Journal: IEEE Computer

Volume 59, Issue 3

9 -- 11Antonio Mastropaolo. Secrets in the Synapses: When Steganography Meets Large Language Models
12 -- 14Erich J. Neuhold. 50 & 25 YEARS AGO
15 -- 0Ergun Akleman. Computing Through Time: Learning: Humans vs Machines
16 -- 19Nir Kshetri, Jeffrey M. Voas. Thoughts on Technology and the State
18 -- 0Jeffrey M. Voas. IN THIS ISSUE
20 -- 30Manfred Broy, Harald Ruess. Principled Cyber-Physical System Design: From Foundations and Models to Practical Engineering
31 -- 38Rolf Ernst, Robin Hapka. Machine Learning in Safety-Critical Applications: Beyond Traditional Worst-Case Design
39 -- 50Daojing He, Yuxing Zhang, Shanshan Zhu, Sammy Chan. Fuzzing Microsoft Remote Procedure Call Services
51 -- 59Stefano Galantino, Jacopo Marino, Fulvio Risso, Stefano Braghin, Liubov Nedoshivina, Antonio Fernandez Gómez-Skarmeta, Domenico Siracusa. Edge-to-Cloud Continuum Made Real
60 -- 69Victor R. Kebande. The End of Pretraining for Large Language Models: The Future of Agentic and AI Reasoning Beyond Peak Data
70 -- 83Christian Macedonia. The Computational Kosmoplex: A Principia for Engineers in the Age of AI
84 -- 91Zhaoqing Teng, Magy Seif El-Nasr. Unlocking Player Strategy: A Visual Journey Into Players' Problem-Solving Behaviors
92 -- 99Tairan Fu, David Nazareno Campo, Javier Coronado-Blázquez, Javier Conde, Pedro Reviriego, Fabrizio Lombardi. Stochastic Streets: A Walk Through Random LLM Address Generation in Four European Cities
100 -- 104Nir Kshetri, Jeffrey M. Voas. Is Vibe Coding the Future of Software?
105 -- 112Nir Kshetri, Jeffrey M. Voas. The Deepfake Governance Gap: Navigating Global Regulation in an Age of Synthetic Realitiess
113 -- 118Hal Berghel. From Trolls to Edgelords: The Use of Social Media to Support Extreme Ideology
119 -- 125Norita B. Ahmad, Anoud Abusalim, Jeffrey M. Voas, Keith W. Miller 0001. Be Visible or Vanish: Academic Publishing in the Platform Age
126 -- 130Thomas M. Coughlin. Space Data Centers Come of Age
131 -- 138James Bret Michael. Firmware, Dependability, and Trust
139 -- 141Dimitrios Serpanos. False Data Injection: Blind Trust and Stealthy Attacks
142 -- 146Mark Kennedy, Joanna F. DeFranco, Phillip A. Laplante. Discovering Proxy Systems to Test Critical AI Systems: A Metadata-Driven Software Similarity Approach