


Остановите войну!
for scientists:


default search action
IEEE Computer, Volume 49
Volume 49, Number 1, January 2016
- Roger U. Fujii:
Raising the Bar: Ensuring Quality Products and Services for Our Members. 4 - Sumi Helal
:
2016 Outlook: Humans in the Technology Loop. 7-9 - Paul Nikolich, Kenneth J. Christensen, Lori Cameron:
802 Standards. 10 - Lynette A. Jones:
Designing Effective Refreshable Braille Displays. 14 - Gregory D. Abowd:
Beyond Weiser: From Ubiquitous to Collective Computing. 17-23 - Carl K. Chang:
Situation Analytics: A Foundation for a New Software Engineering Paradigm. 24-33 - Zhihao Jiang
, Houssam Abbas, Kuk Jin Jang, Rahul Mangharam:
The Challenges of High-Confidence Medical Device Software. 34-42 - Dejan S. Milojicic
, Timothy Roscoe:
Outlook on Operating Systems. 43-51 - Lalit Kumar Singh, Gopika Vinod, Anil Kumar Tripathi:
Early Prediction of Software Reliability: A Case Study with a Nuclear Power Plant System. 52-58 - Hitesh Rajput, Tanmoy Som
, Soumitra Kar:
Using Radon Transform to Recognize Skewed Images of Vehicular License Plates. 59-65 - Kjell Jørgen Hole:
Building Trust in E-Government Services. 66-74 - Hal Berghel:
Digital Politics 2016. 75-79 - Dragutin Petkovic:
Using Learning Analytics to Assess Capstone Project Teams. 80-83 - Gary McGraw:
Four Software Security Findings. 84-87 - Marilyn Wolf:
Embedded Software in Crisis. 88-90 - Brian David Johnson:
Beyond Science Fiction: The American Dream. 91-93 - Andreas Bulling
:
Pervasive Attentive User Interfaces. 94-98 - Michael B. Spring:
The Future of Standardization: Are We Destined to Repeat History? 99-101 - Greg Byrd
:
IEEE/IBM Watson Student Showcase. 102-104 - David Alan Grier:
New Cycles of Technology. 120
Volume 49, Number 2, February 2016
- Charles R. Severance:
Bruce Schneier: The Security Mindset. 7-8 - Elisa Bertino:
Securing Mobile Applications. 9 - Schahram Dustdar
:
Cloud Computing. 12-13 - Fernando Díaz-del-Río
, Javier J. Salmerón-García, José Luis Sevillano
:
Extending Amdahl's Law for the Cloud Computing Era. 14-22 - Alireza Khoshkbarforoushha, Meisong Wang, Rajiv Ranjan
, Lizhe Wang, Leila Alem, Samee Ullah Khan, Boualem Benatallah
:
Dimensions for Evaluating Cloud Resource Orchestration Frameworks. 24-33 - Talal H. Noor, Quan Z. Sheng
, Zakaria Maamar
, Sherali Zeadally:
Managing Trust in the Cloud: State of the Art and Research Challenges. 34-45 - Quan Zhang, Weisong Shi
:
Energy-Efficient Workload Placement in Enterprise Datacenters. 46-52 - Lei Xu, Chunxiao Jiang, Yan Chen, Jian Wang, Yong Ren:
A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining. 54-62 - Hal Berghel:
Secretocracy. 63-67 - Mahmoud Barhamgi
, Arosha K. Bandara
, Yijun Yu
, Khalid Belhajjame, Bashar Nuseibeh
:
Protecting Privacy in the Cloud: Current Practices, Future Directions. 68-72 - Nir Kshetri:
Gambling with Source Code. 74-77 - Brian David Johnson, David H. Guston:
Futures We Want to Inhabit. 78-79 - Vint Cerf, Max Senges:
Taking the Internet to the Next Physical Level. 80-86 - David Alan Grier:
The Post-MOOC World. 104
Volume 49, Number 3, March 2016
- Leila De Floriani:
Using 2D Maps for 3D Localization. 5 - Ying-Dar Lin, Jeffrey M. Voas, Antonio Pescapè, Peter Mueller
:
Communications and Privacy under Surveillance. 10-13 - Steven M. Bellovin, Matt Blaze, Susan Landau:
Insecure Surveillance: Technical Issues with Remote Computer Searches. 14-24 - Steven J. Murdoch
:
Insecure by Design: Protocols for Encrypted Phone Calls. 25-33 - Stephen Farrell:
Requirements Analysis Required-Otherwise Targeted Monitoring Enables Pervasive Monitoring. 34-40 - Robert Koch, Mario Golling, Gabi Dreo Rodosek:
How Anonymous Is the Tor Network? A Long-Term Black-Box Investigation. 42-49 - Hassan Metwalley, Stefano Traverso, Marco Mellia
:
Using Passive Measurements to Demystify Online Trackers. 50-55 - Imran Yusof, Al-Sakib Khan Pathan
:
Mitigating Cross-Site Scripting Attacks with a Content Security Policy. 56-63 - Amit P. Sheth, Pramod Anantharam, Cory A. Henson:
Semantic, Cognitive, and Perceptual Computing: Paradigms That Shape Human Experience. 64-72 - Hal Berghel:
Net Neutrality vs. Net Neutering. 73-77 - Shams Zawoad, Ragib Hasan
:
Trustworthy Digital Forensics in the Cloud. 78-81 - Robert N. Charette:
The STEM Anxiety Business. 82-87 - Charlene Chuck Walrad:
The IEEE Computer Society and ACM's Collaboration on Computing Education. 88-91 - Karen Bartleson:
Practical Insights from the Peculiar World of Standards. 92-96 - Gaurav Misra, Jose M. Such:
How Socially Aware Are Social Media Privacy Controls? 96-99 - Greg Byrd
:
Immortal Bits: Managing Our Digital Legacies. 100-103 - Angelos Stavrou
, Daniel Fleck, Constantinos Kolias:
On the Move: Evading Distributed Denial-of-Service Attacks. 104-107 - David Alan Grier:
Go, Stop, Go, Stop. 128
Volume 49, Number 4, April 2016
- Brian M. Gaff:
The Need for Speed. 10-12 - Charles R. Severance:
Bruce Schneier: Building Cryptographic Systems. 13-15 - W. Neville Holmes:
32 & 16 Years Ago. 16-17 - Qiang Yang:
Cross-Domain Data Fusion. 18 - Naren Ramakrishnan, Ravi Kumar:
Big Data. 20-22 - Jignesh M. Patel:
Operational NoSQL Systems: What's New and What's Next? 23-30 - Venkat N. Gudivada, Dhana Rao, Vijay V. Raghavan:
Renaissance in Database Management: Navigating the Landscape of Candidate Systems. 31-42 - Giovanni Cherubini, Jens Jelitto, Vinodh Venkatesan:
Cognitive Storage for Big Data. 43-51 - Hsiang-Fu Yu, Cho-Jui Hsieh, Hyokun Yun, S. V. N. Vishwanathan, Inderjit S. Dhillon:
Nomadic Computing for Big Data Analytics. 52-60 - Asmaa Elbadrawy, Agoritsa Polyzou, Zhiyun Ren, Mackenzie Sweeney, George Karypis
, Huzefa Rangwala:
Predicting Student Performance Using Personalized Analytics. 61-69 - Behrooz Parhami:
Low Acceptance Rates of Conference Papers Considered Harmful. 70-73 - Hal Berghel:
The Bogus Science Theorem (and the Junk Science Wager). 74-78 - Erik P. DeBenedictis:
The Boolean Logic Tax. 79-82 - Jürgen Steimle:
Skin-The Next User Interface. 83-87 - Yuvraj Agarwal, Anind K. Dey:
Toward Building a Safe, Secure, and Easy-to-Use Internet of Things Infrastructure. 88-91 - Michael Bennett:
Afrofuturism. 92-93 - John C. Knight, Jack W. Davidson, Anh Nguyen-Tuong, Jason Hiser, Michele Co:
Diversity in Cybersecurity. 94-98 - David Alan Grier:
The Global Profession. 120
Volume 49, Number 5, May 2016
- H. Chad Lane, David A. Forsyth:
Virtual Learning and Object Reconstruction. 14-15 - Alfred C. Weaver, Greg Byrd
, Renée C. Bryce:
Computing Tools and Techniques for Emergency Response. 16-18 - Robin R. Murphy:
Emergency Informatics: Using Computing to Improve Disaster Management. 19-27 - Marco Avvenuti, Stefano Cresci
, Fabio Del Vigna
, Maurizio Tesconi
:
Impromptu Crisis Mapping to Prioritize Emergency Response. 28-37 - Alper Bozkurt, Edgar J. Lobaton, Mihail L. Sichitiu
:
A Biobotic Distributed Sensor Network for Under-Rubble Search and Rescue. 38-46 - Liliya I. Besaleva, Alfred C. Weaver:
Applications of Social Networks and Crowdsourcing for Disaster Management Improvement. 47-53 - Henri E. Bal, Dick H. J. Epema, Cees de Laat, Rob van Nieuwpoort
, John W. Romein, Frank J. Seinstra, Cees Snoek, Harry A. G. Wijshoff:
A Medium-Scale Distributed System for Computer Science Research: Infrastructure for the Long Term. 54-63 - Sebastian Gayer, Andrea Herrmann, Thorsten Keuler, Matthias Riebisch, Pablo Oliveira Antonino:
Lightweight Traceability for the Agile Architect. 64-71 - Hal Berghel:
Attenuated FAQs. 73-77 - Weisong Shi
, Schahram Dustdar
:
The Promise of Edge Computing. 78-81 - John Leslie King, Jonathan Grudin:
Will Computers Put Us Out of Work? 82-85 - Phillip A. Laplante, Jeffrey M. Voas, Nancy L. Laplante:
Standards for the Internet of Things: A Case Study in Disaster Response. 87-90 - Omar Niamut
, Mu Mu, Spyros G. Denazis, Nicholas J. P. Race
:
Social Telemedia: The Relationship between Social Information and Networked Media. 92-97 - Greg Byrd
:
Home Sweet Mind-Controlled Home. 98-101 - Jeffrey M. Voas, Kim Schaffer
:
Insights on Formal Methods in Cybersecurity. 102-105 - David Alan Grier:
Technological Improvisation. 128
Volume 49, Number 6, June 2016
- Mohamed Ibrahim, Krishnendu Chakrabarty
:
Digital-Microfluidic Biochips. 8-9 - Elisa Bertino:
Security Threats: Protecting the New Cyberfrontier. 11-14 - Daniel Vecchiato, Marco Vieira
, Eliane Martins:
The Perils of Android Security Configuration. 15-21 - David Kotz
, Carl A. Gunter, Santosh Kumar, Jonathan P. Weiner:
Privacy and Security in Mobile Health: A Research Agenda. 22-30 - Ronald Prescott Loui, Terrence D. Loui:
How to Survive a Cyber Pearl Harbor. 31-37 - V. S. Subrahmanian, Amos Azaria
, Skylar Durst, Vadim Kagan, Aram Galstyan, Kristina Lerman, Linhong Zhu, Emilio Ferrara
, Alessandro Flammini, Filippo Menczer:
The DARPA Twitter Bot Challenge. 38-46 - Tsong Yueh Chen
, Fei-Ching Kuo, Wenjuan Ma, Willy Susilo
, Dave Towey, Jeffrey M. Voas, Zhi Quan Zhou
:
Metamorphic Testing for Cybersecurity. 48-55 - Qingpeng Zhang, Daniel Dajun Zeng, Fei-Yue Wang, Ronald L. Breiger
, James A. Hendler
:
Brokers or Bridges? Exploring Structural Holes in a Crowdsourcing System. 56-64 - Qiuming Luo, Feng Xiao, Zhong Ming, Hao Li, Jianyong Chen, Jianhua Zhang:
Optimizing the Memory Management of a Virtual Machine Monitor on a NUMA System. 66-74 - Sorel Reisman, Eli Shmueli:
Opening the Instructional Doors to Computer Science and IT-Finally. 77-79 - Jeffrey M. Voas:
Demystifying the Internet of Things. 80-83 - Erik P. DeBenedictis:
Rebooting Computers as Learning Machines. 84-87 - Daniel Ullrich, Andreas Butz:
Social Robots for the 21st Century. 88-92 - Brian David Johnson:
Science Fiction and the Coming Age of Sentient Tools. 95-97 - Kateryna Netkachova, Robin E. Bloomfield:
Security-Informed Safety. 98-102 - David Alan Grier:
Scientific Conversations. 120
Volume 49, Number 7, July 2016
- Björn W. Schuller
, Jian Pei:
Using Computer Intelligence for Depression Diagnosis and Crowdsourcing. 8-9 - Antti Oulasvirta
, Gregory D. Abowd:
User Interface Design in the 21st Century. 11-13 - Yuta Sugiura, Takeo Igarashi, Masahiko Inami:
Cuddly User Interfaces. 14-19 - Daisuke Sakamoto
, Yuta Sugiura, Masahiko Inami, Takeo Igarashi:
Graphical Instruction for Home Robots. 20-25 - John M. Carroll, Jiawei Chen, Tina Chien-Wen Yuan, Benjamin V. Hanrahan:
In Search of Coproduction: Smart Services as Reciprocal Activities. 26-32 - Jun Kato
, Takeo Igarashi, Masataka Goto:
Programming with Examples to Develop Data-Intensive User Interfaces. 34-42 - Brad A. Myers, Amy J. Ko, Thomas D. LaToza, YoungSeok Yoon:
Programmers Are Users Too: Human-Centered Methods for Improving Programming Tools. 44-52 - Samuel Kounev, Nikolaus Huber, Fabian Brosig, Xiaoyun Zhu:
A Model-Based Approach to Designing Self-Aware IT Systems and Infrastructures. 53-61 - Xia Yang, Peng Shi, Haiyong Sun, Wenxuan Zheng, Jim Alves-Foss:
A Fast Boot, Fast Shutdown Technique for Android OS Devices. 62-68 - Peter Bajcsy
, Antoine Vandecreme, Julien Amelot, Joe Chalfoun, Michael Majurski, Mary Brady:
Enabling Stem Cell Characterization from Large Microscopy Images. 70-79 - David Alan Grier:
Free Tuition for Community College: A Role for the Tech Community? 80-82 - Hal Berghel:
The Dictator's (False) Dilemma. 84-87 - Norman S. Matloff:
The H-1B Visa Controversy. 88-93 - Greg Byrd
:
Let the Sun Shine. 94-97 - George F. Hurlburt:
"Good Enough" Security: The Best We'll Ever Have. 98-101 - David Alan Grier:
Aware of the Situation. 120
Volume 49, Number 8, August 2016
- David A. Bader
:
Evolving MPI+X Toward Exascale. 10 - Domenic Forte
, Ron Perez, Yongdae Kim, Swarup Bhunia:
Supply-Chain Security for Cyberinfrastructure [Guest editors' introduction]. 12-16 - Parrish Ralston, David Fry, Scott Suko, Bryce Winters, Matthew King, Robert Kober:
Defeating counterfeiters with microscopic dielets embedded in electronic components. 18-26 - Joseph P. Skudlarek, Tom Katsioulas, Michael Chen:
A Platform Solution for Secure Supply-Chain and Chip Life-Cycle Management. 28-34 - Sk Subidh Ali, Mohamed Ibrahim, Jeyavijayan Rajendran, Ozgur Sinanoglu
, Krishnendu Chakrabarty
:
Supply-Chain Security of Digital Microfluidic Biochips. 36-43 - Wei Hu
, Baolei Mao
, Jason Oberg, Ryan Kastner
:
Detecting Hardware Trojans with Gate-Level Information-Flow Tracking. 44-52 - Kan Xiao, Adib Nahiyan, Mark M. Tehranipoor:
Security Rule Checking in IC Design. 54-61 - Olav Lysne, Kjell Jørgen Hole, Christian Otterstad, Øyvind Ytrehus, Raymond Aarseth, Jorgen Tellnes:
Vendor Malware: Detection Limits and Mitigation. 62-69 - Kim Schaffer
, Jeffrey M. Voas:
What Happened to Formal Methods for Security? 70-79 - Doug Terry:
Toward a New Approach to IoT Fault Tolerance. 80-83 - Claude Y. Laporte, Rory V. O'Connor
:
Systems and Software Engineering Standards for Very Small Entities: Accomplishments and Overview. 84-87