Journal: IEEE Computer

Volume 49, Issue 8

10 -- 0David A. Bader. Evolving MPI+X Toward Exascale
12 -- 16Domenic Forte, Ron Perez, Yongdae Kim, Swarup Bhunia. Supply-Chain Security for Cyberinfrastructure [Guest editors' introduction]
18 -- 26Parrish Ralston, David Fry, Scott Suko, Bryce Winters, Matthew King, Robert Kober. Defeating counterfeiters with microscopic dielets embedded in electronic components
28 -- 34Joseph P. Skudlarek, Tom Katsioulas, Michael Chen. A Platform Solution for Secure Supply-Chain and Chip Life-Cycle Management
36 -- 43Sk Subidh Ali, Mohamed Ibrahim, Jeyavijayan Rajendran, Ozgur Sinanoglu, Krishnendu Chakrabarty. Supply-Chain Security of Digital Microfluidic Biochips
44 -- 52Wei Hu, Baolei Mao, Jason Oberg, Ryan Kastner. Detecting Hardware Trojans with Gate-Level Information-Flow Tracking
54 -- 61Kan Xiao, Adib Nahiyan, Mark Tehranipoor. Security Rule Checking in IC Design
62 -- 69Olav Lysne, Kjell Jørgen Hole, Christian Otterstad, Øyvind Ytrehus, Raymond Aarseth, Jorgen Tellnes. Vendor Malware: Detection Limits and Mitigation
70 -- 79Kim Schaffer, Jeffrey Voas. What Happened to Formal Methods for Security?
80 -- 83Doug Terry. Toward a New Approach to IoT Fault Tolerance
84 -- 87Claude Y. Laporte, Rory V. O'Connor. Systems and Software Engineering Standards for Very Small Entities: Accomplishments and Overview
88 -- 91Erik P. DeBenedictis. The Search for Computing's Secretariat
92 -- 97Celia Paulsen. Cybersecuring Small Businesses
98 -- 102Hal Berghel. The Pollyanna Delusion
104 -- 108Xiangshi Ren. Rethinking the Relationship between Humans and Computers
109 -- 111Evan Atherton. Science Fiction Prototyping at Work
112 -- 116Amir Vahid Dastjerdi, Rajkumar Buyya. Fog Computing: Helping the Internet of Things Realize Its Potential
156 -- 0David Alan Grier. Changing Trust