Journal: IEEE Computer

Volume 50, Issue 9

8 -- 9Ann DeMarle. Let Us Entertain You
10 -- 11Kenneth Magel. Revisiting the Impact of the Ada Programming Language
14 -- 17Philip C. Treleaven, Richard Gendal Brown, Danny Yang. Blockchain Technology in Finance
18 -- 28Tomaso Aste, Paolo Tasca, Tiziana di Matteo. Blockchain Technologies: The Foreseeable Impact on Society and Industry
29 -- 37Chris Khan, Antony Lewis, Emily Rutland, Clemens Wan, Kevin Rutter, Clark Thompson. A Distributed-Ledger Consortium Model for Collaborative Innovation
38 -- 49Ittay Eyal. Blockchain Technology: Transforming Libertarian Cryptocurrency Dreams to Finance and Banking Realities
50 -- 57Daniele Magazzeni, Peter McBurney, William Nash. Validation and Verification of Smart Contracts: A Research Agenda
58 -- 66Michael Bedford Taylor. The Evolution of Bitcoin Hardware
67 -- 74Fariborz Farahmand. The Importance of Human Information Processing: A Behavioral Economics Model for Predicting Domain Name Choice
76 -- 82Mohiuddin Ahmed. Thwarting DoS Attacks: A Framework for Detection based on Collective Anomalies and Clustering
83 -- 86Mark Embury, Jan Clayton. Standardization and Certification Challenges for Biopharmaceutical Plants
87 -- 91Hal Berghel. Oh, What a Tangled Web: Russian Hacking, Fake News, and the 2016 US Presidential Election
92 -- 98Chii Chang, Satish Narayana Srirama, Rajkumar Buyya. Indie Fog: An Efficient Fog-Computing Infrastructure for the Internet of Things
100 -- 104Hyunji Chung, Michaela Iorga, Jeffrey Voas, Sangjin Lee. "Alexa, Can I Trust You?"
105 -- 0David Alan Grier. Bringing the Benefits Home
106 -- 110Kyle Rakos, Alex Ruffino, Charles Li, Katherine Mao, Luke McBee, Ryan McBee, Matt Molo, Sanay Shah, Ian Sibley, Tyler Stagge. Purdue University Team Tackles Global Underwater-Vehicle Competition
112 -- 0Julie Jenson Bennett. The Meanings in the Machine

Volume 50, Issue 8

4 -- 5David Alan Grier. The Better Mix: 1985-1990
8 -- 12Pascal Guitton, Philippe Nain, Francois Sillion. Inria: From Cold-War Computing to Digital Sciences
14 -- 17Erik P. DeBenedictis. Computer Design Starts Over
18 -- 25Shaoshan Liu, Jie Tang, Zhe Zhang, Jean-Luc Gaudiot. Computer Architectures for Autonomous Driving
26 -- 33Rathijit Sen, David A. Wood. Energy-Proportional Computing: A New Definition
34 -- 45Fei Xia, Ashur Rafiev, Ali Aalsaud, Mohammed A. N. Al-Hayanni, James J. Davis, Joshua M. Levine, Andrey Mokhov, Alexander Romanovsky, Rishad A. Shafik, Alex Yakovlev, Sheng Yang. Voltage, Throughput, Power, Reliability, and Multicore Scaling
46 -- 51Ike Nassi. Scaling the Computer to the Problem: Application Programming with Unlimited Memory
52 -- 58Christof Teuscher. The Weird, the Small, and the Uncontrollable: Redefining the Frontiers of Computing
60 -- 63Andreas Stefik, Stefan Hanenberg. Methodological Irregularities in Programming-Language Research
64 -- 68John Hagel, John Seely Brown. Shaping Strategies for the IoT
69 -- 73Erik P. DeBenedictis, Mustafa Badaroglu, An Chen, Thomas M. Conte, Paolo A. Gargini. Sustaining Moore's Law with 3D Chips
74 -- 78Kateryna Netkachova, Robin E. Bloomfield. Is Chocolate Good for You - or, Is the Cloud Secure?
104 -- 0David Alan Grier. The Lingua Franca of Technology

Volume 50, Issue 7

10 -- 11Rick Kazman. Software Engineering
12 -- 0Jörg Henkel, Paolo Montuschi. Computer Engineers' Challenges for the Next Decade: The Triangle of Power Density, Circuit Degradation, and Reliability
13 -- 16Scooter Willis, Greg Byrd, Brian David Johnson. Challenge-Based Learning
17 -- 19Nancy Boyer. Inspiring the Next Generation of Scientists and Engineers: K-12 and Beyond
20 -- 22Lindsey Hitchcock. Greenpower: Racing to a STEM Finish
23 -- 25Randy Swearer. Industry-Backed Competitions: Helping Today's Students Prepare for Tomorrow's Careers
29 -- 31Randy Scheid. Code4GoodPBC: Bridging the Gap between Innovation and Philanthropy
32 -- 33Richard S. Thomas. Using Design Slam to Foster Lifelong Learning Solutions
35 -- 43Juan C. SanMiguel, Andrea Cavallaro. Networked Computer Vision: The Importance of a Holistic Simulator
44 -- 53Jörg Liebig, Sven Apel, Andreas Janker, Florian Garbe, Sebastian Oster. Handling Static Configurability in Refactoring Engines
54 -- 63Liliana Pasquale, Carlo Ghezzi, Edoardo Pasi, Christos Tsigkanos, Menouer Boubekeur, Blanca Florentino-Liaño, Tarik Hadzic, Bashar Nuseibeh. Topology-Aware Access Control of Smart Spaces
64 -- 72Yamini Allu, Fred Douglis, Mahesh Kamat, Philip Shilane, R. Hugo Patterson, Benjamin Zhu. Backup to the Future: How Workload and Hardware Changes Continually Redefine Data Domain File Systems
74 -- 79Mohammad A. Salahuddin, Ala I. Al-Fuqaha, Mohsen Guizani, Khaled Shuaib, Farag Sallabi. Softwarization of Internet of Things Infrastructure for Secure and Smart Healthcare
80 -- 84Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, Jeffrey M. Voas. DDoS in the IoT: Mirai and Other Botnets
85 -- 0Natalie Vanatta. Envisioning the Future to Empower Action
86 -- 91Hal Berghel. Which Is More Dangerous-the Dark Web or the Deep State?
92 -- 95Al Crouch, Michael Laisne, Martin Keim. Generalizing Access to Instrumentation Embedded in a Semiconductor Device
96 -- 98Sorel Reisman. Teaching vs. Research-Optimizing Your Contribution for Society's Well-Being
99 -- 102Scooter Willis. Stand on the Shoulders of Giants
112 -- 0David Alan Grier. Connecting to Nigeria

Volume 50, Issue 6

4 -- 5Lee Garber. Computer Highlights Society Magazines
6 -- 0Lynette A. Jones. A Haptic Compass for Navigation
7 -- 0Erich J. Neuhold. Computer, June 1967 and 1992
8 -- 9Tom Snyder, Greg Byrd. The Internet of Everything
10 -- 11David Alan Grier. The Yau Years: 1981-1984
12 -- 14Mark D. Hill, Michael R. Marty. Retrospective on Amdahl's Law in the Multicore Era
16 -- 18Marilyn Wolf, Saibal Mukhopadhyay. VLSI for the Internet of Things
19 -- 26Chenguang Shen, Mani B. Srivastava. Exploring Hardware Heterogeneity to Improve Pervasive Context Inferences
27 -- 34Mingze Gao, Qian Wang, Md Tanvir Arafin, Yongqiang Lyu, Gang Qu. Approximate Computing for Low Power and Security in the Internet of Things
35 -- 40Mathias Soeken, Pierre-Emmanuel Gaillardon, Saeideh Shirinzadeh, Rolf Drechsler, Giovanni De Micheli. A PLiM Computer for the Internet of Things
41 -- 49Aldo Romani, Marco Tartagni, Enrico Sangiorgi. Doing a Lot with a Little: Micropower Conversion and Management for Ambient-Powered Electronics
50 -- 59Gagan Gupta, Tony Nowatzki, Vinay Gangadhar, Karthikeyan Sankaralingam. Kickstarting Semiconductor Innovation with Open Source Hardware
60 -- 68Patrick Eugster, Chamikara Jayalath, Kirill Kogan, Julian James Stephen. Big Data Analytics beyond the Single Datacenter
69 -- 73Jeffrey M. Voas, Phillip A. Laplante. The IoT Blame Game
74 -- 75Jennifer Davis. Marketing and Engineering-Working across the Aisle
76 -- 80Erik P. DeBenedictis, Jesse K. Mee, Michael P. Frank. The Opportunities and Controversies of Reversible Computing
81 -- 85Hsiu-Chuan Huang, Zhi-Kai Zhang, Hao-Wen Cheng, Shiuhpyng Winston Shieh. Web Application Security: Threats, Countermeasures, and Pitfalls
86 -- 91Harold Thimbleby. Improve IT, Improve Healthcare
92 -- 95Justin Riley, John Noss, Wes Dillingham, James Cuff, Ignacio Martín Llorente. A High-Availability Cloud for Research Computing
104 -- 0David Alan Grier. Global Connections

Volume 50, Issue 5

8 -- 9Grace A. Lewis. Cloud Computing
10 -- 11Giovanni De Micheli, Luca Benini. Networks on Chips: 15 Years Later
13 -- 0Björn W. Schuller. Can Affective Computing Save Lives? Meet Mobile Health
14 -- 17Carl K. Chang, Sorel Reisman, Edmundo Tovar. Advances in Learning Technologies
18 -- 26Austin Cory Bart, Javier Tibau, Eli Tilevich, Clifford A. Shaffer, Dennis G. Kafura. BlockPy: An Open Access Data-Science Environment for Introductory Programmers
27 -- 35Soroush Ghorashi, Carlos Jensen. Integrating Collaborative and Live Coding for Distance Education
36 -- 43Sujata Rani, Parteek Kumar. A Sentiment Analysis System to Improve Teaching and Learning
44 -- 52Toru Ishida, Tetsuo Sawaragi, Kumiyo Nakakoji, Takushi Sogo. Interdisciplinary Education for Design Innovation
54 -- 60Henry C. B. Chan. Internet of Education Resources Using a Chemistry-Inspired Framework
62 -- 71Yang Xie, Chongxi Bao, Ankur Srivastava. Security-Aware 2.5D Integrated Circuit Design Flow Against Hardware IP Piracy
72 -- 79Zoltán Ádám Mann. The Top Eight Misconceptions about NP-Hardness
80 -- 87Richard E. Fairley, Mary Jane Willshire. Better Now Than Later: Managing Technical Debt in Systems Development
88 -- 98Jeffrey M. Voas, Rick Kuhn. What Happened to Software Metrics?
99 -- 0Brian David Johnson. Sentient Tools and the Future of Work
100 -- 102Gary McGraw. Six Tech Trends Impacting Software Security
103 -- 105W. Richards Adrion. How Computer Science Departments and Faculty Can Contribute to the CS for All Initiative
106 -- 109Andrew C. Gray, Eric M. Schwartz. A Successful Approach to the 2016 RobotX Challenge
110 -- 115Nicholas A. Valentino, John Leslie King, Walter W. Hill. Polling and Prediction in the 2016 Presidential Election
116 -- 119Joanna Bryson, Alan F. T. Winfield. Standardizing Ethical Design for Artificial Intelligence and Autonomous Systems
120 -- 124Hal Berghel. A Quick Take on Windows Security Evolution
132 -- 0David Alan Grier. A Russian Tragedy

Volume 50, Issue 4

7 -- 0Sven Dietrich. Cybersecurity and the Future
8 -- 9Stephen P. Morse. The Intel 8086 Chip and the Future of Microprocessor Design
10 -- 12Charles R. Severance. Resurrecting the CDC 6500 Supercomputer
13 -- 0Leila De Floriani. A High-level Language for Interactive Data Visualization
14 -- 16Stefano Zanero. Cyber-Physical Systems
17 -- 26Gerry Howser, Bruce M. McMillin. Using Information-Flow Methods to Analyze the Security of Cyber-Physical Systems
27 -- 37Teodora Sanislav, Sherali Zeadally, George Dan Mois. A Cloud-Integrated, Multilayered, Agent-Based Cyber-Physical System Architecture
38 -- 47Cesare Alippi, Manuel Roveri. The (Not) Far-Away Path to Smart Cyber-Physical Systems: An Information-Centric Framework
48 -- 51Rolf Oppliger, Günther Pernul, Sokratis K. Katsikas. New Frontiers: Assessing and Managing Security Risks
52 -- 61Gaute Wangen. Information Security Risk Assessment: A Method Comparison
62 -- 71Judith E. Y. Rossebø, Reinder Wolthuis, Frank Fransen, Gunnar Björkman, Nuno Medeiros. An Enhanced Risk-Assessment Methodology for Smart Grids
72 -- 79Pete Burnap, Yulia Cherdantseva, Andrew Blyth, Peter Eden, Kevin Jones, Hugh Soulsby, Kristan Stoddart. Determining and Sharing Risk Data in Distributed Interdependent Systems
80 -- 90Zahid Akhtar, Ajita Rattani. A Face in any Form: New Challenges and Opportunities for Face Recognition Technology
91 -- 95Rubén S. Montero, Elisa Rojas, Alfonso A. Carrillo, Ignacio Martín Llorente. Extending the Cloud to the Network Edge
96 -- 99Erik P. DeBenedictis. Computer Architecture's Changing Role in Rebooting Computing
100 -- 105George Hurlburt. Shining Light on the Dark Web
106 -- 109Marta E. Cecchinato, Anna L. Cox. Smartwatches: Digital Handcuffs or Magic Bracelets?
110 -- 114Hal Berghel. Alt-News and Post-Truths in the "Fake News" Era
120 -- 0David Alan Grier. The Radical Technology of Industrie 4.0

Volume 50, Issue 3

6 -- 7David Alan Grier. When the Field was Young
12 -- 0Daniel J. Sorin. Persistent Memory
14 -- 19Katarzyna Wac, Homero Rivas, Maddalena Fiordelli. Quality-of-Life Technologies
20 -- 29Mirana Randriambelonoro, Yu Chen, Pearl Pu. Can Fitness Trackers Help Diabetic and Obese Users Make and Sustain Lifestyle Changes?
30 -- 38Aarti Sathyanarayana, Jaideep Srivastava, Luis Fernández-Luque. The Science of Sweet Dreams: Predicting Sleep Efficiency from Wearable Device Data
40 -- 49Tongda Zhang, Renate Fruchter, Maria Frank. Are They Paying Attention? A Model-Based Method to Identify Individuals' Mental States
50 -- 59Adela C. Timmons, Theodora Chaspari, Sohyun C. Han, Laura Perrone, Shrikanth S. Narayanan, Gayla Margolin. Using Multimodal Wearable Technology to Detect Conflict among Couples
60 -- 69Eisa Zarepour, Mohammadreza Hosseini, Salil S. Kanhere, Arcot Sowmya, Hamid R. Rabiee. Applications and Challenges of Wearable Visual Lifeloggers
70 -- 73Chuck Walrad. Standards for the Enterprise IT Profession
74 -- 76Scooter Willis. You Never Forget Your First Project
78 -- 82Angelos Stavrou, Jeffrey M. Voas. Verified Time
84 -- 89Hal Berghel. On the Problem of (Cyber) Attribution
90 -- 91Steve Brown. The New Diversity: Working with Nonhumans
96 -- 0David Alan Grier. Digital Trade

Volume 50, Issue 2

5 -- 0Bruce M. McMillin, Tao Zhang. Fog Computing for Smart Living
6 -- 7David Alan Grier. Computer's First Issues and the First Volunteer
11 -- 0Lei Yang 0006, Jiannong Cao. Application Repartitioning in the Cloud
12 -- 15Mike Daily, Antti Oulasvirta, Jun Rekimoto. Technology for Human Augmentation
16 -- 24Peter A. Zientara, Sooyeon Lee, Gus H. Smith, Rorry Brenner, Laurent Itti, Mary Beth Rosson, John M. Carroll, Kevin M. Irick, Vijaykrishnan Narayanan. Third Eye: A Shopping Assistant for the Visually Impaired
26 -- 35Florian Wahl, Rui Zhang, Martin Freund, Oliver Amft. Personalizing 3D-Printed Smart Eyeglasses to Augment Daily Life
36 -- 46Cheng Zhang, Sinan Hersek, Yiming Pu, Danrui Sun, Qiuyue Xue, Thad E. Starner, Gregory D. Abowd, Omer T. Inan. Bioacoustics-Based Human-Body-Mediated Communication
48 -- 58Rajan Bhattacharyya, Brian A. Coffman, JaeHoon Choe, Matthew E. Phillips. Does Neurotechnology Produce a Better Brain?
59 -- 67Shahram Mohrehkesh, Michele C. Weigle, Sajal K. Das. Energy Harvesting in Electromagnetic Nanonetworks
68 -- 71Scott Jenson. The Future IoT: Building Better Legos
72 -- 75Erik P. DeBenedictis. It's Time to Redefine Moore's Law Again
76 -- 79Elisa Bertino, Nayeem Islam. Botnets and Internet of Things Security
80 -- 85Hal Berghel. Lies, Damn Lies, and Fake News
86 -- 91Robert N. Charette. IT's Fatal Amnesia
92 -- 96Barry Brown. The Social Life of Autonomous Cars
97 -- 0Alida Draudt, Julia Rose West. Envisioning Personal Futures
104 -- 0David Alan Grier. A License to Build (Software)

Volume 50, Issue 12

4 -- 6Jean-Luc Gaudiot. Embracing Changes
7 -- 9Hausi A. Müller. The Rise of Intelligent Cyber-Physical Systems
10 -- 12David Patterson. Reduced Instruction Set Computers Then and Now
18 -- 23Mike Daily, Swarup Medasani, Reinhold Behringer, Mohan Trivedi. Self-Driving Cars
24 -- 31Ernst D. Dickmanns. Developing the Sense of Vision for Autonomous Road Vehicles at UniBwM
32 -- 40Mina J. Hanna, Shawn C. Kimmel. Current US Federal Policy Framework for Self-Driving Vehicles: Opportunities and Challenges
42 -- 49Shaoshan Liu, Jie Tang, Chao Wang, Quan Wang, Jean-Luc Gaudiot. A Unified Cloud Platform for Autonomous Driving
50 -- 58Nirav Ajmeri, Chung-Wei Hang, Simon Parsons, Munindar P. Singh. Aragorn: Eliciting and Maintaining Secure Service Policies
60 -- 71William Knowles, Jose M. Such, Antonios Gouglidis, Gaurav Misra, Awais Rashid. All That Glitters Is Not Gold: On the Effectiveness of Cybersecurity Qualifications
72 -- 76Hal Berghel. Equifax and the Latest Round of Identity Theft Roulette
77 -- 0Chris Arkenberg. The Future of Intelligent Assistants
78 -- 81Georgios Karakonstantis, Dimitrios S. Nikolopoulos, Dimitris Gizopoulos, Pedro Trancoso, Yiannakis Sazeides, Christos D. Antonopoulos, Srikumar Venugopal, Shidhartha Das. Error-Resilient Server Ecosystems for Edge and Cloud Datacenters
82 -- 85John A. Stankovic, James W. Sturges, Jon Eisenberg. A 21st Century Cyber-Physical Systems Education
86 -- 90Erik P. DeBenedictis. Plotting a Socially Responsible Course for Computers Using Cybersecurity as an Example
91 -- 95Nir Kshetri, Jeffrey M. Voas. Hacking Power Grids: A Current Problem
96 -- 100Alexander Kott, David S. Alberts. How Do You Command an Army of Intelligent Things?
104 -- 0David Alan Grier. The Subway to China

Volume 50, Issue 11

8 -- 11Nancy G. Leveson. The Therac-25: 30 Years Later
14 -- 17Michael Beigl, Florian Michahelles, Hideyuki Tokuda, Steve Hodges. Programming the World
18 -- 24Fulvio Corno, Luigi De Russis, Alberto Monge Roffarello. A Semantic Web Approach to Simplifying Trigger-Action Programming in the IoT
26 -- 36Jack Hodges, Kimberly García, Steven Ray. Semantic Development and Integration of Standards for Adoption and Interoperability
38 -- 49Thomas Kubitza, Albrecht Schmidt 0001. meSchup: A Platform for Programming Interconnected Smart Things
50 -- 58Henry B. Wolfe. The Mobile Phone as Surveillance Device: Progress, Perils, and Protective Measures
60 -- 67Roja Bandari, Zicong Zhou, Hai Qian, Timothy R. Tangherlini, Vwani P. Roychowdhury. A Resistant Strain: Revealing the Online Grassroots Rise of the Antivaccination Movement
68 -- 71Daniel Lam, Ethan Stillman, Anthony Cariello, Andrew McCorkle, Ahmed Fouad. A High School Team's Hard Road to Success in an International Engineering Competition
72 -- 76Hal Berghel. The New Science Wars
77 -- 0David Alan Grier. A More National Technology
78 -- 81Paul Grassi, Mike Garcia, Katie Boeckl. Government Adopts an Industry Approach to Open Source Collaboration
82 -- 85Adam L. Young, Moti Yung. On Ransomware and Envisioning the Enemy of Tomorrow
86 -- 90Patricia Takako Endo, Guto Leoni Santos, Daniel Rosendo, Demis Moacir Gomes, André Moreira, Judith Kelner, Djamel Sadok, Glauco Estacio Gonçalves, Mozhgan Mahloo. Minimizing and Managing Cloud Failures
91 -- 0Brian David Johnson. The Future of Shopping: An Eerie Silence?
96 -- 0Peter Brusilovsky. Toward Flexible MOOCs: Student-Sourcing of Learning Content at Scale

Volume 50, Issue 10

8 -- 11Ben Shneiderman. Revisiting the Astonishing Growth of Human-Computer Interaction Research
12 -- 13David B. Lomet. The Future of Data Management
16 -- 18Antti Oulasvirta. On-Skin Interfaces
19 -- 27Jürgen Steimle, Joanna Bergstrom-Lehtovirta, Martin Weigel, Aditya Shekhar Nittala, Sebastian Boring, Alex Olwal, Kasper Hornbæk. On-Skin Interaction Using Body Landmarks
28 -- 35Pedro Lopes, Patrick Baudisch. Interactive Systems Based on Electrical Muscle Stimulation
36 -- 38Mahadev Satyanarayanan. Edge Computing
40 -- 49Guenter Klas. Edge Computing and the Role of Cellular Networks
50 -- 57Peng Liu, Lance Hartung, Suman Banerjee. Lightweight Multitenancy at the Network's Extreme Edge
58 -- 67Ganesh Ananthanarayanan, Paramvir Bahl, Peter Bodík, Krishna Chintalapudi, Matthai Philipose, Lenin Ravindranath, Sudipta Sinha. Real-Time Video Analytics: The Killer App for Edge Computing
68 -- 72Hal Berghel. Net Neutrality Reloaded
73 -- 0Brian David Johnson. The Weaponization of AI: A Glimpse into Future Threats
74 -- 77Erik P. DeBenedictis. 3D Software: A New Research Imperative
78 -- 85Jeffrey M. Voas, Nir Kshetri. Human Tagging
86 -- 91Robert N. Charette. Low Clearance Ahead: Can Predictable IT Crashes Be Avoided?
92 -- 96Jie Tang, Dawei Sun, Shaoshan Liu, Jean-Luc Gaudiot. Enabling Deep Learning on IoT Devices
98 -- 101Gregory W. Hislop, Heidi J. C. Ellis. Humanitarian Open Source Software in Computing Education
102 -- 106Albrecht Schmidt 0001. Technologies to Amplify the Mind
108 -- 0David Alan Grier. Keeping the Internet Global

Volume 50, Issue 1

5 -- 7Jean-Luc Gaudiot. 2017: The New Computer Society
8 -- 0Shaoshan Liu, James Peng, Jean-Luc Gaudiot. Computer, Drive My Car!
10 -- 11Erich J. Neuhold. Computer, January 1967 and 1992
14 -- 18Sumi Helal. Computer's 50th Anniversary
20 -- 29Thomas M. Conte, Erik P. DeBenedictis, Paolo A. Gargini, Elie K. Track. Rebooting Computing: The Road Ahead
30 -- 39Mahadev Satyanarayanan. The Emergence of Edge Computing
40 -- 47Antti Oulasvirta. User Interface Design with Combinatorial Optimization
48 -- 57Daqing Zhang, Hao Wang, Dan Wu. Toward Centimeter-Scale Human Activity Sensing with Wi-Fi Signals
58 -- 65John Atkinson, Alvaro Maurelia. Redundancy-Based Trust in Question-Answering Systems
66 -- 70G. R. Gangadharan. Open Source Solutions for Cloud Computing
71 -- 0Brian David Johnson. The Impossible Thing
72 -- 75Jeffrey M. Voas, Phillip A. Laplante. Curriculum Considerations for the Internet of Things
76 -- 80Nir Kshetri, Jeffrey M. Voas. Banking on Availability
82 -- 87Hal Berghel. Software Sophistry and Political Sleight of Hand
96 -- 0David Alan Grier. Local Culture, Global Habits