


default search action
IEEE Computer, Volume 58
Volume 58, Number 1, January 2025
- Hironori Washizaki
:
Leadership and Engagement: IEEE Computer Society 2025 Key Strategies. 4-8 - Erich J. Neuhold
:
50 & 25 Years Ago. 12-15 - Ergun Akleman
:
Computing Through Time: Augmented AI. 14 - Jeffrey M. Voas
, Keith W. Miller
:
Social Unrest, Political Violence, and War. 16-19 - Jeffrey M. Voas
:
Outlook 2025. 20-22 - Saurabh Sinha
, Johannes Wynand Lambrechts
, Abadahigwa Bimana
, Aili Ashipala
:
Augmented Artificial Intelligence in 5G, 6G, and Beyond: A Quantum Leap. 24-32 - Keith M. Davis III
, Tuukka Ruotsalo
:
Physiological Data: Challenges for Privacy and Ethics. 33-44 - Youyang Qu
, Ming Ding
, Nan Sun
, Kanchana Thilakarathna
, Tianqing Zhu
, Dusit Niyato
:
The Frontier of Data Erasure: A Survey on Machine Unlearning for Large Language Models. 45-57 - Lu Wang
, K. L. Eddie Law
:
Model to Learn Like Humans. 58-65 - Sonsoles López-Pernas
, Mohammed Saqr
, Miguel Á. Conde
, Mikko Apiola
, Matti Tedre
:
Mapping Computer Engineering Education Research: A Topic Analysis. 66-75 - Vignesh Adhinarayanan
, Wu-chun Feng:
Looking Back to Look Forward: 15 Years of the Green500. 76-86 - Dejan S. Milojicic
:
Technology Predictions 2025. 88-90 - H. B. Duran
:
Plug (In) and Play: The State of BCI Gaming in 2025: Why This 25-Year-Old Technology Is Finally Getting the Attention it Deserves. 91-96 - Alberto Blanco-Justicia
, Josep Domingo-Ferrer
, Najeeb Moharram Jebreel
, Benet Manzanares-Salor
, David Sánchez
:
Unlearning in Large Language Models: We Are Not There Yet. 97-100 - Dylan Porter, Joanna F. DeFranco
, Phil Laplante
:
Requirements Specification Automated Quality Analysis: Past, Present, and Future. 101-104 - Srinivas Devadas
, Daniel Sánchez
:
Toward a Universal Cryptographic Accelerator. 105-108 - Khizer Khaderi
, Michael Zyda
:
How to Hire a Gen Z Through Gaming. 109-116 - Domenico Talia
:
Are Robots and Intelligent Systems Changing Our Mind? 117-120 - Brian A. Weiss
, Donald H. Costello
, Matt Scassero
:
Test and Evaluation of Autonomous Systems: Developing the Educational Landscape. 121-125 - Abram H. Clark
, Ishan Srivastava
:
Modeling Flow-Arrest Transitions in Granular Media. 126-133 - Nir Kshetri
:
Economics of Open Source Software and AI Models. 134-141 - Mikko T. Siponen
:
Evidence-Based Cybersecurity Management: How to Use Sanctions Effectively and Avoid Pitfalls. 142-145 - Hal Berghel
:
A Story Arc From TRON to Sora: An Interview With Judson Rosebush - Part 1. 146-150 - Cullen E. Bash
, John McDonald
, Dejan S. Milojicic
, Juliane Mueller, Tom Wilson, Ying Zhang
:
Convergence of Energy and IT Sectors. 151-158
Volume 58, Number 2, February 2025
- Erich J. Neuhold
:
50 & 25 Years Ago. 7-11 - Ergun Akleman
:
Computing Through Time: Intelligence Assistance. 8 - Joanna F. DeFranco
, Jeffrey M. Voas
:
Global E-Waste Exposed. 12-15 - Jeffrey M. Voas
:
In This Issue. 13 - Kjell Jørgen Hole
:
Intelligent Assistants Strengthening Personhood. 16-24 - Basem Al-Madani, Shihab Hasan
, Amer Abualhassan
, Farouq Aliyu
:
Integrating Data Distribution Service (DDS) in Smart Traffic Systems: A Comprehensive Review. 25-34 - JoAnn M. Paul
, Isaac Bettendorf
:
Paradox, Conflict, and Structural Intelligence. 35-41 - Maciej Rys
, Anna Maria Górska
:
Breaking Barriers: Increasing Female Participation in Hackathons. 42-51 - Waad Albayyali
, Aymen Belghith
:
Strengthening Active Directory Security: Detecting and Mitigating Kerberoasting Attacks. 52-62 - Nir Kshetri
:
Building Trust in AI: How Blockchain Enhances Data Integrity, Security, and Privacy. 63-70 - Mladan Jovanovic
, Mark Campbell
:
Self-Directing AI: The Road to Fully Autonomous AI Agents. 71-77 - Nancy R. Mead
, Carol Woody
, Scott A. Hissam:
Open Source Software: The Ultimate in Reuse or a Risk Not Worth Taking? 78-83 - Michael Freeman
, Amy R. Pritchett
:
Uncrewed Aerial Systems Integration in Coast Guard Search and Rescue Operations. 84-89 - Jyotika Athavale
:
Standards in Review: Key Developments With IEEE Computer Society Standards in 2024. 90-92 - Yanyi Wu
:
The University as an AI Ombudsman - Part 1. 93-97 - Christopher C. Price
, Ichiro Takeuchi, James M. Rondinelli
, Wei Chen
, Christopher L. Hinkle
:
AI-Accelerated Electronic Materials Discovery and Development. 98-104 - Abdul Majeed
, Seong Oun Hwang
:
Synthetic Data: A New Frontier for Democratizing Artificial Intelligence and Data Access. 106-114 - Vijay Janapa Reddi
, Amir Yazdanbakhsh
:
Architecture 2.0: Foundations of Artificial Intelligence Agents for Modern Computer System Design. 116-124
Volume 58, Number 3, March 2025
- Erich J. Neuhold
:
50 & 25 Years Ago. 7-11 - Ergun Akleman
:
Computing Through Time: Metaverse. 8 - Ergun Akleman
:
Computing Through Time: Low Code/No Code. 10 - Keith W. Miller
, Jeffrey M. Voas
:
Data Feudalism and e-Personhood - Are We Becoming Digital Serfs? 12-15 - Jeffrey M. Voas
:
Pros and Cons. 16-21 - George F. Hurlburt
, George K. Thiruvathukal
, Nir Kshetri
, Norita B. Ahmad
:
Low Code/No Code Meets the Metaverse. 22-28 - Bilal Naqvi
, Damian Kedziora
, Lanqi Zhang, Shola Oyedeji
:
Quality of Low-Code/No-Code Development Platforms Through the Lens of ISO 25010:2023. 30-40 - Perla M. Viera-González, Osvaldo Habib González-González, Guillermo Ezequiel Sánchez-Guerrero
:
Low-Code Automation for Resolving Incidents During Class Schedule Registration. 41-48 - Chen Zhong
, John Oruongo
, J. B. (Joo Baek) Kim
:
LLM-Powered Low-Code/No-Code Data Analytics in Education and Workforce Development. 49-59 - Yosra Magdi Mekki, Leslie V. Simon, William D. Freeman
, Junaid Qadir
:
Medical Education Metaverses (MedEd Metaverses): Opportunities, Use Case, and Guidelines. 60-70 - Zhe Wei
, Sen Wang, Fang Wang, Lingqiao Shui:
Metaverse for Sustainable Smart Civil Aviation: Technologies, Applications, and Challenges. 71-81 - Hal Berghel
:
A Story Arc From Tron to Sora: An Interview With Judson Rosebush - Part II. 82-86 - Phil Laplante
:
Reasoning About Disinformation. 87-91 - Michael Zyda
:
Do You Think You Own Stock in the Power Company??? 92-95 - Javier Conde
, Gonzalo Martínez
, Pedro Reviriego
, Zhen Gao
, Shanshan Liu
, Fabrizio Lombardi
:
Can ChatGPT Learn to Count Letters? 96-99 - Mohamad Kassab
, João Paulo Fernandes
:
The Forgotten Potential: Why Aspect-Oriented Programming Faded Away. 100-104 - Mauro Tortonesi
:
The Compute Continuum: Trends and Challenges. 105-108 - Yanyi Wu
:
The University as an AI Ombudsman - Part II. 109-114 - Jonmichael Hands
, Tom Coughlin
:
Advancing Data Security and Sustainability: Establishing a Circular Economy for Storage. 115-118 - Andreas Grünert, James Bret Michael
, Rolf Oppliger
, Ruedi Rytz:
On the Measurability and Testability of IT Security. 120-126
Volume 58, Number 4, April 2025
- Erich J. Neuhold
:
50 & 25 Years Ago. 7-10 - Ergun Akleman
:
Computing Through Time: Intelligent Security. 8 - Nir Kshetri
, Jeffrey M. Voas
:
Big Tech, Big Energy, and AI. 11-13 - D. Frank Hsu
, Christina Schweikert
:
Secure and Intelligent Systems. 14-16 - D. Richard Kuhn
, M. S. Raunak
, Raghu N. Kacker
:
Measuring and Visualizing Dataset Coverage for Machine Learning. 18-26 - Marina L. Gavrilova
:
Information Fusion: A Decade of Innovations in Biometric Multimodal Research. 27-36 - Koji Nakao
, Daisuke Inoue, Katsunari Yoshioka
:
Unveiling IoT Threats: A Case Study on Darknet and Honeypot Analysis. 37-45 - Evans Owusu, Mariyam Mapkar, Mohamed Rahouti
, Dinesh C. Verma
:
Robust Intrusion Detection With Combinatorial Fusion and Generative Artificial Intelligence. 46-57 - Louis Nisiotis
, Cecilia Metra
, Jyotika Athavale
, Dejan S. Milojicic
, Stephen Dukes, Jeewika Ranaweera
, Sin-Kuen Hawkins:
The Emerging Metaverse: IEEE ISEMV 2024 Retrospective and Future Directions. 58-64 - Diman Zad Tootaghaj, Yiqian Wu, Ting He
, Nilanjan Ray Chaudhuri, Dejan S. Milojicic
, Luka V. Strezoski
, James Anderson
, Puneet Sharma
:
Distributed, Sustainable, and Secure Energy Future Through IT Modernization. 65-73 - Sorel Reisman
:
Engineering? No Way. 74-78 - Russell S. A. Palmer
, Andrew M. A. Palmer:
Intention Is All You Need to Create Your Own Hollywood Blockbuster MoviesRevolutionizing Filmmaking With Generative AI and Saga. 79-94 - Kim M. Hajek
, Paul Trauttmansdorff
, Sabina Leonelli
, Stephan Guttinger
, Silvia Milano
:
How to Foster Responsible and Resilient Data: The Ethical Data Initiative. 95-99 - Christof Ebert
, Sriram Panyam
, Praveen Gujar
:
AI for Cloud and SaaS: Technologies and Business Models. 100-105 - Roberto Oliveira
, Carla Nébele Ferreira Hanau
, Valdemar Vicente Graciano Neto
, Eliomar Araújo de Lima
, Vinicius Carvalho Lopes
, José Maria Nazar David
, Regina Braga
, Wagner Arbex
, Mohamad Kassab
:
Smart Farming for Poultry: Enhancing Growth and Efficiency With Low-Cost Internet of Things Solutions. 106-110 - John McHugh
:
The Origins of Software Errors: Where Do They Come From? Where Do They Go? 111-114 - Dirk Riehle
:
The Software Bill of Materials. 115-120 - Nir Kshetri
:
From Predictive and Generative to Agentic AI: Shaping the Future of Marketing Operations and Strategies. 121-129 - Christopher Bud Daniel
, Doron Drusinsky
, Loren E. Peitso:
Multiagent Aircraft Flight Route Planning in a 3D Threat-Contested Environment Using Cross-Entropy Search. 130-146 - Aqilah Julaihi
, Norita B. Ahmad
:
Genomic Gold Rush or Ethical Minefield? Rethinking Data Practices in Health Tech Giants. 147-151 - Shinya Takamaeda-Yamazaki
:
Uncertainty in Machine Learning and Future Computers. 152-156 - Jyotika Athavale
, Darren Galpin
:
Functional Safety Standards: IEEE P2851 Road Map. 158-160
Volume 58, Number 5, May 2025
- Erich J. Neuhold
:
50 & 25 Years Ago. 7-10 - Ergun Akleman
:
Computing Through Time: Architecture. 8 - Joanna F. DeFranco
, Jeffrey M. Voas
:
Your Coworker's First Name Is Artificial and Last Name Is Intelligence. 11-14 - Jeffrey M. Voas
:
In This Issue. 12 - Ying Li
, Praveen Kumar Donta
, Xingwei Wang
, Ilir Murturi
, Min Huang
, Schahram Dustdar
:
KDN-FLB: Knowledge-Defined Networking Through Federated Learning and Blockchain. 16-26 - Mehdi Gheisari
, Hamid Tahaei
, Christian Fernández-Campusano
, Mazhar Hussain Malik
, Ernest Mnkandla
, Zenghui Wang
, Malusi Sibiya
, Julian L. Webber
, Muhammad Rizwan Mughal, Cheng-Chi Lee
, Panjun Sun
, Abolfazl Mehbodniya
:
A Flexible Software-Defined Networking-Based Privacy-Preserving Method for Internet of Things-Based Smart City Environment Based on the Neighbors Situation. 27-36 - David A. Patterson
, Jeremy Bennett
, Mary Bennett, Hélène Chelin, David M. Harris, Jennifer Hellar
, William Jones, Konrad Moron
, Paolo Savini, Roger Shepherd, Ray Simar
, Zachary Susskind, Stefan Wallentowitz
:
Embench IOT 2.0 and DSP 1.0: Modern Embedded Computing Benchmarks. 37-47 - Dulari B. Gajjar, Prisha Faldu
, Deep Rameshbhai Kothadiya
, Aayushi Pushpakant Chaudhari
, Nikita M. Bhatt:
DeViTC: Deep-Vision Transformer to Recognize Originality of Currency. 48-56 - João R. Campos
, Ernesto Costa
, Marco Vieira
:
Predicting Failures in Complex Systems. 57-64 - George F. Hurlburt
:
Why Bring Science to the Forefront? 65-70 - Sriram Panyam
, Praveen Gujar
:
How AI Agents Are Transforming Software Engineering and the Future of Product Development. 71-77 - Michael Zyda
:
Much Ado About DeepSeek ... 78-81 - Sean Oesch
, Jack Hutchins, Phillipe Austria
, Amul Chaulagain
:
Agentic AI and the Cyber Arms Race. 82-85 - Nir Kshetri
, Jeffrey M. Voas
:
Agentic Artificial Intelligence for Cyber Threat Management. 86-90 - Mladan Jovanovic
, Mark Campbell
:
Evolving AI: What Lies Beyond Today's Language Models. 91-96 - Nikolina Renieri
, Dimitrios Serpanos
:
Interoperability: A Key to the Future. 97-100 - J. T. Sodano
, Joanna F. DeFranco
:
Citizen Development, Low-Code/No-Code Platforms, and the Evolution of Generative AI in Software Development. 101-104 - Hal Berghel
:
Cyberdidacticism: The New Epistemic Paradigm for Cognitive Minimalism and Generative Artificial Intelligence. 106-112
Volume 58, Number 6, June 2025
- Antonio Mastropaolo
:
How Artificial Intelligence Is Reshaping Our Lives: A Framework to Unravel Its Complexities. 4-5 - Erich J. Neuhold
:
50 & 25 Years Ago. 9-12 - Ergun Akleman
:
Computing Through Time: Data Storage. 10 - Michael Chapiro
, Jeffrey M. Voas
:
Artificial Intelligence, Concrete, and Wood. 13-16 - Jeffrey M. Voas
:
In This Issue. 14 - Jeffrey M. Voas
:
Writing for Computer. 15 - Phil Laplante
:
Assured Autonomy, Artificial Intelligence, and Machine Learning. 17-28 - David Abramson
, Jake Carroll
:
A Capability Maturity Model for Research Data Storage Systems. 30-39 - Xiang Li
, Qing Liu
, Quan Bai
, Xiwei Xu
:
The Role of Knowledge Graphs on Responsible Artificial Intelligence Realization: Research Opportunities and Challenges. 40-48 - Anurag Saxena
:
Rethinking Software Testing for Modern Development. 49-58 - Suman Nath
, Ryen W. White
, Fazle E. Faisal, Morris Sharp
, Robert Gruen
, Lenin Ravindranath Sivalingam:
From Search Engines to Action Engines. 59-68 - Angelos Stavrou
, Jeffrey M. Voas
:
General and Agentic AI, and the Challenges of Xplainable Reliability. 69-72 - Dawn Foster
:
From Data to Action: Building Healthy and Sustainable Open Source Projects. 74-78 - Christof Ebert
:
Innovation Turns Smart and Green. 79-82 - Jaydeep P. Kulkarni
, Siddhartha Raman Sundara Raman
, Shanshan Xie
, Chieh-Pu Lo
:
Unconventional Computing Using Ising Accelerators. 83-86 - Bob Maley
, Joanna F. DeFranco
:
The Blue Pill Attack as a Wake-Up Call. 88-90 - Daniel M. Berry
:
Why Large Language Models Appear to Be Intelligent and Creative: Because They Generate Bullsh*t! 91-96 - Jon G. Rokne
:
Teaching a Compiler Course. 97-100 - Dimitris Gizopoulos
:
The Dark Side of Computing: Silent Data Corruptions. 101-106 - Nir Kshetri
:
Blockchain and Stablecoins: Driving the Future of Digital Finance. 107-114 - Jyotika Athavale
, Richard Tong:
Shaping the Future Through Artificial Intelligence Standardization Efforts. 116-118 - Nir Kshetri
:
Redefining Human Resource Practices With AI Agents and Agentic AI: Automated Compliance and Enhanced Productivity. 119-124
Volume 58, Number 7, July 2025
- Antonio Mastropaolo
:
Pixels of Deception: How Evolutionary Algorithms Break AI Reliability. 4-6 - Erich J. Neuhold
:
50 & 25 Years Ago. 10-13 - Ergun Akleman
:
Computing Through Time: Software Development. 11 - Jason W. Rupe
, Jeffrey M. Voas
:
Is Critical Thinking Critical? 14-16 - Tracy Bannon
, Phil Laplante
:
Generative AI in the Software Development Lifecycle. 17-19 - Yanyi Wu
, Xinyu Lu, Chenghua Lin
:
Knowledge Monopoly Risks in Generative AI-Assisted Software Development Lifecycle. 20-30 - Faruk Muratovic, Diana Kearns-Manolatos, Ahmed Alibage
:
Generative AI in Software Development: Challenges, Opportunities, and New Paradigms for Quality Assurance. 31-39 - Amit Jain
, Rohit Tiwari
:
AI for Productivity: Transforming Enterprise Software Development. 40-52 - Aybüke Yalçiner
, Ebru Gökalp
, Ahmet Dikici
:
Transforming Software Engineering Processes Through Generative AI: A Framework for Integration and Implementation. 53-65 - Aman Swaraj, Sandeep Kumar
, Lalit Mohan Sharma:
ChatGPT Choreography: Discovering Developer Dialogues and Potential Software Development Lifecycle Applications. 66-78 - Marco Vieira
:
Leveraging LLMs for Trustworthy Software Engineering: Insights and Challenges. 79-90 - Christof Ebert
:
The Return of the Magic Triangle. 91-94 - Brian M. Sadler
:
Computer Education in the Machine Learning Era: Intelligent Systems. 96-99 - Nir Kshetri
:
Blockchain Standardization in Practice: Contrasting European Union and U.S. Approaches. 100-108 - Scott Atchley
, Rosa M. Badia
, Bronis R. de Supinski
, Joshua B. Fryman, Dieter Kranzlmüller
, Srilatha Manne
, Pekka Manninen, Satoshi Matsuoka
, Dejan S. Milojicic
, Galen M. Shipman
, Eric Van Hensbergen
, Robert W. Wisniewski
:
Predicting the Future of Supercomputing. 110-120 - Lan Zhang
, Anoop Singhal
, Qingtian Zou, Xiaoyan Sun
, Peng Liu
, Hsiao-Ying Lin:
Can AI Fix Buggy Code? Exploring the Use of Large Language Models in Automated Program Repair. 122-128 - Bilal Naqvi
, Joakim Kävrestad
:
Embracing Neurodiversity in Cybersecurity: What Lies Ahead? 130-133 - Michael Zyda
:
Hype Me to the Moon! Let Me Dream Among the AI Stars! Let's Give up on That Guy Who Wants to Go to Mars ... 134-137 - Christopher Clark, Armon Barton
:
GTS Attack: Finding Adversarial Examples With Greedy Tree Search. 138-146 - Douglas C. Schmidt
:
Software Testing in the Generative AI Era: A Practitioner's Playbook. 147-152 - Roy Rada
:
Generative AI and Health Care: Brief Survey. 153-156 - Joseph Weiss
, James Bret Michael
:
Bridging the Gap Between Engineering and Cybersecurity to Better Protect Critical Infrastructures. 157-160 - Dimitrios Serpanos
, Panayotis Antoniadis
:
Cyberphysical Systems in Control: Risks of Digital Transformation. 161-164
Volume 58, Number 8, August 2025
- Antonio Mastropaolo:
Smarter, Not Harder: Efficient Artificial Intelligence Training With Selective Data. 4-6 - Erich J. Neuhold:
50 & 25 Years Ago. 10-13 - Ergun Akleman:
Computing Through Time: Playing in Metaverse. 11 - Nir Kshetri, Jeffrey M. Voas:
Is Citizen Journalism Reshaping "the News"? 14-18 - Jeffrey M. Voas:
In this Issue. 17 - Tolga O. Atalay, Angelos Stavrou, Lixia Zhang:
Envisioning the Next-Generation Cellular Architecture With Named Data Networking. 20-29 - Enis Karaarslan, Beste Akdik:
Toward Reliable Disaster Data Sharing With Blockchain and Zero-Knowledge Proofs. 30-40 - Vishwas Gupta, Shikha Sharma:
Meta's Strategic Evolution: How Metaverse and AI Are Shaping the Future of Technology. 41-52 - William Eduardo Villegas-Ch., Rommel Gutierrez, Alexandra Maldonado Navarro, Aracely Mera-Navarrete:
Adaptive Authentication and Access Control System in Dynamic Educational Environments Based on AI. 53-63 - Abdus Salam, Rasel Mahmud, Tohedul Islam, Saddam Mukta, Swakkhar Shatabda:
A Comprehensive Survey on Mamba: Architectures, Challenges, and Opportunities. 64-76 - Mary Kollander, Robert Hollowood, Maria Williams, Pradeeban Kathiravelu:
An Interactive Native History Web Map for Epidemic Diseases in Alaska. 77-85 - Caroline Trippel:
Specification and Formal Verification of Hardware-Software Contracts for High-Assurance Computer Architectures. 86-91 - Somdip Dey:
The Rise of Open Source Models and Implications of Democratizing AI. 92-96 - Christof Ebert:
Software-Defined Innovation. 97-101 - Syed Rizvi, Anthony Demeri:
Life at Risk: Uncovering the Urgent Security Gaps in Internet of Things-Integrated Cloud Infrastructures. 102-106 - Brooke Smith, Elizabeth Stringer:
The Greatest of All Time: World of Warcraft's 20 Years of Player Commitment: Part 1: The Mastery of Efficacy. 107-113 - Xihao Xie, Jia Zhang, Jeffrey M. Voas:
Immunology for AI. 114-116 - Kaushik Sengupta, Jonathan Zhou, Zheng Liu, Emir Ali Karahan:
AI Enabling Discovery and Design of Radio and High-Frequency Wireless Chips Beyond Human Intuition. 117-122 - Nir Kshetri:
Governing Agentic AI: Security, Identity, and Oversight in the Age of Autonomous Intelligent Systems. 123-129 - Norita B. Ahmad, Aqilah Julaihi, Preman Rajalingam:
From Data to Diagnosis: Rethinking Clinical Decision Support With Explainable AI. 130-135 - Lorena A. Barba:
Experience Embracing GenAI in an Engineering Computations Course: What Went Wrong and What's Next. 136-141 - Abir Akib, Sanjay Rekhi, Kostas Amberiadis, Ankur Srivastava:
Metrics and Methodology for Hardware Security Constructs. 142-148 - Dirk Riehle:
Open Source License Obligations: Attribution and Copyleft. 149-152 - Mladan Jovanovic, Mark Campbell:
Benchmarking AI: Toward Inclusive Evaluation of Language Models. 153-159 - Jyotika Athavale, Louis J. Gullo:
Bridging Functional Safety and Reliability: IEEE's Predictive Maintenance Standardization Efforts. 160-162

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.