Journal: IEEE Computer

Volume 53, Issue 9

4 -- 7Leila De Floriani. 2020: A Journey of Discovery, Challenges, and Opportunity
9 -- 10Doug A. Bowman. Embracing Physical Keyboards for Virtual Reality
14 -- 17Erich J. Neuhold. 50 & 25 Years Ago
17 -- 0Ergun Akleman. Deep Learning
18 -- 19Jeffrey M. Voas. Citations and Letters
20 -- 30James Bret Michael, D. Richard Kuhn, Jeffrey M. Voas. Security or Privacy: Can You Have Both?
31 -- 35An Braeken, Madhusanka Liyanage, Salil S. Kanhere, Sudhir Dixit. Blockchain and Cyberphysical Systems
36 -- 45Ouns Bouachir, Moayad Aloqaily, Lewis Tseng, Azzedine Boukerche. Blockchain and Fog Computing for Cyberphysical Systems: The Case of Smart Industry
46 -- 55Charles Tim Batista Garrocho, Mateus Coelho Silva, Celio Marcio Soares Ferreira, Carlos Frederico Marcelo da Cunha Cavalcanti, Ricardo Augusto Rabelo Oliveira. Real-Time Systems Implications in the Blockchain-Based Vertical Integration of Industry 4.0
56 -- 65Faizan Safdar Ali, Moayad Aloqaily, Omar Alfandi, Öznur Özkasap. Cyberphysical Blockchain-Enabled Peer-to-Peer Energy Trading
66 -- 76Scott Eisele, Carlos A. Barreto, Abhishek Dubey, Xenofon D. Koutsoukos, Taha Eghtesad, Aron Laszka, Anastasia Mavridou. Blockchains for Transactive Energy Systems: Opportunities, Challenges, and Approaches
78 -- 79David Alan Grier. If Not Here, Then Where?
80 -- 84Nektarios Georgios Tsoutsos, Nikhil Gupta, Ramesh Karri. Cybersecurity Road Map for Digital Manufacturing
85 -- 90Nir Kshetri, Joanna F. DeFranco. The Economics of Cyberattacks on Brazil
91 -- 96Igor Linkov, Stephanie Elisabeth Galaitsi, Benjamin D. Trump, Jeffrey M. Keisler, Alexander Kott. Cybertrust: From Explainable to Actionable and Interpretable Artificial Intelligence
97 -- 100Phil Laplante. A Brief History of Software Professionalism and the Way Forward

Volume 53, Issue 8

7 -- 9Erich J. Neuhold. 50 & 25 Years Ago
9 -- 0Ergun Akleman. Computing Through Time
10 -- 13Nir Kshetri. COVID-19 Meets Big Tech
14 -- 17Liming Chen 0001, Huansheng Ning, Chris D. Nugent, Zhiwen Yu 0001. Hybrid Human-Artificial Intelligence
18 -- 28Zeynep Akata, Dan Balliet, Maarten de Rijke, Frank Dignum, Virginia Dignum, Guszti Eiben, Antske Fokkens, Davide Grossi, Koen V. Hindriks, Holger H. Hoos, Hayley Hung, Catholijn M. Jonker, Christof Monz, Mark A. Neerincx, Frans A. Oliehoek, Henry Prakken, Stefan Schlobach, Linda C. van der Gaag, Frank van Harmelen, Herke van Hoof, Birna van Riemsdijk, Aimee van Wynsberghe, Rineke Verbrugge, Bart Verheij, Piek Vossen, Max Welling. A Research Agenda for Hybrid Intelligence: Augmenting Human Intellect With Collaborative, Adaptive, Responsible, and Explainable Artificial Intelligence
29 -- 39John E. Wenskovitch, Chris North. Interactive Artificial Intelligence: Designing for the "Two Black Boxes" Problem
40 -- 48Hanwen Feng, Jing Zhou, Weiguo Lin, Yujuan Zhang, Zhiguo Qu. Multiple-Input, Multilayer-Perception-Based Classification of Traces From Side-Channel Attacks
49 -- 58Niccolo Pescetelli, Manuel Cebrián, Iyad Rahwan. BeeMe: Real-Time Internet Control of Situated Human Agents
59 -- 67Bin Hu, Kehua Guo, Jian Zhang 0048, Sheng Ren, Jianhua Ma. Exploring a Humanoid Video-Understanding Algorithm Guided by Behavior
68 -- 70David Alan Grier. Pervasive Ideals
71 -- 73Sorel Reisman. Viva la Revolucion?
74 -- 78Alexandru Paler. Aggregated Control of Quantum Computations: When Stacked Architectures Are Too Good to Be Practical Soon
79 -- 83Claude Y. Laporte, Jezreel Mejia Miranda. Delivering Software- and Systems-Engineering Standards for Small Teams
84 -- 88Wilhelm Hasselbring, Leslie Carr, Simon Hettrick, Heather S. Packer, Thanassis Tiropanis. Open Source Research Software
89 -- 93Mark Campbell 0002. Putting the Passe Into Passwords: How Passwordless Technologies Are Reshaping Digital Identity
94 -- 99Eric Osterweil, Angelos Stavrou, Lixia Zhang 0001. 21 Years of Distributed Denial-of-Service: A Call to Action
100 -- 104David Kleidermacher. Building an Internet of Secure Things

Volume 53, Issue 7

7 -- 8Elisabeth André. Is Artificial Intelligence Able to Help With Pain Assessment?
9 -- 11Erich Neuhold. 50 & 25 Years Ago
11 -- 0Ergun Akleman. Computing Through Time: Social Distancing
12 -- 13Jeffrey M. Voas. The "Patching" Mentality
14 -- 18Karthik Nandakumar, Nalini K. Ratha, Sharath Pankanti, Alex Pentland, Maurice Herlihy. Blockchain: From Technology to Marketplaces
20 -- 28Sean Cao, Lin William Cong, Meng Han, Qixuan Hou, Baozhong Yang. Blockchain Architecture for Auditing Automation and Trust Building in Public Markets
29 -- 44Neetesh Saxena, Ieuan Thomas, Prosanta Gope, Pete Burnap, Neeraj Kumar 0001. PharmaCrypt: Blockchain for Critical Pharmaceutical Industry to Counterfeit Drugs
45 -- 56Nabajeet Barman, Deepak G. C, Maria G. Martini. Blockchain for Video Streaming: Opportunities, Challenges, and Open Issues
57 -- 67Sujit Biswas, Kashif Sharif, Fan Li 0001, Saraju P. Mohanty. Blockchain for E-Health-Care Systems: Easier Said Than Done
68 -- 70David Alan Grier. A Prize, a Prediction, and a Drama
71 -- 75Shuvra S. Bhattacharyya, Marilyn Claire Wolf. Research Challenges for Heterogeneous Cyberphysical System Design
76 -- 79Phil Laplante. Contactless U: Higher Education in the Postcoronavirus World
80 -- 87Hal Berghel, Robert N. Charette, Edward G. Happ, John Leslie King. It's On: COVID-19, Risk Ecology, and Preparedness Tips
88 -- 92Eric Osterweil, Angelos Stavrou, Lixia Zhang 0001. 21 Years of Distributed Denial-of Service: Current State of Affairs
93 -- 98Hal Berghel. A Collapsing Academy, Part 1

Volume 53, Issue 6

7 -- 8Xiaotie Deng, Tao Xiao, Keyu Zhu. Learn to Play Maximum Revenue Auction
9 -- 12Erich Neuhold. 50 & 25 Years Ago
11 -- 0Ergun Akleman. Computing Through Time
13 -- 15Jeffrey M. Voas, Phil Laplante. Cyberpandemics
14 -- 0Jeffrey M. Voas. In This Issue
16 -- 27James Bret Michael, D. Richard Kuhn, Jeffrey M. Voas. Cyberthreats in 2025
28 -- 33Behrooz Parhami. Reliability Inversion: A Cautionary Tale
34 -- 43Mehmet Demir, Ozgur Turetken, Atefeh Mashatan. An Enterprise Transformation Guide for the Inevitable Blockchain Disruption
44 -- 52Claudio Bettini, Salil Kanhere, Marc Langheinrich, Archan Misra, Delphine Reinhardt. Is Privacy Regulation Slowing Down Research on Pervasive Computing?
53 -- 56Robby Robson. IEEE SA Open: Engaging Industry, Academia, and Researchers in Open Source Development
57 -- 61Gary McGraw, Richie Bonett, Victor Shepardson, Harold Figueroa. The Top 10 Risks of Machine Learning Security
62 -- 66Sean W. Smith. Securing the Internet of Things: An Ongoing Challenge
67 -- 72Marcello Caleffi, Daryus Chandra, Daniele Cuomo, Shima Hassanpour, Angela Sara Cacciapuoti. The Rise of the Quantum Internet
73 -- 76Mark Campbell 0002. Inference Acceleration: Adding Brawn to the Brains
77 -- 81Nikolay Harutyunyan. Managing Your Open Source Supply Chain-Why and How?
82 -- 84David Alan Grier. An Ambassador for Neural Networks

Volume 53, Issue 5

7 -- 9Erich Neuhold. 50 & 25 Years Ago
10 -- 12Charalambos Konstantinou, Saraju P. Mohanty. Cybersecurity for the Smart Grid
14 -- 24Astha Chawla, Prakhar Agrawal, Animesh Singh, Bijaya Ketan Panigrahi, Kolin Paul, Bhavesh R. Bhalja. Denial-of-Service Resilient Frameworks for Synchrophasor-Based Wide Area Monitoring Systems
25 -- 34David Smith 0001, Peng Wang, Ming Ding 0001, Jonathan Chan, Brian Spak, Xinlong Guan, Paul Tyler, Thierry Rakotoarivelo, Zihuai Lin, Tariq Abbasi. Privacy-Preserved Optimal Energy Trading, Statistics, and Forecasting for a Neighborhood Area Network
35 -- 43Bibek Shrestha, Hui Lin 0005. Data-Centric Edge Computing to Defend Power Grids Against IoT-Based Attacks
44 -- 54Mohammed Masum Siraj Khan, Alejandro Palomino, Jonathon Brugman, Jairo Giraldo, Sneha Kumar Kasera, Masood Parvania. The Cyberphysical Power System Resilience Testbed: Architecture and Applications
55 -- 62Carlos A. Barreto, Himanshu Neema, Xenofon D. Koutsoukos. Attacking Electricity Markets Through IoT Devices
63 -- 72Jiahao Xie, A. P. Sakis Meliopoulos. Sensitive Detection of GPS Spoofing Attack in Phasor Measurement Units via Quasi-Dynamic State Estimation
73 -- 76Sumi Helal. The Monkey, the Ant, and the Elephant: Addressing Safety in Smart Spaces
78 -- 80Bruce Schneier. Attacking Machine Learning Systems
81 -- 84James Bret Michael, George W. Dinolt, Doron Drusinsky. Open Questions in Formal Methods
85 -- 90Hal Berghel. The Equifax Hack Revisited and Repurposed
91 -- 92David Alan Grier. Mechanical Trust

Volume 53, Issue 4

7 -- 8Daniel J. Sorin. Computer Architecture for Orbital Edge Computing
9 -- 12Erich J. Neuhold. 50 & 25 Years Ago
10 -- 0Ergun Akleman. Computing Through Time: Artificial Life
13 -- 14Jeffrey M. Voas. Thoughts on Complexity, Trust, and Truth
15 -- 18Rick Kuhn, Mohammad S. Raunak. Narrow Spectrum Software Testing Addressing Complexity and Trust
17 -- 0Jeffrey M. Voas. In This Issue
20 -- 30Steve Hodges, Sue Sentance, Joe Finney, Thomas Ball. Physical Computing: A Key Element of Modern Computer Science Education
31 -- 35Mohiuddin Ahmed, Al-Sakib Khan Pathan. Blockchain: Can It Be Trusted?
36 -- 45Fabrizio Lamberti, Alberto Cannavò, Paolo Montuschi. Is Immersive Virtual Reality the Ultimate Interface for 3D Animators?
46 -- 50Sha Wei, Yuanye Ma, Ruiqi Li, Lin Hu. Toward Smart Manufacturing: Key Technologies and Trends Driving Standardization
51 -- 56Doron Drusinsky, James Bret Michael. Obtaining Trust in Executable Derivatives Using Crowdsourced Critiques With Blind Signatures
58 -- 62Thomas Kubitza, Patrick Bader, Matthias Mogerle, Albrecht Schmidt 0001. Developing IoT Systems: It's All About the Software
63 -- 67Mark Campbell 0002. DNA Data Storage: Automated DNA Synthesis and Sequencing Are Key to Unlocking Virtually Unlimited Data Storage
68 -- 72Dirk Riehle. Single-Vendor Open Source Firms
73 -- 76David Alan Grier. The Outward Spiral
77 -- 80Erik P. DeBenedictis. The Quantum Moonshot

Volume 53, Issue 3

7 -- 10Erich J. Neuhold. 50 & 25 Years Ago
11 -- 13Dongliang Xue, Linpeng Huang, Chao Li 0009, Chentao Wu. Dapper: An Adaptive Manager for Large-Capacity Persistent Memory
14 -- 15Marilyn Wolf. Distributed Data Analysis and Reliable Operation of Cyberphysical Systems
16 -- 25Munehiro Fukuda, Collin Gordon, Utku Mert, Matthew Sell. An Agent-Based Computational Framework for Distributed Data Analysis
26 -- 37Hui Lin 0005, Homa Alemzadeh, Zbigniew Kalbarczyk, Ravishankar K. Iyer. Challenges and Opportunities in the Detection of Safety-Critical Cyberphysical Attacks
47 -- 56Yahya Javed, Muhamad Felemban, Tawfeeq A. Shawly, Jason Kobes, Arif Ghafoor. A Partition-Driven Integrated Security Architecture for Cyberphysical Systems
57 -- 61Xenofon D. Koutsoukos. Systems Science of Secure and Resilient Cyberphysical Systems
62 -- 66Nir Kshetri, Jeffrey M. Voas. 5G, Security, and You
67 -- 72Hal Berghel. The Sokol Hoax: A 25-Year Retrospective
74 -- 76David Alan Grier. Top Influence
77 -- 82Hal Berghel. New Perspectives on (Anti)Social Media
83 -- 0Marilyn Wolf. In Memoriam: Dan Dobberpuhl

Volume 53, Issue 2

4 -- 5Xin Peng 0001. Helping Developers Analyze and Debug Industrial Microservice Systems
9 -- 11Erich J. Neuhold. 50 & 25 Years Ago
12 -- 13Jeffrey M. Voas. Reinventing Wheels
13 -- 0Ergun Akleman. Computing Through Time: Flying
14 -- 22Dejan S. Milojicic. Accelerators for Artificial Intelligence and High-Performance Computing
23 -- 25Sumi Helal. Digital Health: E-Coaching and Remote Monitoring
26 -- 34Wenbing Zhao 0001, Xiongyi Liu, Tie Qiu, Xiong Luo. Virtual Avatar-Based Life Coaching for Children With Autism Spectrum Disorder
35 -- 45Taqdir Ali, Muhammad Afzal, Hyeong Won Yu, Ubaid Ur Rehman, Ho-Seong Han, June Young Choi, Arif Jamshed, Jamil Hussain, Muhammad Bilal Amin, Musarrat Hussain, Usman Akhtar, Wajahat Ali Khan, Sungyoung Lee, Byeong Ho Kang 0001, Maqbool Hussain. The Intelligent Medical Platform: A Novel Dialogue-Based Platform for Health-Care Services
46 -- 56Ankush Manocha, Ramandeep Singh, Prabal Verma. An Internet of Things Fog-Assisted Sleep-Deprivation Prediction Framework for Spinal Cord Injury Patients
57 -- 67Shuchi Dhir, Sumithra Devi K. A. The Use of Biometric Fingerprints for On-the-Fly Digital Signing of Documents
68 -- 70Riccardo Mariani. IEEE Computer Society Standards Activities Board: Adapting to a Changing World
71 -- 74Mary Theofanos. Is Usable Security an Oxymoron?
76 -- 79Oliver Barker. Realizing the Promise of the Internet of Things in Smart Buildings
80 -- 82Mark Campbell 0002. Automated Coding: The Quest to Develop Programs That Write Programs
83 -- 87Tomas Gustavsson. Managing the Open Source Dependency
88 -- 90David Alan Grier. Reflecting on CAP
91 -- 94Erik P. DeBenedictis. Beyond Quantum Supremacy

Volume 53, Issue 12

4 -- 5Jaideep Vaidya. Securely Connecting Wearables to Displays
10 -- 0Ergun Akleman. Computing Through Time
18 -- 19Jeffrey M. Voas, Hsiao-Ying Lin. Is Artificial Intelligence/Machine Learning the Anticipated Silver Bullet?
20 -- 23Atif Mashkoor, Paolo Arcaini, Angelo Gargantini. Intelligent Autonomous Systems
24 -- 34Sohag Kabir, Yiannis Papadopoulos. Computational Intelligence for Safety Assurance of Cooperative Systems of Systems
35 -- 46Erfan Asaadi, Ewen Denney, Jonathan Menzies, Ganesh Pai, Dimo Petroff. Dynamic Assurance Cases: A Pathway to Trusted Autonomy
47 -- 59Lina Garcés, Silverio Martínez-Fernández, Valdemar Vicente Graciano Neto, Elisa Yumi Nakagawa. Architectural Solutions for Self-Adaptive Systems
60 -- 68Samuel H. Christie V., Daria Smirnova, Amit K. Chopra, Munindar P. Singh. Protocols Over Things: A Decentralized Programming Model for the Internet of Things
69 -- 79Hao Shi, Wei Dong 0006, Rui Li, Wanwei Liu. Controller Resynthesis for Multirobot System When Changes Happen
80 -- 89Sayani Sarkar, Michael W. Totaro, Ashok Kumar, Khalid Elgazzar. Real-Time Object Processing and Routing for Intelligent Drones: A Novel Approach
90 -- 91David Alan Grier. Stirring the Pot
92 -- 96Qingtian Zou, Xiaoyan Sun, Peng Liu 0005, Anoop Singhal. An Approach for Detection of Advanced Persistent Threat Attacks
98 -- 101Jakob Jul Jensen. Applying a "Smart Ecosystem" Mindset to Rethink Your Products
102 -- 105Phil Laplante. Software Engineering Lineage: How Do You Know What You Know?
106 -- 110Nir Kshetri, Joanna F. DeFranco. The Economics Behind Food Supply Blockchains
111 -- 114Scott Mansfield. Network Management in IEEE 802 Standards
115 -- 119Simon Phipps, Stefano Zacchiroli. Continuous Open Source License Compliance
121 -- 125Mark Campbell 0002. Beyond Conversational Artificial Intelligence
126 -- 128Jay Liebowitz. Life as a Professor Amid COVID-19
129 -- 132Preeti Chauhan. Plagiarism Detection: A Data Search Challenge

Volume 53, Issue 11

7 -- 8Manish Parashar. Parallel and Distributed Systems
9 -- 12Erich J. Neuhold. 50 & 25 Years Ago
13 -- 15James Bret Michael, Jeffrey M. Voas. Algorithms, Algorithms, Algorithms
14 -- 0Jeffrey M. Voas. In This Issue
16 -- 25Dejan S. Milojicic. The Edge-to-Cloud Continuum
26 -- 35Bai Li, Shaoshan Liu, Jie Tang 0003, Jean-Luc Gaudiot, LiangLiang Zhang, Qi Kong. Autonomous Last-Mile Delivery Vehicles in Complex Traffic Environments
36 -- 44Tom van Nuenen, Xavier Ferrer Aran, Jose M. Such, Mark Coté. Transparency for Whom? Assessing Discriminatory Artificial Intelligence
45 -- 52Phil Laplante, Dejan S. Milojicic, Sergey Serebryakov, Daniel Bennett. Artificial Intelligence and Critical Systems: From Hype to Reality
53 -- 61Marinus Ossewaarde, Erdener Gulenc. National Varieties of Artificial Intelligence Discourses: Myth, Utopianism, and Solutionism in West European Policy Expectations
62 -- 64David Alan Grier. Fellow Travelers
65 -- 69Dimitrios Serpanos, GianLuigi Ferrari, George Nikolakopoulos, Jon Pérez, Markus Tauber, Stefan Van Baelen. Embedded Artificial Intelligence: The ARTEMIS Vision
70 -- 74Shane Coughlan. Standardizing Open Source License Compliance With OpenChain
75 -- 78John Viega. 20 Years of Software Security
79 -- 82Robert C. Seacord. Effective C

Volume 53, Issue 10

7 -- 10Erich Neuhold. 50 & 25 Years Ago
9 -- 0Ergun Akleman. Computing Through Time
11 -- 12Jeffrey M. Voas, Phil Laplante. Rethinking Home, Office, School
13 -- 22Anastasia Anagnostou, Simon J. E. Taylor. Can Open Science Change the World?
23 -- 27Carlos E. Jimenez-Gomez, Jesús Cano Carrillo, Francisco Falcone. Artificial Intelligence in Government
28 -- 37Averill Campion, Mila-Gasco Hernandez, Slava Jankin Mikhaylov, Marc Esteve. Managing Artificial Intelligence Deployment in the Public Sector
38 -- 46Gianluigi Viscusi, Anca Rusu, Marie-Valentine Florin. Public Strategies for Artificial Intelligence: Which Value Drivers?
47 -- 58Jennifer Cobbe, Michelle Seng Ah Lee, Heleen Janssen, Jatinder Singh. Centering the Law in the Digital State
59 -- 68Sara B. Jordan, Samantha L. Fenn, Benjamin B. Shannon. Transparency as Threat at the Intersection of Artificial Intelligence and Cyberbiosecurity
69 -- 76Angelo M. e Silva, Yara R. Rodrigues, Renato Porfirio Ishii. RIGOR: A New Proposal for Predicting Infant Mortality in Government Health Systems Using Artificial Intelligence in Brazil
77 -- 87Gaspar Gonzalez-Briceno, Abraham Sanchez, Susana Ortega-Cisneros, Mario Salvador Garcia Contreras, German Alonso Pinedo Diaz, E. Ulises Moya-Sanchez. Artificial Intelligence-Based Referral System for Patients With Diabetic Retinopathy
88 -- 90David Alan Grier. A Prize and a Prediction
91 -- 95Julie M. Haney, Wayne G. Lutters. Security Awareness Training for the Workforce: Moving Beyond "Check-the-Box" Compliance
96 -- 100Erik DeBenedictis. Quantum Access
101 -- 104Alfredo Herrera. The Promises and Challenges of Open Source Hardware
105 -- 109Philippe Ombredanne. Free and Open Source Software License Compliance: Tools for Software Composition Analysis
110 -- 113Mark Campbell 0002. Beyond Zero Trust: Trust Is a Vulnerability
114 -- 118Jean-Luc Gaudiot, Hironori Kasahara. Computer Education in the Age of COVID-19
119 -- 122Norita Ahmad, Preeti Chauhan. State of Data Privacy During COVID-19

Volume 53, Issue 1

7 -- 8Karl Ricanek. Kinship Verification
9 -- 12Erich J. Neuhold. 50 & 25 Years Ago
13 -- 14Jeffrey M. Voas. A Value-Added Gem
16 -- 17Jeffrey M. Voas. Outlooks on Diverse Technologies
18 -- 29Nir Kshetri. Blockchain-Based Financial Technologies and Cryptocurrencies for Low-Income People: Technical Potential Versus Practical Reality
30 -- 36Celia Paulsen. The Future of IT Operational Technology Supply Chains
37 -- 44Rick Kuhn, Raghu N. Kacker, Yu Lei, Dimitris E. Simos. Input Space Coverage Matters
45 -- 52Loren E. Peitso, James Bret Michael. The Promise of Interactive Shared Augmented Reality
53 -- 62Munindar P. Singh, Amit K. Chopra. Computational Governance and Violable Contracts for Blockchain Applications
63 -- 71Simo Johannes Hosio, Niels van Berkel, Jonas Oppenlaender, Jorge Gonçalves 0001. Crowdsourcing Personalized Weight Loss Diets
72 -- 77Hal Berghel. A Critical Look at the 2019 College Admissions Scandal?
78 -- 80David Alan Grier. The Manual Memex
81 -- 85Arndt Lüder. Flexibility in Production Systems by Exploiting Cyberphysical Systems
86 -- 90Nir Kshetri, Jeffrey M. Voas. Thoughts on General Data Protection Regulation and Online Human Surveillance