![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
IEEE Computer, Volume 57
Volume 57, Number 1, January 2024
- Jyotika Athavale
:
Make Your Mark. 4-7 - Erich J. Neuhold
:
50 & 25 Years Ago. 12-15 - Ergun Akleman
:
Computing Through Time. 13 - Jeffrey M. Voas
:
Niceties, Necessities, Antiquities, and Ubiquities. 16-17 - Jeffrey M. Voas
, Ron Vetter
:
Outlook 2024. 18-20 - George F. Hurlburt
, Sorel Reisman
:
Experts Speak Out About Artificial Intelligence in Education: First of Two Roundtables. 21-26 - Lucas Layman
, Ron Vetter
:
Generative Artificial Intelligence and the Future of Software Testing. 27-32 - Brian David Johnson
:
The Future of Threatcasting. 34-39 - Lucia Cascone
, Vincenzo Loia
, Michele Nappi
, Fabio Narducci
:
Soft Biometrics for Cybersecurity: Ongoing Revolution for Industry 4.0. 40-50 - Mark O. Neisser
, Ndubuisi G. Orji
, Harry J. Levinson
, Umberto Celano
, James R. Moyne
, Supika Mashiro
, Dan Wilcox
, Slava Libman
:
How Lithography and Metrology Are Enabling Yield in the Next Generation of Semiconductor Patterning. 51-58 - Charles Weir
, Anna Dyson
, Olamide Jogunola
, Louise A. Dennis
, Katie Paxton-Fear
:
Interlinked Computing in 2040: Safety, Truth, Ownership, and Accountability. 59-68 - Abdul Majeed
, Seong Oun Hwang
:
Feature Stores: A Key Enabler for Feature Reusability and Availability Across Machine Learning Pipelines. 69-74 - Debendra Das Sharma
, Thomas M. Coughlin
:
Universal Chiplet Interconnect Express: An Open Industry Standard for Memory and Storage Applications. 75-81 - Nir Kshetri
, Jeffrey M. Voas
:
Data Centers in Your Backyard? 82-87 - Matthew Akers
, Armon Barton
:
Forming Adversarial Example Attacks Against Deep Neural Networks With Reinforcement Learning. 88-99 - Payal Arora
, Usha Raman
:
The Case for Femwork: Feminist Design Principles in Tech and Tech-Enabled Work. 100-104 - Javier Conde
, Pedro Reviriego
, Joaquín Salvachúa
, Gonzalo Martínez
, José Alberto Hernández
, Fabrizio Lombardi
:
Understanding the Impact of Artificial Intelligence in Academic Writing: Metadata to the Rescue. 105-109 - Phil Laplante
:
Deception and Intuition in Software Engineering. 110-113 - Michael Zyda
:
How to Create a Games Industry in Your Country. 114-119 - Michael T. Swearingen
, James Bret Michael
, Joseph Weiss
, Robert Radvanovsky:
Resilient Without Zero Trust. 120-122 - Dimitrios Serpanos
:
Industrial Internet of Things: Trends and Challenges. 124-128 - Hal Berghel
:
Generative Artificial Intelligence, Semantic Entropy, and the Big Sort. 130-135 - Pedro Bruel
, Sai Rahul Chalamalasetti
, Aditya Dhakal
, Eitan Frachtenberg
, Ninad Hogade
, Rolando Pablo Hong Enriquez
, Alok Mishra
, Dejan S. Milojicic
, Pavana Prakash
, Gourav Rattihalli
:
Predicting Heterogeneity and Serverless Principles of Converged High-Performance Computing, Artificial Intelligence, and Workflows. 136-144
Volume 57, Number 2, February 2024
- Erich J. Neuhold
:
50 & 25 Years Ago. 7-10 - Ergun Akleman
:
Computing Through Time: Text and Drive. 8 - Joanna F. DeFranco
, Jeffrey M. Voas
:
"Thirsty" Computing. 11-13 - Jeffrey M. Voas
:
In This Issue. 12 - George F. Hurlburt
, Sorel Reisman
:
Experts Speak Out About Artificial Intelligence in Education: Second of Two Panel Roundtables. 14-20 - Mike Hinchey
:
Ethics and Computing. 21-23 - David Kreps
, Moira de Roche
:
The International Federation for Information Processing Code of Ethics in Context. 24-32 - Gabriela Ramos, Mariagrazia Squicciarini, Eleonora Lamm
:
Making AI Ethical by Design: The UNESCO Perspective. 33-43 - Frances S. Grodzinsky, Marty J. Wolf
, Keith W. Miller
:
Ethical Issues From Emerging AI Applications: Harms Are Happening. 44-52 - Kristen K. Greene
, Mary Frances Theofanos
, Craig Watson
, Anne Andrews
, Eyeisha Barron
:
Avoiding Past Mistakes in Unethical Human Subjects Research: Moving From Artificial Intelligence Principles to Practice. 53-63 - Donald Gotterbarn, Keith W. Miller
:
Cui Bono? Software Professionals Should Always Ask "Who Benefits?". 64-69 - Frederico Cerveira
, António Howcroft Ferreira, Raul Barbosa
:
Resilient Virtualization. 70-78 - Jisoo Kim
, Mungyu Bae, Yeonsung Chu, Moon Chan Park, Dongwon Park, Dawoon Jung, Sangyeun Cho:
Self-Encrypting Drive Evolving Toward Multitenant Cloud Computing. 79-90 - Andreas Nettsträter
, Marius Brehler
:
How to Find the Right Scope for Open Source Developments? 91-94 - Nina DeFranco Tommarello
, Rebecca Deek
:
The Convergence of the Internet of Things and Artificial Intelligence in Medicine: Assessing the Benefits, Challenges, and Risks. 95-99 - Lieven Eeckhout
:
Toward Sustainable Computer Systems. 101-104 - Nir Kshetri
:
Wholesale Central Bank Digital Currencies in Asia: Current Status and Motivation. 105-110 - Rolf Oppliger
, Andreas Grünert:
How to Measure Cybersecurity and Why Heuristics Matter. 111-115 - Mark Campbell
, Mladan Jovanovic
:
Directing AI: Charting a Roadmap of AI Opportunities and Risks. 116-120 - Christopher D. Nordquist
, Stanley S. Chou
:
Exploring Heterogeneous Integration: Its Essence and Future Path. 121-124 - Nir Kshetri
:
Generative Artificial Intelligence and E-Commerce. 125-128
Volume 57, Number 3, March 2024
- Erich J. Neuhold
:
50 & 25 Years Ago. 7-10 - Ergun Akleman
:
Computing Through Time: Trustworthy AI. 8 - Jeffrey M. Voas
:
The Influencer. 11-13 - Jeffrey M. Voas
:
Also in this Issue. 12 - Phil Laplante
, Joanna F. DeFranco
, Rick Kuhn
:
Assured Autonomy, Artificial Intelligence, and Machine Learning: A Roundtable Discussion. 14-21 - Riccardo Mariani
, Francesca Rossi
, Rita Cucchiara
, Marco Pavone
, Barnaby Simkin, Ansgar Koene, Jochen Papenbrock:
Trustworthy AI - Part III. 22-24 - Antonio Emanuele Cinà
, Kathrin Grosse, Ambra Demontis
, Battista Biggio
, Fabio Roli
, Marcello Pelillo
:
Machine Learning Security Against Data Poisoning: Are We There Yet? 26-34 - Padmapritha T
, Korkut Bekiroglu
, Subathra Seshadhri, Seshadhri Srinivasan
:
Trustworthy AI-Based Personalized Insulin Recommender for Elderly People Who Have Type-2 Diabetes. 35-45 - Sonia C. Sousa
, David Lamas, José Cravino, Paulo Martins
:
Human-Centered Trustworthy Framework: A Human-Computer Interaction Perspective. 46-58 - Jeremy Peckham
:
An AI Harms and Governance Framework for Trustworthy AI. 59-68 - Abhishek Hazra
, Andrea Morichetta
, Ilir Murturi
, Lauri Lovén
, Chinmaya Kumar Dehury
, Victor Casamayor-Pujol
, Praveen Kumar Donta
, Schahram Dustdar
:
Distributed AI in Zero-Touch Provisioning for Edge Networks: Challenges and Research Directions. 69-78 - Youyang Qu
, Xin Yuan
, Ming Ding
, Wei Ni
, Thierry Rakotoarivelo, David B. Smith
:
Learn to Unlearn: Insights Into Machine Unlearning. 79-90 - Rita Cucchiara
, Lorenzo Baraldi
, Marcella Cornia
, Sara Sarto
:
Video Surveillance and Privacy: A Solvable Paradox? 91-100 - Abdul Majeed
, Seong Oun Hwang
:
Making Large Language Models More Reliable and Beneficial: Taking ChatGPT as a Case Study. 101-106 - Yuntao Liu
, Daniel Xing, Isaac McDaniel
, Olsan Ozbay
, Abir Akib, Mumtahina Islam Sukanya, Sanjay Rekhi, Ankur Srivastava:
Security Advantages and Challenges of 3D Heterogeneous Integration. 107-112 - Jim Handy, Tom Coughlin
:
How Emerging Memories Extend Battery Life. 113-116 - Alice Barana
, Marina Marchisio
:
Eight Sustainable Practices for Digital Activity Development: Drivers and Barriers in International Higher Education Collaboration. 117-122 - Dimitrios Serpanos
, Marilyn Wolf
:
Safety and Artificial Intelligence in Cyberphysical Systems. 123-126 - Michael Zyda
:
Large Language Models and Generative AI, Oh My! 127-132
Volume 57, Number 4, April 2024
- Erich J. Neuhold
:
50 & 25 Years Ago. 7-10 - Ergun Akleman
:
Computing Through Time: Dependability. 8 - Jeffrey M. Voas
:
Thoughts on Dependability. 11-12 - Joanna F. DeFranco
, Phil Laplante
, Rick Kuhn
, Zhaojun Steven Li
:
Dependable Computing. 13-15 - John A. McDermid
, Radu Calinescu
, Ibrahim Habli
, Richard Hawkins
, Yan Jia
, John Molloy
, Matt Osborne
, Colin Paterson
, Zoë Porter
, Philippa Ryan Conmy
:
The Safety of Autonomy: A Systematic Approach. 16-25 - Hiromu Yano, Tadashi Dohi, Hiroyuki Okamura
:
Performance Comparison of Software Reliability Estimation Algorithms. 26-36 - Alwyn E. Goodloe
, Klaus Havelund
:
High-Integrity Runtime Verification. 37-45 - Ren-Yi Huang
, G. Dumindu Samaraweera
, J. Morris Chang
:
Exploring Threats, Defenses, and Privacy-Preserving Techniques in Federated Learning: A Survey. 46-56 - Les Hatton
:
Dependability Improvement Depends on Dependable Measurement. 57-67 - Robert V. Binder
:
Software Dependability Measurement at the Age of 36. 68-81 - Kishor S. Trivedi
, Andrea Bobbio
:
Reliability and Availability Analysis in Practice: Toward Multilevel Models for Complex Systems. 82-92 - Christof Ebert
:
Industry Trends 2024: Innovation Needs Competence. 93-98 - Sean McGregor
:
Open Digital Safety. 99-103 - Eugenio Cesario
:
Machine Learning for Enhancing Public Safety in Modern Cities. 104-107 - Yale N. Patt
:
The CORRECT First Course in Computing for Serious Students. 108-112 - Nir Kshetri
:
Economics of Artificial Intelligence Governance. 113-118 - Doron Drusinsky
:
From P Versus NP to Probabilistic and Zero Knowledge Proof Systems. 119-130 - Wei Tang
, Margaret Martonosi
:
Distributed Quantum Computing via Integrating Quantum and Classical Computing. 131-136 - Sugandha Agarwal
, Norita B. Ahmad
, Dima Jamali:
AI and Big Data in Contemporary Marketing. 137-142 - Eitan Frachtenberg
, Viyom Mittal
, Pedro Bruel, Michalis Faloutsos, Dejan S. Milojicic
:
The Distribution Is the Performance. 143-149 - Shimeng Yu
, Tae-Hyeon Kim
:
Semiconductor Memory Technologies: State-of-the-Art and Future Trends. 150-154 - Joanna F. DeFranco
, Jeffrey M. Voas
:
Internet of Things-Flavored Chips. 156-158 - Gary McGraw
, Richie Bonett
, Harold Figueroa
, Katie McMahon
:
23 Security Risks in Black-Box Large Language Model Foundation Models. 160-164
Volume 57, Number 5, May 2024
- Erich J. Neuhold
:
50 & 25 Years Ago. 7-11 - Ergun Akleman
:
Computing Through Time: Venture Scientists. 8 - Jeffrey M. Voas
:
Dissertation, Inc. 12-14 - Jeffrey M. Voas:
Also in this Issue. 13 - Sumi Helal
, Philip C. Treleaven
:
Venture Scientists and Technology Entrepreneurship. 15-19 - Philip C. Treleaven
:
Educating Venture Scientists: Inspiring Students and Young Professionals To Commercialize Their Deep Tech Research Supported by Their Institutions. 20-28 - Marco Aiello
:
The AI Revolution and the Future of Work: Threats and Opportunities. 29-34 - Sergio Balassone
:
Fostering Innovation and Entrepreneurship in Europe: The EIT Digital Journey. 35-38 - Chan-Yuan Wong
, Jui-Jan Chan:
How Public Research Institutions Propagate Industrial Niches and Configure New Industrial Structure: The Case of ITRI (Taiwan) for Semiconductor Technologies. 39-43 - Mihkel Solvak
, Ave Lauringson
:
A Case Study of the Public Sector Digital Ecosystem in Estonia. 44-49 - Victor Alexiev
:
Venture Building in the Digital Era: Unraveling the Past, Present, and Future of Corporate Innovation. 50-57 - Anton Rassõlkin
, Pavels Maksimkins, Andrejs Stupans, Viktor Rjabtsikov, Armands Senfelds, Vladimir Kuts
:
The Spatial Representation of a Self-Driving Vehicle for the Virtual Entity of a Digital Twin. 58-66 - Ajmal Khan
, Amer Saeed
, Farman Ullah, Muhammad Bilal
, Yasir Muhammad, Hesham El-Sayed
:
Charging Support Communication System Based on Vehicle-to-Vehicle Communication for Electric Vehicles. 67-77 - Qingtian Zou
, Lan Zhang
, Xiaoyan Sun, Anoop Singhal
, Peng Liu
:
Using Explainable AI for Neural Network-Based Network Attack Detection. 78-85 - D. Richard Kuhn
, Mohammad S. Raunak
, Raghu N. Kacker
, Jaganmohan Chandrasekaran
, Erin Lanus
, Tyler Cody
, Laura J. Freeman
:
Assured Autonomy Through Combinatorial Methods. 86-90 - George F. Hurlburt
:
Addressing the Perceived Skills Gap. 91-96 - Michael Zyda
:
Today Generative AI Is Just a Parlor Trick. 98-101 - Phil Laplante
:
Use a Pencil: On Writing Software Documentation Well and the Role of Autodocumentation. 102-105 - Matteo Calabrese
, Gregory Falco
:
Physics-Informed Satellite Cybersecurity. 106-109 - Mark Campbell
, Mladan Jovanovic
:
Disinfecting AI: Mitigating Generative AI's Top Risks. 111-116 - Hal Berghel
:
Social Media, Cognitive Dysfunction, and Social Disruption. 118-124
Volume 57, Number 6, June 2024
- Erich J. Neuhold
:
50 & 25 Years Ago. 7-10 - Ergun Akleman
:
Computing Through Time: Biometrics. 8 - Joanna F. DeFranco
, Jeffrey M. Voas
:
"Golden Years" Users. 11-14 - Jeffrey M. Voas
:
In this Issue. 12-13 - Francisco Maciá Pérez, Iren Lorenzo-Fonseca
, José Vicente Berná-Martínez, Alex Maciá-Fiteni:
Accompaniment Services for the Elderly: A Comparison of Decision-Making Support Architectures in Distributed IT. 16-28 - Dezhi Ran
, Yingjie Fu
, Yibo He, Tianyu Chen, Xing Tang, Tao Xie:
Path Toward Elderly Friendly Mobile Apps. 29-39 - Fernando Alonso-Fernandez
, Josef Bigün
, Julian Fiérrez
, Naser Damer
, Hugo Proença, Arun Ross
:
Periocular Biometrics: A Modality for Unconstrained Scenarios. 40-49 - Kiavash Jamshidi, Ramin Toosi
, Mohammad Ali Akhaee
:
Gender Recognition Based on Hand Images Employing Local and Global Shape Information. 50-61 - Jiangtao Wang, Long Chen
, Deborah Lycett
, Duncan Vernon, Dingchang Zheng
:
Toward Population Health Intelligence: When Artificial Intelligence Meets Population Health Research. 62-72 - Bilal Naqvi
, Joakim Kävrestad, A. K. M. Najmul Islam
:
Inclusive and Accessible Cybersecurity: Challenges and Future Directions. 73-81 - Akriti Verma
, Shama Naz Islam
, Valeh Moghaddam
, Adnan Anwar
:
Digital Emotion Regulation on Social Media. 82-89 - Irina Zaks
, Timothy Lehnen
, Aaron Zaks
:
Improving Velocity of Code Contributions in Open Source. 90-96 - Christof Ebert
, Xuya Wang:
China Artificial Intelligence Industry Insights. 97-101 - Nir Kshetri
:
Generative Artificial Intelligence in the Financial Services Industry. 102-108 - Sorel Reisman
:
Practical Classroom Use of Generative Artificial Intelligence - A Case Study. 110-114 - Barry Jenkins
, Warren Mayoss
, Michael Zyda:
Streamed Interactive Media: How Changing the Paradigm on Streaming Game Content Enables a New Media Category. 116-121 - Biswabandan Panda
:
The Game of Latency, Bandwidth, and Hardware Prefetching. 122-126 - Michela Taufer
, Daniel Milroy, Todd Gamblin
, Andrew Jones
, Bill Magro, Heidi Poxon
, Seetharami R. Seelam:
HPC and Cloud Convergence Beyond Technical Boundaries: Strategies for Economic Sustainability, Standardization, and Data Accessibility. 128-136 - Mohamad Kassab
, Joanna F. DeFranco
:
Unlocking the Internet of Things Engineering Job Market. 137-140 - Preeti S. Chauhan
:
Deepfake: Risks and Opportunities. 141-144
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.