


default search action
IEEE Computer, Volume 53
Volume 53, Number 1, January 2020
- Karl Ricanek
:
Kinship Verification. 7-8 - Erich J. Neuhold:
50 & 25 Years Ago. 9-12 - Jeffrey M. Voas:
A Value-Added Gem. 13-14 - Jeffrey M. Voas
:
Outlooks on Diverse Technologies. 16-17 - Nir Kshetri
:
Blockchain-Based Financial Technologies and Cryptocurrencies for Low-Income People: Technical Potential Versus Practical Reality. 18-29 - Celia Paulsen
:
The Future of IT Operational Technology Supply Chains. 30-36 - Rick Kuhn
, Raghu N. Kacker, Yu Lei, Dimitris E. Simos:
Input Space Coverage Matters. 37-44 - Loren E. Peitso, James Bret Michael
:
The Promise of Interactive Shared Augmented Reality. 45-52 - Munindar P. Singh
, Amit K. Chopra
:
Computational Governance and Violable Contracts for Blockchain Applications. 53-62 - Simo Johannes Hosio
, Niels van Berkel
, Jonas Oppenlaender
, Jorge Gonçalves
:
Crowdsourcing Personalized Weight Loss Diets. 63-71 - Hal Berghel
:
A Critical Look at the 2019 College Admissions Scandal? 72-77 - David Alan Grier
:
The Manual Memex. 78-80 - Arndt Lüder
:
Flexibility in Production Systems by Exploiting Cyberphysical Systems. 81-85 - Nir Kshetri
, Jeffrey M. Voas
:
Thoughts on General Data Protection Regulation and Online Human Surveillance. 86-90
Volume 53, Number 2, February 2020
- Xin Peng:
Helping Developers Analyze and Debug Industrial Microservice Systems. 4-5 - Erich J. Neuhold:
50 & 25 Years Ago. 9-11 - Jeffrey M. Voas:
Reinventing Wheels. 12-13 - Ergun Akleman
:
Computing Through Time: Flying. 13 - Dejan S. Milojicic
:
Accelerators for Artificial Intelligence and High-Performance Computing. 14-22 - Sumi Helal
:
Digital Health: E-Coaching and Remote Monitoring. 23-25 - Wenbing Zhao, Xiongyi Liu, Tie Qiu, Xiong Luo:
Virtual Avatar-Based Life Coaching for Children With Autism Spectrum Disorder. 26-34 - Taqdir Ali
, Muhammad Afzal
, Hyeong Won Yu, Ubaid Ur Rehman, Ho-Seong Han, June Young Choi, Arif Jamshed, Jamil Hussain
, Muhammad Bilal Amin
, Musarrat Hussain, Usman Akhtar
, Wajahat Ali Khan
, Sungyoung Lee
, Byeong Ho Kang
, Maqbool Hussain:
The Intelligent Medical Platform: A Novel Dialogue-Based Platform for Health-Care Services. 35-45 - Ankush Manocha
, Ramandeep Singh
, Prabal Verma:
An Internet of Things Fog-Assisted Sleep-Deprivation Prediction Framework for Spinal Cord Injury Patients. 46-56 - Shuchi Dhir
, Sumithra Devi K. A:
The Use of Biometric Fingerprints for On-the-Fly Digital Signing of Documents. 57-67 - Riccardo Mariani
:
IEEE Computer Society Standards Activities Board: Adapting to a Changing World. 68-70 - Mary Theofanos
:
Is Usable Security an Oxymoron? 71-74 - Oliver Barker
:
Realizing the Promise of the Internet of Things in Smart Buildings. 76-79 - Mark Campbell
:
Automated Coding: The Quest to Develop Programs That Write Programs. 80-82 - Tomas Gustavsson
:
Managing the Open Source Dependency. 83-87 - David Alan Grier
:
Reflecting on CAP. 88-90 - Erik P. DeBenedictis
:
Beyond Quantum Supremacy. 91-94
Volume 53, Number 3, March 2020
- Erich J. Neuhold:
50 & 25 Years Ago. 7-10 - Dongliang Xue
, Linpeng Huang
, Chao Li, Chentao Wu:
Dapper: An Adaptive Manager for Large-Capacity Persistent Memory. 11-13 - Marilyn Wolf
:
Distributed Data Analysis and Reliable Operation of Cyberphysical Systems. 14-15 - Munehiro Fukuda
, Collin Gordon, Utku Mert, Matthew Sell:
An Agent-Based Computational Framework for Distributed Data Analysis. 16-25 - Hui Lin
, Homa Alemzadeh, Zbigniew Kalbarczyk, Ravishankar K. Iyer
:
Challenges and Opportunities in the Detection of Safety-Critical Cyberphysical Attacks. 26-37 - Yahya Javed
, Muhamad Felemban
, Tawfeeq A. Shawly
, Jason Kobes, Arif Ghafoor
:
A Partition-Driven Integrated Security Architecture for Cyberphysical Systems. 47-56 - Xenofon D. Koutsoukos:
Systems Science of Secure and Resilient Cyberphysical Systems. 57-61 - Nir Kshetri
, Jeffrey M. Voas:
5G, Security, and You. 62-66 - Hal Berghel
:
The Sokol Hoax: A 25-Year Retrospective. 67-72 - David Alan Grier
:
Top Influence. 74-76 - Hal Berghel
:
New Perspectives on (Anti)Social Media. 77-82 - Marilyn Wolf:
In Memoriam: Dan Dobberpuhl. 83
Volume 53, Number 4, April 2020
- Daniel J. Sorin
:
Computer Architecture for Orbital Edge Computing. 7-8 - Erich J. Neuhold:
50 & 25 Years Ago. 9-12 - Ergun Akleman
:
Computing Through Time: Artificial Life. 10 - Jeffrey M. Voas:
Thoughts on Complexity, Trust, and Truth. 13-14 - Rick Kuhn, M. S. Raunak:
Narrow Spectrum Software Testing Addressing Complexity and Trust. 15-18 - Jeffrey M. Voas:
In This Issue. 17 - Steve Hodges
, Sue Sentance
, Joe Finney
, Thomas Ball:
Physical Computing: A Key Element of Modern Computer Science Education. 20-30 - Mohiuddin Ahmed
, Al-Sakib Khan Pathan
:
Blockchain: Can It Be Trusted? 31-35 - Fabrizio Lamberti
, Alberto Cannavò
, Paolo Montuschi
:
Is Immersive Virtual Reality the Ultimate Interface for 3D Animators? 36-45 - Sha Wei
, Yuanye Ma, Ruiqi Li, Lin Hu:
Toward Smart Manufacturing: Key Technologies and Trends Driving Standardization. 46-50 - Doron Drusinsky, James Bret Michael
:
Obtaining Trust in Executable Derivatives Using Crowdsourced Critiques With Blind Signatures. 51-56 - Thomas Kubitza, Patrick Bader, Matthias Mogerle, Albrecht Schmidt
:
Developing IoT Systems: It's All About the Software. 58-62 - Mark Campbell
:
DNA Data Storage: Automated DNA Synthesis and Sequencing Are Key to Unlocking Virtually Unlimited Data Storage. 63-67 - Dirk Riehle
:
Single-Vendor Open Source Firms. 68-72 - David Alan Grier
:
The Outward Spiral. 73-76 - Erik P. DeBenedictis
:
The Quantum Moonshot. 77-80
Volume 53, Number 5, May 2020
- Erich J. Neuhold:
50 & 25 Years Ago. 7-9 - Charalambos Konstantinou, Saraju P. Mohanty
:
Cybersecurity for the Smart Grid. 10-12 - Astha Chawla
, Prakhar Agrawal, Animesh Singh, Bijaya Ketan Panigrahi, Kolin Paul, Bhavesh R. Bhalja
:
Denial-of-Service Resilient Frameworks for Synchrophasor-Based Wide Area Monitoring Systems. 14-24 - David Smith
, Peng Wang, Ming Ding
, Jonathan Chan, Brian Spak, Xinlong Guan, Paul Tyler, Thierry Rakotoarivelo, Zihuai Lin
, Tariq Abbasi:
Privacy-Preserved Optimal Energy Trading, Statistics, and Forecasting for a Neighborhood Area Network. 25-34 - Bibek Shrestha, Hui Lin
:
Data-Centric Edge Computing to Defend Power Grids Against IoT-Based Attacks. 35-43 - Mohammed Masum Siraj Khan, Alejandro Palomino
, Jonathon Brugman, Jairo Giraldo, Sneha Kumar Kasera, Masood Parvania
:
The Cyberphysical Power System Resilience Testbed: Architecture and Applications. 44-54 - Carlos A. Barreto
, Himanshu Neema, Xenofon D. Koutsoukos
:
Attacking Electricity Markets Through IoT Devices. 55-62 - Jiahao Xie
, A. P. Sakis Meliopoulos:
Sensitive Detection of GPS Spoofing Attack in Phasor Measurement Units via Quasi-Dynamic State Estimation. 63-72 - Sumi Helal
:
The Monkey, the Ant, and the Elephant: Addressing Safety in Smart Spaces. 73-76 - Bruce Schneier
:
Attacking Machine Learning Systems. 78-80 - James Bret Michael
, George W. Dinolt, Doron Drusinsky:
Open Questions in Formal Methods. 81-84 - Hal Berghel
:
The Equifax Hack Revisited and Repurposed. 85-90 - David Alan Grier
:
Mechanical Trust. 91-92
Volume 53, Number 6, June 2020
- Xiaotie Deng, Tao Xiao, Keyu Zhu:
Learn to Play Maximum Revenue Auction. 7-8 - Erich J. Neuhold:
50 & 25 Years Ago. 9-12 - Ergun Akleman
:
Computing Through Time. 11 - Jeffrey M. Voas
, Phil Laplante:
Cyberpandemics. 13-15 - Jeffrey M. Voas
:
In This Issue. 14 - James Bret Michael, D. Richard Kuhn
, Jeffrey M. Voas:
Cyberthreats in 2025. 16-27 - Behrooz Parhami
:
Reliability Inversion: A Cautionary Tale. 28-33 - Mehmet Demir
, Ozgur Turetken
, Atefeh Mashatan:
An Enterprise Transformation Guide for the Inevitable Blockchain Disruption. 34-43 - Claudio Bettini
, Salil S. Kanhere
, Marc Langheinrich
, Archan Misra
, Delphine Reinhardt
:
Is Privacy Regulation Slowing Down Research on Pervasive Computing? 44-52 - Robby Robson
:
IEEE SA Open: Engaging Industry, Academia, and Researchers in Open Source Development. 53-56 - Gary McGraw
, Richie Bonett, Victor Shepardson, Harold Figueroa:
The Top 10 Risks of Machine Learning Security. 57-61 - Sean W. Smith
:
Securing the Internet of Things: An Ongoing Challenge. 62-66 - Marcello Caleffi
, Daryus Chandra
, Daniele Cuomo
, Shima Hassanpour, Angela Sara Cacciapuoti:
The Rise of the Quantum Internet. 67-72 - Mark Campbell
:
Inference Acceleration: Adding Brawn to the Brains. 73-76 - Nikolay Harutyunyan
:
Managing Your Open Source Supply Chain-Why and How? 77-81 - David Alan Grier
:
An Ambassador for Neural Networks. 82-84
Volume 53, Number 7, July 2020
- Elisabeth André
:
Is Artificial Intelligence Able to Help With Pain Assessment? 7-8 - Erich J. Neuhold:
50 & 25 Years Ago. 9-11 - Ergun Akleman
:
Computing Through Time: Social Distancing. 11 - Jeffrey M. Voas:
The "Patching" Mentality. 12-13 - Karthik Nandakumar, Nalini K. Ratha
, Sharath Pankanti
, Alex Pentland, Maurice Herlihy:
Blockchain: From Technology to Marketplaces. 14-18 - Sean Cao, Lin William Cong
, Meng Han
, Qixuan Hou, Baozhong Yang
:
Blockchain Architecture for Auditing Automation and Trust Building in Public Markets. 20-28 - Neetesh Saxena
, Ieuan Thomas, Prosanta Gope
, Pete Burnap
, Neeraj Kumar
:
PharmaCrypt: Blockchain for Critical Pharmaceutical Industry to Counterfeit Drugs. 29-44 - Nabajeet Barman
, Deepak G. C., Maria G. Martini
:
Blockchain for Video Streaming: Opportunities, Challenges, and Open Issues. 45-56 - Sujit Biswas
, Kashif Sharif
, Fan Li
, Saraju P. Mohanty
:
Blockchain for E-Health-Care Systems: Easier Said Than Done. 57-67 - David Alan Grier
:
A Prize, a Prediction, and a Drama. 68-70 - Shuvra S. Bhattacharyya, Marilyn Claire Wolf:
Research Challenges for Heterogeneous Cyberphysical System Design. 71-75 - Phil Laplante
:
Contactless U: Higher Education in the Postcoronavirus World. 76-79 - Hal Berghel, Robert N. Charette, Edward G. Happ, John Leslie King
:
It's On: COVID-19, Risk Ecology, and Preparedness Tips. 80-87 - Eric Osterweil
, Angelos Stavrou
, Lixia Zhang:
21 Years of Distributed Denial-of Service: Current State of Affairs. 88-92 - Hal Berghel
:
A Collapsing Academy, Part 1. 93-98
Volume 53, Number 8, August 2020
- Erich J. Neuhold:
50 & 25 Years Ago. 7-9 - Ergun Akleman
:
Computing Through Time. 9 - Nir Kshetri
:
COVID-19 Meets Big Tech. 10-13 - Liming Chen
, Huansheng Ning
, Chris D. Nugent
, Zhiwen Yu
:
Hybrid Human-Artificial Intelligence. 14-17 - Zeynep Akata, Dan Balliet, Maarten de Rijke
, Frank Dignum, Virginia Dignum
, Guszti Eiben, Antske Fokkens
, Davide Grossi
, Koen V. Hindriks
, Holger H. Hoos, Hayley Hung, Catholijn M. Jonker, Christof Monz, Mark A. Neerincx, Frans A. Oliehoek
, Henry Prakken, Stefan Schlobach
, Linda C. van der Gaag, Frank van Harmelen
, Herke van Hoof, Birna van Riemsdijk
, Aimee van Wynsberghe, Rineke Verbrugge, Bart Verheij
, Piek Vossen
, Max Welling:
A Research Agenda for Hybrid Intelligence: Augmenting Human Intellect With Collaborative, Adaptive, Responsible, and Explainable Artificial Intelligence. 18-28 - John E. Wenskovitch
, Chris North:
Interactive Artificial Intelligence: Designing for the "Two Black Boxes" Problem. 29-39 - Hanwen Feng, Jing Zhou
, Weiguo Lin, Yujuan Zhang, Zhiguo Qu
:
Multiple-Input, Multilayer-Perception-Based Classification of Traces From Side-Channel Attacks. 40-48 - Niccolo Pescetelli
, Manuel Cebrián
, Iyad Rahwan:
BeeMe: Real-Time Internet Control of Situated Human Agents. 49-58 - Bin Hu
, Kehua Guo
, Jian Zhang
, Sheng Ren
, Jianhua Ma:
Exploring a Humanoid Video-Understanding Algorithm Guided by Behavior. 59-67 - David Alan Grier
:
Pervasive Ideals. 68-70 - Sorel Reisman:
Viva la Revolucion? 71-73 - Alexandru Paler
:
Aggregated Control of Quantum Computations: When Stacked Architectures Are Too Good to Be Practical Soon. 74-78 - Claude Y. Laporte
, Jezreel Mejia Miranda:
Delivering Software- and Systems-Engineering Standards for Small Teams. 79-83 - Wilhelm Hasselbring
, Leslie Carr
, Simon Hettrick
, Heather S. Packer, Thanassis Tiropanis:
Open Source Research Software. 84-88 - Mark Campbell
:
Putting the Passe Into Passwords: How Passwordless Technologies Are Reshaping Digital Identity. 89-93 - Eric Osterweil
, Angelos Stavrou
, Lixia Zhang:
21 Years of Distributed Denial-of-Service: A Call to Action. 94-99 - David Kleidermacher
:
Building an Internet of Secure Things. 100-104
Volume 53, Number 9, September 2020
- Leila De Floriani:
2020: A Journey of Discovery, Challenges, and Opportunity. 4-7 - Doug A. Bowman
:
Embracing Physical Keyboards for Virtual Reality. 9-10 - Erich J. Neuhold:
50 & 25 Years Ago. 14-17 - Ergun Akleman
:
Deep Learning. 17 - Jeffrey M. Voas:
Citations and Letters. 18-19 - James Bret Michael
, D. Richard Kuhn, Jeffrey M. Voas:
Security or Privacy: Can You Have Both? 20-30 - An Braeken, Madhusanka Liyanage
, Salil S. Kanhere
, Sudhir Dixit:
Blockchain and Cyberphysical Systems. 31-35 - Ouns Bouachir
, Moayad Aloqaily
, Lewis Tseng, Azzedine Boukerche
:
Blockchain and Fog Computing for Cyberphysical Systems: The Case of Smart Industry. 36-45 - Charles Tim Batista Garrocho
, Mateus Coelho Silva
, Celio Marcio Soares Ferreira, Carlos Frederico Marcelo da Cunha Cavalcanti, Ricardo Augusto Rabelo Oliveira
:
Real-Time Systems Implications in the Blockchain-Based Vertical Integration of Industry 4.0. 46-55 - Faizan Safdar Ali, Moayad Aloqaily
, Omar Alfandi
, Öznur Özkasap
:
Cyberphysical Blockchain-Enabled Peer-to-Peer Energy Trading. 56-65 - Scott Eisele
, Carlos A. Barreto
, Abhishek Dubey
, Xenofon D. Koutsoukos
, Taha Eghtesad, Aron Laszka
, Anastasia Mavridou:
Blockchains for Transactive Energy Systems: Opportunities, Challenges, and Approaches. 66-76 - David Alan Grier
:
If Not Here, Then Where? 78-79 - Nektarios Georgios Tsoutsos
, Nikhil Gupta, Ramesh Karri
:
Cybersecurity Road Map for Digital Manufacturing. 80-84 - Nir Kshetri
, Joanna F. DeFranco
:
The Economics of Cyberattacks on Brazil. 85-90 - Igor Linkov
, Stephanie Elisabeth Galaitsi, Benjamin D. Trump, Jeffrey M. Keisler
, Alexander Kott:
Cybertrust: From Explainable to Actionable and Interpretable Artificial Intelligence. 91-96 - Phil Laplante
:
A Brief History of Software Professionalism and the Way Forward. 97-100
Volume 53, Number 10, October 2020
- Erich J. Neuhold:
50 & 25 Years Ago. 7-10 - Ergun Akleman
:
Computing Through Time. 9 - Jeffrey M. Voas, Phil Laplante
:
Rethinking Home, Office, School. 11-12 - Anastasia Anagnostou, Simon J. E. Taylor
:
Can Open Science Change the World? 13-22 - Carlos E. Jimenez-Gomez
, Jesús Cano Carrillo, Francisco Falcone
:
Artificial Intelligence in Government. 23-27 - Averill Campion, Mila Gascó-Hernández
, Slava Jankin Mikhaylov
, Marc Esteve
:
Managing Artificial Intelligence Deployment in the Public Sector. 28-37 - Gianluigi Viscusi
, Anca Rusu, Marie-Valentine Florin
:
Public Strategies for Artificial Intelligence: Which Value Drivers? 38-46 - Jennifer Cobbe
, Michelle Seng Ah Lee
, Heleen Janssen, Jatinder Singh
:
Centering the Law in the Digital State. 47-58 - Sara B. Jordan, Samantha L. Fenn, Benjamin B. Shannon:
Transparency as Threat at the Intersection of Artificial Intelligence and Cyberbiosecurity. Computer 53(10): 59-68 (2020) - Angelo M. e Silva
, Yara R. Rodrigues, Renato Porfirio Ishii
:
RIGOR: A New Proposal for Predicting Infant Mortality in Government Health Systems Using Artificial Intelligence in Brazil. 69-76 - Gaspar González-Briceño
, Abraham Sánchez, Susana Ortega-Cisneros
, Mario Salvador Garcia Contreras, German Alonso Pinedo Diaz
, Eduardo Ulises Moya-Sánchez
:
Artificial Intelligence-Based Referral System for Patients With Diabetic Retinopathy. 77-87 - David Alan Grier
:
A Prize and a Prediction. 88-90 - Julie M. Haney
, Wayne G. Lutters:
Security Awareness Training for the Workforce: Moving Beyond "Check-the-Box" Compliance. 91-95 - Erik DeBenedictis
:
Quantum Access. 96-100 - Alfredo Herrera
:
The Promises and Challenges of Open Source Hardware. 101-104 - Philippe Ombredanne
:
Free and Open Source Software License Compliance: Tools for Software Composition Analysis. 105-109 - Mark Campbell
:
Beyond Zero Trust: Trust Is a Vulnerability. 110-113 - Jean-Luc Gaudiot
, Hironori Kasahara
:
Computer Education in the Age of COVID-19. 114-118 - Norita B. Ahmad, Preeti Chauhan:
State of Data Privacy During COVID-19. 119-122
Volume 53, Number 11, November 2020
- Manish Parashar
:
Parallel and Distributed Systems. 7-8 - Erich J. Neuhold:
50 & 25 Years Ago. 9-12 - James Bret Michael
, Jeffrey M. Voas:
Algorithms, Algorithms, Algorithms. 13-15 - Jeffrey M. Voas
:
In This Issue. 14 - Dejan S. Milojicic
:
The Edge-to-Cloud Continuum. 16-25 - Bai Li
, Shaoshan Liu
, Jie Tang
, Jean-Luc Gaudiot
, Liangliang Zhang
, Qi Kong:
Autonomous Last-Mile Delivery Vehicles in Complex Traffic Environments. 26-35 - Tom van Nuenen
, Xavier Ferrer Aran
, Jose M. Such
, Mark Coté
:
Transparency for Whom? Assessing Discriminatory Artificial Intelligence. 36-44 - Phil Laplante
, Dejan S. Milojicic
, Sergey Serebryakov
, Daniel Bennett:
Artificial Intelligence and Critical Systems: From Hype to Reality. 45-52 - Marinus Ossewaarde
, Erdener Gulenc:
National Varieties of Artificial Intelligence Discourses: Myth, Utopianism, and Solutionism in West European Policy Expectations. 53-61 - David Alan Grier
:
Fellow Travelers. 62-64 - Dimitrios Serpanos
, Gianluigi Ferrari, George Nikolakopoulos, Jon Pérez
, Markus Tauber
, Stefan Van Baelen:
Embedded Artificial Intelligence: The ARTEMIS Vision. 65-69 - Shane Coughlan:
Standardizing Open Source License Compliance With OpenChain. 70-74 - John Viega
:
20 Years of Software Security. 75-78 - Robert C. Seacord
:
Effective C. 79-82
Volume 53, Number 12, December 2020
- Jaideep Vaidya
:
Securely Connecting Wearables to Displays. 4-5 - Ergun Akleman
:
Computing Through Time. 10 - Jeffrey M. Voas
, Hsiao-Ying Lin
:
Is Artificial Intelligence/Machine Learning the Anticipated Silver Bullet? 18-19 - Atif Mashkoor
, Paolo Arcaini
, Angelo Gargantini
:
Intelligent Autonomous Systems. 20-23 - Sohag Kabir
, Yiannis Papadopoulos
:
Computational Intelligence for Safety Assurance of Cooperative Systems of Systems. 24-34 - Erfan Asaadi, Ewen Denney, Jonathan Menzies, Ganesh J. Pai
, Dimo Petroff:
Dynamic Assurance Cases: A Pathway to Trusted Autonomy. 35-46 - Lina Garcés
, Silverio Martínez-Fernández
, Valdemar Vicente Graciano Neto
, Elisa Yumi Nakagawa
:
Architectural Solutions for Self-Adaptive Systems. 47-59 - Samuel H. Christie V.
, Daria Smirnova, Amit K. Chopra
, Munindar P. Singh
:
Protocols Over Things: A Decentralized Programming Model for the Internet of Things. 60-68 - Hao Shi
, Wei Dong
, Rui Li, Wanwei Liu
:
Controller Resynthesis for Multirobot System When Changes Happen. 69-79 - Sayani Sarkar
, Michael W. Totaro, Ashok Kumar, Khalid Elgazzar:
Real-Time Object Processing and Routing for Intelligent Drones: A Novel Approach. 80-89 - David Alan Grier
:
Stirring the Pot. 90-91 - Qingtian Zou
, Xiaoyan Sun
, Peng Liu, Anoop Singhal:
An Approach for Detection of Advanced Persistent Threat Attacks. 92-96 - Jakob Jul Jensen
:
Applying a "Smart Ecosystem" Mindset to Rethink Your Products. 98-101 - Phil Laplante
:
Software Engineering Lineage: How Do You Know What You Know? 102-105 - Nir Kshetri
, Joanna F. DeFranco:
The Economics Behind Food Supply Blockchains. 106-110 - Scott Mansfield:
Network Management in IEEE 802 Standards. 111-114 - Simon Phipps
, Stefano Zacchiroli:
Continuous Open Source License Compliance. 115-119 - Mark Campbell
:
Beyond Conversational Artificial Intelligence. 121-125 - Jay Liebowitz:
Life as a Professor Amid COVID-19. 126-128 - Preeti Chauhan
:
Plagiarism Detection: A Data Search Challenge. 129-132

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.