


default search action
IEEE Computer, Volume 57
Volume 57, Number 1, January 2024
- Jyotika Athavale

:
Make Your Mark. 4-7 - Erich J. Neuhold

:
50 & 25 Years Ago. 12-15 - Ergun Akleman

:
Computing Through Time. 13 - Jeffrey M. Voas

:
Niceties, Necessities, Antiquities, and Ubiquities. 16-17 - Jeffrey M. Voas

, Ron Vetter
:
Outlook 2024. 18-20 - George F. Hurlburt

, Sorel Reisman
:
Experts Speak Out About Artificial Intelligence in Education: First of Two Roundtables. 21-26 - Lucas Layman

, Ron Vetter
:
Generative Artificial Intelligence and the Future of Software Testing. 27-32 - Brian David Johnson

:
The Future of Threatcasting. 34-39 - Lucia Cascone

, Vincenzo Loia
, Michele Nappi
, Fabio Narducci
:
Soft Biometrics for Cybersecurity: Ongoing Revolution for Industry 4.0. 40-50 - Mark O. Neisser

, Ndubuisi G. Orji
, Harry J. Levinson
, Umberto Celano
, James R. Moyne
, Supika Mashiro
, Dan Wilcox
, Slava Libman
:
How Lithography and Metrology Are Enabling Yield in the Next Generation of Semiconductor Patterning. 51-58 - Charles Weir

, Anna Dyson
, Olamide Jogunola
, Louise A. Dennis
, Katie Paxton-Fear
:
Interlinked Computing in 2040: Safety, Truth, Ownership, and Accountability. 59-68 - Abdul Majeed

, Seong Oun Hwang
:
Feature Stores: A Key Enabler for Feature Reusability and Availability Across Machine Learning Pipelines. 69-74 - Debendra Das Sharma

, Thomas M. Coughlin
:
Universal Chiplet Interconnect Express: An Open Industry Standard for Memory and Storage Applications. 75-81 - Nir Kshetri

, Jeffrey M. Voas
:
Data Centers in Your Backyard? 82-87 - Matthew Akers

, Armon Barton
:
Forming Adversarial Example Attacks Against Deep Neural Networks With Reinforcement Learning. 88-99 - Payal Arora

, Usha Raman
:
The Case for Femwork: Feminist Design Principles in Tech and Tech-Enabled Work. 100-104 - Javier Conde

, Pedro Reviriego
, Joaquín Salvachúa
, Gonzalo Martínez
, José Alberto Hernández
, Fabrizio Lombardi
:
Understanding the Impact of Artificial Intelligence in Academic Writing: Metadata to the Rescue. 105-109 - Phil Laplante

:
Deception and Intuition in Software Engineering. 110-113 - Michael Zyda

:
How to Create a Games Industry in Your Country. 114-119 - Michael T. Swearingen

, James Bret Michael
, Joseph Weiss
, Robert Radvanovsky:
Resilient Without Zero Trust. 120-122 - Dimitrios Serpanos

:
Industrial Internet of Things: Trends and Challenges. 124-128 - Hal Berghel

:
Generative Artificial Intelligence, Semantic Entropy, and the Big Sort. 130-135 - Pedro Bruel

, Sai Rahul Chalamalasetti
, Aditya Dhakal
, Eitan Frachtenberg
, Ninad Hogade
, Rolando Pablo Hong Enriquez
, Alok Mishra
, Dejan S. Milojicic
, Pavana Prakash
, Gourav Rattihalli
:
Predicting Heterogeneity and Serverless Principles of Converged High-Performance Computing, Artificial Intelligence, and Workflows. 136-144
Volume 57, Number 2, February 2024
- Erich J. Neuhold

:
50 & 25 Years Ago. 7-10 - Ergun Akleman

:
Computing Through Time: Text and Drive. 8 - Joanna F. DeFranco

, Jeffrey M. Voas
:
"Thirsty" Computing. 11-13 - Jeffrey M. Voas

:
In This Issue. 12 - George F. Hurlburt

, Sorel Reisman
:
Experts Speak Out About Artificial Intelligence in Education: Second of Two Panel Roundtables. 14-20 - Mike Hinchey

:
Ethics and Computing. 21-23 - David Kreps

, Moira de Roche
:
The International Federation for Information Processing Code of Ethics in Context. 24-32 - Gabriela Ramos, Mariagrazia Squicciarini, Eleonora Lamm

:
Making AI Ethical by Design: The UNESCO Perspective. 33-43 - Frances S. Grodzinsky, Marty J. Wolf

, Keith W. Miller
:
Ethical Issues From Emerging AI Applications: Harms Are Happening. 44-52 - Kristen K. Greene

, Mary Frances Theofanos
, Craig Watson
, Anne Andrews
, Eyeisha Barron
:
Avoiding Past Mistakes in Unethical Human Subjects Research: Moving From Artificial Intelligence Principles to Practice. 53-63 - Donald Gotterbarn, Keith W. Miller

:
Cui Bono? Software Professionals Should Always Ask "Who Benefits?". 64-69 - Frederico Cerveira

, António Howcroft Ferreira
, Raul Barbosa
:
Resilient Virtualization. 70-78 - Jisoo Kim

, Mungyu Bae, Yeonsung Chu, Moon Chan Park, Dongwon Park, Dawoon Jung, Sangyeun Cho:
Self-Encrypting Drive Evolving Toward Multitenant Cloud Computing. 79-90 - Andreas Nettsträter

, Marius Brehler
:
How to Find the Right Scope for Open Source Developments? 91-94 - Nina DeFranco Tommarello

, Rebecca Deek
:
The Convergence of the Internet of Things and Artificial Intelligence in Medicine: Assessing the Benefits, Challenges, and Risks. 95-99 - Lieven Eeckhout

:
Toward Sustainable Computer Systems. 101-104 - Nir Kshetri

:
Wholesale Central Bank Digital Currencies in Asia: Current Status and Motivation. 105-110 - Rolf Oppliger

, Andreas Grünert:
How to Measure Cybersecurity and Why Heuristics Matter. 111-115 - Mark Campbell

, Mladan Jovanovic
:
Directing AI: Charting a Roadmap of AI Opportunities and Risks. 116-120 - Christopher D. Nordquist

, Stanley S. Chou
:
Exploring Heterogeneous Integration: Its Essence and Future Path. 121-124 - Nir Kshetri

:
Generative Artificial Intelligence and E-Commerce. 125-128
Volume 57, Number 3, March 2024
- Erich J. Neuhold

:
50 & 25 Years Ago. 7-10 - Ergun Akleman

:
Computing Through Time: Trustworthy AI. 8 - Jeffrey M. Voas

:
The Influencer. 11-13 - Jeffrey M. Voas

:
Also in this Issue. 12 - Phil Laplante

, Joanna F. DeFranco
, Rick Kuhn
:
Assured Autonomy, Artificial Intelligence, and Machine Learning: A Roundtable Discussion. 14-21 - Riccardo Mariani

, Francesca Rossi
, Rita Cucchiara
, Marco Pavone
, Barnaby Simkin, Ansgar Koene, Jochen Papenbrock:
Trustworthy AI - Part III. 22-24 - Antonio Emanuele Cinà

, Kathrin Grosse, Ambra Demontis
, Battista Biggio
, Fabio Roli
, Marcello Pelillo
:
Machine Learning Security Against Data Poisoning: Are We There Yet? 26-34 - Padmapritha T

, Korkut Bekiroglu
, Subathra Seshadhri, Seshadhri Srinivasan
:
Trustworthy AI-Based Personalized Insulin Recommender for Elderly People Who Have Type-2 Diabetes. 35-45 - Sonia C. Sousa

, David Lamas, José Cravino, Paulo Martins
:
Human-Centered Trustworthy Framework: A Human-Computer Interaction Perspective. 46-58 - Jeremy Peckham

:
An AI Harms and Governance Framework for Trustworthy AI. 59-68 - Abhishek Hazra

, Andrea Morichetta
, Ilir Murturi
, Lauri Lovén
, Chinmaya Kumar Dehury
, Victor Casamayor-Pujol
, Praveen Kumar Donta
, Schahram Dustdar
:
Distributed AI in Zero-Touch Provisioning for Edge Networks: Challenges and Research Directions. 69-78 - Youyang Qu

, Xin Yuan
, Ming Ding
, Wei Ni
, Thierry Rakotoarivelo, David B. Smith
:
Learn to Unlearn: Insights Into Machine Unlearning. 79-90 - Rita Cucchiara

, Lorenzo Baraldi
, Marcella Cornia
, Sara Sarto
:
Video Surveillance and Privacy: A Solvable Paradox? 91-100 - Abdul Majeed

, Seong Oun Hwang
:
Making Large Language Models More Reliable and Beneficial: Taking ChatGPT as a Case Study. 101-106 - Yuntao Liu

, Daniel Xing, Isaac McDaniel
, Olsan Ozbay
, Abir Akib, Mumtahina Islam Sukanya, Sanjay Rekhi, Ankur Srivastava:
Security Advantages and Challenges of 3D Heterogeneous Integration. 107-112 - Jim Handy, Tom Coughlin

:
How Emerging Memories Extend Battery Life. 113-116 - Alice Barana

, Marina Marchisio
:
Eight Sustainable Practices for Digital Activity Development: Drivers and Barriers in International Higher Education Collaboration. 117-122 - Dimitrios Serpanos

, Marilyn Wolf
:
Safety and Artificial Intelligence in Cyberphysical Systems. 123-126 - Michael Zyda

:
Large Language Models and Generative AI, Oh My! 127-132
Volume 57, Number 4, April 2024
- Erich J. Neuhold

:
50 & 25 Years Ago. 7-10 - Ergun Akleman

:
Computing Through Time: Dependability. 8 - Jeffrey M. Voas

:
Thoughts on Dependability. 11-12 - Joanna F. DeFranco

, Phil Laplante
, Rick Kuhn
, Zhaojun Steven Li
:
Dependable Computing. 13-15 - John A. McDermid

, Radu Calinescu
, Ibrahim Habli
, Richard Hawkins
, Yan Jia
, John Molloy
, Matt Osborne
, Colin Paterson
, Zoë Porter
, Philippa Ryan Conmy
:
The Safety of Autonomy: A Systematic Approach. 16-25 - Hiromu Yano, Tadashi Dohi, Hiroyuki Okamura

:
Performance Comparison of Software Reliability Estimation Algorithms. 26-36 - Alwyn E. Goodloe

, Klaus Havelund
:
High-Integrity Runtime Verification. 37-45 - Ren-Yi Huang

, G. Dumindu Samaraweera
, J. Morris Chang
:
Exploring Threats, Defenses, and Privacy-Preserving Techniques in Federated Learning: A Survey. 46-56 - Les Hatton

:
Dependability Improvement Depends on Dependable Measurement. 57-67 - Robert V. Binder

:
Software Dependability Measurement at the Age of 36. 68-81 - Kishor S. Trivedi

, Andrea Bobbio
:
Reliability and Availability Analysis in Practice: Toward Multilevel Models for Complex Systems. 82-92 - Christof Ebert

:
Industry Trends 2024: Innovation Needs Competence. 93-98 - Sean McGregor

:
Open Digital Safety. 99-103 - Eugenio Cesario

:
Machine Learning for Enhancing Public Safety in Modern Cities. 104-107 - Yale N. Patt

:
The CORRECT First Course in Computing for Serious Students. 108-112 - Nir Kshetri

:
Economics of Artificial Intelligence Governance. 113-118 - Doron Drusinsky

:
From P Versus NP to Probabilistic and Zero Knowledge Proof Systems. 119-130 - Wei Tang

, Margaret Martonosi
:
Distributed Quantum Computing via Integrating Quantum and Classical Computing. 131-136 - Sugandha Agarwal

, Norita B. Ahmad
, Dima Jamali:
AI and Big Data in Contemporary Marketing. 137-142 - Eitan Frachtenberg

, Viyom Mittal
, Pedro Bruel, Michalis Faloutsos, Dejan S. Milojicic
:
The Distribution Is the Performance. 143-149 - Shimeng Yu

, Tae-Hyeon Kim
:
Semiconductor Memory Technologies: State-of-the-Art and Future Trends. 150-154 - Joanna F. DeFranco

, Jeffrey M. Voas
:
Internet of Things-Flavored Chips. 156-158 - Gary McGraw

, Richie Bonett
, Harold Figueroa
, Katie McMahon
:
23 Security Risks in Black-Box Large Language Model Foundation Models. 160-164
Volume 57, Number 5, May 2024
- Erich J. Neuhold

:
50 & 25 Years Ago. 7-11 - Ergun Akleman

:
Computing Through Time: Venture Scientists. 8 - Jeffrey M. Voas

:
Dissertation, Inc. 12-14 - Jeffrey M. Voas:

Also in this Issue. 13 - Sumi Helal

, Philip C. Treleaven
:
Venture Scientists and Technology Entrepreneurship. 15-19 - Philip C. Treleaven

:
Educating Venture Scientists: Inspiring Students and Young Professionals To Commercialize Their Deep Tech Research Supported by Their Institutions. 20-28 - Marco Aiello

:
The AI Revolution and the Future of Work: Threats and Opportunities. 29-34 - Sergio Balassone

:
Fostering Innovation and Entrepreneurship in Europe: The EIT Digital Journey. 35-38 - Chan-Yuan Wong

, Jui-Jan Chan:
How Public Research Institutions Propagate Industrial Niches and Configure New Industrial Structure: The Case of ITRI (Taiwan) for Semiconductor Technologies. 39-43 - Mihkel Solvak

, Ave Lauringson
:
A Case Study of the Public Sector Digital Ecosystem in Estonia. 44-49 - Victor Alexiev

:
Venture Building in the Digital Era: Unraveling the Past, Present, and Future of Corporate Innovation. 50-57 - Anton Rassõlkin

, Pavels Maksimkins, Andrejs Stupans
, Viktor Rjabtsikov, Armands Senfelds, Vladimir Kuts
:
The Spatial Representation of a Self-Driving Vehicle for the Virtual Entity of a Digital Twin. 58-66 - Ajmal Khan

, Amer Saeed
, Farman Ullah, Muhammad Bilal
, Yasir Muhammad, Hesham El-Sayed
:
Charging Support Communication System Based on Vehicle-to-Vehicle Communication for Electric Vehicles. 67-77 - Qingtian Zou

, Lan Zhang
, Xiaoyan Sun
, Anoop Singhal
, Peng Liu
:
Using Explainable AI for Neural Network-Based Network Attack Detection. 78-85 - D. Richard Kuhn

, M. S. Raunak
, Raghu N. Kacker
, Jaganmohan Chandrasekaran
, Erin Lanus
, Tyler Cody
, Laura J. Freeman
:
Assured Autonomy Through Combinatorial Methods. 86-90 - George F. Hurlburt

:
Addressing the Perceived Skills Gap. 91-96 - Michael Zyda

:
Today Generative AI Is Just a Parlor Trick. 98-101 - Phil Laplante

:
Use a Pencil: On Writing Software Documentation Well and the Role of Autodocumentation. 102-105 - Matteo Calabrese

, Gregory Falco
:
Physics-Informed Satellite Cybersecurity. 106-109 - Mark Campbell

, Mladan Jovanovic
:
Disinfecting AI: Mitigating Generative AI's Top Risks. 111-116 - Hal Berghel

:
Social Media, Cognitive Dysfunction, and Social Disruption. 118-124
Volume 57, Number 6, June 2024
- Erich J. Neuhold

:
50 & 25 Years Ago. 7-10 - Ergun Akleman

:
Computing Through Time: Biometrics. 8 - Joanna F. DeFranco

, Jeffrey M. Voas
:
"Golden Years" Users. 11-14 - Jeffrey M. Voas

:
In this Issue. 12-13 - Francisco Maciá Pérez

, Iren Lorenzo-Fonseca
, José Vicente Berná-Martínez
, Alex Maciá-Fiteni
:
Accompaniment Services for the Elderly: A Comparison of Decision-Making Support Architectures in Distributed IT. 16-28 - Dezhi Ran

, Yingjie Fu
, Yibo He, Tianyu Chen, Xing Tang, Tao Xie:
Path Toward Elderly Friendly Mobile Apps. 29-39 - Fernando Alonso-Fernandez

, Josef Bigün
, Julian Fiérrez
, Naser Damer
, Hugo Proença
, Arun Ross
:
Periocular Biometrics: A Modality for Unconstrained Scenarios. 40-49 - Kiavash Jamshidi, Ramin Toosi

, Mohammad Ali Akhaee
:
Gender Recognition Based on Hand Images Employing Local and Global Shape Information. 50-61 - Jiangtao Wang, Long Chen

, Deborah Lycett
, Duncan Vernon, Dingchang Zheng
:
Toward Population Health Intelligence: When Artificial Intelligence Meets Population Health Research. 62-72 - Bilal Naqvi

, Joakim Kävrestad
, A. K. M. Najmul Islam
:
Inclusive and Accessible Cybersecurity: Challenges and Future Directions. 73-81 - Akriti Verma

, Shama Naz Islam
, Valeh Moghaddam
, Adnan Anwar
:
Digital Emotion Regulation on Social Media. 82-89 - Irina Zaks

, Timothy Lehnen
, Aaron Zaks
:
Improving Velocity of Code Contributions in Open Source. 90-96 - Christof Ebert

, Xuya Wang:
China Artificial Intelligence Industry Insights. 97-101 - Nir Kshetri

:
Generative Artificial Intelligence in the Financial Services Industry. 102-108 - Sorel Reisman

:
Practical Classroom Use of Generative Artificial Intelligence - A Case Study. 110-114 - Barry L. Jenkins

, Warren Mayoss
, Michael Zyda:
Streamed Interactive Media: How Changing the Paradigm on Streaming Game Content Enables a New Media Category. 116-121 - Biswabandan Panda

:
The Game of Latency, Bandwidth, and Hardware Prefetching. 122-126 - Michela Taufer

, Daniel Milroy
, Todd Gamblin
, Andrew Jones
, Bill Magro, Heidi Poxon
, Seetharami R. Seelam:
HPC and Cloud Convergence Beyond Technical Boundaries: Strategies for Economic Sustainability, Standardization, and Data Accessibility. 128-136 - Mohamad Kassab

, Joanna F. DeFranco
:
Unlocking the Internet of Things Engineering Job Market. 137-140 - Preeti S. Chauhan

:
Deepfake: Risks and Opportunities. 141-144
Volume 57, Number 8, August 2024
- Jeffrey M. Voas

:
Letters to the Editor. 4 - Erich J. Neuhold

:
50 & 25 Years Ago. 8-11 - Ergun Akleman

:
Computing Through Time: Technology Predictions. 9 - Phil Laplante

, Dejan S. Milojicic
, Jeffrey M. Voas
:
"Cyberpanics" and Global Disinformation Campaigns. 12-14 - Joanna F. DeFranco

, Nir Kshetri
, George K. Thiruvathukal
, George F. Hurlburt
:
Crowdsourcing: A Roundtable Discussion. 15-21 - Dejan S. Milojicic

, Phil Laplante
:
Technology Predictions: Technologies that Advance Humanity and Broad AI Adoption. 22-25 - Richard Shan

:
Language Artificial Intelligence at a Crossroads: Deciphering the Future of Small and Large Language Models. 26-35 - Rafael Ferreira da Silva

, Rosa M. Badia
, Deborah Bard
, Ian T. Foster
, Shantenu Jha
, Frédéric Suter
:
Frontiers in Scientific Workflows: Pervasive Integration With High-Performance Computing. 36-44 - Ernestina Cianca

, Mauro De Sanctis
, Tommaso Rossi
, Marina Ruggieri
:
Advanced Technologies for a Sustainable Future of Space. 45-54 - Huber Flores

:
AI Sensors and Dashboards. 55-64 - Sajad Shirali-Shahreza

:
Set Up My Smart Home as I Want. 65-73 - Javier Conde

, Miguel González, Pedro Reviriego
, Zhen Gao
, Shanshan Liu
, Fabrizio Lombardi
:
Speed and Conversational Large Language Models: Not All Is About Tokens per Second. 74-80 - Alexander Kott, George Yegor Dubynskyi, Andrii Paziuk

, Stephanie Elisabeth Galaitsi, Benjamin D. Trump, Igor Linkov
:
Russian Cyber Onslaught Was Blunted by Ukrainian Cyber Resilience, Not Merely Security. 82-89 - Henry Chan Bun Chan

:
CARES Model for Supporting Computing Education and 4C Framework for Teaching in Hybrid Classrooms. 90-95 - Mladan Jovanovic

, Mark Campbell
:
Compacting AI: In Search of the Small Language Model. 96-100 - Norita B. Ahmad

, Sabir Haque
:
Balancing Innovation and Ethics in AI- and Big Data-Driven Marketing. 102-107 - Christof Ebert

:
Convergence of IT, OT, and the IoT. 108-112 - Dirk Riehle

:
Free and Open Source Software. 114-118 - Nir Kshetri

:
The Economics of Semiconductor Manufacturing in the United States. 120-126 - Reetuparna Das

, Satish Narayanasamy:
Systems Challenges and Opportunities for Genomics. 127-135
Volume 57, Number 9, September 2024
- Erich J. Neuhold

:
50 & 25 Years Ago. 7-10 - Ergun Akleman

:
Computing Through Time: Playing Chess. 8 - Elena Loukoianova

, Jeffrey M. Voas
:
Data Submarines. 11-12 - Joaquim Jorge

, Wolfgang Hürst
:
Extended Reality and Artificial Intelligence's Ethical Crossroads: From Sensory Manipulation to Creative Disruption. 14-20 - W. Eric Wong

:
Certifying and Regulating AI/ML-Centric Applications. 21-23 - Tuomas Granlund

, Vlad Stirbu
, Tommi Mikkonen
:
Toward a Regulatory-Compliant Lifecycle for Artificial-Intelligence-Based Medical Devices in the European Union: Industry Perspectives. 24-34 - Richard Shan

:
Certifying Generative AI: Retrieval-Augmented Generation Chatbots in High-Stakes Environments. 35-44 - Vinod Vasudevan

, Amr Abdullatif
, Sohag Kabir
, Felician Campean:
Certifiability Analysis of Machine Learning Systems for Low-Risk Automotive Applications. 45-56 - Kíng-Pîng Tenn

, Yu-Wei Chang
, Hong-Yen Chen
, Teng-Kai Fan, Tsungnan Lin
:
Toward Trustworthy Artificial Intelligence: An Integrated Framework Approach Mitigating Threats. 57-67 - Ali G. Hessami

, Alexander Kriebitz, Gerlinde Weger, Eleanor 'Nell' Watson
, Patricia Shaw:
Artificial Intelligence for the Benefit of Everyone. 68-79 - Simon Chesterman

, Yuting Gao
, Jungpil Hahn
, Valerie Sticher
:
The Evolution of AI Governance. 80-92 - Derek C. Schuurman

:
A Tribute to the Z80. 94-95 - D. Frank Hsu

, Bruce S. Kristal
, Christina Schweikert
:
Combinatorial Fusion Analysis. 96-100 - Elsa López Pérez

, Göran Selander, John Preuß Mattsson
, Thomas Watteyne
, Malisa Vucinic
:
EDHOC Is a New Security Handshake Standard: An Overview of Security Analysis. 101-110 - Tom Coughlin

, Roger Hoyt:
IEEE Roadmap Outlines Development of Mass Digital Storage Technology. 111-116 - Michael Zyda

:
Generative AI Changes the World, Maybe. 118-123 - Sorel Reisman

:
Generative Artificial Intelligence and Problematic Student E-Mails. 124-127 - Nir Kshetri

, Jeffrey M. Voas
:
Adapting to Generative Artificial Intelligence: Approaches in Higher Education Institutions. 128-133 - Theodoros Komninos, Dimitrios Serpanos

:
Cyberconflict: The New Frontier of Global Warfare and Social Influence. 135-138 - Tracy Trac Bannon

:
Infusing Artificial Intelligence Into Software Engineering and the DevSecOps Continuum. 140-148
Volume 57, Number 10, October 2024
- Erich J. Neuhold

:
50 & 25 Years Ago. 7-10 - Ergun Akleman

:
Computing Through Time: Security. 8 - Jeffrey M. Voas

:
Mockery, Fake Reviews, and Fake Reviewers. 11-13 - Jeffrey M. Voas

:
In this Issue. 12 - W. Eric Wong

, Jeffrey M. Voas
:
Revisiting Software Reliability Modeling and Testing. 14-25 - Carson Koball, Yong Wang

, Bhaskar Prasad Rimal
, Varghese Mathew Vaidyan
:
Machine Learning Security: Threat Model, Attacks, and Challenges. 26-35 - Anton Dimov Hristozov

:
Engineering Challenges for Developing Reliable and Secure Heterogeneous Computing Systems. 36-44 - Mohammed Amine Boudouaia

, Samir Ouchani
:
Designing Secure and Smart Supply Chains: A Roadmap. 45-55 - Maciej Rys

:
Unraveling Participation Motivations in Pandemic-Related Hackathons: A COVID-19 Study. 56-65 - Bilal Naqvi

, Kari Smolander
:
Practitioners' Perspectives on and Prospects for Usable Security. 66-74 - Theresa Fister

, George K. Thiruvathukal
:
Artificial Intelligence Employment Interviews: Examining Limitations, Biases, and Perceptions. 76-81 - Christian Koch

:
The Prisoner's Dilemma of Open-Source Software Security. 82-85 - Andreas Grünert, James Bret Michael

, Rolf Oppliger
, Ruedi Rytz:
Why Probabilities Cannot Be Used in Cyber Risk Management. 86-89 - Joanna F. DeFranco

:
Health Care 4.0 and Clinical Internet of Things. 90-92 - George F. Hurlburt

:
Artificial Intelligence, the Workforce and Educational Realities. 94-98 - Umang Bhatt

, Holli Sargeant
:
When Should Algorithms Resign? A Proposal for AI Governance. 99-103 - Kevin Macwan

:
Integrating Blockchain Technology in Online Gaming Ecosystems. 104-111 - Nir Kshetri

:
Navigating EU Regulations: Challenges for U.S. Technology Firms and the Rise of Europe's Generative AI Ecosystem. 112-117 - Matthew Litton

, Doron Drusinsky
, London Bridget, James Bret Michael
:
Machine-Learned Correctness Properties, Runtime Verification, and Advance-Warning Oracles for Autonomous Systems. 118-130 - Hal Berghel

:
Election Integrity in the United States: How Will 2024 Compare to 2020? 131-137 - Mengjia Yan

, Thomas Bourgeat, Sharad Malik
:
Formal Verification for Secure Processors: A Guide for Computer Architects. 138-143 - Christof Ebert

, Ulrich Hemel:
Grow Your Artificial Intelligence Competence. 144-150 - Jyotika Athavale

, Cullen E. Bash
, Wesley Brewer
, Matthias Maiterth
, Dejan S. Milojicic
, Harry Petty
, Soumyendu Sarkar
:
Digital Twins for Data Centers. 151-158 - Nicholas Soures

, Jayanta Dey
, Dhireesha Kudithipudi
:
Learning Continually in Silicon. 160-164
Volume 57, Number 11, November 2024
- Erich J. Neuhold

:
50 & 25 Years Ago. 7-10 - Ergun Akleman

:
Computing Through Time: Intelligence Failures. 8 - Nir Kshetri

, Jeffrey M. Voas
:
3D Printing the "Tools" of War. 11-13 - M. S. Raunak, D. Richard Kuhn

:
AI Failures. 14-16 - Hem Chandra Joshi

, Sandeep Kumar
:
Artificial Intelligence Failures in Autonomous Vehicles: Causes, Implications, and Prevention. 18-30 - Mary Missy Cummings

, Benjamin Wheeler, John Kliem:
A Root Cause Analysis of a Self-Driving Car Dragging a Pedestrian. 31-40 - Tu Anh Ngo

, Alka Luqman
, Jonathan Chan Chew Meng, Anupam Chattopadhyay
:
A Systematic Approach Toward Robust Perception in (Semi-)Autonomous Vehicles. 41-48 - Michail Tsikerdekis

, Sherali Zeadally
, Iyad A. Katib
:
Defenses Against Artificial Intelligence Attacks. 49-59 - John Molloy

, Sepeedeh Shahbeigi
, John A. McDermid
:
Hazard and Safety Analysis of Machine-Learning-Based Perception Capabilities in Autonomous Vehicles. 60-70 - Julia De Miguel Velazquez, Sanja Scepanovic

, Andrés Gvirtz
, Daniele Quercia
:
Decoding Real-World Artificial Intelligence Incidents. 71-81 - Barani Maung Maung

, Keegan McBride
, Jason Samuel Lucas
, Maryam Tabar
, Dongwon Lee
:
Generative AI Disproportionately Harms Long Tail Users. 82-85 - John Leslie King

, Hal Berghel
, Phillip Glen Armour
, Robert N. Charette:
Healthy Skepticism. 86-91 - Ram Chillarege

:
Software Reliability: What Went Wrong? How to Fix It? 92-94 - William H. Widen

, Marilyn Wolf
:
Redux: Corporate Governance and Management of AI-Driven Product Development. 95-98 - Hal Berghel

:
Bruce Schneier on AI Security (Interview). 99-101 - Michael Zyda

:
Twenty Columns Later ... 102-117 - Varun Gupta

, Chetna Gupta:
Navigating the Landscape of AI-Generated Text Detection: Issues and Solutions for Upholding Academic Integrity. 118-123 - Mladan Jovanovic

, Mark Campbell
:
Fusing AI: Multimodal Language Models Inference Across Diverse Inputs. 124-130 - Ravi S. Sharma

, Samia Loucif
, Nir Kshetri
, Jeffrey M. Voas
:
Global Initiatives on "Safer" and More "Responsible" Artificial Intelligence. 131-137
Volume 57, Number 12, December 2024
- Jyotika Athavale

, Shivam:
Empowering Diversity and Innovation: Jyotika Athavale Led the Charge This Year as 2024 IEEE Computer Society President. 4-9 - Jeffrey M. Voas

:
Letters. 16 - Erich J. Neuhold

:
50 & 25 Years Ago. 20-24 - Ergun Akleman

:
Computing Through Time: Agriculture. 23 - Jeffrey M. Voas

, D. Richard Kuhn
:
"Over Spooked". 25-26 - Jeffrey M. Voas

:
Also In This Issue. 26 - Tracy Trac Bannon

, Phil Laplante
:
Generative AI in the Software Development Lifecycle. 27-34 - Joanna F. DeFranco

, Jeffrey M. Voas
:
Computing for Agricultural and Urban Environments. 35-37 - Ashish Gupta

, Vishesh Kumar Tanwar
, Amit Nath Jha
, Sajal K. Das
:
Analyzing Real-Time Insect Detection in Smart Connected Farms. 38-46 - Abdul-Rasheed Ottun

, Adeyinka Akintola
, Mohan Liyanage
, Michell Boerger
, Pan Hui
, Sasu Tarkoma
, Nikolay Tcholtchev
, Petteri Nurmi
, Huber Flores
:
AI Robustness Against Attacks in City-Scale Autonomous Drone Deployments. 47-57 - Yuankai He

, Weisong Shi
:
A Vision for Transformative Intersections. 58-68 - Natalia Silvis-Cividjian

:
Therac-25 Accidents: We Keep on Learning From Them. 69-78 - Jorge Eduardo Rivadeneira

, José Marcelo Fernandes
, André Rodrigues
, Fernando Boavida
, Jorge Sá Silva
:
Passive Data Collection in a Pandemic Situation: A Case Study. 79-89 - Dirk Riehle

:
Open Source Program Offices. 90-94 - Abdul Majeed

, Seong Oun Hwang
:
The Data Island Problem and Its Mitigation: Are We There Yet? 95-103 - Christof Ebert

, David A. Gustafson
:
Software Measurement: Four Steps to Unlock Success. 104-109 - Nir Kshetri

:
Disinformation and Misinformation in the Age of Artificial Intelligence and the Metaverse. 110-116 - Konstantin Läufer

, Gunda Mertin
, George K. Thiruvathukal
:
Engaging More Students in Formal Methods Education: A Practical Approach Using Temporal Logic of Actions. 118-123 - Cliff Young

:
Beyond the Quantitative Approach. 124-127 - Edward Au

:
Introduction to IEEE Computer Society Standards Activities. 129-132 - Sadasivan Shankar

:
Challenging Trends in Energy of Computing for Data Centers. 134-142 - Katerina Megas

, Barbara Cuthill
, Michael Fagan
, Paul Watrobski
:
NIST Cybersecurity for IoT Program. 144-148

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














