


default search action
IEEE Computer, Volume 57
Volume 57, Number 1, January 2024
- Jyotika Athavale
:
Make Your Mark. 4-7 - Erich J. Neuhold
:
50 & 25 Years Ago. 12-15 - Ergun Akleman
:
Computing Through Time. 13 - Jeffrey M. Voas
:
Niceties, Necessities, Antiquities, and Ubiquities. 16-17 - Jeffrey M. Voas
, Ron Vetter
:
Outlook 2024. 18-20 - George F. Hurlburt
, Sorel Reisman
:
Experts Speak Out About Artificial Intelligence in Education: First of Two Roundtables. 21-26 - Lucas Layman
, Ron Vetter
:
Generative Artificial Intelligence and the Future of Software Testing. 27-32 - Brian David Johnson
:
The Future of Threatcasting. 34-39 - Lucia Cascone
, Vincenzo Loia
, Michele Nappi
, Fabio Narducci
:
Soft Biometrics for Cybersecurity: Ongoing Revolution for Industry 4.0. 40-50 - Mark O. Neisser
, Ndubuisi G. Orji
, Harry J. Levinson
, Umberto Celano
, James R. Moyne
, Supika Mashiro
, Dan Wilcox
, Slava Libman
:
How Lithography and Metrology Are Enabling Yield in the Next Generation of Semiconductor Patterning. 51-58 - Charles Weir
, Anna Dyson
, Olamide Jogunola
, Louise A. Dennis
, Katie Paxton-Fear
:
Interlinked Computing in 2040: Safety, Truth, Ownership, and Accountability. 59-68 - Abdul Majeed
, Seong Oun Hwang
:
Feature Stores: A Key Enabler for Feature Reusability and Availability Across Machine Learning Pipelines. 69-74 - Debendra Das Sharma
, Thomas M. Coughlin
:
Universal Chiplet Interconnect Express: An Open Industry Standard for Memory and Storage Applications. 75-81 - Nir Kshetri
, Jeffrey M. Voas
:
Data Centers in Your Backyard? 82-87 - Matthew Akers
, Armon Barton
:
Forming Adversarial Example Attacks Against Deep Neural Networks With Reinforcement Learning. 88-99 - Payal Arora
, Usha Raman
:
The Case for Femwork: Feminist Design Principles in Tech and Tech-Enabled Work. 100-104 - Javier Conde
, Pedro Reviriego
, Joaquín Salvachúa
, Gonzalo Martínez
, José Alberto Hernández
, Fabrizio Lombardi
:
Understanding the Impact of Artificial Intelligence in Academic Writing: Metadata to the Rescue. 105-109 - Phil Laplante
:
Deception and Intuition in Software Engineering. 110-113 - Michael Zyda
:
How to Create a Games Industry in Your Country. 114-119 - Michael T. Swearingen
, James Bret Michael
, Joseph Weiss
, Robert Radvanovsky:
Resilient Without Zero Trust. 120-122 - Dimitrios Serpanos
:
Industrial Internet of Things: Trends and Challenges. 124-128 - Hal Berghel
:
Generative Artificial Intelligence, Semantic Entropy, and the Big Sort. 130-135 - Pedro Bruel
, Sai Rahul Chalamalasetti
, Aditya Dhakal
, Eitan Frachtenberg
, Ninad Hogade
, Rolando Pablo Hong Enriquez
, Alok Mishra
, Dejan S. Milojicic
, Pavana Prakash
, Gourav Rattihalli
:
Predicting Heterogeneity and Serverless Principles of Converged High-Performance Computing, Artificial Intelligence, and Workflows. 136-144
Volume 57, Number 2, February 2024
- Erich J. Neuhold
:
50 & 25 Years Ago. 7-10 - Ergun Akleman
:
Computing Through Time: Text and Drive. 8 - Joanna F. DeFranco
, Jeffrey M. Voas
:
"Thirsty" Computing. 11-13 - Jeffrey M. Voas
:
In This Issue. 12 - George F. Hurlburt
, Sorel Reisman
:
Experts Speak Out About Artificial Intelligence in Education: Second of Two Panel Roundtables. 14-20 - Mike Hinchey
:
Ethics and Computing. 21-23 - David Kreps
, Moira de Roche
:
The International Federation for Information Processing Code of Ethics in Context. 24-32 - Gabriela Ramos, Mariagrazia Squicciarini, Eleonora Lamm
:
Making AI Ethical by Design: The UNESCO Perspective. 33-43 - Frances S. Grodzinsky, Marty J. Wolf
, Keith W. Miller
:
Ethical Issues From Emerging AI Applications: Harms Are Happening. 44-52 - Kristen K. Greene
, Mary Frances Theofanos
, Craig Watson
, Anne Andrews
, Eyeisha Barron
:
Avoiding Past Mistakes in Unethical Human Subjects Research: Moving From Artificial Intelligence Principles to Practice. 53-63 - Donald Gotterbarn, Keith W. Miller
:
Cui Bono? Software Professionals Should Always Ask "Who Benefits?". 64-69 - Frederico Cerveira
, António Howcroft Ferreira
, Raul Barbosa
:
Resilient Virtualization. 70-78 - Jisoo Kim
, Mungyu Bae, Yeonsung Chu, Moon Chan Park, Dongwon Park, Dawoon Jung, Sangyeun Cho:
Self-Encrypting Drive Evolving Toward Multitenant Cloud Computing. 79-90 - Andreas Nettsträter
, Marius Brehler
:
How to Find the Right Scope for Open Source Developments? 91-94 - Nina DeFranco Tommarello
, Rebecca Deek
:
The Convergence of the Internet of Things and Artificial Intelligence in Medicine: Assessing the Benefits, Challenges, and Risks. 95-99 - Lieven Eeckhout
:
Toward Sustainable Computer Systems. 101-104 - Nir Kshetri
:
Wholesale Central Bank Digital Currencies in Asia: Current Status and Motivation. 105-110 - Rolf Oppliger
, Andreas Grünert:
How to Measure Cybersecurity and Why Heuristics Matter. 111-115 - Mark Campbell
, Mladan Jovanovic
:
Directing AI: Charting a Roadmap of AI Opportunities and Risks. 116-120 - Christopher D. Nordquist
, Stanley S. Chou
:
Exploring Heterogeneous Integration: Its Essence and Future Path. 121-124 - Nir Kshetri
:
Generative Artificial Intelligence and E-Commerce. 125-128
Volume 57, Number 3, March 2024
- Erich J. Neuhold
:
50 & 25 Years Ago. 7-10 - Ergun Akleman
:
Computing Through Time: Trustworthy AI. 8 - Jeffrey M. Voas
:
The Influencer. 11-13 - Jeffrey M. Voas
:
Also in this Issue. 12 - Phil Laplante
, Joanna F. DeFranco
, Rick Kuhn
:
Assured Autonomy, Artificial Intelligence, and Machine Learning: A Roundtable Discussion. 14-21 - Riccardo Mariani
, Francesca Rossi
, Rita Cucchiara
, Marco Pavone
, Barnaby Simkin, Ansgar Koene, Jochen Papenbrock:
Trustworthy AI - Part III. 22-24 - Antonio Emanuele Cinà
, Kathrin Grosse, Ambra Demontis
, Battista Biggio
, Fabio Roli
, Marcello Pelillo
:
Machine Learning Security Against Data Poisoning: Are We There Yet? 26-34 - Padmapritha T
, Korkut Bekiroglu
, Subathra Seshadhri, Seshadhri Srinivasan
:
Trustworthy AI-Based Personalized Insulin Recommender for Elderly People Who Have Type-2 Diabetes. 35-45 - Sonia C. Sousa
, David Lamas, José Cravino, Paulo Martins
:
Human-Centered Trustworthy Framework: A Human-Computer Interaction Perspective. 46-58 - Jeremy Peckham
:
An AI Harms and Governance Framework for Trustworthy AI. 59-68 - Abhishek Hazra
, Andrea Morichetta
, Ilir Murturi
, Lauri Lovén
, Chinmaya Kumar Dehury
, Victor Casamayor-Pujol
, Praveen Kumar Donta
, Schahram Dustdar
:
Distributed AI in Zero-Touch Provisioning for Edge Networks: Challenges and Research Directions. 69-78 - Youyang Qu
, Xin Yuan
, Ming Ding
, Wei Ni
, Thierry Rakotoarivelo, David B. Smith
:
Learn to Unlearn: Insights Into Machine Unlearning. 79-90 - Rita Cucchiara
, Lorenzo Baraldi
, Marcella Cornia
, Sara Sarto
:
Video Surveillance and Privacy: A Solvable Paradox? 91-100 - Abdul Majeed
, Seong Oun Hwang
:
Making Large Language Models More Reliable and Beneficial: Taking ChatGPT as a Case Study. 101-106 - Yuntao Liu
, Daniel Xing, Isaac McDaniel
, Olsan Ozbay
, Abir Akib, Mumtahina Islam Sukanya, Sanjay Rekhi, Ankur Srivastava:
Security Advantages and Challenges of 3D Heterogeneous Integration. 107-112 - Jim Handy, Tom Coughlin
:
How Emerging Memories Extend Battery Life. 113-116 - Alice Barana
, Marina Marchisio
:
Eight Sustainable Practices for Digital Activity Development: Drivers and Barriers in International Higher Education Collaboration. 117-122 - Dimitrios Serpanos
, Marilyn Wolf
:
Safety and Artificial Intelligence in Cyberphysical Systems. 123-126 - Michael Zyda
:
Large Language Models and Generative AI, Oh My! 127-132
Volume 57, Number 4, April 2024
- Erich J. Neuhold
:
50 & 25 Years Ago. 7-10 - Ergun Akleman
:
Computing Through Time: Dependability. 8 - Jeffrey M. Voas
:
Thoughts on Dependability. 11-12 - Joanna F. DeFranco
, Phil Laplante
, Rick Kuhn
, Zhaojun Steven Li
:
Dependable Computing. 13-15 - John A. McDermid
, Radu Calinescu
, Ibrahim Habli
, Richard Hawkins
, Yan Jia
, John Molloy
, Matt Osborne
, Colin Paterson
, Zoë Porter
, Philippa Ryan Conmy
:
The Safety of Autonomy: A Systematic Approach. 16-25 - Hiromu Yano, Tadashi Dohi, Hiroyuki Okamura
:
Performance Comparison of Software Reliability Estimation Algorithms. 26-36 - Alwyn E. Goodloe
, Klaus Havelund
:
High-Integrity Runtime Verification. 37-45 - Ren-Yi Huang
, G. Dumindu Samaraweera
, J. Morris Chang
:
Exploring Threats, Defenses, and Privacy-Preserving Techniques in Federated Learning: A Survey. 46-56 - Les Hatton
:
Dependability Improvement Depends on Dependable Measurement. 57-67 - Robert V. Binder
:
Software Dependability Measurement at the Age of 36. 68-81 - Kishor S. Trivedi
, Andrea Bobbio
:
Reliability and Availability Analysis in Practice: Toward Multilevel Models for Complex Systems. 82-92 - Christof Ebert
:
Industry Trends 2024: Innovation Needs Competence. 93-98 - Sean McGregor
:
Open Digital Safety. 99-103 - Eugenio Cesario
:
Machine Learning for Enhancing Public Safety in Modern Cities. 104-107 - Yale N. Patt
:
The CORRECT First Course in Computing for Serious Students. 108-112 - Nir Kshetri
:
Economics of Artificial Intelligence Governance. 113-118 - Doron Drusinsky
:
From P Versus NP to Probabilistic and Zero Knowledge Proof Systems. 119-130 - Wei Tang
, Margaret Martonosi
:
Distributed Quantum Computing via Integrating Quantum and Classical Computing. 131-136 - Sugandha Agarwal
, Norita B. Ahmad
, Dima Jamali:
AI and Big Data in Contemporary Marketing. 137-142 - Eitan Frachtenberg
, Viyom Mittal
, Pedro Bruel, Michalis Faloutsos, Dejan S. Milojicic
:
The Distribution Is the Performance. 143-149 - Shimeng Yu
, Tae-Hyeon Kim
:
Semiconductor Memory Technologies: State-of-the-Art and Future Trends. 150-154 - Joanna F. DeFranco
, Jeffrey M. Voas
:
Internet of Things-Flavored Chips. 156-158 - Gary McGraw
, Richie Bonett
, Harold Figueroa
, Katie McMahon
:
23 Security Risks in Black-Box Large Language Model Foundation Models. 160-164
Volume 57, Number 5, May 2024
- Erich J. Neuhold
:
50 & 25 Years Ago. 7-11 - Ergun Akleman
:
Computing Through Time: Venture Scientists. 8 - Jeffrey M. Voas
:
Dissertation, Inc. 12-14 - Jeffrey M. Voas:
Also in this Issue. 13 - Sumi Helal
, Philip C. Treleaven
:
Venture Scientists and Technology Entrepreneurship. 15-19 - Philip C. Treleaven
:
Educating Venture Scientists: Inspiring Students and Young Professionals To Commercialize Their Deep Tech Research Supported by Their Institutions. 20-28 - Marco Aiello
:
The AI Revolution and the Future of Work: Threats and Opportunities. 29-34 - Sergio Balassone
:
Fostering Innovation and Entrepreneurship in Europe: The EIT Digital Journey. 35-38 - Chan-Yuan Wong
, Jui-Jan Chan:
How Public Research Institutions Propagate Industrial Niches and Configure New Industrial Structure: The Case of ITRI (Taiwan) for Semiconductor Technologies. 39-43 - Mihkel Solvak
, Ave Lauringson
:
A Case Study of the Public Sector Digital Ecosystem in Estonia. 44-49 - Victor Alexiev
:
Venture Building in the Digital Era: Unraveling the Past, Present, and Future of Corporate Innovation. 50-57 - Anton Rassõlkin
, Pavels Maksimkins, Andrejs Stupans, Viktor Rjabtsikov, Armands Senfelds, Vladimir Kuts
:
The Spatial Representation of a Self-Driving Vehicle for the Virtual Entity of a Digital Twin. 58-66 - Ajmal Khan
, Amer Saeed
, Farman Ullah, Muhammad Bilal
, Yasir Muhammad, Hesham El-Sayed
:
Charging Support Communication System Based on Vehicle-to-Vehicle Communication for Electric Vehicles. 67-77 - Qingtian Zou
, Lan Zhang
, Xiaoyan Sun, Anoop Singhal
, Peng Liu
:
Using Explainable AI for Neural Network-Based Network Attack Detection. 78-85 - D. Richard Kuhn
, M. S. Raunak
, Raghu N. Kacker
, Jaganmohan Chandrasekaran
, Erin Lanus
, Tyler Cody
, Laura J. Freeman
:
Assured Autonomy Through Combinatorial Methods. 86-90 - George F. Hurlburt
:
Addressing the Perceived Skills Gap. 91-96 - Michael Zyda
:
Today Generative AI Is Just a Parlor Trick. 98-101 - Phil Laplante
:
Use a Pencil: On Writing Software Documentation Well and the Role of Autodocumentation. 102-105 - Matteo Calabrese
, Gregory Falco
:
Physics-Informed Satellite Cybersecurity. 106-109 - Mark Campbell
, Mladan Jovanovic
:
Disinfecting AI: Mitigating Generative AI's Top Risks. 111-116 - Hal Berghel
:
Social Media, Cognitive Dysfunction, and Social Disruption. 118-124
Volume 57, Number 6, June 2024
- Erich J. Neuhold
:
50 & 25 Years Ago. 7-10 - Ergun Akleman
:
Computing Through Time: Biometrics. 8 - Joanna F. DeFranco
, Jeffrey M. Voas
:
"Golden Years" Users. 11-14 - Jeffrey M. Voas
:
In this Issue. 12-13 - Francisco Maciá Pérez
, Iren Lorenzo-Fonseca
, José Vicente Berná-Martínez
, Alex Maciá-Fiteni
:
Accompaniment Services for the Elderly: A Comparison of Decision-Making Support Architectures in Distributed IT. 16-28 - Dezhi Ran
, Yingjie Fu
, Yibo He, Tianyu Chen, Xing Tang, Tao Xie:
Path Toward Elderly Friendly Mobile Apps. 29-39 - Fernando Alonso-Fernandez
, Josef Bigün
, Julian Fiérrez
, Naser Damer
, Hugo Proença
, Arun Ross
:
Periocular Biometrics: A Modality for Unconstrained Scenarios. 40-49 - Kiavash Jamshidi, Ramin Toosi
, Mohammad Ali Akhaee
:
Gender Recognition Based on Hand Images Employing Local and Global Shape Information. 50-61 - Jiangtao Wang, Long Chen
, Deborah Lycett
, Duncan Vernon, Dingchang Zheng
:
Toward Population Health Intelligence: When Artificial Intelligence Meets Population Health Research. 62-72 - Bilal Naqvi
, Joakim Kävrestad
, A. K. M. Najmul Islam
:
Inclusive and Accessible Cybersecurity: Challenges and Future Directions. 73-81 - Akriti Verma
, Shama Naz Islam
, Valeh Moghaddam
, Adnan Anwar
:
Digital Emotion Regulation on Social Media. 82-89 - Irina Zaks
, Timothy Lehnen
, Aaron Zaks
:
Improving Velocity of Code Contributions in Open Source. 90-96 - Christof Ebert
, Xuya Wang:
China Artificial Intelligence Industry Insights. 97-101 - Nir Kshetri
:
Generative Artificial Intelligence in the Financial Services Industry. 102-108 - Sorel Reisman
:
Practical Classroom Use of Generative Artificial Intelligence - A Case Study. 110-114 - Barry L. Jenkins
, Warren Mayoss
, Michael Zyda:
Streamed Interactive Media: How Changing the Paradigm on Streaming Game Content Enables a New Media Category. 116-121 - Biswabandan Panda
:
The Game of Latency, Bandwidth, and Hardware Prefetching. 122-126 - Michela Taufer
, Daniel Milroy
, Todd Gamblin
, Andrew Jones
, Bill Magro, Heidi Poxon
, Seetharami R. Seelam:
HPC and Cloud Convergence Beyond Technical Boundaries: Strategies for Economic Sustainability, Standardization, and Data Accessibility. 128-136 - Mohamad Kassab
, Joanna F. DeFranco
:
Unlocking the Internet of Things Engineering Job Market. 137-140 - Preeti S. Chauhan
:
Deepfake: Risks and Opportunities. 141-144
Volume 57, Number 8, August 2024
- Jeffrey M. Voas
:
Letters to the Editor. 4 - Erich J. Neuhold
:
50 & 25 Years Ago. 8-11 - Ergun Akleman
:
Computing Through Time: Technology Predictions. 9 - Phil Laplante
, Dejan S. Milojicic
, Jeffrey M. Voas
:
"Cyberpanics" and Global Disinformation Campaigns. 12-14 - Joanna F. DeFranco
, Nir Kshetri
, George K. Thiruvathukal
, George F. Hurlburt
:
Crowdsourcing: A Roundtable Discussion. 15-21 - Dejan S. Milojicic
, Phil Laplante
:
Technology Predictions: Technologies that Advance Humanity and Broad AI Adoption. 22-25 - Richard Shan
:
Language Artificial Intelligence at a Crossroads: Deciphering the Future of Small and Large Language Models. 26-35 - Rafael Ferreira da Silva
, Rosa M. Badia
, Deborah Bard
, Ian T. Foster
, Shantenu Jha
, Frédéric Suter
:
Frontiers in Scientific Workflows: Pervasive Integration With High-Performance Computing. 36-44 - Ernestina Cianca
, Mauro De Sanctis
, Tommaso Rossi
, Marina Ruggieri
:
Advanced Technologies for a Sustainable Future of Space. 45-54 - Huber Flores
:
AI Sensors and Dashboards. 55-64 - Sajad Shirali-Shahreza
:
Set Up My Smart Home as I Want. 65-73 - Javier Conde
, Miguel González, Pedro Reviriego
, Zhen Gao
, Shanshan Liu
, Fabrizio Lombardi
:
Speed and Conversational Large Language Models: Not All Is About Tokens per Second. 74-80 - Alexander Kott, George Yegor Dubynskyi, Andrii Paziuk
, Stephanie Elisabeth Galaitsi, Benjamin D. Trump, Igor Linkov
:
Russian Cyber Onslaught Was Blunted by Ukrainian Cyber Resilience, Not Merely Security. 82-89 - Henry Chan Bun Chan
:
CARES Model for Supporting Computing Education and 4C Framework for Teaching in Hybrid Classrooms. 90-95 - Mladan Jovanovic
, Mark Campbell
:
Compacting AI: In Search of the Small Language Model. 96-100 - Norita B. Ahmad
, Sabir Haque
:
Balancing Innovation and Ethics in AI- and Big Data-Driven Marketing. 102-107 - Christof Ebert
:
Convergence of IT, OT, and the IoT. 108-112 - Dirk Riehle
:
Free and Open Source Software. 114-118 - Nir Kshetri
:
The Economics of Semiconductor Manufacturing in the United States. 120-126 - Reetuparna Das
, Satish Narayanasamy:
Systems Challenges and Opportunities for Genomics. 127-135
Volume 57, Number 9, September 2024
- Erich J. Neuhold
:
50 & 25 Years Ago. 7-10 - Ergun Akleman
:
Computing Through Time: Playing Chess. 8 - Elena Loukoianova
, Jeffrey M. Voas
:
Data Submarines. 11-12 - Joaquim Jorge
, Wolfgang Hürst
:
Extended Reality and Artificial Intelligence's Ethical Crossroads: From Sensory Manipulation to Creative Disruption. 14-20 - W. Eric Wong
:
Certifying and Regulating AI/ML-Centric Applications. 21-23 - Tuomas Granlund
, Vlad Stirbu
, Tommi Mikkonen
:
Toward a Regulatory-Compliant Lifecycle for Artificial-Intelligence-Based Medical Devices in the European Union: Industry Perspectives. 24-34 - Richard Shan
:
Certifying Generative AI: Retrieval-Augmented Generation Chatbots in High-Stakes Environments. 35-44 - Vinod Vasudevan
, Amr Abdullatif
, Sohag Kabir
, Felician Campean:
Certifiability Analysis of Machine Learning Systems for Low-Risk Automotive Applications. 45-56 - Kíng-Pîng Tenn
, Yu-Wei Chang
, Hong-Yen Chen
, Teng-Kai Fan, Tsungnan Lin
:
Toward Trustworthy Artificial Intelligence: An Integrated Framework Approach Mitigating Threats. 57-67 - Ali G. Hessami
, Alexander Kriebitz, Gerlinde Weger, Eleanor Nell Watson
, Patricia Shaw:
Artificial Intelligence for the Benefit of Everyone. 68-79 - Simon Chesterman
, Yuting Gao
, Jungpil Hahn
, Valerie Sticher
:
The Evolution of AI Governance. 80-92 - Derek C. Schuurman
:
A Tribute to the Z80. 94-95 - D. Frank Hsu
, Bruce S. Kristal
, Christina Schweikert
:
Combinatorial Fusion Analysis. 96-100 - Elsa López Pérez
, Göran Selander, John Preuß Mattsson
, Thomas Watteyne
, Malisa Vucinic
:
EDHOC Is a New Security Handshake Standard: An Overview of Security Analysis. 101-110 - Tom Coughlin
, Roger Hoyt:
IEEE Roadmap Outlines Development of Mass Digital Storage Technology. 111-116 - Michael Zyda
:
Generative AI Changes the World, Maybe. 118-123 - Sorel Reisman
:
Generative Artificial Intelligence and Problematic Student E-Mails. 124-127 - Nir Kshetri
, Jeffrey M. Voas
:
Adapting to Generative Artificial Intelligence: Approaches in Higher Education Institutions. 128-133 - Theodoros Komninos, Dimitrios Serpanos
:
Cyberconflict: The New Frontier of Global Warfare and Social Influence. 135-138 - Tracy Trac Bannon
:
Infusing Artificial Intelligence Into Software Engineering and the DevSecOps Continuum. 140-148
Volume 57, Number 10, October 2024
- Erich J. Neuhold
:
50 & 25 Years Ago. 7-10 - Ergun Akleman
:
Computing Through Time: Security. 8 - Jeffrey M. Voas
:
Mockery, Fake Reviews, and Fake Reviewers. 11-13 - Jeffrey M. Voas
:
In this Issue. 12 - W. Eric Wong
, Jeffrey M. Voas
:
Revisiting Software Reliability Modeling and Testing. 14-25 - Carson Koball, Yong Wang
, Bhaskar Prasad Rimal
, Varghese Mathew Vaidyan
:
Machine Learning Security: Threat Model, Attacks, and Challenges. 26-35 - Anton Dimov Hristozov
:
Engineering Challenges for Developing Reliable and Secure Heterogeneous Computing Systems. 36-44 - Mohammed Amine Boudouaia
, Samir Ouchani
:
Designing Secure and Smart Supply Chains: A Roadmap. 45-55 - Maciej Rys
:
Unraveling Participation Motivations in Pandemic-Related Hackathons: A COVID-19 Study. 56-65 - Bilal Naqvi
, Kari Smolander
:
Practitioners' Perspectives on and Prospects for Usable Security. 66-74 - Theresa Fister
, George K. Thiruvathukal
:
Artificial Intelligence Employment Interviews: Examining Limitations, Biases, and Perceptions. 76-81 - Christian Koch
:
The Prisoner's Dilemma of Open-Source Software Security. 82-85 - Andreas Grünert, James Bret Michael
, Rolf Oppliger
, Ruedi Rytz:
Why Probabilities Cannot Be Used in Cyber Risk Management. 86-89 - Joanna F. DeFranco
:
Health Care 4.0 and Clinical Internet of Things. 90-92 - George F. Hurlburt
:
Artificial Intelligence, the Workforce and Educational Realities. 94-98 - Umang Bhatt
, Holli Sargeant
:
When Should Algorithms Resign? A Proposal for AI Governance. 99-103 - Kevin Macwan
:
Integrating Blockchain Technology in Online Gaming Ecosystems. 104-111 - Nir Kshetri
:
Navigating EU Regulations: Challenges for U.S. Technology Firms and the Rise of Europe's Generative AI Ecosystem. 112-117 - Matthew Litton
, Doron Drusinsky
, London Bridget, James Bret Michael
:
Machine-Learned Correctness Properties, Runtime Verification, and Advance-Warning Oracles for Autonomous Systems. 118-130 - Hal Berghel
:
Election Integrity in the United States: How Will 2024 Compare to 2020? 131-137 - Mengjia Yan
, Thomas Bourgeat, Sharad Malik
:
Formal Verification for Secure Processors: A Guide for Computer Architects. 138-143 - Christof Ebert
, Ulrich Hemel:
Grow Your Artificial Intelligence Competence. 144-150 - Jyotika Athavale
, Cullen E. Bash
, Wesley Brewer
, Matthias Maiterth
, Dejan S. Milojicic
, Harry Petty
, Soumyendu Sarkar
:
Digital Twins for Data Centers. 151-158 - Nicholas Soures
, Jayanta Dey
, Dhireesha Kudithipudi
:
Learning Continually in Silicon. 160-164
Volume 57, Number 11, November 2024
- Erich J. Neuhold
:
50 & 25 Years Ago. 7-10 - Ergun Akleman
:
Computing Through Time: Intelligence Failures. 8 - Nir Kshetri
, Jeffrey M. Voas
:
3D Printing the "Tools" of War. 11-13 - M. S. Raunak, D. Richard Kuhn
:
AI Failures. 14-16 - Hem Chandra Joshi
, Sandeep Kumar
:
Artificial Intelligence Failures in Autonomous Vehicles: Causes, Implications, and Prevention. 18-30 - Mary Missy Cummings
, Benjamin Wheeler, John Kliem:
A Root Cause Analysis of a Self-Driving Car Dragging a Pedestrian. 31-40 - Tu Anh Ngo
, Alka Luqman
, Jonathan Chan Chew Meng, Anupam Chattopadhyay
:
A Systematic Approach Toward Robust Perception in (Semi-)Autonomous Vehicles. 41-48 - Michail Tsikerdekis
, Sherali Zeadally
, Iyad A. Katib
:
Defenses Against Artificial Intelligence Attacks. 49-59 - John Molloy
, Sepeedeh Shahbeigi
, John A. McDermid
:
Hazard and Safety Analysis of Machine-Learning-Based Perception Capabilities in Autonomous Vehicles. 60-70 - Julia De Miguel Velazquez, Sanja Scepanovic
, Andrés Gvirtz
, Daniele Quercia
:
Decoding Real-World Artificial Intelligence Incidents. 71-81 - Barani Maung Maung
, Keegan McBride
, Jason Samuel Lucas
, Maryam Tabar
, Dongwon Lee
:
Generative AI Disproportionately Harms Long Tail Users. 82-85 - John Leslie King
, Hal Berghel
, Phillip Glen Armour
, Robert N. Charette:
Healthy Skepticism. 86-91 - Ram Chillarege
:
Software Reliability: What Went Wrong? How to Fix It? 92-94 - William H. Widen
, Marilyn Wolf
:
Redux: Corporate Governance and Management of AI-Driven Product Development. 95-98 - Hal Berghel
:
Bruce Schneier on AI Security (Interview). 99-101 - Michael Zyda
:
Twenty Columns Later ... 102-117 - Varun Gupta
, Chetna Gupta:
Navigating the Landscape of AI-Generated Text Detection: Issues and Solutions for Upholding Academic Integrity. 118-123 - Mladan Jovanovic
, Mark Campbell
:
Fusing AI: Multimodal Language Models Inference Across Diverse Inputs. 124-130 - Ravi S. Sharma
, Samia Loucif
, Nir Kshetri
, Jeffrey M. Voas
:
Global Initiatives on "Safer" and More "Responsible" Artificial Intelligence. 131-137
Volume 57, Number 12, December 2024
- Jyotika Athavale
, Shivam:
Empowering Diversity and Innovation: Jyotika Athavale Led the Charge This Year as 2024 IEEE Computer Society President. 4-9 - Jeffrey M. Voas
:
Letters. 16 - Erich J. Neuhold
:
50 & 25 Years Ago. 20-24 - Ergun Akleman
:
Computing Through Time: Agriculture. 23 - Jeffrey M. Voas
, D. Richard Kuhn
:
"Over Spooked". 25-26 - Jeffrey M. Voas
:
Also In This Issue. 26 - Tracy Trac Bannon
, Phil Laplante
:
Generative AI in the Software Development Lifecycle. 27-34 - Joanna F. DeFranco
, Jeffrey M. Voas
:
Computing for Agricultural and Urban Environments. 35-37 - Ashish Gupta
, Vishesh Kumar Tanwar
, Amit Nath Jha
, Sajal K. Das
:
Analyzing Real-Time Insect Detection in Smart Connected Farms. 38-46 - Abdul-Rasheed Ottun
, Adeyinka Akintola
, Mohan Liyanage
, Michell Boerger
, Pan Hui
, Sasu Tarkoma
, Nikolay Tcholtchev
, Petteri Nurmi
, Huber Flores
:
AI Robustness Against Attacks in City-Scale Autonomous Drone Deployments. 47-57 - Yuankai He
, Weisong Shi
:
A Vision for Transformative Intersections. 58-68 - Natalia Silvis-Cividjian
:
Therac-25 Accidents: We Keep on Learning From Them. 69-78 - Jorge Eduardo Rivadeneira
, José Marcelo Fernandes
, André Rodrigues
, Fernando Boavida
, Jorge Sá Silva
:
Passive Data Collection in a Pandemic Situation: A Case Study. 79-89 - Dirk Riehle
:
Open Source Program Offices. 90-94 - Abdul Majeed
, Seong Oun Hwang
:
The Data Island Problem and Its Mitigation: Are We There Yet? 95-103 - Christof Ebert
, David A. Gustafson
:
Software Measurement: Four Steps to Unlock Success. 104-109 - Nir Kshetri
:
Disinformation and Misinformation in the Age of Artificial Intelligence and the Metaverse. 110-116 - Konstantin Läufer
, Gunda Mertin
, George K. Thiruvathukal
:
Engaging More Students in Formal Methods Education: A Practical Approach Using Temporal Logic of Actions. 118-123 - Cliff Young
:
Beyond the Quantitative Approach. 124-127 - Edward Au
:
Introduction to IEEE Computer Society Standards Activities. 129-132 - Sadasivan Shankar
:
Challenging Trends in Energy of Computing for Data Centers. 134-142 - Katerina Megas
, Barbara Cuthill
, Michael Fagan
, Paul Watrobski
:
NIST Cybersecurity for IoT Program. 144-148

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.