Journal: IEEE Computer

Volume 51, Issue 9

8 -- 9Jaideep Vaidya. Privacy-Preserving Statistics
14 -- 17Sumi Helal. The Expanding Frontier of Artificial Intelligence
18 -- 27Plamen P. Angelov, Xiaowei Gu. Toward Anthropomorphic Machine Learning
28 -- 36Hani Hagras. Toward Human-Understandable, Explainable AI
38 -- 46Dagmar Schuller, Björn W. Schuller. The Age of Artificial Emotional Intelligence
48 -- 53Thang N. Dinh, My T. Thai. AI and Blockchain: A Disruptive Integration
54 -- 62Wasim Ahmad Bhat. Is a Data-Capacity Gap Inevitable in Big Data Storage?
64 -- 74Mahbub Hassan, Wen Hu, Guohao Lan, Aruna Seneviratne, Sara Khalifa, Sajal K. Das. Kinetic-Powered Health Wearables: Challenges and Opportunities
76 -- 79Rolf Ernst. Automated Driving: The Cyber-Physical Perspective
80 -- 84George F. Hurlburt. Toward Applied Cyberethics
86 -- 90Florence Hudson, Chris Clark. Wearables and Medical Interoperability: The Evolving Frontier

Volume 51, Issue 8

4 -- 5Patrick Schaumont, Paolo Montuschi. The Rise of Hardware Security in Computer Architectures
14 -- 17Oresti Banos, Chris D. Nugent. M-Coaching: Towards the Next Generation of Mobile-Driven Healthcare Support Services
18 -- 25Mauro Tschanz, Tim Lucas Dorner, Jürgen Holm, Kerstin Denecke. Using eMMA to Manage Medication
26 -- 33Haolin Wang, Qingpeng Zhang, Mary Ip, Joseph Tak Fai Lau. Social Media-based Conversational Agents for Health Management and Interventions
34 -- 43Simo Hosio, Jaro Karppinen, Niels van Berkel, Jonas Oppenlaender, Jorge Gonçalves. Mobile Decision Support and Data Provisioning for Low Back Pain
44 -- 51Hal Berghel, Daniel Berleant. The Online Trolling Ecosystem
52 -- 55Erik P. DeBenedictis. A Role for IEEE in Quantum Computing
56 -- 59Jim Isaak, Mina J. Hanna. User Data Privacy: Facebook, Cambridge Analytica, and Privacy Protection
60 -- 65Robin Bloomfield, Peter Bishop 0001, Eoin Butler, Robert J. Stroud. Security-Informed Safety: Supporting Stakeholders with Codes of Practice
66 -- 70Roy Want, Wei Wang, Stan Chesnutt. Accurate Indoor Location for the IoT

Volume 51, Issue 7

4 -- 5Ayten Ozge Akmandor, Niraj K. Jha. Detecting and Alleviating Stress with SoDA
12 -- 15Jeffrey M. Voas, Rick Kuhn, Constantinos Kolias, Angelos Stavrou, Georgios Kambourakis. Cybertrust in the IoT Age
16 -- 25Rodrigo Roman Castro, Javier López 0001, Stefanos Gritzalis. Evolution and Trends in IoT Security
26 -- 34Natalija Vlajic, Daiwei Zhou. IoT as a Land of Opportunity for DDoS Hackers
36 -- 43Weizhi Meng. Intrusion Detection in the Era of IoT: Building Trust via Traffic Filtering and Sampling
44 -- 53José María de Fuentes, Lorena González-Manzano, Agusti Solanas, Fatbardh Veseli. Attribute-Based Credentials for Privacy-Aware Smart Health Services in IoT-Based Smart Cities
54 -- 65Jatinder Singh, Christopher Millard, Chris Reed, Jennifer Cobbe, Jon Crowcroft. Accountability in the IoT: Systems, Law, and Ways Forward
66 -- 77Ryan Gary Kim, Janardhan Rao Doppa, Partha Pratim Pande, Diana Marculescu, Radu Marculescu. Machine Learning and Manycore Systems Design: A Serendipitous Symbiosis
78 -- 81Timothy Buzzelli. University of Central Florida Takes the Bronze at Annual International Programming Competition
82 -- 85Rick Kuhn, Mohammad S. Raunak, Raghu Kacker. Can Reducing Faults Prevent Vulnerabilities?
86 -- 90Hal Berghel. Newton's Great Insight
91 -- 95Yoshihiro Shiroishi, Kunio Uchiyama, Norihiro Suzuki. Society 5.0: For Human Security and Well-Being

Volume 51, Issue 6

7 -- 8Björn W. Schuller. What Affective Computing Reveals about Autistic Children's Facial Expressions of Joy or Fear
12 -- 17James A. Hendler, Wendy Hall, Noshir Contractor. Web Science: Now More Than Ever
18 -- 28Kyungsik Han, Hyunggu Jung, Jin Yea Jang, Dongwon Lee 0001. Understanding Users' Privacy Attitudes through Subjective and Objective Assessments: An Instagram Case Study
30 -- 40John Gastil, Sascha D. Meinrath. Bringing Citizens and Policymakers Together Online: Imagining the Possibilities and Taking Stock of Privacy and Transparency Hazards
42 -- 51Daye Nam, Mayank Kejriwal. How Do Organizations Publish Semantic Markup? Three Case Studies Using Public Schema.org Crawls
52 -- 60Jun Sun 0011, Steffen Staab, Jérôme Kunegis. Understanding Social Networks Using Transfer Learning
62 -- 71Carleen F. Maitland. Now You See It, Now You Don't: Digital Connectivity in Marginalized Communities
72 -- 81Toru Ishida, Yohei Murakami, Donghui Lin, Takao Nakaguchi, Masayuki Otani. Language Service Infrastructure on the Web: The Language Grid
82 -- 85Erik P. DeBenedictis. Accelerated Architectures Create Programming Opportunities
86 -- 89Kristen K. Greene, Michelle Steves, Mary Theofanos. No Phishing beyond This Point
90 -- 94Trevor Pering, Kathy Farrington, Thorsten Dahm. Taming the IoT: Operationalized Testing to Secure Connected Devices
96 -- 99Richard Vedder. Benefits of College - By Degrees
100 -- 103F. D. Wright, Thomas M. Conte. Standards: Roadmapping Computer Technology Trends Enlightens Industry

Volume 51, Issue 5

8 -- 9Leila De Floriani. Globe Browsing in OpenSpace
10 -- 11Erich J. Neuhold. Computer, 1968 and 1993
12 -- 16Nicholas D. Lane, Pete Warden. The Deep (Learning) Transformation of Mobile and Embedded Computing
18 -- 30Andreas Moshovos, Jorge Albericio, Patrick Judd, Alberto Delmas Lascorz, Sayeh Sharify, Zissis Poulos, Tayler H. Hetherington, Tor M. Aamodt, Natalie D. Enright Jerger. Exploiting Typical Values to Accelerate Deep Learning
32 -- 41Shuochao Yao, Yiran Zhao, Aston Zhang, Shaohan Hu, Huajie Shao, Chao Zhang, Lu Su, Tarek F. Abdelzaher. Deep Learning for the Internet of Things
42 -- 49Seyed Ali Ossia, Ali Shahin Shamsabadi, Ali Taheri, Hamid R. Rabiee, Hamed Haddadi. Private and Scalable Personal Data Analytics Using Hybrid Edge-to-Cloud Deep Learning
50 -- 59Thomas Plötz, Yu Guan. Deep Learning for Human Activity Recognition in Mobile Computing
60 -- 67Jagmohan Chauhan, Suranga Seneviratne, Yining Hu, Archan Misra, Aruna Seneviratne, Youngki Lee. Breathing-Based Authentication on Resource-Constrained IoT Devices using Recurrent Neural Networks
68 -- 76Jungmo Ahn, Huynh Nguyen Loc, Rajesh Krishna Balan, Youngki Lee, JeongGil Ko. Finding Small-Bowel Lesions: Challenges in Endoscopy-Image-Based Learning Systems
78 -- 83Robert N. Charette. Puncturing Pernicious Project Pufferies
84 -- 89Hal Berghel. Malice Domestic: The Cambridge Analytica Dystopia
90 -- 91Marilyn Wolf. Computing in the Real World Is the Grandest of Challenges
92 -- 95Nir Kshetri, Jeffrey M. Voas. Cyberthreats under the Bed

Volume 51, Issue 4

12 -- 13Ronald F. DeMara, Paolo Montuschi. Non-Volatile Memory Trends: Toward Improving Density and Energy Profiles across the System Stack
16 -- 19Daniel Prince. Cybersecurity: The Security and Protection Challenges of Our Digital World
20 -- 27Sulabh Bhattarai, Yong Wang. End-to-End Trust and Security for Internet of Things Applications
28 -- 38Zhen Ni, Qianmu Li, Gang Liu. Game-Model-Based Network Security Risk Control
40 -- 47Yongsuk Lee, Gyungho Lee. Detecting Code Reuse Attacks with Branch Prediction
50 -- 59Kristofer E. Bouchard, James B. Aimone, Miyoung Chun, Thomas Dean, Michael Denker, Markus Diesmann, David Donofrio, Loren M. Frank, Narayanan Kasthuri, Christof Koch, Oliver Rübel, Horst D. Simon, Friedrich T. Sommer, Prabhat. International Neuroscience Initiatives through the Lens of High-Performance Computing
60 -- 68Konstantin Rubinov, Luciano Baresi. What Are We Missing When Testing Our Android Apps?
70 -- 73Hal Berghel. Weaponizing Twitter Litter: Abuse-Forming Networks and Social Media
74 -- 77Thomas M. Conte, Erik P. DeBenedictis, Avi Mendelson, Dejan S. Milojicic. Rebooting Computers to Avoid Meltdown and Spectre
78 -- 81Mina J. Hanna. Net Neutrality: A Brief Overview of the Policy and the FCC's Ruling to Upend It
82 -- 85Chung-Kuan Chen, Zhi-Kai Zhang, Shan-Hsin Lee, Shiuhpyng Shieh. Penetration Testing in the IoT Age
86 -- 89Jeffrey M. Voas, Phillip A. Laplante. IoT's Certification Quagmire
90 -- 94Jon Rosdahl. Computer Society Standards Drive Industry

Volume 51, Issue 3

8 -- 9Daniel J. Sorin. Low-Power Content Addressable Memory
12 -- 15Oresti Banos, Christopher Nugent. E-Coaching for Health
16 -- 23Sergio F. Ochoa, Francisco J. Gutierrez. Architecting E-Coaching Systems: A First Step for Dealing with Their Intrinsic Design Complexity
24 -- 34Julie M. Robillard, Jesse Hoey. Emotion and Motivation in Cognitive Assistive Technologies for Dementia
36 -- 42Paolo Pilloni, Luca Piras, Salvatore Carta, Gianni Fenu, Fabrizio Mulas, Ludovico Boratto. Recommender System Lets Coaches Identify and Help Athletes Who Begin Losing Motivation
43 -- 51Mario O. Parra, Jesús Favela, Luís A. Castro, Arturo Morales. Monitoring Eating Behaviors for a Nutritionist E-Assistant Using Crowdsourcing
52 -- 61Chit-Kwan Lin, Andreas Wild, Gautham N. Chinya, Yongqiang Cao, Mike Davies, Daniel M. Lavery, Hong Wang. Programming Spiking Neural Networks on Intel's Loihi
62 -- 65Scooter Willis. The Maker Revolution
66 -- 69Hal Berghel. Trolling Pathologies
70 -- 73Dimitrios Serpanos. The Cyber-Physical Systems Revolution
74 -- 77Nir Kshetri, Jeffrey M. Voas. Hackings Brand-Equity Nexus

Volume 51, Issue 2

10 -- 12Bruce McMillin. Software Engineering
14 -- 26David Harel, Guy Katz, Rami Marelly, Assaf Marron. Wise Computing: Toward Endowing System Development with Proactive Wisdom
28 -- 35Alexander Egyed, Klaus Zeman, Peter Hehenberger, Andreas Demuth. Maintaining Consistency across Engineering Artifacts
36 -- 42Ivan Handler. Data Sharing Defined - Really!
44 -- 53Stergios Papadimitriou, Lefteris Moussiades. Mac OS versus FreeBSD: A Comparative Evaluation
54 -- 58Roman Beck. Beyond Bitcoin: The Rise of Blockchain World
60 -- 62Gary McGraw. The New Killer App for Security: Software Inventory
64 -- 67Hal Berghel. Bruce Schneier on Future Digital Threats
68 -- 71Erik P. DeBenedictis. A Future with Quantum Machine Learning
72 -- 75Rajendra K. Raj, Allen Parrish. Toward Standards in Undergraduate Cybersecurity Education in 2018
76 -- 80Amitangshu Pal, Krishna Kant. IoT-Based Sensing and Communications Infrastructure for the Fresh Food Supply Chain
81 -- 83F. D. Wright. Standards: Engaging for the Future

Volume 51, Issue 12

4 -- 6Lori Cameron. [Elsewhere in the CS]
7 -- 9Erich J. Neuhold. Computer, December 1968 and 1993 [50 & 25 Years Ago]
10 -- 12Yasha Wang, Katsuyuki Yamazaki. Governments in the Age of Big Data and Smart Cities [Guest Editors' Introduction]
14 -- 23Takahiro Sumitomo, Noboru Koshizuka. Progress and Initiatives for Open Data Policy in Japan
24 -- 31Hui Gao 0002, Chi Harold Liu, Wendong Wang. Hybrid Vehicular Crowdsourcing With Driverless Cars: Challenges and a Solution
32 -- 41Leye Wang, Bin Guo, Qiang Yang 0001. Smart City Development With Urban Transfer Learning
42 -- 49Jiangtao Wang, Junfeng Zhao, Yong Zhang, Xin Peng 0001, Ying Li, Yun Xie. Enabling Human-Centric Smart Cities: Crowdsourcing-Based Practice in China
50 -- 58Noboru Koshizuka, Stephan Haller, Ken Sakamura. CPaaS.io: An EU-Japan Collaboration on Open Smart-City Platforms
59 -- 63Nir Kshetri. Blockchain and Electronic Healthcare Records [Cybertrust]
64 -- 68Ju Wang, XiaoJiang Chen, Dingyi Fang, Jie Xiong 0001, Hongbo Jiang, Rajesh Krishna Balan. Material Identification and Target Imaging with RFIDs [IoT Connection]
69 -- 73Erik P. DeBenedictis, Michael P. Frank. The National Quantum Initiative Will Also Benefit Classical Computers [Rebooting Computing]

Volume 51, Issue 11

1 -- 0James Joshi. Front Cover
4 -- 6Lori Cameron. [Elsewhere in the CS]
7 -- 9Erich J. Neuhold. [50 & 25 Years Ago]
10 -- 12Oleg Sokolsky, Nicola Bezzo. Resiliency in Cyber-Physical Systems [Guest Editors' Introduction]
14 -- 23Darren D. Cofer, Andrew Gacek, John Backes, Michael W. Whalen, Lee Pike, Adam Foltzer, Michal Podhradsky, Gerwin Klein, Ihor Kuz, June Andronick, Gernot Heiser, Douglas Stuart. A Formal Approach to Constructing Secure Air Vehicle Software
24 -- 36Tarek F. Abdelzaher, Nora Ayanian, Tamer Basar, Suhas N. Diggavi, Jana Diesner, Deepak Ganesan, Ramesh Govindan, Susmit Jha, Tancrède Lepoint, Benjamin M. Marlin, Klara Nahrstedt, David M. Nicol, Raj Rajkumar, Stephen Russell, Sanjit A. Seshia, Fei Sha, Prashant J. Shenoy, Mani B. Srivastava, Gaurav S. Sukhatme, Ananthram Swami, Paulo Tabuada, Don Towsley, Nitin H. Vaidya, Venugopal V. Veeravalli. Toward an Internet of Battlefield Things: A Resilience Perspective
37 -- 45Varun Badrinath Krishna, Ziping Wu, Vaidehi V. Ambardekar, Richard Macwan, William H. Sanders. Cyberattacks on Primary Frequency Response Mechanisms in Power Grids
46 -- 55Yuchang Won, Buyeon Yu, Jaegeun Park, In-Hee Park, Haegeon Jeong, Jeanseong Baik, Kyungtae Kang, Insup Lee, Sang Hyuk Son, Kyung-Joon Park, Yongsoon Eun. An Attack-Resilient CPS Architecture for Hierarchical Control: A Case Study on Train Control Systems
56 -- 65Mohammad Shihabul Haque, Daniel Jun Xian Ng, Arvind Easwaran, Karthikeyan Thangamariappan. Contract-Based Hierarchical Resilience Management for Cyber-Physical Systems
66 -- 77Tanesh Kumar, Pawani Porambage, Ijaz Ahmad, Madhusanka Liyanage, Erkki Harjula, Mika Ylianttila. Securing Gadget-Free Digital Services
78 -- 89Sylvain Hallé, Raphaël Khoury, Mewena Awesso. Streamlining the Inclusion of Computer Experiments In a Research Paper
90 -- 94Hal Bergel. Election Integrity 2018: Are We Better Off Than We Were in 2016? [Aftershock]
95 -- 98Christos Koulamas, Athanasios P. Kalogeras. Cyber-Physical Systems and Digital Twins in the Industrial Internet of Things [Cyber-Physical Systems]
99 -- 111Nir Kshetri. Cryptocurrencies: Transparency Versus Privacy [Cybertrust]
102 -- 105Hal Berghel. The Genesis of Postmodern Disinformatics [Out of Band]
106 -- 111Claudio Lima. Developing Open and Interoperable DLT\/Blockchain Standards [Standards]

Volume 51, Issue 10

10 -- 15Robert N. Charette, John Leslie King. Winning and Losing in IT
16 -- 23Stefan Seidel, Nicholas Berente, Benoit Martinez, Aron Lindberg, Kalle Lyytinen, Jeffrey V. Nickerson. Autonomous Tools in System Design: Reflective Practice in Ubisofts Ghost Recon Wildlands Project
24 -- 31Telle Whitney, Valerie Taylor. Increasing Women and Underrepresented Minorities in Computing: The Landscape and What You Can Do
32 -- 39Peter J. Denning. Winning at Innovation
40 -- 47Jonathan Grudin. Innovation and Inertia: Information Technology and Education in the United States
48 -- 57Marie Hicks. When Winning Is Losing: Why the Nation that Invented the Computer Lost Its Lead
58 -- 65Walt Scacchi. Winning and Losing in Large-Scale Software Development: A Multi-Decade Perspective
66 -- 73Lynn Conway. The Disappeared: Beyond Winning and Losing
74 -- 85Jack J. Dongarra, Vladimir Getov, Kevin Walsh. The 30th Anniversary of the Supercomputing Conference: Bringing the Future Closer - Supercomputing History and the Immortality of Now
86 -- 89Erik P. DeBenedictis, Travis S. Humble, Paolo A. Gargini. Quantum Computer Scale-up
90 -- 92Scooter Willis. Make Learning Fun and Get Out of the Way of the Smartphone Generation
94 -- 98Ashutosh Dhekne, Umberto Ravaioli, Romit Roy Choudhury. P2PLoc: Peer-to-Peer Localization of Fast-Moving Entities
100 -- 103Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo. Access Control for Emerging Distributed Systems

Volume 51, Issue 1

4 -- 6Hironori Kasahara. Satisfaction and Sustainability
14 -- 16Sumi Helal. 2018 Outlook: The Emerging Web and Information Sciences
18 -- 27Wendy Hall, Ramine Tinati, Will Jennings. From Brexit to Trump: Social Media's Role in Democracy
28 -- 38Wojciech Szpankowski, Ananth Grama. Frontiers of Science of Information: Shannon Meets Turing
40 -- 49C. Gordon Bell, Ike Nassi. Revisiting Scalable Coherent Shared Memory
50 -- 56Hong Mei, Yao Guo. Toward Ubiquitous Operating Systems: A Software-Defined Perspective
57 -- 65Dario Bruneo, Salvatore Distefano, Francesco Longo 0001, Giovanni Merlino, Antonio Puliafito. I/Ocloud: Adding an IoT Dimension to Cloud Infrastructures
66 -- 75Tanusree Chatterjee, Sushmita Ruj, Sipra Das Bit. Security Issues in Named Data Networks
76 -- 79Connor Tingley, George Serwin, Rohan Tuli, Jenya Kirsch Posner, Celvi Lisy, Lily Bresee, Keaton Viadro, Chip Morimoto. Turning an International Competition into a Valuable Learning Experience
80 -- 88Jeffrey M. Voas, Rick Kuhn, Celia Paulsen, Kim Schaffer. Educating Next-Gen Computer Scientists
89 -- 93Hal Berghel. Disinformatics: The Discipline behind Grand Deceptions
94 -- 97Apostol Vassilev, Nicky Mouha, Luis Brandao. Psst, Can You Keep a Secret?
104 -- 0Nathan Shedroff. Self-Managing Real Estate