Journal: IEEE Computer

Volume 52, Issue 9

4 -- 5Quintin Fettes, Mark Clark, Razvan Bunescu, Avinash Karanth, Ahmed Louri. Dynamic Voltage and Frequency Scaling in NoCs With Supervised and Reinforcement Learning Techniques
9 -- 11Erich Neuhold. 50 & 25 Years Ago
12 -- 14David Alan Grier. Translational Computing: What Needs the Translation?
16 -- 23David Abramson, Manish Parashar. Translational Research in Computer Science
24 -- 34Rick Kuhn, Jeffrey M. Voas, Phillip A. Laplante. Taking Score on the Success of Blockchain, So Far
35 -- 43Anna Zamansky, Dirk van der Linden, Irit Hadar, Stephane Bleuer-Elsner. Log My Dog: Perceived Impact of Dog Activity Tracking
44 -- 51Mark Salisbury. When Computers Advise Us: How to Represent the Types of Knowledge Users Seek for Expert Advice
52 -- 60Philipp Hukal, Nicholas Berente, Matt Germonprez, Aaron Schecter. Bots Coordinating Work in Open Source Software Projects
61 -- 67Cheng-Kui Huang, Tawei Wang, Chia-Yu Lin. Early Results on the Business Value of Internet of Things Initiatives
68 -- 77Blesson Varghese, Philipp Leitner, Suprio Ray, Kyle Chard, Adam Barker, Yehia Elkhatib, Herry Herry, Cheol-Ho Hong, Jeremy Singer, Fung Po Tso, Eiko Yoneki, Mohamed Faten Zhani. Cloud Futurology
78 -- 81Apostolos P. Fournaris, Aris S. Lalos, Dimitrios Serpanos. Generative Adversarial Networks in AI-Enabled Safety-Critical Systems: Friend or Foe?
82 -- 89Robin Bloomfield, Heidy Khlaaf, Philippa Ryan Conmy, Gareth Fletcher. Disruptive Innovations and Disruptive Assurance: Assuring Machine Learning and Autonomy

Volume 52, Issue 8

4 -- 5Klaus Mueller. Advances in Visualization Recommender Systems
9 -- 11Erich J. Neuhold. 50 & 25 Years Ago
10 -- 0Ergun Akleman. Computing Through Time
12 -- 13David Alan Grier. Go/No Go
14 -- 26Massimo Villari, Maria Fazio, Schahram Dustdar, Omer Rana, Devki Nandan Jha, Rajiv Ranjan. Osmosis: The Osmotic Computing Platform for Microelements in the Cloud, Edge, and Internet of Things
27 -- 33Hudson S. Borges, Marco Tulio Valente. How Do Developers Promote Open Source Projects?
34 -- 42Alejandro Figueroa 0001, John Atkinson. Dual-View Learning for Detecting Web Query Intents
43 -- 53Hokeun Kim, Edward A. Lee, Schahram Dustdar. Creating a Resilient IoT With Edge Computing
54 -- 57Gary McGraw, Richie Bonett, Harold Figueroa, Victor Shepardson. Security Engineering for Machine Learning
58 -- 62Hassan Habibi Gharakheili, Arunan Sivanathan, Ayyoob Hamza, Vijay Sivaraman. Network-Level Security for the Internet of Things: Opportunities and Challenges
63 -- 67Hendrik Schöttle. Open Source License Compliance-Why and How?
68 -- 71Robby Simpson. The IEEE Standards Association Corporate Program: Engaging Industry in Standards Development
72 -- 75Kjell J. Hole, Subutai Ahmad. Biologically Driven Artificial Intelligence

Volume 52, Issue 7

7 -- 9Erich J. Neuhold. 50 & 25 Years Ago
10 -- 11David Alan Grier. Transforming the Field
12 -- 14Moustafa Youssef, Fahim Kawsar. Transformative Computing and Communication
16 -- 24Mohammed Alloulah, Howard Huang. Future Millimeter-Wave Indoor Systems: A Blueprint for Joint Communication and Sensing
25 -- 36Stefano Savazzi, Stephan Sigg, Federico Vicentini, Sanaz Kianoush, Rainhard D. Findling. On the Use of Stray Wireless Signals for Sensing: A Look Beyond 5G for the Next Generation of Industry
37 -- 46Mahadev Satyanarayanan, Nigel Davies. Augmenting Cognition Through Edge Computing
47 -- 56Nan Gao, Wei Shao 0006, Flora D. Salim. Predicting Personality Traits From Physical Activity Intensity
57 -- 66Lourdes Moreno, Paloma Martínez. The Harmonization of Accessibility Standards for Public Policies
67 -- 71Geoffrey C. Bowker. The Computerization Time Crunch
72 -- 75Muhammad Taimoor Khan 0001, Howard E. Shrobe. Security of Cyberphysical Systems: Chaining Induction and Deduction
76 -- 79John D. Roth, Corey E. Lutton, James Bret Michael. Security Through Simplicity: A Case Study in Logical Segmentation Inference

Volume 52, Issue 6

4 -- 5Jaideep Vaidya. Advances in Hardware Trojan Detection
9 -- 11Erich J. Neuhold. 50 & 25 Years Ago
12 -- 0David Alan Grier. Exploring the Current State of Quantum Computing
13 -- 17Travis S. Humble, Erik P. DeBenedictis. Quantum Realism
18 -- 26Ruslan Shaydulin, Hayato Ushijima-Mwesigwa, Christian F. A. Negre, Ilya Safro, Susan M. Mniszewski, Yuri Alexeev. A Hybrid Approach for Solving Optimization Problems on Small Quantum Computers
27 -- 37Alexandru Paler, Daniel Herr, Simon J. Devitt. Really Small Shoe Boxes: On Realistic Quantum Resource Estimation
38 -- 46Catherine C. McGeoch, Richard Harris, Steven P. Reinhardt, Paul I. Bunyk. Practical Annealing-Based Quantum Computing
47 -- 57Shaohan Hu, Peng Liu 0010, Chun-Fu Richard Chen, Marco Pistoia, Jay M. Gambetta. Reduction-Based Problem Mapping for Quantum Computing
58 -- 67Peng Liu 0010, Shaohan Hu, Marco Pistoia, Chun-Fu Richard Chen, Jay M. Gambetta. Stochastic Optimization of Quantum Programs
68 -- 72George F. Hurlburt. The Tyranny of Urgency
73 -- 76Phil Laplante, Sohpia Applebaum. NIST's 18 Internet of Things Trust Concerns
78 -- 81Dimitrios Serpanos. There Is No Safety Without Security and Dependability
82 -- 86Miriam Ballhausen. Free and Open Source Software Licenses Explained
88 -- 92Don Wright. Meeting Industry's Standardization Needs

Volume 52, Issue 5

7 -- 10Erich J. Neuhold. 50 & 25 Years Ago
11 -- 12David Alan Grier. A Familiar Vision
13 -- 18Venkat N. Gudivada, Sharath Pankanti, Guna Seetharaman, Yu Zhang. Cognitive Computing Systems: Their Potential and the Future
20 -- 29Michael V. DeBole, Brian Taba, Arnon Amir, Filipp Akopyan, Alexander Andreopoulos, William P. Risk, Jeff Kusnitz, Carlos Ortega-Otero, Tapan K. Nayak, Rathinakumar Appuswamy, Peter J. Carlson, Andrew S. Cassidy, Pallab Datta, Steven K. Esser, Guillaume Garreau, Kevin L. Holland, Scott Lekuch, Michael Mastro, Jeffrey L. McKinstry, Carmelo di Nolfo, Brent Paulovicks, Jun Sawada, Kai Schleupen, Benjamin Shaw, Jennifer L. Klamo, Myron D. Flickner, John V. Arthur, Dharmendra S. Modha. TrueNorth: Accelerating From Zero to 64 Million Neurons in 10 Years
30 -- 39Steven D. Pyle, Justin D. Sapp, Ronald F. DeMara. Leveraging Stochasticity for In Situ Learning in Binarized Deep Neural Networks
40 -- 47Nikhil Rasiwasia. Perspectives on Becoming an Applied Machine Learning Scientist
48 -- 57Zheng Ma, Jiaxin Wu, Sheng-hua Zhong, Jianmin Jiang, Stephen J. Heinen. Human Eye Movements Reveal Video Frame Importance
58 -- 66Seong Oun Hwang, Asif Mehmood. Blockchain-Based Resource Syndicate
67 -- 70Bernhard Rinner. Can We Trust Smart Cameras?
72 -- 74Louise M. Morman. How Do We Prepare the Next Generation for a Career in Our Digital Era?

Volume 52, Issue 4

7 -- 9Erich J. Neuhold. 50 & 25 Years Ago
10 -- 11David Alan Grier. The Path Across the Great Deep
12 -- 20Nitish Nag, Ramesh Jain. A Navigational Approach to Health: Actionable Guidance for Improved Quality of Life
21 -- 31Jose M. Such, Pierre Ciholas, Awais Rashid, John Vidler, Timothy Seabrook. Basic Cyber Hygiene: Does It Work?
32 -- 39Giuseppe Pino De Francesco. The General Data Protection Regulation's Practical Impact on Software Architecture
40 -- 49Kassem Fawaz, Kang G. Shin. Security and Privacy in the Internet of Things
50 -- 58Fariborz Farahmand, Firoozeh Farahmand. Privacy Decision Making: The Brain Approach
59 -- 63Dirk Riehle. The Innovations of Open Source
64 -- 68Nir Kshetri, Jeffrey M. Voas. Thoughts on Cyberbullying
69 -- 72John C. Havens, Ali Hessami. From Principles and Standards to Certification

Volume 52, Issue 3

4 -- 5Albert Y. Zomaya. A Novel Hierarchical Two-Tier Node-Deployment Strategy for Sustainable Wireless Sensor Networks
9 -- 11Erich J. Neuhold. 50 & 25 Years Ago
12 -- 13David Alan Grier. Learning to Live in an Insecure World
14 -- 17Ann E. Kelley Sobel, Allen Parrish, Rajendra K. Raj. Curricular Foundations for Cybersecurity
18 -- 28Matthew Hudnall. Educational and Workforce Cybersecurity Frameworks: Comparing, Contrasting, and Mapping
29 -- 37Diana L. Burley, Alfred H. Lewis Jr.. Cybersecurity Curricula 2017 and Boeing: Linking Curricular Guidance to Professional Practice
38 -- 47David S. Gibson, Vijay Anand, Josh Dehlinger, Charles Dierbach, Tracy Emmersen, Andrew Phillips. Accredited Undergraduate Cybersecurity Degrees: Four Approaches
48 -- 57Tracy Emmersen, Joseph M. Hatfield, Jeff Kosseff, Steven R. Orr IV. The USNA's Interdisciplinary Approach to Cybersecurity Education
58 -- 66Jean R. S. Blair, Andrew O. Hall, Edward Sobiesk. Educating Future Multidisciplinary Cybersecurity Teams
67 -- 75Jessica Ivy, Sarah B. Lee, Dana Franz, Joseph Crumpton. Seeding Cybersecurity Workforce Pathways With Secondary Education
76 -- 80Hal Berghel. Codes of Ethics in a Post-Truth World
81 -- 86Robert N. Charette. Evolving From Know-How to Know-What
87 -- 90Nir Kshetri, Jeffrey M. Voas. Trusting Pirated Software

Volume 52, Issue 2

4 -- 5Bjoern Schuller. Microexpressions: A Chance for Computers to Beat Humans at Detecting Hidden Emotions?
6 -- 8Lori Cameron. Computer Highlights Society Magazines
9 -- 11Erich J. Neuhold. 50 & 25 Years Ago
12 -- 13David Alan Grier. Holding Us Together
14 -- 22Vard Antinyan, Anna Börjesson Sandberg, Miroslaw Staron. A Pragmatic View on Code Complexity Management
23 -- 31Kjell Jørgen Hole, Christian Otterstad. Software Systems With Antifragility to Downtime
32 -- 40Philip C. Treleaven, Jeremy Barnett, Adriano Soares Koshiyama. Algorithms: Law and Regulation
41 -- 51Kamran Siddique, Zahid Akhtar, Farrukh Aslam Khan, Yangwoo Kim. KDD Cup 99 Data Sets: A Perspective on the Role of Data Sets in Network Intrusion Detection Research
52 -- 62Kirk M. Bresniker, Paolo Faraboschi, Avi Mendelson, Dejan S. Milojicic, Timothy Roscoe, Robert N. M. Watson. Rack-Scale Capabilities: Fine-Grained Protection for Large-Scale Memories
63 -- 67Amitangshu Pal, Krishna Kant. NFMI: Connectivity for Short-Range IoT Applications
68 -- 72Rick Kuhn, Dylan Yaga, Jeffrey M. Voas. Rethinking Distributed Ledger Technology

Volume 52, Issue 12

4 -- 11Cecilia Metra. The 2019 IEEE Computer Society: Hit Target on Member Satisfaction and Technical Excellence
16 -- 17Hui Lei, Chao Qiu, Haipeng Yao, Song Guo 0001. When Blockchain-Enabled Internet of Things Meets Cloud Computing
18 -- 21Erich J. Neuhold. 50 & 25 Years Ago
20 -- 0Ergun Akleman. Computing Through Time
28 -- 30David Alan Grier. The IEEE Computer Society and the Tools of the Past
31 -- 33Dejan S. Milojicic. Technology Predictions
34 -- 38Paolo Faraboschi, Eitan Frachtenberg, Phillip A. Laplante, Katherine Mansfield, Dejan S. Milojicic. Technology Predictions: Art, Science, and Fashion
39 -- 44Danny Lange. Cognitive Robotics: Making Robots Sense, Understand, and Interact
45 -- 52Kirk Bresniker, Ada Gavrilovska, James Holt, Dejan S. Milojicic, Trung Tran. Grand Challenge: Applying Artificial Intelligence and Machine Learning to Cybersecurity
53 -- 57Eitan Frachtenberg. Practical Drone Delivery
58 -- 64Roberto Saracco. Digital Twins: Bridging Physical Space and Cyberspace
65 -- 70Avi Mendelson. Security and Privacy in the Age of Big Data and Machine Learning
71 -- 79Thomas M. Coughlin. Nonvolatile Memory Express: The Link That Binds Them
80 -- 82Jeffrey M. Voas. Predictions on Predictions
83 -- 88Alex Hoffman. Moral Hazards in Cyber Vulnerability Markets
89 -- 93Paul E. Black, Monika Singh. Opaque Wrappers and Patching: Negative Results
94 -- 98Amitangshu Pal, Krishna Kant. Using Blockchain for Provenance and Traceability in Internet of Things-Integrated Food Logistics
99 -- 102Mark Campbell 0002. Smart Edge: The Effects of Shifting the Center of Data Gravity Out of the Cloud
103 -- 106Diomidis Spinellis. How to Select Open Source Components
107 -- 108Ann E. K. Sobel. Revisiting Whether Everyone Should Go to College
109 -- 112David G. Hough. The IEEE Standard 754: One for the History Books
114 -- 117Erik P. DeBenedictis. Moore's Law: A Hard Act to Follow

Volume 52, Issue 11

7 -- 8Manish Parashar. The Reproducibility Initiative
12 -- 13David Alan Grier. Toward Healthier Lifestyles
14 -- 17Sumi Helal, Ramesh Jain. Digital Health-Active and Healthy Living
18 -- 29Matteo Gadaleta, Michele Rossi, Eric J. Topol, Steven R. Steinhubl, Giorgio Quer. On the Effectiveness of Deep Representation Learning: The Atrial Fibrillation Case
30 -- 39Nutta Homdee, Ridwan Alam, James A. Hayes, Tamanna Hamid, John Park, Sean Wolfe, Hilda Goins, Nykesha Fyffe, Temple Newbold, Tonya L. Smith-Jackson, Azziza Bankole, Martha S. Anderson, John Lach. Agitation Monitoring and Prevention System for Dementia Caregiver Empowerment
40 -- 51Chi-Ho Tseng, Chen Lin, Hsiang-Chih Chang, Cyuan-Cin Liu, Bess Ma F. Serafico, Li-Ching Wu, Chih-Ting Lin, Tien Hsu, Chun-Yao Huang, Men-Tzung Lo. Cloud-Based Artificial Intelligence System for Large-Scale Arrhythmia Screening
52 -- 61William Cheng-Chung Chu, Chihhsiong Shih, Wen-Yi Chou, Sheikh Iqbal Ahamed, Pao-Ann Hsiung. Artificial Intelligence of Things in Sports Science: Weight Training as an Example
62 -- 72Ozgun Pinarer, Atay Ozgovde. Application-Aware Dynamic Energy Management for Portable Devices
73 -- 78Yoshihiro Shiroishi, Kunio Uchiyama, Norihiro Suzuki. Better Actions for Society 5.0: Using AI for Evidence-Based Policy Making That Keeps Humans in the Loop
80 -- 83James Bret Michael. Assessing the Trustworthiness of Electronic Systems

Volume 52, Issue 10

7 -- 8Paolo Montuschi. New and Emerging Topics in Computing
11 -- 0Ergun Akleman. Computing Through Time
12 -- 13David Alan Grier. A Good Party
14 -- 23Stephen D. Crocker. The Arpanet and Its Impact on the State of Networking
24 -- 29Paul Stimers. The U.S. National Quantum Initiative
30 -- 40Yung-Hsiang Lu, George K. Thiruvathukal, Ahmed S. Kaseb, Kent Gauen, Damini Rijhwani, Ryan Dailey, Deeptanshu Malik, Yutong Huang, Sarah Aghajanzadeh, Minghao Guo. See the World Through Network Cameras
41 -- 51Admela Jukan, Francisco Carpio, Xavi Masip, Ana Juan Ferrer, Nicole Kemper, Birgit U. Stetina. Fog-to-Cloud Computing for Farming: Low-Cost Technologies, Data Exchange, and Animal Welfare
52 -- 60Flavio Bertini, Stefano Giovanni Rizzo, Danilo Montesi. Can Information Hiding in Social Media Posts Represent a Threat?
61 -- 69Xingya Wang, Weisong Sun, Linghuan Hu, Yuan Zhao, W. Eric Wong, Zhenyu Chen 0001. Software-Testing Contests: Observations and Lessons Learned
70 -- 74Tae Wan Kim, Santiago Mejia. From Artificial Intelligence to Artificial Wisdom: What Socrates Teaches Us
76 -- 82Apostol Vassilev. Can Deep Learning Save Us and Itself From the Avalanche of Threats in Cyberspace?
84 -- 88Pei Zhang 0001, Shijia Pan, Mostafa Mirshekari, Jonathon Fagert, Hae Young Noh. Structures as Sensors: Indirect Sensing for Inferring Users and Environments
89 -- 91Mark Campbell 0002. Synthetic Data: How AI Is Transitioning From Data Consumer to Data Producer... and Why That's Important
92 -- 96Jeff McAffer. Getting Started With Open Source Governance
97 -- 98Ann E. K. Sobel. A New (?) Educational View of Computing
99 -- 104Hal Berghel. Huawei, BIS, and the IEEE: It's Déjà Vu All Over Again
106 -- 109Geoff Thompson. Ethernet: From Office to Data Center to IoT
110 -- 112Erik P. DeBenedictis. Powerball and Quantum Supremacy

Volume 52, Issue 1

4 -- 6Cecilia Metra. The 2019 IEEE Computer Society: Targeting Member Satisfaction and Technical Excellence
7 -- 9Lori Cameron. Computer Highlights Society Magazines
10 -- 12Erich Neuhold. 50 & 25 Years Ago
13 -- 14David Alan Grier. A revolutionary outlook [EIC's Message]
16 -- 26Elisa Bertino, Shawn Merrill, Alina Nesen, Christine Utz. Redefining Data Transparency: A Multidimensional Approach
27 -- 35Ben Shneiderman, Catherine Plaisant. Interactive Visual Event Analytics: Opportunities and Challenges
36 -- 45Dong Wang 0002, Boleslaw K. Szymanski, Tarek Abdelzaher, Heng Ji, Lance M. Kaplan. The Age of Social Sensing
46 -- 53Jiangtao Wang, Yasha Wang, Qin Lv. Crowd-Assisted Machine Learning: Current Issues and Future Directions
54 -- 57Marilyn Wolf. Computer Security as Civil Defense
58 -- 61Nir Kshetri, Jeffrey M. Voas. Online Advertising Fraud
62 -- 65Lu Dai, Stan Krolikoski. A unique collaboration: revitalizing existing standards while preparing for the future
66 -- 70Hal Berghel. Vehicle Telematics: The Good, Bad and Ugly
72 -- 76Hironori Kasahara. Collaboration for the Future