Journal: IEEE Computer

Volume 54, Issue 9

4 -- 5Patrick Schaumont, Paolo Montuschi. Computer Security at the Forefront of Emerging Topics in Computing
9 -- 12Erich J. Neuhold. 50 & 25 Years Ago
13 -- 14Jeffrey M. Voas, Phil Laplante. "Opening" Banking
15 -- 24James Bret Michael, Doron Drusinsky, Duminda Wijesekera. Formal Verification of Cyberphysical Systems
25 -- 29James Bret Michael, Doron Drusinsky, Duminda Wijesekera. Formal Methods in Cyberphysical Systems
30 -- 38Ziquan Deng, Zhaodan Kong. Interpretable Fault Diagnosis for Cyberphysical Systems: A Learning Perspective
39 -- 48Meiyi Ma, John A. Stankovic, Lu Feng 0001. Toward Formal Methods for Smart Cities
49 -- 58Guangyao Chen, Zhihao Jiang. Environment Modeling During Model Checking of Cyberphysical Systems
59 -- 71Matthew Jablonski, Bo Yu, Gabriela Felicia Ciocarlie, Paulo C. G. Costa. A Case Study in the Formal Modeling of Safe and Secure Manufacturing Automation
72 -- 74David Alan Grier. Time and Money
76 -- 79Jon G. Rokne. Shoehorning
80 -- 85Christian Berghoff, Matthias Neu, Arndt von Twickel. The Interplay of AI and Biometrics: Challenges and Opportunities
86 -- 89Dimitrios Serpanos, Konstantinos Katsigiannis. Fuzzing: Cyberphysical System Testing for Security and Dependability
90 -- 96James Bret Michael, Thomas C. Wingfield. Defensive AI: The Future Is Yesterday
98 -- 102Michael Zyda. "Why Did I Say, 'Yes' to Writing This Bimonthly Column?"

Volume 54, Issue 8

4 -- 0Terence Kelly. Letters
8 -- 10Erich J. Neuhold. 50 & 25 Years Ago
9 -- 0Ergun Akleman. Compliting Through Time
11 -- 12Nir Kshetri, Jeffrey M. Voas. Where's the Silicon?
13 -- 18Vladimir Getov. Insights Into the Origins of the IEEE Computer Society and the Invention of Electronic Digital Computing
20 -- 21W. Eric Wong, Zijiang Yang. Safety, Security, and Reliability of Autonomous Vehicle Software
22 -- 32Simon Burton, John Alexander McDermid, Philip Garnett, Rob Weaver. Safety, Complexity, and Automated Driving: Holistic Perspectives on Safety Assurance
33 -- 45Haiyang Yu, Shuai Ma, Qi Hu, Zhen Yang 0004. Blockchain-Based Continuous Auditing for Dynamic Data Sharing in Autonomous Vehicular Networks
46 -- 55Sachin Motwani, Tarun Sharma, Anubha Gupta. Ethics in Autonomous Vehicle Software: The Dilemmas
56 -- 65Ye Ni, Zhilong Xia, Fangtong Zhao, Chunrong Fang, Zhenyu Chen 0001. An Online Multistep-Forward Voltage-Prediction Approach Based on an LSTM-TD Model and KF Algorithm
66 -- 76Koorosh Aslansefat, Sohag Kabir, Amr Abdullatif, Vinod Vasudevan, Yiannis Papadopoulos. Toward Improving Confidence in Autonomous Vehicle Software: A Study on Traffic Sign Recognition Systems
77 -- 85Jack R. Toohey, Mohammad S. Raunak, Dave W. Binkley. From Neuron Coverage to Steering Angle: Testing Autonomous Vehicles Effectively
86 -- 88David Alan Grier. For the Common Defense
89 -- 93Mark Campbell 0002, Mladan Jovanovic. Conversational Artificial Intelligence: Changing Tomorrow's Health Care Today
94 -- 97Dejan S. Milojicic. Educate Back Better: A Perspective from Industry
98 -- 103Nir Kshetri. The Economics of Blockchain-Based Supply Chain Traceability in Developing Countries
104 -- 111Sean P. Goggins, Matt Germonprez, Kevin Lumbard. Making Open Source Project Health Transparent
112 -- 117Alexander Kott, Maureen S. Golan, Benjamin D. Trump, Igor Linkov. Cyber Resilience: by Design or by Intervention?
118 -- 124Philip C. Treleaven. Future Computers: Digital, Quantum, Biological
125 -- 132Preeti Chauhan, Nir Kshetri. 2021 State of the Practice in Data Privacy and Security

Volume 54, Issue 7

4 -- 5Manish Parashar. Enabling Reproducible Research in Parallel and Distributed Systems
12 -- 13Jeffrey M. Voas, Nir Kshetri. Lost and Never Found
14 -- 16Phil Laplante, Dejan S. Milojicic. Technology Predictions
18 -- 26J. Antonio GarciaMacias, Luís A. Castro 0001, Arturo Serrano-Santoyo. Diverging Images of the Technoscapes in Developing Economies
27 -- 36Lei Xu 0012, Lin Chen 0009, Zhimin Gao, Hiram Moya, Weidong Shi. Reshaping the Landscape of the Future: Software-Defined Manufacturing
37 -- 45Sachin Motwani, Anubha Gupta. Experiencing Hyperloops: The Transit of the Future
46 -- 56Aspen Russell, Eitan Frachtenberg. Worlds Apart: Technology, Remote Work, and Equity
57 -- 68Arne Broering, Christoph Niedermeier, Ioana Olaru, Ulrich Schöpp, Kilian Telschig, Michael Villnow. Toward Embodied Intelligence: Smart Things on the Rise
69 -- 78Tommi Mikkonen, Cesare Pautasso, Antero Taivalsaari. Isomorphic Internet of Things Architectures With Web Technologies
79 -- 81David Alan Grier. Value by Squares
82 -- 88Efstratios Chatzoglou, Georgios Kambourakis, Constantinos Kolias. WiF0: All Your Passphrase Are Belong to Us
89 -- 93Dennis Brophy. Design Automation Standards Committee: Setting Tomorrow's Standards
94 -- 96Sicun Gao. Nonlinearity, Automation, and Reliable Cyberphysical Systems
98 -- 104John Viega, James Bret Michael. Struggling With Supply-Chain Security
105 -- 110Norita B. Ahmad, Nash Milic, Mohammed Ibahrine. Data and Disinformation
111 -- 118Doron Drusinsky, James Bret Michael. Multiagent Pathfinding Under Rigid, Optimization, and Uncertainty Constraints
119 -- 123Heimo Müller, Michaela Theresia Mayrhofer, Evert-Ben van Veen, Andreas Holzinger. The Ten Commandments of Ethical Medical AI

Volume 54, Issue 6

8 -- 0Ergun Akleman. Computing through time
10 -- 12Jeffrey M. Voas, Nir Kshetri. Homework [EIC'S Message]
11 -- 0Jeffrey M. Voas. About This Issue
14 -- 23Marc C. Canellas. Defending IEEE Software Standards in Federal Criminal Court
24 -- 35Jaime Meza, Leticia Vaca Cárdenas, Mónica Vaca-Cardenas, Luis Terán, Edy Portmann. A Human-Machine Collaboration Model for Urban Planning in Smart Cities
36 -- 45Cody Harrison Fleming, Carl R. Elks, Georgios Bakirtzis, Stephen C. Adams, Bryan T. Carter, Peter A. Beling, Barry M. Horowitz. Cyberphysical Security Through Resiliency: A Systems-Centric Approach
46 -- 48David Alan Grier. Forgetting Moore's Law [Body of Knowledge]
49 -- 52Changmi Jung, Lasse Mertins. Quality and Accountability in the Online Business Education Environment
53 -- 58Nir Kshetri. The Economics of Central Bank Digital Currency [Computing's Economics]
59 -- 63Wayne Beaton. Open Source Software Engineering the Eclipse Way
64 -- 71Joshua A. Kroll, James Bret Michael, David B. Thaw. Enhancing Cybersecurity via Artificial Intelligence: Risks, Rewards, and Frameworks

Volume 54, Issue 5

4 -- 6Gulustan Dogan. Advances in Human Activity Recognition
10 -- 12Erich J. Neuhold. 50 & 25 Years Ago
13 -- 14Vinton G. Cerf. "What We Do Now, Kemosabe?"
15 -- 21Nir Kshetri, Jeffrey M. Voas. Major Computing Technologies of the Past 75 Years
22 -- 23Marilyn Wolf, Dimitrios Serpanos. Computing for Autonomy: Latency, Power, Resilience
24 -- 33Joy Arulraj, Abhijit Chatterjee, Alexandros Daglis, Ashutosh Dhekne, Umakishore Ramachandran. eCloud: A Vision for the Evolution of the Edge-Cloud Continuum
34 -- 43Bernhard Rinner, Christian Bettstetter, Hermann Hellwagner, Stephan Weiss 0002. Multidrone Systems: More Than the Sum of the Parts
44 -- 53Samuel H. Christie V., Amit K. Chopra, Munindar P. Singh. Bungie: Improving Fault Tolerance via Extensible Application-Level Protocols
54 -- 55David Alan Grier. Don't Make Me Puke
56 -- 60Hsiao-Ying Lin, Battista Biggio. Adversarial Machine Learning: Attacks From Laboratories to the Real World
62 -- 64David Lorge Parnas. Software Engineering: A Profession in Waiting
65 -- 69Joanna F. DeFranco, Christopher S. Eagle, James Bret Michael, John Viega, Jeffrey M. Voas. Hackathons 101
70 -- 75Dana Eleftheriadou, Eddy Hartog, Natalia Gkiaouri. The Cities Challenge: Driving a Green and Digital Recovery and Social Resilience
76 -- 80Joanna F. DeFranco, Michael Hutchinson. Understanding Smart Medical Devices
81 -- 88Claude Y. Laporte, Mirna Muñoz. Not Teaching Software Engineering Standards to Future Software Engineers-Malpractice?

Volume 54, Issue 4

10 -- 0Ergun Akleman. Computing Through Time
11 -- 13Jeffrey M. Voas, Keith W. Miller. Confronting Your Digital Accuser
12 -- 0Jeffrey M. Voas. In This Issue
14 -- 25Liu Liu, Jie Tang 0003, Shaoshan Liu, Bo Yu, Yuan Xie 0001, Jean-Luc Gaudiot. Π-RT: A Runtime Framework to Enable Energy-Efficient Real-Time Robotic Vision Applications on Heterogeneous Architectures
26 -- 34Jiangtao Wang, Leye Wang, Yanhui Song. Crowd-Machine Hybrid Urban Sensing and Computing
35 -- 44Ava Lew. Flipping the Script: A Sociotechnical Approach to Platforms and Unanticipated Uses
46 -- 48David Alan Grier. Linking the Elements Together: Will NoSQL Databases Live up to Their Promise?
49 -- 54Doron Drusinsky. Who Is Authenticating My E-Commerce Logins?
55 -- 58Mark Campbell 0002. Computational Acceleration: Offense in Depth
59 -- 65Preeti Chauhan, Mohit Sood. Big Data: Present and Future
66 -- 69Shaoshan Liu, Jean-Luc Gaudiot, Hironori Kasahara. Engineering Education in the Age of Autonomous Machines
70 -- 75Isabel Drost-Fromm, Rob Tompkins. Open Source Community Governance the Apache Way
76 -- 84Matthew Lanoue, Chad A. Bollmann, James Bret Michael, John D. Roth, Duminda Wijesekera. An Attack Vector Taxonomy for Mobile Telephony Security Vulnerabilities
86 -- 90Nir Kshetri. The Economics of Digital Twins

Volume 54, Issue 3

4 -- 5Daniel J. Sorin. Reconfigurable Hardware in Postsilicon Microarchitecture
14 -- 17Jeffrey M. Voas, Nir Kshetri. Online Eats "Food Courts"
15 -- 0Jeffrey M. Voas. In This Issue
18 -- 27Piotr Nawrocki, Krzysztof Wrona, Mateusz Marczak, Bartlomiej Sniezynski. A Comparison of Native and Cross-Platform Frameworks for Mobile Applications
28 -- 36Chen Liu. Visualizing Logical Correlation in Trace Data for System Debugging
37 -- 46Sugandhi, Parteek Kumar, Sanmeet Kaur. Indian Sign Language Generation System
48 -- 51Hsiao-Ying Lin. Will We Adopt AI Like We Adopted Electricity?
52 -- 54David Alan Grier. The Engineering Mindset
55 -- 62Joanna F. DeFranco, David F. Ferraiolo, Rick Kuhn, Joshua Roberts. A Trusted Federated System to Share Granular Data Among Disparate Database Resources
63 -- 67Petros Kapsalas, Aris S. Lalos, Konstantinos Moustakas, Dimitrios Serpanos. The Role of Modularity in Multimodal Simultaneous Localization and Mapping Systems
68 -- 72Steven Furnell, Julie M. Haney, Mary Theofanos. Pandemic Parallels: What Can Cybersecurity Learn From COVID-19?
73 -- 78Raghvinder S. Sangwan, Robert L. Nord, Ipek Ozkaya. Architectural Dependency Analysis: Addressing the Elephant in the Room
80 -- 84Riccardo Mariani, Nir Maor, Jyotika Athavale, Kevin Gay. The Importance of Interoperability in Functional Safety Standards

Volume 54, Issue 2

4 -- 6Sudip Mittal. Secure V2V and V2I Technologies for the Next-Generation Intelligent Transportation Systems
10 -- 12Erich J. Neuhold. 50 & 25 Years Ago
11 -- 0Ergun Akleman. Computing Through Time
13 -- 15Jeffrey M. Voas, Nir Kshetri. Monetizing You
14 -- 0Jeffrey M. Voas. In This Issue
16 -- 25David Alan Grier, Dejan S. Milojicic, Sorel Reisman, John W. Walz. Special Technical Communities: A 10-Year Retrospective
26 -- 29Nir Kshetri, Jeffrey M. Voas, Ravi Sharma 0001. Computing and Socioeconomic Transformations
30 -- 38Friedhelm Victor, Peter Ruppel, Axel Küpper. A Taxonomy for Distributed Ledger Analytics
39 -- 49Gonçalo Sousa Mendes, Daniel Chen, Bruno M. C. Silva, Carlos Serrão, João Casal. A Novel Reputation System for Mobile App Stores Using Blockchain
50 -- 59Han-Yee Kim, Lei Xu 0012, Weidong Shi, Taeweon Suh. A Secure and Flexible FPGA-Based Blockchain System for the IIoT
60 -- 62David Alan Grier. There Is Still No Silver Bullet
63 -- 65George O. Strawn. Pandemics, Public Education, and the Future
66 -- 69Mark Campbell 0002. Tomorrow's Call Center Will Be Neither: Not Call Focused, Nor Centralized
70 -- 74Norita B. Ahmad. Do Data Almost Always Eventually Leak?
75 -- 79Jesús M. González-Barahona. A Brief History of Free, Open Source Software and Its Communities
80 -- 85Alexander Kott, Igor Linkov. To Improve Cyber Resilience, Measure It
86 -- 90Joanna F. DeFranco, Nir Kshetri, Jeffrey M. Voas. Rearchitecting the Malls: The Shifting U.S. Retail Landscape

Volume 54, Issue 12

4 -- 6Qian Zhang 0001, Ron Vetter. DROO: Integrated Learning and Optimization for Edge Computing Offloading
10 -- 12Erich J. Neuhold. 50 & 25 Years Ago
11 -- 0Ergun Akleman. Computing Through Time
13 -- 17Forrest Shull, Megha Ben. 75 Years Young: Reflecting on a Milestone Year for the Society
24 -- 26Joanna F. DeFranco, Jeffrey M. Voas. Reproducibility, Fabrication, and Falsification
27 -- 0Claudio Demartini, Leila De Floriani, Ji-Jiang Yang, Alfredo Cuzzocrea, Hossain Shahriar, Sorel Reisman, Mohammad Zulkernine. IEEE COMPSAC 2022
28 -- 37Philip Koopman, Benjamin Kuipers, William H. Widen, Marilyn Wolf. Ethics, Safety, and Autonomous Vehicles
38 -- 49Valeria Henríquez, Ana María Moreno 0001, José A. Calvo-Manzano, Tomás San Feliu. Agile-CMMI Alignment: Contributions and To-Dos for Organizations
50 -- 59Georgios Bakirtzis, Eswaran Subrahmanian, Cody Harrison Fleming. Compositional Thinking in Cyberphysical Systems Theory
60 -- 71Dorian Leroy, June Sallou, Johann Bourcier, Benoît Combemale. When Scientific Software Meets Software Engineering
72 -- 80Yan Zhu 0010, Qian Guo, Hongjian Yin, Kaitai Liang, Stephen S. Yau. Blockchain-Based Software Architecture Development for Service Requirements With Smart Contracts
81 -- 83David Alan Grier, David Alan Grier. "The Known World" and Its Successors
84 -- 87Suzanna Schmeelk, Irena Bojanova. Perspectives on Directing a Graduate Cybersecurity Program
88 -- 91Mark Campbell. Protecting AI: We Built the Brains, but What About Helmets?
92 -- 98Mamduh M. Hanafi, Nir Kshetri, Ravi Sharma 0001, Nir Kshetri. Economics of Artificial Intelligence in the Gulf Cooperation Council Countries
99 -- 103Dirk Riehle. The Open Source Distributor Business Model
104 -- 108Joanna F. DeFranco, Dimitrios Serpanos. The 12 Flavors of Cyberphysical Systems
109 -- 115Hal Berghel, Hal Berghel. The Online Disinformation Opera
116 -- 120Michael Zyda. Will I See Sensor-Based Games Happen Before I Die?

Volume 54, Issue 11

4 -- 5Tao Ju. Deforming With Sparsity
17 -- 25Rolf Ernst, Xiaobo Sharon Hu. Autonomous Systems Design - A Virtual Roundtable
36 -- 46Prosanta Gope, Biplab Sikdar 0001. A Comparative Study of Design Paradigms for PUF-Based Security Protocols for IoT Devices: Current Progress, Challenges, and Future Expectation
58 -- 67Michael Linares, Nishant Aswani, Gary Mac, Chenglu Jin, Fei Chen, Nikhil Gupta 0002, Ramesh Karri. Hack3D: Crowdsourcing the Assessment of Cybersecurity in Digital Manufacturing
88 -- 94Adam Cron, Erik Jan Marinissen. IEEE Standard 1838 Is on the Move
100 -- 103George Nikolakopoulos, Ali Agha. Pushing the Limits of Autonomy for Enabling the Next Generation of Space Robotics Exploration Missions

Volume 54, Issue 10

4 -- 5Qihua Zhou, Song Guo 0001, Haodong Lu, Li Li 0012, Minyi Guo, Yanfei Sun, Kun Wang 0005. A Comprehensive Inspection of the Straggler Problem
9 -- 12Erich J. Neuhold. 50 & 25 Years Ago
11 -- 0Ergun Akleman. Computing Through Time
13 -- 0Jeffrey M. Voas. Tell Me a Story
14 -- 24Phil Laplante, Ben Amaba. Artificial Intelligence in Critical Infrastructure Systems
25 -- 27Mohammad S. Raunak, Rick Kuhn. Explainable Artificial Intelligence and Machine Learning
28 -- 37Mohammad Naiseh, Deniz Cemiloglu, Dena Al-Thani, Nan Jiang, Raian Ali. Explainable Recommendations and Calibrated Trust: Two Systematic User Errors
38 -- 48Sahil Deo, Neha Sontakke. Usability, User Comprehension, and Perceptions of Explanations for Complex Decision Support Systems in Finance: A Robo-Advisory Use Case
49 -- 59Ismini Psychoula, Andreas Gutmann, Pradip Mainali, Sharon H. Lee, Paul Dunphy, Fabien A. P. Petitcolas. Explainable Machine Learning for Fraud Detection
60 -- 68Seshadhri Srinivasan, Pandarasamy Arjunan, Baihong Jin, Alberto L. Sangiovanni-Vincentelli, Zuraimi Sultan, Kameshwar Poolla. Explainable AI for Chiller Fault-Detection Systems: Gaining Human Trust
69 -- 77Victoria DaPoian, Eric Lyness, William Brinckerhoff, Ryan Danell, Xiang Li, Melissa Trainer. Science Autonomy and the ExoMars Mission: Machine Learning to Help Find Life on Mars
78 -- 86Andreas Holzinger, Heimo Müller. Toward Human-AI Interfaces to Support Explainability and Causability in Medical AI
87 -- 89David Alan Grier. Do We Go Viral?
90 -- 94Joseph Mortati, Erran Carmel. Can We Prevent a Technological Arms Race in University Student Cheating?
95 -- 101David Harel, Assaf Marron, Raz Yerushalmi. Scenario-Based Algorithmics: Coding Algorithms by Automatic Composition of Separate Concerns
102 -- 105Joseph Williams. The Computing Architectures Donnybrook
106 -- 110Alexandre K. Ligo, Alexander Kott, Igor Linkov. Autonomous Cyberdefense Introduces Risk: Can We Manage the Risk?
111 -- 115Frank Hannig, Jürgen Teich. Open Source Hardware
116 -- 120Amin Vahdat, Dejan S. Milojicic. The Next Wave in Cloud Systems Architecture
122 -- 128Phil Laplante, Nir Kshetri. Open Banking: Definition and Description
129 -- 132Norita B. Ahmad, Kevin Dias. Validating "Data Validation"
133 -- 137Joanna F. DeFranco. 12 Flavors of IoT
138 -- 144Hal Berghel. A Collapsing Academy, Part II: How Cancel Culture Works on the Academy

Volume 54, Issue 1

4 -- 9Forrest Shull, Megha Ben. Driving Innovation and Removing Barriers: Forrest Shull Takes the Helm as 2021 IEEE Computer Society President
10 -- 14Leila De Floriani. 2020: A Year of Transformative Change and Conquering Adversity
16 -- 17Elisabeth André. Can Artificial Intelligence Detect Good (or Bad) Chemistry Between People?
21 -- 24Erich J. Neuhold. 50 & 25 Years Ago
26 -- 28Jeffrey M. Voas, Nir Kshetri. Scarcity
29 -- 38Nicky Mouha, Asmaa Hailane. The Application of Formal Methods to Real-World Cryptographic Algorithms, Protocols, and Systems
40 -- 41Joseph Williams, Jeffrey M. Voas. Outlook 2021
42 -- 48Vard Antinyan. Hypnotized by Lines of Code
49 -- 60Alexander Weiss, Smitha Gautham, Athira Varma Jayakumar, Carl R. Elks, D. Richard Kuhn, Raghu N. Kacker, Thomas B. Preußer. Understanding and Fixing Complex Faults in Embedded Cyberphysical Systems
61 -- 69Vartan Piroumian. Digital Twins: Universal Interoperability for the Digital Age
70 -- 80Henry M. Kim, Marek Laskowski, Michael Zargham, Hjalmar Turesson, Matthew Barlin, Danil Kabanov. Token Economics in Real Life: Cryptocurrency and Incentives Design for Insolar's Blockchain Network
81 -- 83David Alan Grier. Where Do We Learn to Behave Like Grownups?
84 -- 88Hiroshi Fuketa, Kunio Uchiyama. Edge Artificial Intelligence Chips for the Cyberphysical Systems Era
89 -- 95Richard D. Riehle, James Bret Michael. Improving the Trustworthiness of Software Through Rigorous Data Type Design
96 -- 102Jason Borenstein, Frances S. Grodzinsky, Ayanna M. Howard, Keith W. Miller, Marty J. Wolf. AI Ethics: A Long History and a Recent Burst of Attention
103 -- 109Paul N. Edwards, John Leslie King. Institutions, Infrastructures, and Innovation