verification. 7-8 - Erich J. Neuhold:
50 & 25 Years Ago. 9-12 - Jeffrey M. Voas:
A Value-Added Gem. 13-14 - Jeffrey M. Voas
:
Outlooks on Diverse Technologies. 16-17 - Nir Kshetri
:
Blockchain-Based Financial Technologies and Cryptocurrencies for Low-Income People: Technical Potential Versus Practical Reality. 18-29 - Celia Paulsen
:
The Future of IT Operational Technology Supply Chains. 30-36 - Rick Kuhn
, Raghu N. Kacker, Yu Lei, Dimitris E. Simos:
Input Space Coverage Matters. 37-44 - Loren E. Peitso, James Bret Michael
:
The Promise of Interactive Shared Augmented Reality. 45-52 - Munindar P. Singh
, Amit K. Chopra
:
Computational Governance and Violable Contracts for Blockchain Applications. 53-62 - Simo Johannes Hosio
, Niels van Berkel
, Jonas Oppenlaender
, Jorge Gonçalves
:
Crowdsourcing Personalized Weight Loss Diets. 63-71 - Hal Berghel
:
A Critical Look at the 2019 College Admissions Scandal? 72-77 - David Alan Grier
:
The Manual Memex. 78-80 - Arndt Lüder
:
Flexibility in Production Systems by Exploiting Cyberphysical Systems. 81-85 - Nir Kshetri
, Jeffrey M. Voas
:
Thoughts on General Data Protection Regulation and Online Human Surveillance. 86-90
Volume 53, Number 2, February 2020
- Xin Peng:
Helping Developers Analyze and Debug Industrial Microservice Systems. 4-5 - Erich J. Neuhold:
50 & 25 Years Ago. 9-11 - Jeffrey M. Voas:
Reinventing Wheels. 12-13 - Ergun Akleman
:
Computing Through Time: Flying. 13 - Dejan S. Milojicic
:
Accelerators for Artificial Intelligence and High-Performance Computing. 14-22 - Sumi Helal
:
Digital Health: E-Coaching and Remote Monitoring. 23-25 - Wenbing Zhao, Xiongyi Liu, Tie Qiu, Xiong Luo:
Virtual Avatar-Based Life Coaching for Children With Autism Spectrum Disorder. 26-34 - Taqdir Ali
, Muhammad Afzal
, Hyeong Won Yu, Ubaid Ur Rehman, Ho-Seong Han, June Young Choi, Arif Jamshed, Jamil Hussain
, Muhammad Bilal Amin
, Musarrat Hussain, Usman Akhtar
, Wajahat Ali Khan
, Sungyoung Lee
, Byeong Ho Kang
, Maqbool Hussain:
The Intelligent Medical Platform: A Novel Dialogue-Based Platform for Health-Care Services. 35-45 - Ankush Manocha
, Ramandeep Singh
, Prabal Verma:
An Internet of Things Fog-Assisted Sleep-Deprivation Prediction Framework for Spinal Cord Injury Patients. 46-56 - Shuchi Dhir
, Sumithra Devi K. A:
The Use of Biometric Fingerprints for On-the-Fly Digital Signing of Documents. 57-67 - Riccardo Mariani
:
IEEE Computer Society Standards Activities Board: Adapting to a Changing World. 68-70 - Mary Theofanos
:
Is Usable Security an Oxymoron? 71-74 - Oliver Barker
:
Realizing the Promise of the Internet of Things in Smart Buildings. 76-79 - Mark Campbell
:
Automated Coding: The Quest to Develop Programs That Write Programs. 80-82 - Tomas Gustavsson
:
Managing the Open Source Dependency. 83-87 - David Alan Grier
:
Reflecting on CAP. 88-90 - Erik P. DeBenedictis
:
Beyond Quantum Supremacy. 91-94
Volume 53, Number 3, March 2020
- Erich J. Neuhold:
50 & 25 Years Ago. 7-10 - Dongliang Xue
, Linpeng Huang
, Chao Li, Chentao Wu:
Dapper: An Adaptive Manager for Large-Capacity Persistent Memory. 11-13 - Marilyn Wolf
:
Distributed Data Analysis and Reliable Operation of Cyberphysical Systems. 14-15 - Munehiro Fukuda
, Collin Gordon, Utku Mert, Matthew Sell:
An Agent-Based Computational Framework for Distributed Data Analysis. 16-25 - Hui Lin
, Homa Alemzadeh, Zbigniew Kalbarczyk, Ravishankar K. Iyer
:
Challenges and Opportunities in the Detection of Safety-Critical Cyberphysical Attacks. 26-37 - Yahya Javed
, Muhamad Felemban
, Tawfeeq A. Shawly
, Jason Kobes, Arif Ghafoor
:
A Partition-Driven Integrated Security Architecture for Cyberphysical Systems. 47-56 - Xenofon D. Koutsoukos:
Systems Science of Secure and Resilient Cyberphysical Systems. 57-61 - Nir Kshetri
, Jeffrey M. Voas:
5G, Security, and You. 62-66 - Hal Berghel
:
The Sokol Hoax: A 25-Year Retrospective. 67-72 - David Alan Grier
:
Top Influence. 74-76 - Hal Berghel
:
New Perspectives on (Anti)Social Media. 77-82 - Marilyn Wolf:
In Memoriam: Dan Dobberpuhl. 83
Volume 53, Number 4, April 2020
- Daniel J. Sorin
:
Computer Architecture for Orbital Edge Computing. 7-8 - Erich J. Neuhold:
50 & 25 Years Ago. 9-12 - Ergun Akleman
:
Computing Through Time: Artificial Life. 10 - Jeffrey M. Voas:
Thoughts on Complexity, Trust, and Truth. 13-14 - Rick Kuhn, M. S. Raunak:
Narrow Spectrum Software Testing Addressing Complexity and Trust. 15-18 - Jeffrey M. Voas:
In This Issue. 17 - Steve Hodges
, Sue Sentance
, Joe Finney
, Thomas Ball:
Physical Computing: A Key Element of Modern Computer Science Education. 20-30 - Mohiuddin Ahmed
, Al-Sakib Khan Pathan
:
Blockchain: Can It Be Trusted? 31-35 - Fabrizio Lamberti
, Alberto Cannavò
, Paolo Montuschi
:
Is Immersive Virtual Reality the Ultimate Interface for 3D Animators? 36-45 - Sha Wei
, Yuanye Ma, Ruiqi Li, Lin Hu:
Toward Smart Manufacturing: Key Technologies and Trends Driving Standardization. 46-50 - Doron Drusinsky, James Bret Michael
:
Obtaining Trust in Executable Derivatives Using Crowdsourced Critiques With Blind Signatures. 51-56 - Thomas Kubitza, Patrick Bader, Matthias Mogerle, Albrecht Schmidt
:
Developing IoT Systems: It's All About the Software. 58-62 - Mark Campbell
:
DNA Data Storage: Automated DNA Synthesis and Sequencing Are Key to Unlocking Virtually Unlimited Data Storage. 63-67 - Dirk Riehle
:
Single-Vendor Open Source Firms. 68-72 - David Alan Grier
:
The Outward Spiral. 73-76 - Erik P. DeBenedictis
:
The Quantum Moonshot. 77-80
Volume 53, Number 5, May 2020
- Erich J. Neuhold:
50 & 25 Years Ago. 7-9 - Charalambos Konstantinou, Saraju P. Mohanty
:
Cybersecurity for the Smart Grid. 10-12 - Astha Chawla
, Prakhar Agrawal, Animesh Singh, Bijaya Ketan Panigrahi, Kolin Paul, Bhavesh R. Bhalja
:
Denial-of-Service Resilient Frameworks for Synchrophasor-Based Wide Area Monitoring Systems. 14-24 - David Smith
, Peng Wang, Ming Ding
, Jonathan Chan, Brian Spak, Xinlong Guan, Paul Tyler, Thierry Rakotoarivelo, Zihuai Lin
, Tariq Abbasi:
Privacy-Preserved Optimal Energy Trading, Statistics, and Forecasting for a Neighborhood Area Network. 25-34 - Bibek Shrestha, Hui Lin
:
Data-Centric Edge Computing to Defend Power Grids Against IoT-Based Attacks. 35-43 - Mohammed Masum Siraj Khan, Alejandro Palomino
, Jonathon Brugman, Jairo Giraldo, Sneha Kumar Kasera, Masood Parvania
:
The Cyberphysical Power System Resilience Testbed: Architecture and Applications. 44-54 - Carlos A. Barreto
, Himanshu Neema, Xenofon D. Koutsoukos
:
Attacking Electricity Markets Through IoT Devices. 55-62 - Jiahao Xie
, A. P. Sakis Meliopoulos:
Sensitive Detection of GPS Spoofing Attack in Phasor Measurement Units via Quasi-Dynamic State Estimation. 63-72 - Sumi Helal
:
The Monkey, the Ant, and the Elephant: Addressing Safety in Smart Spaces. 73-76 - Bruce Schneier
:
Attacking Machine Learning Systems. 78-80 - James Bret Michael
, George W. Dinolt, Doron Drusinsky:
Open Questions in Formal Methods. 81-84 - Hal Berghel
:
The Equifax Hack Revisited and Repurposed. 85-90 - David Alan Grier
:
Mechanical Trust. 91-92
Volume 53, Number 6, June 2020
- Xiaotie Deng, Tao Xiao, Keyu Zhu:
Learn to Play Maximum Revenue Auction. 7-8 - Erich J. Neuhold:
50 & 25 Years Ago. 9-12 - Ergun Akleman
:
Computing Through Time. 11 - Jeffrey M. Voas
, Phil Laplante:
Cyberpandemics. 13-15 - Jeffrey M. Voas
:
In This Issue. 14 - James Bret Michael, D. Richard Kuhn
, Jeffrey M. Voas:
Cyberthreats in 2025. 16-27 - Behrooz Parhami
:
Reliability Inversion: A Cautionary Tale. 28-33 - Mehmet Demir
, Ozgur Turetken
, Atefeh Mashatan:
An Enterprise Transformation Guide for the Inevitable Blockchain Disruption. 34-43 - Claudio Bettini
, Salil S. Kanhere
, Marc Langheinrich
, Archan Misra
, Delphine Reinhardt
:
Is Privacy Regulation Slowing Down Research on Pervasive Computing? 44-52 - Robby Robson
:
IEEE SA Open: Engaging Industry, Academia, and Researchers in Open Source Development. 53-56 - Gary McGraw
, Richie Bonett, Victor Shepardson, Harold Figueroa:
The Top 10 Risks of Machine Learning Security. 57-61 - Sean W. Smith
:
Securing the Internet of Things: An Ongoing Challenge. 62-66 - Marcello Caleffi
, Daryus Chandra
, Daniele Cuomo
, Shima Hassanpour, Angela Sara Cacciapuoti:
The Rise of the Quantum Internet. 67-72 - Mark Campbell
:
Inference Acceleration: Adding Brawn to the Brains. 73-76 - Nikolay Harutyunyan
:
Managing Your Open Source Supply Chain-Why and How? 77-81 - David Alan Grier
:
An Ambassador for Neural Networks. 82-84
Volume 53, Number 7, July 2020
- Elisabeth André
:
Is Artificial Intelligence Able to Help With Pain Assessment? 7-8 - Erich J. Neuhold:
50 & 25 Years Ago. 9-11 - Ergun Akleman
:
Computing Through Time: Social Distancing. 11 - Jeffrey M. Voas:
The "Patching" Mentality. 12-13 - Karthik Nandakumar, Nalini K. Ratha, Sharath Pankanti
, Alex Pentland, Maurice Herlihy:
Blockchain: From Technology to Marketplaces. 14-18 - Sean Cao, Lin William Cong, Meng Han
, Qixuan Hou, Baozhong Yang
:
Blockchain Architecture for Auditing Automation and Trust Building in Public Markets. 20-28 - Neetesh Saxena
, Ieuan Thomas, Prosanta Gope
, Pete Burnap
, Neeraj Kumar
:
PharmaCrypt: Blockchain for Critical Pharmaceutical Industry to Counterfeit Drugs. 29-44 - Nabajeet Barman
, Deepak G. C., Maria G. Martini
:
Blockchain for Video Streaming: Opportunities, Challenges, and Open Issues. 45-56 - Sujit Biswas
, Kashif Sharif
, Fan Li
, Saraju P. Mohanty
:
Blockchain for E-Health-Care Systems: Easier Said Than Done. 57-67 - David Alan Grier
:
A Prize, a Prediction, and a Drama. 68-70 - Shuvra S. Bhattacharyya, Marilyn Claire Wolf:
Research Challenges for Heterogeneous Cyberphysical System Design. 71-75 - Phil Laplante
:
Contactless U: Higher Education in the Postcoronavirus World. 76-79 - Hal Berghel, Robert N. Charette, Edward G. Happ, John Leslie King
:
It's On: COVID-19, Risk Ecology, and Preparedness Tips. 80-87 - Eric Osterweil
, Angelos Stavrou
, Lixia Zhang:
21 Years of Distributed Denial-of Service: Current State of Affairs. 88-92 - Hal Berghel
:
A Collapsing Academy, Part 1. 93-98
Volume 53, Number 8, August 2020
- Erich J. Neuhold:
50 & 25 Years Ago. 7-9 - Ergun Akleman
:
Computing Through Time. 9 - Nir Kshetri
:
COVID-19 Meets Big Tech. 10-13 - Liming Chen
, Huansheng Ning
, Chris D. Nugent
, Zhiwen Yu
:
Hybrid Human-Artificial Intelligence. 14-17 - Zeynep Akata, Dan Balliet, Maarten de Rijke
, Frank Dignum, Virginia Dignum
, Guszti Eiben, Antske Fokkens
, Davide Grossi
, Koen V. Hindriks
, Holger H. Hoos, Hayley Hung, Catholijn M. Jonker, Christof Monz, Mark A. Neerincx, Frans A. Oliehoek
, Henry Prakken, Stefan Schlobach
, Linda C. van der Gaag, Frank van Harmelen
, Herke van Hoof, Birna van Riemsdijk, Aimee van Wynsberghe, Rineke Verbrugge, Bart Verheij
, Piek Vossen
, Max Welling:
A Research Agenda for Hybrid Intelligence: Augmenting Human Intellect With Collaborative, Adaptive, Responsible, and Explainable Artificial Intelligence. 18-28 - John E. Wenskovitch
, Chris North:
Interactive Artificial Intelligence: Designing for the "Two Black Boxes" Problem. 29-39 - Hanwen Feng, Jing Zhou
, Weiguo Lin, Yujuan Zhang, Zhiguo Qu
:
Multiple-Input, Multilayer-Perception-Based Classification of Traces From Side-Channel Attacks. 40-48 - Niccolo Pescetelli
, Manuel Cebrián
, Iyad Rahwan:
BeeMe: Real-Time Internet Control of Situated Human Agents. 49-58 - Bin Hu
, Kehua Guo
, Jian Zhang
, Sheng Ren
, Jianhua Ma:
Exploring a Humanoid Video-Understanding Algorithm Guided by Behavior. 59-67 - David Alan Grier
:
Pervasive Ideals. 68-70 - Sorel Reisman:
Viva la Revolucion? 71-73 - Alexandru Paler
:
Aggregated Control of Quantum Computations: When Stacked Architectures Are Too Good to Be Practical Soon. 74-78 - Claude Y. Laporte
, Jezreel Mejia Miranda:
Delivering Software- and Systems-Engineering Standards for Small Teams. 79-83 - Wilhelm Hasselbring
, Leslie Carr
, Simon Hettrick, Heather S. Packer, Thanassis Tiropanis:
Open Source Research Software. 84-88 - Mark Campbell
:
Putting the Passe Into Passwords: How Passwordless Technologies Are Reshaping Digital Identity. 89-93 - Eric Osterweil
, Angelos Stavrou
, Lixia Zhang:
21 Years of Distributed Denial-of-Service: A Call to Action. 94-99 - David Kleidermacher
:
Building an Internet of Secure Things. 100-104
Volume 53, Number 9, September 2020
- Leila De Floriani:
2020: A Journey of Discovery, Challenges, and Opportunity. 4-7 - Doug A. Bowman
:
Embracing Physical Keyboards for Virtual Reality. 9-10 - Erich J. Neuhold:
50 & 25 Years Ago. 14-17 - Ergun Akleman
:
Deep Learning. 17 - Jeffrey M. Voas:
Citations and Letters. 18-19 - James Bret Michael
, D. Richard Kuhn, Jeffrey M. Voas:
Security or Privacy: Can You Have Both? 20-30 - An Braeken, Madhusanka Liyanage
, Salil S. Kanhere
, Sudhir Dixit:
Blockchain and Cyberphysical Systems. 31-35 - Ouns Bouachir
, Moayad Aloqaily
, Lewis Tseng, Azzedine Boukerche
:
Blockchain and Fog Computing for Cyberphysical Systems: The Case of Smart Industry. 36-45