


default search action
IEEE Computer, Volume 55
Volume 55, Number 1, January 2022
- Elham Ebrahimi:
Can Shooter Bias Be Measured in Immersive Virtual Reality? 4-5 - William Gropp, Forrest Shull:
Succeeding Together. 12-17 - Erich J. Neuhold:
50 & 25 Years Ago. 9-11 - Nir Kshetri, Jeffrey M. Voas:
Cryptojacking. 18-19 - Tom Coughlin:
Digital Storage and Memory. 20-29 - Joseph Williams, Jeffrey M. Voas:
Outlook: Forward Thinking for 2022. 30-32 - John VerWey
:
The Other Artificial Intelligence Hardware Problem. 34-42 - Rod F. Crawford, Andrew N. Sloss:
Is Expressiveness the Future of Software? 43-52 - Mohamad Kassab, Phillip A. Laplante:
Open Banking: What It Is, Where It's at, and Where It's Going. 53-63 - Shaoshan Liu, Jean-Luc Gaudiot:
Rise of the Autonomous Machines. 64-73 - Keith W. Miller, Deborah G. Johnson, Perry D. Drake:
The ConnectionRoom: A New Analogy for Understanding the Ethical Dimensions of Social Media. 74-81 - Joanna F. DeFranco:
From Calculations to Computations: A Look Back at the First Computer. 82-87 - Doron Drusinsky:
On the High-Energy Consumption of Bitcoin Mining. 88-93 - Lachlan McCalman, Daniel Steinberg, Grace Abuhamad, Marc-Etienne Brunet, Robert C. Williamson, Richard S. Zemel:
Assessing AI Fairness in Finance. 94-97 - Sarah Horton
:
Building an Accessible Digital World. 98-102 - Christos Alexakos, Konstantinos Votis, Dimitrios Tzovaras
, Dimitrios Serpanos:
Reshaping the Intelligent Transportation Scene: Challenges of an Operational and Safe Internet of Vehicles. 104-107 - Steve Keckler, Dejan S. Milojicic:
Accelerators. 108-112 - Michael Zyda:
Can We Replace All, or Mostly All, In-Class Teaching With Educational Games? 113-117 - Hal Berghel:
The State of the Art in Voting Machine Technology: Just How Reliable Are They? 118-126 - Joseph Weiss, Rob Stephens, Nadine Miller:
Control System Cyber Incidents Are Real - and Current Prevention and Mitigation Strategies Are Not Working. 128-137
Volume 55, Number 2, February 2022
- Erich J. Neuhold:
50 & 25 Years Ago. 7-9 - Phil Laplante, Jeffrey M. Voas:
Zero-Trust Artificial Intelligence? 10-12 - Jungheum Park, Hyunji Chung, Joanna F. DeFranco:
Multilayered Diagnostics for Smart Cities. 14-22 - Zhou Yang, Spencer Bradshaw, Rattikorn Hewett, Fang Jin
:
Discovering Opioid Use Patterns From Social Media for Relapse Prevention. 23-33 - Thomas B. Preußer, Smitha Gautham, Abhi D. Rajagopala, Carl R. Elks, Alexander Weiss
:
Everything You Always Wanted to Know About Embedded Trace. 34-43 - Usama Salama, Lina Yao, Hye-Young Paik:
A Multilevel Collective Framework for Internet of Things Digital Forensic Investigation. 44-53 - Salman Ahmed, Ya Xiao, Taejoong Chung, Carol J. Fung, Moti Yung, Danfeng Daphne Yao
:
Privacy Guarantees of Bluetooth Low Energy Contact Tracing: A Case Study on COVIDWISE. 54-62 - Jerry Bonnell
, Mitsunori Ogihara
, Yelena Yesha:
Challenges and Issues in Data Science Education. 63-66 - Phillip Bernstein, Mark Greaves, Steve McConnell, Clifford Pearson:
Harnessing Artificial Intelligence to Design Healthy, Sustainable, and Equitable Places. 67-71 - Nir Kshetri, Maya Chhetri:
Gender Asymmetry in Cybersecurity: Socioeconomic Causes and Consequences. 72-77 - Yuxia Zhang, Hao He
, Minghui Zhou:
Commercial Participation in OpenStack: Two Sides of a Coin. 78-84 - Sarah Jane Mee, Salam Daher:
Alexa, M.D. 85-89 - Mladan Jovanovic
, Mia Schmitz:
Explainability as a User Requirement for Artificial Intelligence Systems. 90-94 - Norita B. Ahmad, Areeba Hamid
, Vian Ahmed:
Data Science: Hype and Reality. 95-101 - Doron Drusinsky, Matthew Litton
, James Bret Michael:
Lightweight Verification and Validation of Cyberphysical Systems Using Machine-Learned Correctness Properties. 102-108
Volume 55, Number 3, March 2022
- Erich J. Neuhold:
50 & 25 Years Ago. 7-10 - Nir Kshetri, Jeffrey M. Voas:
Ransomware: Pay to Play? 11-13 - Joanna F. DeFranco:
Should Cyberphysical Systems and the Internet of Things Get Married? 14-23 - Atif Mashkoor, Tim Menzies
, Alexander Egyed, Rudolf Ramler:
Artificial Intelligence and Software Engineering: Are We Ready? 24-28 - Hironori Washizaki, Foutse Khomh, Yann-Gaël Guéhéneuc, Hironori Takeuchi, Naotake Natori, Takuo Doi, Satoshi Okuda
:
Software-Engineering Design Patterns for Machine Learning Applications. 30-39 - Stephen John Warnett
, Uwe Zdun
:
Architectural Design Decisions for the Machine Learning Workflow. 40-51 - Jubril Gbolahan Adigun
, Matteo Camilli
, Michael Felderer, Andrea Giusti, Dominik T. Matt, Anna Perini, Barbara Russo, Angelo Susi:
Collaborative Artificial Intelligence Needs Stronger Assurances Driven by Risks. 52-63 - Zubair Khaliq
, Sheikh Umar Farooq, Dawood Ashraf Khan:
Transformers for GUI Testing: A Plausible Solution to Automated Test Case Generation and Flaky Tests. 64-73 - Norbert Siegmund, Johannes Dorn, Max Weber, Christian Kaltenecker, Sven Apel
:
Green Configuration: Can Artificial Intelligence Help Reduce Energy Consumption of Configurable Software Systems? 74-81 - Laura J. Freeman, Feras A. Batarseh, D. Richard Kuhn, M. S. Raunak, Raghu N. Kacker:
The Path to a Consensus on Artificial Intelligence Assurance. 82-86 - Bill Curtis, Robert A. Martin, Philippe-Emmanuel Douziech:
Measuring the Structural Quality of Software Systems. 87-90 - Lior Ella:
How to Build a Scalable Quantum Controller. 91-94 - Nir Kshetri, Elena Loukoianova:
Data Privacy Considerations for Central Bank Digital Currencies in Asia-Pacific Countries. 95-100 - Raghvinder S. Sangwan, Youakim Badr, Satish Mahadevan Srinivasan, Partha Mukherjee:
On the Testability of Artificial Intelligence and Machine Learning Systems. 101-105 - Joseph Weiss, Rob Stephens, Nadine Miller:
Changing the Paradigm of Control System Cybersecurity. 106-116 - Hal Berghel:
A Collapsing Academy, Part III: Scientometrics and Metric Mania. 117-123 - Michael Zyda:
Let's Rename Everything "the Metaverse!". 124-129
Volume 55, Number 4, April 2022
- Elisabeth André
:
How Virtual Agents Learn to Speak Expressively. 4-5 - Erich J. Neuhold:
50 & 25 Years Ago. 9-11 - Ergun Akleman:
Computing Through Time. 10 - Joanna F. DeFranco, Jeffrey M. Voas, Nir Kshetri:
Algorithms: Society's Invisible Puppeteers. 12-14 - George K. Thiruvathukal, Yung-Hsiang Lu:
Efficient Computer Vision for Embedded Systems. 15-19 - Philip C. Treleaven, Malgorzata Smietanka, Hirsh Pithadia:
Federated Learning: The Pioneering Distributed Machine Learning and Privacy-Preserving Data Technology. 20-29 - Dai Hoang Tran
, Quan Z. Sheng
, Wei Emma Zhang
, Salma Abdalla Hamad, Nguyen Lu Dang Khoa
, Nguyen Hoang Tran:
Deep Conversational Recommender Systems: Challenges and Opportunities. 30-39 - Adriano Soares Koshiyama, Emre Kazim, Philip C. Treleaven:
Algorithm Auditing: Managing the Legal, Ethical, and Technological Risks of Artificial Intelligence, Machine Learning, and Associated Algorithms. 40-50 - Henry E. Schaffer:
Computerized Analysis Can Improve Education While Taking Advantage of Economies of Scale. 52-55 - Joanna F. DeFranco, Michael J. Metro:
Internet of Telemedicine. 56-59 - Nir Kshetri:
Scams, Frauds, and Crimes in the Nonfungible Token Market. 60-64 - Jesús M. González-Barahona
, Daniel Izquierdo-Cortazar, Gregorio Robles
:
Software Development Metrics With a Purpose. 66-73 - Joshua Brian Fitzgerald:
Elliptic Curve Pairings. 74-77 - Keren Bergman, Ray Beausoleil, Dejan S. Milojicic:
Silicon Photonics. 78-81 - Mark Campbell, Mladan Jovanovic
:
Digital Self: The Next Evolution of the Digital Human. 82-86 - Preeti S. Chauhan, Nir Kshetri:
The Role of Data and Artificial Intelligence in Driving Diversity, Equity, and Inclusion. 88-93 - Malisa Vucinic, Göran Selander, John Preuss Mattsson, Thomas Watteyne:
Lightweight Authenticated Key Exchange With EDHOC. 94-100
Volume 55, Number 5, May 2022
- Manish Parashar:
Advancing Reproducibility in Parallel and Distributed Systems Research. 4-5 - Erich J. Neuhold:
50 & 25 Years Ago. 9-12 - Jeffrey M. Voas:
"Dumbing Down". 13 - Michael Zyda:
We Need Something Like "Bell Labs" for the Games Industry. 16-21 - Barry L. Jenkins, John Scott, Francois Malassenet, Kshitij Patil:
Toward a New Type of Stream for Interactive Content. 22-30 - Jessica D. Bayliss:
The Data-Oriented Design Process for Game Development. 31-38 - Marko Radeta, Agustin Zuniga
, Naser Hossein Motlagh
, Mohan Liyanage
, Rúben Freitas, Moustafa Youssef, Sasu Tarkoma, Huber Flores, Petteri Nurmi
:
Deep Learning and the Oceans. 39-50 - Shuiguang Deng, Pan Lv, Ouwen Jin, Schahram Dustdar
, Ying Li, De Ma, Zhaohui Wu, Gang Pan:
Darwin-S: A Reference Software Architecture for Brain-Inspired Computers. 51-63 - Ann E. K. Sobel, Ron Vetter:
Cybersecurity Best Practices for CISE Programs. 64-72 - Michael Grottke
, Kishor S. Trivedi:
Aging, Fast and Slow. 73-75 - Hsiao-Ying Lin:
Large-Scale Artificial Intelligence Models. 76-80 - Theodoros Komninos, Michael Paraskevas, Zacharoula Smyrnaiou
, Dimitrios Serpanos:
Cyberphysical Systems in K-12 Education. 81-84 - Shiuhpyng Shieh, Shanhsin Lee, Mengru Tsai:
Strategy and Tactics Against Ransomware. 85-92 - Hal Berghel:
The QAnon Phenomenon: The Storm Has Always Been Among Us. 93-100 - Michael Zyda:
How Do I Get a Position in the Games Industry? The FAQ. 102-108
Volume 55, Number 6, June 2022
- Chia-Lin Yang:
A Forward Speculative Interference Attack. 4-5 - Erich J. Neuhold:
50 & 25 Years Ago. 9-11 - Ergun Akleman:
Computing Through Time. 10 - Joanna F. DeFranco, Jeffrey M. Voas:
Revisiting Software Metrology. 12-14 - James Bret Michael, Marko Orescanin:
Developing and Deploying Artificial Intelligence Systems. 15-17 - Dennis Muiruri, Lucy Ellen Lwakatare
, Jukka K. Nurminen
, Tommi Mikkonen
:
Practices and Infrastructures for Machine Learning Systems: An Interview Study in Finnish Organizations. 18-29 - Kunai Zhang, Yahui Liu, Weiqiang Zhang, Shaoshan Liu:
π-Learner: A Lifelong Roadside Learning Framework for Infrastructure Augmented Autonomous Driving. 30-39 - K. M. A. Solaiman, Tao Sun, Alina Nesen, Bharat K. Bhargava, Michael Stonebraker:
Applying Machine Learning and Data Fusion to the "Missing Person" Problem. 40-55 - Milad Taleby Ahvanooey
, Mark Xuefang Zhu, Wojciech Mazurczyk, Malika Bendechache:
Information Hiding in Digital Textual Contents: Techniques and Current Challenges. 56-65 - Pedro Reviriego, Elena Merino Gómez, Fabrizio Lombardi:
Latin and Greek in Computing: Ancient Words in a New World. 66-72 - Oscar Pastor, Alfonso Pierantonio, Gustavo Rossi:
Teaching Modeling in the Time of Agile Development. 73-76 - Arief Zulkifli:
TikTok in 2022: Revisiting Data and Privacy. 77-80 - Ildikó Vancsa:
The Four Opens: Open Source Beyond the Code. 81-84 - Nir Kshetri:
El Salvador's Bitcoin Gamble. 85-89 - Craig Iaboni
, Himanshu Patel, Deepan Lobo, Ji-Won Choi, Pramod Abichandani:
Where Are They Going? Clustering Event Camera Data to Detect and Track Moving Objects. 90-94 - Doron Drusinsky:
Cryptographic-Biometric Self-Sovereign Personal Identities. 96-102
Volume 55, Number 7, July 2022
- Han-Wei Shen:
Scientific Visualization Using Neural Networks. 4-6 - Erich J. Neuhold:
50 & 25 Years Ago. 10-12 - Joanna F. DeFranco, Jeffrey M. Voas:
"Smarter" Seeking "Wiser". 13-14 - Phil Laplante, Dejan S. Milojicic:
Predicting Technologies That Advance Humanity. 15-17 - David A. Patterson, Joseph Gonzalez
, Urs Hölzle, Quoc V. Le, Chen Liang, Lluis-Miquel Munguia, Daniel Rothchild, David R. So, Maud Texier, Jeff Dean:
The Carbon Footprint of Machine Learning Training Will Plateau, Then Shrink. 18-28 - Torsten Hoefler, Ariel Hendel, Duncan Roweth:
The Convergence of Hyperscale Data Center and High-Performance Computing Networks. 29-37 - Yiming Huo
:
Space Broadband Access: The Race Has Just Begun. 38-45 - Ria Cheruvu
:
Unconventional Concerns for Human-Centered Artificial Intelligence. 46-55 - Ramalatha Marimuthu, Shally Gupta, Larry Stapleton, Dominique Duncan
, Bozenna Pasik-Duncan:
Challenging the Digital Divide: Factors Affecting the Availability, Adoption, and Acceptance of Future Technology in Elderly User Communities. 56-66 - Rosa M. Badia, Ian T. Foster, Dejan S. Milojicic:
More Real Than Real: The Race to Simulate Everything. 67-72 - Phil Laplante:
Trusting Digital Twins. 73-77 - James Bret Michael:
Placing Trust in Automated Software Development Processes. 78-81 - Thomas M. Coughlin, William R. Tonti:
Computing Nearer to Data. 82-87 - Dimitrios Serpanos, Theodoros Komninos:
The Cyberwarfare in Ukraine. 88-91 - Moshe Sipper:
Artificial General Intelligence: Pressure Cooker or Crucible? 92-96 - Neil C. Rowe:
Algorithms for Artificial Intelligence. 97-102 - Hal Berghel:
Prosperity Theology Goes Online: Will This Be a Fifth Great Awakening? 104-110 - Michael Zyda:
Weapons of Mass Distraction - The America's Army Game at 20. 112-122
Volume 55, Number 8, August 2022
- Clayton Ferner:
Contributions of Quantum Factoring on Quantum Research. 5-7 - Erich J. Neuhold:
50 & 25 Years Ago. 11-13 - Ergun Akleman:
Computing Through Time. 12 - Jeffrey M. Voas, Elena Loukoianova:
Warming Your Chicken. 14-15 - Jeffrey M. Voas:
In This Issue. 15 - Manish Parashar, Michael A. Heroux, Victoria Stodden:
Research Reproducibility. 16-18 - Ian T. Foster, Carl Kesselman
:
CUF-Links: Continuous and Ubiquitous FAIRness Linkages for Reproducible Research. 20-30 - Martin D. Halbert
:
Advancing Reproducibility at the NSF. 31-39 - Lorena A. Barba:
Defining the Role of Open Source Software in Research Reproducibility. 40-48 - Torsten Hoefler:
Benchmarking Data Science: 12 Ways to Lie With Statistics and Performance on Parallel Computers. 49-56 - Abdul Majeed
, Seong Oun Hwang:
A Privacy-Assured Data Lifecycle for Epidemic-Handling Systems. 57-69 - Huber Flores, Agustin Zuniga
, Sasu Tarkoma, Leonardo Tonetto, Tristan Braud, Pan Hui, Yong Li, Mostafa H. Ammar, Petteri Nurmi
:
Collaboration Stability: Quantifying the Success and Failure of Opportunistic Collaboration. 70-81 - Krassen Stefanov
:
Software Systems and Frameworks for Competency-Based Learning. 82-88 - Nir Kshetri, Jeffrey M. Voas:
Blockchain's Carbon and Environmental Footprints. 89-94 - Mark Campbell:
Privacy-Preserving Computation: Doomed to Succeed. 95-99 - Joanna F. DeFranco, Bob Maley:
Closing the Security Agility Gap. 100-102 - James Bret Michael, George W. Dinolt, Frederick B. Cohen, Duminda Wijesekera:
Can You Trust Zero Trust? 103-105
Volume 55, Number 9, September 2022
- Patrick Schaumont
:
Emerging Computing Challenges in the Interaction of Hardware and Software. 4-5 - Erich J. Neuhold:
50 & 25 Years Ago. 9-12 - Nir Kshetri, Jeffrey M. Voas:
Cyber Olympics: Game On! 13-15 - Giovanna Di Marzo Serugendo, Anne-Françoise Cutting-Decelle, Laurent Guise, Thierry Cormenier, Imran Khan, Luc Hossenlopp:
Digital Twins: From Conceptual Views to Industrial Applications in the Electrical Domain. 16-25 - Bo Yu, Chongyu Chen, Jie Tang, Shaoshan Liu, Jean-Luc Gaudiot:
Autonomous Vehicles Digital Twin: A Practical Paradigm for Autonomous Driving System Development. 26-34 - Peter Kriens, Tim Verbelen:
What Machine Learning Can Learn From Software Modularity. 35-42 - Attila Kertész:
Block the Chain: Software Weapons of Fighting Against COVID-19. 43-53 - Carlo Puliafito, Claudio Cicconetti
, Marco Conti, Enzo Mingozzi, Andrea Passarella:
Stateful Function as a Service at the Edge. 54-64 - Claudio Cicconetti
, Marco Conti, Andrea Passarella:
In-Network Computing With Function as a Service at the Edge. 65-73 - Hsiao-Ying Lin:
Staying Stronger Together: Synergy From Multiple Sensors. 74-78 - Manish Parashar:
Democratizing Science Through Advanced Cyberinfrastructure. 79-84 - Leandros A. Maglaras
, Mohamed Amine Ferrag, Helge Janicke, Nick Ayres, Leandros Tassiulas:
Reliability, Security, and Privacy in Power Grids. 85-88 - Anita D. Carleton, Forrest Shull, Erin Harper:
Architecting the Future of Software Engineering. 89-93 - Pankaj Mehra
, Tom Coughlin:
Taming Memory With Disaggregation. 94-98 - Bernhard Bauer, Mouadh Ayache, Saleh Mulhem, Meirav Nitzan, Jyotika Athavale, Rainer Buchty, Mladen Berekovic
:
On the Dependability Lifecycle of Electrical/Electronic Product Development: The Dual-Cone V-Model. 99-106 - Hal Berghel:
A Collapsing Academy IV: How Did Memory and Gag Laws Gain Admission? 107-114 - James Bret Michael:
Understanding Conversational Artificial Intelligence. 115-119 - Michael Zyda:
Building a Human-Intelligent Metaverse. 120-128
Volume 55, Number 10, October 2022
- Paolo Montuschi, Jean-Michel Muller
, Florent de Dinechin
:
Computer Arithmetic: Continuing a Long and Steady Emergence. 4-6 - Erich J. Neuhold:
50 & 25 Years Ago. 10-12 - Jeffrey M. Voas
:
Crying "Cybersecurity!". 14-15 - Joanna F. DeFranco
, Nir Kshetri
:
Software Supply Chains. 16-17 - Emanuele Buchicchio
, Luca Grilli
, Eros Capobianco, Salvatore Cipriano
, Diego Antonini
:
Invisible Supply Chain Attacks Based on Trojan Source. 18-25 - César Soto-Valero
, Martin Monperrus
, Benoit Baudry
:
The Multibillion Dollar Software Supply Chain of Ethereum. 26-34 - Alessandro Cilardo, Marcello Cinque
, Luigi De Simone
, Nicola Mazzocca:
Virtualization Over Multiprocessor Systems-on-Chip: An Enabling Paradigm for the Industrial Internet of Things. 35-47 - Wan J. Fokkink
, Martijn A. Goorden
, Joanna M. van de Mortel-Fronczak
, Ferdie F. H. Reijnen, Jacobus E. Rooda:
Supervisor Synthesis: Bridging Theory and Practice. 48-54 - Dragi Kimovski
, Sasko Ristov
, Radu Prodan
:
Decentralized Machine Learning for Intelligent Health-Care Systems on the Computing Continuum. 55-65 - Jay Liebowitz
:
Digital Transformation for the University of the Future: A Perspective. 66-69 - Mohamad Kassab
, Joanna F. DeFranco
:
IoTility: A Contemporary View. 70-74 - Ravi Sharma
, Norita B. Ahmad
, Saqib Ali
, Adil Bilal
, Samar Fatima
, Nir Kshetri
, Fatima Abu Salem, Prateek Sibal:
Technomoral Affordances of Artificial Intelligence in Data-Driven Systems. 76-81 - Domenico Talia:
Machine Intelligence for Human Health: A Few Noteworthy Cases. 82-86 - Sayan Mitra
, Hussein Sibai
:
Symmetry for Boosting Algorithmic Proofs of Cyberphysical Systems. 88-93 - Nir Kshetri
:
Economics of Nonfungible Tokens. 94-99 - Paolo Faraboschi, Eitan Frachtenberg
, Phil Laplante
, Dejan S. Milojicic
, Roberto Saracco
:
Virtual Worlds (Metaverse): From Skepticism, to Fear, to Immersive Opportunities. 100-106 - Mladan Jovanovic
, Mark Campbell:
Generative Artificial Intelligence: Trends and Prospects. 107-112 - Joseph Williams
, Lisa Nee:
Privacy Engineering. 113-118
Volume 55, Number 11, November 2022
- Erich J. Neuhold
:
50 & 25 Years Ago. 8-11 - Charles Li
, Jeffrey M. Voas
:
Carbon "Footprinting" IT. 12-14 - Anubha Gupta
, Sachin Motwani
, Abhishek Agarwal
, Vishaal Udandarao, Tanmoy Chakraborty
:
Changing Landscape of Technical Education Pedagogy From Traditional to Practical e-Learning. 16-28 - Connor Fritz
, Dylan Bray, Grace Lee, Christine Julien
, Sheri Burson, Darla Castelli, Carol Ramsey, Jamie Payton:
Project moveSMART: When Physical Education Meets Computational Thinking in Elementary Classrooms. 29-39 - Ben Nassi
, Yaron Pirutin, Jacob Shams, Raz Swissa, Yuval Elovici
, Boris Zadov:
Optical Speech Recovery From Desktop Speakers. 40-51 - Uélison Jean Lopes dos Santos, Cristiano André da Costa
, André Henrique Mayer, Eduardo Souza dos Reis, Juan Eduardo Cruz Maldonado, Jorge Luis Victória Barbosa
, Rodolfo Stoffel Antunes
, Rodrigo da Rosa Righi
, Nelson Eduardo Flores:
Trends in User Identity and Continuous Authentication. 52-61 - Juanjo Pérez-Sánchez
, Joaquín Nicolás Ros
, Juan Manuel Carrillo de Gea
, José Luis Fernández-Alemán
:
DevOps Certifications for IT Professionals. 62-73 - Dumitru Roman
, Radu Prodan
, Nikolay Nikolov
, Ahmet Soylu, Mihhail Matskin, Andrea Marrella
, Dragi Kimovski
, Brian Elvesæter, Anthony Simonet-Boulogne
, Giannis Ledakis, Hui Song, Francesco Leotta
, Evgeny Kharlamov:
Big Data Pipelines on the Computing Continuum: Tapping the Dark Data. 74-84 - Phillip Glen Armour
, Hal Berghel, Robert N. Charette
, John Leslie King
:
Ukraine Aftershocks. 85-93 - Alina Oprea, Anoop Singhal, Apostol Vassilev
:
Poisoning Attacks Against Machine Learning: Can Machine Learning Be Trustworthy? 94-99 - Hal Berghel
:
Social Media and the Banality of (Online) Crowds. 100-105 - Joseph Weiss
, Michael Hood, Nadine Miller, Chris Potorieko, James Bret Michael
:
Using Machine Learning to Work Around the Operational and Cybersecurity Limitations of Legacy Process Sensors. 106-111 - Phil Laplante
:
Software Engineering's Adolescent Growing Pains. 112-114 - Mohammad H. Mamduhi
, Efe C. Balta
, Alisa Rupenyan
, John Lygeros
:
Information-Operation Technology Integration in Industrial Cyberphysical Systems. 115-118 - Michael Zyda
:
Patent Litigation in the Games Space. 120-129
Volume 55, Number 12, December 2022
- Jeffrey M. Voas
, Patrick McConnell, Nir Kshetri
:
Energy Considerations. 4-5 - William Gropp, Forrest Shull:
Our Opportunities to Collaborate: In-Person and Virtual, Local and Global, the Society Welcomes New Connections. 12-17 - Erich J. Neuhold
:
50 & 25 Years Ago. 9-11 - Ergun Akleman
:
Computing Through Time. 10 - Nir Kshetri
, Jeffrey M. Voas
:
RegTech's Rise. 24-26 - Marilyn Wolf
:
Computer Engineering Education. 27-37 - Dimitrios Serpanos
, Luis Muñoz
, Ioannis Chatzigiannakis
:
Smart and Circular Cities. 38-41 - Dana Eleftheriadou
, William Neale, Natalia Gkiaouri, Andrea Halmos, Vasilis Liogkas:
Redefining Circular Cities: Regulation, Governance, Infrastructure, and Technology. 42-53 - Naser Hossein Motlagh
, Lauri Lovén
, Jacky Cao
, Xiaoli Liu
, Petteri Nurmi
, Schahram Dustdar
, Sasu Tarkoma
, Xiang Su
:
Edge Computing: The Computing Infrastructure for the Smart Megacities of the Future. 54-64 - Sara Nieves Matheu
, Enrique Mármol Campos, José Luis Hernández Ramos
, Antonio F. Skarmeta
, Gianmarco Baldini
:
Federated Cyberattack Detection for Internet of Things-Enabled Smart Cities. 65-73 - Zoran Kostic
, Alex Angus, Zhengye Yang, Zhuoxu Duan, Ivan Seskar
, Gil Zussman
, Dipankar Raychaudhuri:
Smart City Intersections: Intelligence Nodes for Future Metropolises. 74-85 - Aqeel H. Kazmi
, Saqib Rasool Chaudhry, Hadi Tabatabaee Malazi
, Sangita Dhara, Siobhán Clarke
:
Interoperable Internet of Things for Smart Transportation Systems in Circular Cities. 86-97 - Suparna De
, Wei Wang
, Usamah Jassat, Klaus Moessner
:
Usage Mining of the London Santander Bike-Sharing System. 98-108 - Javier Conde
, Andres Munoz-Arcentales
, Johnny Choque
, Gabriel Huecas
, Álvaro Alonso
:
Overcoming the Barriers of Using Linked Open Data in Smart City Applications. 109-118 - Leonidas G. Anthopoulos
, Marijn Janssen:
Business Model Canvas for Big and Open Linked Data in Smart and Circular Cities: Findings From Europe. 119-133 - Nir Kshetri
:
Data and Artificial Intelligence as Tools to Fight Poverty: Some Notable Applications in Agriculture and Health Care. 134-139 - Valdemar Vicente Graciano Neto
, Mohamad Kassab
, Vinicius Carvalho Lopes, Roberto Oliveira
, Renato Bulcão Neto:
The State of IoT for Agribusiness in Brazil. 140-144 - Bianca Trinkenreich, Marco Aurélio Gerosa
, Igor Steinmacher
:
Women in Open Source: We Need to Talk About It. 145-149 - Nir Kshetri
:
A Typology of Metaverses. 150-155 - James A. Ang
, David J. Mountain:
New Horizons for High-Performance Computing. 156-162

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.