4 | -- | 5 | Patrick Schaumont, Paolo Montuschi. The Rise of Hardware Security in Computer Architectures |
14 | -- | 17 | Oresti Banos, Chris D. Nugent. M-Coaching: Towards the Next Generation of Mobile-Driven Healthcare Support Services |
18 | -- | 25 | Mauro Tschanz, Tim Lucas Dorner, Jürgen Holm, Kerstin Denecke. Using eMMA to Manage Medication |
26 | -- | 33 | Haolin Wang, Qingpeng Zhang, Mary Ip, Joseph Tak Fai Lau. Social Media-based Conversational Agents for Health Management and Interventions |
34 | -- | 43 | Simo Hosio, Jaro Karppinen, Niels van Berkel, Jonas Oppenlaender, Jorge Gonçalves. Mobile Decision Support and Data Provisioning for Low Back Pain |
44 | -- | 51 | Hal Berghel, Daniel Berleant. The Online Trolling Ecosystem |
52 | -- | 55 | Erik P. DeBenedictis. A Role for IEEE in Quantum Computing |
56 | -- | 59 | Jim Isaak, Mina J. Hanna. User Data Privacy: Facebook, Cambridge Analytica, and Privacy Protection |
60 | -- | 65 | Robin Bloomfield, Peter Bishop 0001, Eoin Butler, Robert J. Stroud. Security-Informed Safety: Supporting Stakeholders with Codes of Practice |
66 | -- | 70 | Roy Want, Wei Wang, Stan Chesnutt. Accurate Indoor Location for the IoT |