default search action
IEEE Computer, Volume 49
Volume 49, Number 1, January 2016
- Roger U. Fujii:
Raising the Bar: Ensuring Quality Products and Services for Our Members. 4 - Sumi Helal:
2016 Outlook: Humans in the Technology Loop. 7-9 - Paul Nikolich, Kenneth J. Christensen, Lori Cameron:
802 Standards. 10 - Lynette A. Jones:
Designing Effective Refreshable Braille Displays. 14 - Gregory D. Abowd:
Beyond Weiser: From Ubiquitous to Collective Computing. 17-23 - Carl K. Chang:
Situation Analytics: A Foundation for a New Software Engineering Paradigm. 24-33 - Zhihao Jiang, Houssam Abbas, Kuk Jin Jang, Rahul Mangharam:
The Challenges of High-Confidence Medical Device Software. 34-42 - Dejan S. Milojicic, Timothy Roscoe:
Outlook on Operating Systems. 43-51 - Lalit Kumar Singh, Gopika Vinod, Anil Kumar Tripathi:
Early Prediction of Software Reliability: A Case Study with a Nuclear Power Plant System. 52-58 - Hitesh Rajput, Tanmoy Som, Soumitra Kar:
Using Radon Transform to Recognize Skewed Images of Vehicular License Plates. 59-65 - Kjell Jørgen Hole:
Building Trust in E-Government Services. 66-74 - Hal Berghel:
Digital Politics 2016. 75-79 - Dragutin Petkovic:
Using Learning Analytics to Assess Capstone Project Teams. 80-83 - Gary McGraw:
Four Software Security Findings. 84-87 - Marilyn Wolf:
Embedded Software in Crisis. 88-90 - Brian David Johnson:
Beyond Science Fiction: The American Dream. 91-93 - Andreas Bulling:
Pervasive Attentive User Interfaces. 94-98 - Michael B. Spring:
The Future of Standardization: Are We Destined to Repeat History? 99-101 - Greg Byrd:
IEEE/IBM Watson Student Showcase. 102-104 - David Alan Grier:
New Cycles of Technology. 120
Volume 49, Number 2, February 2016
- Charles R. Severance:
Bruce Schneier: The Security Mindset. 7-8 - Elisa Bertino:
Securing Mobile Applications. 9 - Schahram Dustdar:
Cloud Computing. 12-13 - Fernando Díaz-del-Río, Javier J. Salmerón-García, José Luis Sevillano:
Extending Amdahl's Law for the Cloud Computing Era. 14-22 - Alireza Khoshkbarforoushha, Meisong Wang, Rajiv Ranjan, Lizhe Wang, Leila Alem, Samee Ullah Khan, Boualem Benatallah:
Dimensions for Evaluating Cloud Resource Orchestration Frameworks. 24-33 - Talal H. Noor, Quan Z. Sheng, Zakaria Maamar, Sherali Zeadally:
Managing Trust in the Cloud: State of the Art and Research Challenges. 34-45 - Quan Zhang, Weisong Shi:
Energy-Efficient Workload Placement in Enterprise Datacenters. 46-52 - Lei Xu, Chunxiao Jiang, Yan Chen, Jian Wang, Yong Ren:
A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining. 54-62 - Hal Berghel:
Secretocracy. 63-67 - Mahmoud Barhamgi, Arosha K. Bandara, Yijun Yu, Khalid Belhajjame, Bashar Nuseibeh:
Protecting Privacy in the Cloud: Current Practices, Future Directions. 68-72 - Nir Kshetri:
Gambling with Source Code. 74-77 - Brian David Johnson, David H. Guston:
Futures We Want to Inhabit. 78-79 - Vint Cerf, Max Senges:
Taking the Internet to the Next Physical Level. 80-86 - David Alan Grier:
The Post-MOOC World. 104
Volume 49, Number 3, March 2016
- Leila De Floriani:
Using 2D Maps for 3D Localization. 5 - Ying-Dar Lin, Jeffrey M. Voas, Antonio Pescapè, Peter Mueller:
Communications and Privacy under Surveillance. 10-13 - Steven M. Bellovin, Matt Blaze, Susan Landau:
Insecure Surveillance: Technical Issues with Remote Computer Searches. 14-24 - Steven J. Murdoch:
Insecure by Design: Protocols for Encrypted Phone Calls. 25-33 - Stephen Farrell:
Requirements Analysis Required-Otherwise Targeted Monitoring Enables Pervasive Monitoring. 34-40 - Robert Koch, Mario Golling, Gabi Dreo Rodosek:
How Anonymous Is the Tor Network? A Long-Term Black-Box Investigation. 42-49 - Hassan Metwalley, Stefano Traverso, Marco Mellia:
Using Passive Measurements to Demystify Online Trackers. 50-55 - Imran Yusof, Al-Sakib Khan Pathan:
Mitigating Cross-Site Scripting Attacks with a Content Security Policy. 56-63 - Amit P. Sheth, Pramod Anantharam, Cory A. Henson:
Semantic, Cognitive, and Perceptual Computing: Paradigms That Shape Human Experience. 64-72 - Hal Berghel:
Net Neutrality vs. Net Neutering. 73-77 - Shams Zawoad, Ragib Hasan:
Trustworthy Digital Forensics in the Cloud. 78-81 - Robert N. Charette:
The STEM Anxiety Business. 82-87 - Charlene Chuck Walrad:
The IEEE Computer Society and ACM's Collaboration on Computing Education. 88-91 - Karen Bartleson:
Practical Insights from the Peculiar World of Standards. 92-96 - Gaurav Misra, Jose M. Such:
How Socially Aware Are Social Media Privacy Controls? 96-99 - Greg Byrd:
Immortal Bits: Managing Our Digital Legacies. 100-103 - Angelos Stavrou, Daniel Fleck, Constantinos Kolias:
On the Move: Evading Distributed Denial-of-Service Attacks. 104-107 - David Alan Grier:
Go, Stop, Go, Stop. 128
Volume 49, Number 4, April 2016
- Brian M. Gaff:
The Need for Speed. 10-12 - Charles R. Severance:
Bruce Schneier: Building Cryptographic Systems. 13-15 - W. Neville Holmes:
32 & 16 Years Ago. 16-17 - Qiang Yang:
Cross-Domain Data Fusion. 18 - Naren Ramakrishnan, Ravi Kumar:
Big Data. 20-22 - Jignesh M. Patel:
Operational NoSQL Systems: What's New and What's Next? 23-30 - Venkat N. Gudivada, Dhana Rao, Vijay V. Raghavan:
Renaissance in Database Management: Navigating the Landscape of Candidate Systems. 31-42 - Giovanni Cherubini, Jens Jelitto, Vinodh Venkatesan:
Cognitive Storage for Big Data. 43-51 - Hsiang-Fu Yu, Cho-Jui Hsieh, Hyokun Yun, S. V. N. Vishwanathan, Inderjit S. Dhillon:
Nomadic Computing for Big Data Analytics. 52-60 - Asmaa Elbadrawy, Agoritsa Polyzou, Zhiyun Ren, Mackenzie Sweeney, George Karypis, Huzefa Rangwala:
Predicting Student Performance Using Personalized Analytics. 61-69 - Behrooz Parhami:
Low Acceptance Rates of Conference Papers Considered Harmful. 70-73 - Hal Berghel:
The Bogus Science Theorem (and the Junk Science Wager). 74-78 - Erik P. DeBenedictis:
The Boolean Logic Tax. 79-82 - Jürgen Steimle:
Skin-The Next User Interface. 83-87 - Yuvraj Agarwal, Anind K. Dey:
Toward Building a Safe, Secure, and Easy-to-Use Internet of Things Infrastructure. 88-91 - Michael Bennett:
Afrofuturism. 92-93 - John C. Knight, Jack W. Davidson, Anh Nguyen-Tuong, Jason Hiser, Michele Co:
Diversity in Cybersecurity. 94-98 - David Alan Grier:
The Global Profession. 120
Volume 49, Number 5, May 2016
- H. Chad Lane, David A. Forsyth:
Virtual Learning and Object Reconstruction. 14-15 - Alfred C. Weaver, Greg Byrd, Renée C. Bryce:
Computing Tools and Techniques for Emergency Response. 16-18 - Robin R. Murphy:
Emergency Informatics: Using Computing to Improve Disaster Management. 19-27 - Marco Avvenuti, Stefano Cresci, Fabio Del Vigna, Maurizio Tesconi:
Impromptu Crisis Mapping to Prioritize Emergency Response. 28-37 - Alper Bozkurt, Edgar J. Lobaton, Mihail L. Sichitiu:
A Biobotic Distributed Sensor Network for Under-Rubble Search and Rescue. 38-46 - Liliya I. Besaleva, Alfred C. Weaver:
Applications of Social Networks and Crowdsourcing for Disaster Management Improvement. 47-53 - Henri E. Bal, Dick H. J. Epema, Cees de Laat, Rob van Nieuwpoort, John W. Romein, Frank J. Seinstra, Cees Snoek, Harry A. G. Wijshoff:
A Medium-Scale Distributed System for Computer Science Research: Infrastructure for the Long Term. 54-63 - Sebastian Gayer, Andrea Herrmann, Thorsten Keuler, Matthias Riebisch, Pablo Oliveira Antonino:
Lightweight Traceability for the Agile Architect. 64-71 - Hal Berghel:
Attenuated FAQs. 73-77 - Weisong Shi, Schahram Dustdar:
The Promise of Edge Computing. 78-81 - John Leslie King, Jonathan Grudin:
Will Computers Put Us Out of Work? 82-85 - Phillip A. Laplante, Jeffrey M. Voas, Nancy L. Laplante:
Standards for the Internet of Things: A Case Study in Disaster Response. 87-90 - Omar Niamut, Mu Mu, Spyros G. Denazis, Nicholas J. P. Race:
Social Telemedia: The Relationship between Social Information and Networked Media. 92-97 - Greg Byrd:
Home Sweet Mind-Controlled Home. 98-101 - Jeffrey M. Voas, Kim Schaffer:
Insights on Formal Methods in Cybersecurity. 102-105 - David Alan Grier:
Technological Improvisation. 128
Volume 49, Number 6, June 2016
- Mohamed Ibrahim, Krishnendu Chakrabarty:
Digital-Microfluidic Biochips. 8-9 - Elisa Bertino:
Security Threats: Protecting the New Cyberfrontier. 11-14 - Daniel Vecchiato, Marco Vieira, Eliane Martins:
The Perils of Android Security Configuration. 15-21 - David Kotz, Carl A. Gunter, Santosh Kumar, Jonathan P. Weiner:
Privacy and Security in Mobile Health: A Research Agenda. 22-30 - Ronald Prescott Loui, Terrence D. Loui:
How to Survive a Cyber Pearl Harbor. 31-37 - V. S. Subrahmanian, Amos Azaria, Skylar Durst, Vadim Kagan, Aram Galstyan, Kristina Lerman, Linhong Zhu, Emilio Ferrara, Alessandro Flammini, Filippo Menczer:
The DARPA Twitter Bot Challenge. 38-46 - Tsong Yueh Chen, Fei-Ching Kuo, Wenjuan Ma, Willy Susilo, Dave Towey, Jeffrey M. Voas, Zhi Quan Zhou:
Metamorphic Testing for Cybersecurity. 48-55 - Qingpeng Zhang, Daniel Dajun Zeng, Fei-Yue Wang, Ronald L. Breiger, James A. Hendler:
Brokers or Bridges? Exploring Structural Holes in a Crowdsourcing System. 56-64 - Qiuming Luo, Feng Xiao, Zhong Ming, Hao Li, Jianyong Chen, Jianhua Zhang:
Optimizing the Memory Management of a Virtual Machine Monitor on a NUMA System. 66-74 - Sorel Reisman, Eli Shmueli:
Opening the Instructional Doors to Computer Science and IT-Finally. 77-79 - Jeffrey M. Voas:
Demystifying the Internet of Things. 80-83 - Erik P. DeBenedictis:
Rebooting Computers as Learning Machines. 84-87 - Daniel Ullrich, Andreas Butz:
Social Robots for the 21st Century. 88-92 - Brian David Johnson:
Science Fiction and the Coming Age of Sentient Tools. 95-97 - Kateryna Netkachova, Robin E. Bloomfield:
Security-Informed Safety. 98-102 - David Alan Grier:
Scientific Conversations. 120
Volume 49, Number 7, July 2016
- Björn W. Schuller, Jian Pei:
Using Computer Intelligence for Depression Diagnosis and Crowdsourcing. 8-9 - Antti Oulasvirta, Gregory D. Abowd:
User Interface Design in the 21st Century. 11-13 - Yuta Sugiura, Takeo Igarashi, Masahiko Inami:
Cuddly User Interfaces. 14-19 - Daisuke Sakamoto, Yuta Sugiura, Masahiko Inami, Takeo Igarashi:
Graphical Instruction for Home Robots. 20-25 - John M. Carroll, Jiawei Chen, Tina Chien-Wen Yuan, Benjamin V. Hanrahan:
In Search of Coproduction: Smart Services as Reciprocal Activities. 26-32 - Jun Kato, Takeo Igarashi, Masataka Goto:
Programming with Examples to Develop Data-Intensive User Interfaces. 34-42 - Brad A. Myers, Amy J. Ko, Thomas D. LaToza, YoungSeok Yoon:
Programmers Are Users Too: Human-Centered Methods for Improving Programming Tools. 44-52 - Samuel Kounev, Nikolaus Huber, Fabian Brosig, Xiaoyun Zhu:
A Model-Based Approach to Designing Self-Aware IT Systems and Infrastructures. 53-61 - Xia Yang, Peng Shi, Haiyong Sun, Wenxuan Zheng, Jim Alves-Foss:
A Fast Boot, Fast Shutdown Technique for Android OS Devices. 62-68 - Peter Bajcsy, Antoine Vandecreme, Julien Amelot, Joe Chalfoun, Michael Majurski, Mary Brady:
Enabling Stem Cell Characterization from Large Microscopy Images. 70-79 - David Alan Grier:
Free Tuition for Community College: A Role for the Tech Community? 80-82 - Hal Berghel:
The Dictator's (False) Dilemma. 84-87 - Norman S. Matloff:
The H-1B Visa Controversy. 88-93 - Greg Byrd:
Let the Sun Shine. 94-97 - George F. Hurlburt:
"Good Enough" Security: The Best We'll Ever Have. 98-101 - David Alan Grier:
Aware of the Situation. 120
Volume 49, Number 8, August 2016
- David A. Bader:
Evolving MPI+X Toward Exascale. 10 - Domenic Forte, Ron Perez, Yongdae Kim, Swarup Bhunia:
Supply-Chain Security for Cyberinfrastructure [Guest editors' introduction]. 12-16 - Parrish Ralston, David Fry, Scott Suko, Bryce Winters, Matthew King, Robert Kober:
Defeating counterfeiters with microscopic dielets embedded in electronic components. 18-26 - Joseph P. Skudlarek, Tom Katsioulas, Michael Chen:
A Platform Solution for Secure Supply-Chain and Chip Life-Cycle Management. 28-34 - Sk Subidh Ali, Mohamed Ibrahim, Jeyavijayan Rajendran, Ozgur Sinanoglu, Krishnendu Chakrabarty:
Supply-Chain Security of Digital Microfluidic Biochips. 36-43 - Wei Hu, Baolei Mao, Jason Oberg, Ryan Kastner:
Detecting Hardware Trojans with Gate-Level Information-Flow Tracking. 44-52 - Kan Xiao, Adib Nahiyan, Mark M. Tehranipoor:
Security Rule Checking in IC Design. 54-61 - Olav Lysne, Kjell Jørgen Hole, Christian Otterstad, Øyvind Ytrehus, Raymond Aarseth, Jorgen Tellnes:
Vendor Malware: Detection Limits and Mitigation. 62-69 - Kim Schaffer, Jeffrey M. Voas:
What Happened to Formal Methods for Security? 70-79 - Doug Terry:
Toward a New Approach to IoT Fault Tolerance. 80-83 - Claude Y. Laporte, Rory V. O'Connor:
Systems and Software Engineering Standards for Very Small Entities: Accomplishments and Overview. 84-87 - Erik P. DeBenedictis:
The Search for Computing's Secretariat. 88-91 - Celia Paulsen:
Cybersecuring Small Businesses. 92-97 - Hal Berghel:
The Pollyanna Delusion. 98-102 - Xiangshi Ren:
Rethinking the Relationship between Humans and Computers. 104-108 - Evan Atherton:
Science Fiction Prototyping at Work. 109-111 - Amir Vahid Dastjerdi, Rajkumar Buyya:
Fog Computing: Helping the Internet of Things Realize Its Potential. 112-116 - David Alan Grier:
Changing Trust. 156
Volume 49, Number 9, September 2016
- Paolo Montuschi, Jean-Michel Muller:
Modern Computer Arithmetic. 12 - San Murugesan, Bob Colwell:
Next-Generation Computing Paradigms. 14-20 - Krysta M. Svore, Matthias Troyer:
The Quantum Future of Computation. 21-30 - Rodney Van Meter, Simon J. Devitt:
The Path to Scalable Distributed Quantum Computing. 31-42 - Victoria Coleman:
Embodied Molecular Computation: Potential and Challenges. 43-51 - Xin-She Yang, Suash Deb, Simon Fong, Xingshi He, Yuxin Zhao:
From Swarm Intelligence to Metaheuristics: Nature-Inspired Optimization Algorithms. 52-59 - Sameer Saproo, Josef Faller, Victor Shih, Paul Sajda, Nicholas R. Waytowich, Addison W. Bohannon, Vernon J. Lawhern, Brent J. Lance, David C. Jangraw:
Cortically Coupled Computing: A New Paradigm for Synergistic Human-Machine Interaction. 60-68 - Lui Sha, Marco Caccamo, Renato Mancuso, Jung-Eun Kim, Man-Ki Yoon, Rodolfo Pellizzoni, Heechul Yun, Russell Kegley, Dennis R. Perlman, Greg Arundale, Richard M. Bradford:
Real-Time Computing on Multicore Processors. 69-77 - Massimo Maresca:
The Spreadsheet Space: Eliminating the Boundaries of Data Cross-Referencing. 78-85 - Xing Zhang, Zhenglei Yi, Zhi Yan, Geyong Min, Wenbo Wang, Ahmed Elmokashfi, Sabita Maharjan, Yan Zhang:
Social Computing for Mobile Big Data. 86-90 - Scott Campbell:
Teaching Cloud Computing. 91-93 - Greg Byrd:
Seeing Is Understanding. 94-97 - Apostol Vassilev, Robert Staples:
Entropy as a Service: Unlocking Cryptography's Full Potential. 98-102 - Hal Berghel:
Coda in the Key of F2654hD4. 104-109 - Sanjay Kumar Madria:
Security and Risk Assessment in the Cloud. 110-113 - Robert N. Charette:
Dragging Government Legacy Systems Out of the Shadows. 114-119 - David Alan Grier:
The Means of Production. 144
Volume 49, Number 10, October 2016
- Simha Sethumadhavan:
Hardware-Enforced Privacy. 10 - Charles R. Severance:
The Living Computer Museum. 12-13 - Vladimir Getov, Adolfy Hoisie, Pradip Bose:
New Frontiers in Energy-Efficient Computing [Guest editors' introduction]. 14-18 - Xingfu Wu, Valerie E. Taylor, Jeanine E. Cook, Philip J. Mucci:
Using Performance-Power Modeling to Improve Energy Efficiency of HPC Applications. 20-29 - Bilge Acun, Akhil Langer, Esteban Meneses, Harshitha Menon, Osman Sarood, Ehsan Totoni, Laxmikant V. Kalé:
Power, Reliability, and Performance: One System to Rule them All. 30-37 - Ryan E. Grant, Michael J. Levenhagen, Stephen L. Olivier, David Debonis, Kevin T. Pedretti, James H. Laros III:
Standardizing Power Monitoring and Control at Exascale. 38-46 - Efraim Rotem, Uri C. Weiser, Avi Mendelson, Ran Ginosar, Eliezer Weissmann, Yoni Aizik:
H-EARtH: Heterogeneous Multicore Platform Energy Management. 47-55 - Cory E. Merkel, Raqibul Hasan, Nicholas Soures, Dhireesha Kudithipudi, Tarek M. Taha, Sapan Agarwal, Matthew J. Marinella:
Neuromemristive Systems: Boosting Efficiency through Brain-Inspired Computing. 56-64 - Gowtham Atluri, Angus W. MacDonald III, Kelvin O. Lim, Vipin Kumar:
The Brain-Network Paradigm: Using Functional Imaging Data to Study How the Brain Works. 65-71 - David S. Linthicum:
Responsive Data Architecture for the Internet of Things. 72-75 - Erik P. DeBenedictis, R. Stanley Williams:
Help Wanted: A Modern-Day Turing. 76-79 - Dimitris E. Simos, Rick Kuhn, Artemios G. Voyiatzis, Raghu Kacker:
Combinatorial Methods in Security Testing. 80-83 - Hal Berghel:
Douglas Jones on Today's Voting Machines. 84-89 - Giulio Jacucci:
Beyond Search Queries. 90-93 - Ryan Lee:
Threatcasting. 94-95 - Fridolin Wild:
The Future of Learning at the Workplace Is Augmented Reality. 96-98 - David Alan Grier:
Innovating for Tomorrow. 112
Volume 49, Number 11, November 2016
- Matthew B. Dwyer:
Finding Flaws in Natural Language Requirements. 10 - Upkar Varshney, Carl K. Chang:
Smart Health and Well-Being. 11-13 - S. Jay Olshansky, Bruce A. Carnes, Yang Claire Yang, Norvell Miller, Janet Anderson, Hiram Beltran-Sanchez, Karl Ricanek:
The Future of Smart Health. 14-21 - Noel Carroll:
Key Success Factors for Smart and Connected Health Software Solutions. 22-28 - Gina Sprint, Diane J. Cook, Roschelle Fritz, Maureen Schmitter-Edgecombe:
Using Smart Homes to Detect and Analyze Health Events. 29-37 - Shurouq Hijazi, Alex Page, Burak Kantarci, Tolga Soyata:
Machine Learning in Cardiac Health Monitoring and Decision Support. 38-48 - Xiang Su, Jarkko Hyysalo, Mika Rautiainen, Jukka Riekki, Jaakko J. Sauvola, Altti Ilari Maarala, Harri Hirvonsalo, Pingjiang Li, Harri Honko:
Privacy as a Service: Protecting the Individual in Healthcare Data Processing. 49-59 - Humberto Cervantes, Rick Kazman, Jungwoo Ryoo, Duyoung Choi, Duksung Jang:
Architectural Approaches to Security: Four Case Studies. 60-67 - Po-Ching Lin, Ying-Dar Lin, Cheng-Ying Wu, Yuan-Cheng Lai, Yi-Chih Kao:
Balanced Service Chaining in Software-Defined Networks with Network Function Virtualization. 68-76 - Amir Banifatemi, Jean-Luc Gaudiot:
Engineering the New Boundaries of AI. 77-79 - Vasant Dhar:
Equity, Safety, and Privacy in the Autonomous Vehicle Era. 80-83 - Alexander Kott, Ananthram Swami, Bruce J. West:
The Fog of War in Cyberspace. 84-87 - Greg Byrd:
Tactile Digital Braille Display. 88-90 - Hal Berghel:
Chasing Elbridge's Ghost: The Digital Gerrymander. 91-95 - Dimitrios G. Kogias, Michael G. Xevgenis, Charalampos Z. Patrikakis:
Cloud Federation and the Evolution of Cloud Computing. 96-99 - David Alan Grier:
"I'm Not a Computer Scientist, but ...". 104
Volume 49, Number 12, December 2016
- Roger U. Fujii:
Our Journey to the Future. 6-9 - Ali Jadbabaie:
Defining Data Clusters. 15 - Roy Want, Trevor Pering, Yuvraj Agarwal:
Multidevice Interaction. 16-20 - Jarno Leppanen, Mikko Pelkonen, Haipeng Guo, Samuli Hemminki, Petteri Nurmi, Sasu Tarkoma:
Collaborative and Energy-Efficient Speech Monitoring on Smart Devices. 22-30 - Carlo Pinciroli, Giovanni Beltrame:
Swarm-Oriented Programming of Distributed Robot Networks. 32-41 - Timothy Neate, Matt Jones, Michael Evans:
Interdevice Media: Choreographing Content to Maximize Viewer Engagement. 42-49 - Tomás Bures, Frantisek Plásil, Michal Kit, Petr Tuma, Nicklas Hoch:
Software Abstractions for Component Interaction in the Internet of Things. 50-59 - Charith Perera, Chang Liu, Rajiv Ranjan, Lizhe Wang, Albert Y. Zomaya:
Privacy-Knowledge Modeling for the Internet of Things: A Look Back. 60-68 - Alexander Kott, Ananthram Swami, Bruce J. West:
The Internet of Battle Things. 70-75 - Erik P. DeBenedictis:
Computational Complexity and New Computing Approaches. 76-79 - Vincent C. Hu, Rick Kuhn:
Access Control Policy Verification. 80-83 - Brian David Johnson:
So Long, and Thanks for All the Robots. 84-85 - Kenneth M. Zemrowski:
NIST Bases Flagship Security Engineering Publication on ISO/IEC/IEEE 15288: 2015. 86-88 - David Alan Grier:
Fifteen Years to Open Source. 96
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.