


default search action
IEEE Transactions on Emerging Topics in Computing, Volume 5
Volume 5, Number 1, January - March 2017
- Fabrizio Lombardi:

Message from the Editor-in-Chief. 3-4 - Phillip A. Laplante, Claudio Demartini, Fabrizio Lamberti

, Colin J. Neill:
Guest Editorial: Special Issue on Emerging Trends in Education - Part II. 5-6 - Guillaume Jourjon, Johann Márquez-Barja

, Thierry Rakotoarivelo, Alexander Mikroyannidis
, Kostas Lampropoulos
, Spyros G. Denazis, Christos Tranoris
, Daan Pareit, John Domingue
, Luiz A. DaSilva, Max Ott
:
FORGE Toolkit: Leveraging Distributed Systems in eLearning Platforms. 7-19 - Leana Copeland, Tamás D. Gedeon:

Tutorials in eLearning - How Presentation Affects Outcomes. 20-31 - Chih-Yueh Chou, Shu-Fen Tseng, Wen-Chieh Chih, Zhi-Hong Chen, Po-Yao Chao, K. Robert Lai, Chien-Lung Chan, Liang-Chih Yu, Yi-Lung Lin:

Open Student Models of Core Competencies at the Curriculum Level: Using Learning Analytics for Student Reflection. 32-44 - Jui-Long Hung, Morgan C. Wang, Shuyan Wang, Maha M. Abdelrasoul, Yaohang Li, Wu He:

Identifying At-Risk Students for Early Interventions - A Time-Series Clustering Approach. 45-55 - Sergio Gutiérrez Santos, Manolis Mavrikis, Eirini Geraniou

, Alexandra Poulovassilis:
Similarity-Based Grouping to Support Teachers on Collaborative Activities in an Exploratory Mathematical Microworld. 56-68 - Yusuke Sunaga, Hironori Washizaki, Katsuhiko Kakehi, Yoshiaki Fukazawa, Shoso Yamato, Masashi Okubo:

Relation Between Combinations of Personal Characteristic Types and Educational Effectiveness for a Controlled Project-Based Learning Course. 69-76 - Michael James Callaghan

, Maggi Savin-Baden
, Niall McShane
, Augusto Gomez Eguiluz
:
Mapping Learning and Game Mechanics for Serious Games Analysis in Engineering Education. 77-83 - Javier Melero

, Davinia Hernández Leo
:
Design and Implementation of Location-Based Learning Games: Four Case Studies with "QuesTInSitu: The Game". 84-94 - Ramakrishna Nittala

, Andrea Acquaviva, Enrico Macii:
A Software Toolchain for Variability Awareness on Heterogenous Multicore Platforms. 95-107 - Lin Gu, Deze Zeng, Song Guo

, Ahmed Barnawi, Yong Xiang:
Cost Efficient Resource Management in Fog Computing Supported Medical Cyber-Physical System. 108-119 - Alireza Khoshkbarforoushha

, Rajiv Ranjan
, Raj Gaire, Ehsan Abbasnejad, Lizhe Wang, Albert Y. Zomaya
:
Distribution Based Workload Modelling of Continuous Queries in Clouds. 120-133 - Jun Huang

, Xiang Li, Cong-Cong Xing, Wei Wang, Kun Hua
, Song Guo
:
DTD: A Novel Double-Track Approach to Clone Detection for RFID-Enabled Supply Chains. 134-140
Volume 5, Number 2, April - June 2017
- Weiqiang Liu, Earl E. Swartzlander Jr., Máire O'Neill:

Guest Editorial: Introduction to the Special Issue on Emerging Technologies and Designs for Application-Specific Computing. 148-150 - Naoya Onizawa, Akira Mochizuki, Akira Tamakoshi, Takahiro Hanyu:

Sudden Power-Outage Resilient In-Processor Checkpointing for Energy-Harvesting Nonvolatile Processors. 151-163 - Duckhwan Kim, Jaeha Kung

, Saibal Mukhopadhyay:
A Power-Aware Digital Multilayer Perceptron Accelerator with On-Chip Training Based on Approximate Computing. 164-178 - George Razvan Voicu, Sorin Dan Cotofana

:
High-Performance, Cost-Effective 3D Stacked Wide-Operand Adders. 179-192 - David Bruce Cousins, Kurt Rohloff

, Daniel Sumorok:
Designing an FPGA-Accelerated Homomorphic Encryption Co-Processor. 193-206 - Ronald F. DeMara

, Marco Platzner
, Marco Ottavi
:
Guest Editorial: IEEE Transactions on Computers and IEEE Transactions on Emerging Topics in Computing Joint Special Section on Innovation in Reconfigurable Computing Fabrics from Devices to Architectures. 207-209 - Xifan Tang, Giovanni De Micheli, Pierre-Emmanuel Gaillardon:

A High-Performance FPGA Architecture Using One-Level RRAM-Based Multiplexers. 210-222 - Zhezhi He, Deliang Fan

:
Energy Efficient Reconfigurable Threshold Logic Circuit with Spintronic Devices. 223-237 - Jordi Carrabina

, Mohammad Mashayekhi, Jofre Pallares Cuxart
, Lluís Terés
:
Inkjet-Configurable Gate Arrays (IGA). 238-246 - Vinícius Dal Bem

, Felipe S. Marranghello, André Inácio Reis, Renato P. Ribas:
SAT-Based Formulation for Logical Capacity Evaluation of VIA-Configurable Structured ASIC. 247-259 - Rajat Subhra Chakraborty

, Samuel Pagliarini
, Jimson Mathew, Sree Ranjani Rajendran
, M. Nirmala Devi
:
A Flexible Online Checking Technique to Enhance Hardware Trojan Horse Detectability by Reliability Analysis. 260-270 - Yang Shi, Hongfei Fan, Qin Liu:

An Obfuscatable Designated Verifier Signature Scheme. 271-285 - Jiajun Shi, Mingyu Li, Mostafizur Rahman, Santosh Khasanvis, Csaba Andras Moritz:

NP-Dynamic Skybridge: A Fine-Grained 3D IC Technology with NP-Dynamic Logic. 286-299
Volume 5, Number 3, July - September 2017
- Swarup Bhunia

, An Chen, Ozgur Sinanoglu
, Jason M. Fung:
Guest Editors Introduction: Security of Beyond CMOS Devices: Issues and Opportunities. 302-303 - Karsten Beckmann

, Harika Manem, Nathaniel C. Cady
:
Performance Enhancement of a Time-Delay PUF Design by Utilizing Integrated Nanoscale ReRAM Devices. 304-316 - Bodhisatwa Mazumdar

, Samah Mohamed Saeed, Sk Subidh Ali
, Ozgur Sinanoglu
:
Timing Attack and Countermeasure on NEMS Relay Based Design of Block Ciphers. 317-328 - Davide Bellizia

, Simone Bongiovanni, Pietro Monsurrò
, Giuseppe Scotti
, Alessandro Trifiletti:
Univariate Power Analysis Attacks Exploiting Static Dissipation of Nanometer CMOS VLSI Circuits for Cryptographic Applications. 329-339 - Yu Bi, Kaveh Shamsi, Jiann-Shiun Yuan, Yier Jin

, Michael T. Niemier, Xiaobo Sharon Hu
:
Tunnel FET Current Mode Logic for DPA-Resilient Circuit Designs. 340-352 - Ying Feng, Radu Stoleru

, Chien-An Chen, Geoffrey G. Xie:
A Routing-Protocol-Independent Caching Framework for Mobile Clouds. 353-366 - Yan Sun, Tin-Yu Wu, Xinming Li, Mohsen Guizani:

A Rule Verification System for Smart Buildings. 367-379 - Li Qiang, Jie Li

, Corinne Touati:
A User Centered Multi-Objective Handoff Scheme for Hybrid 5G Environments. 380-390 - Xing Zhang, Yongjing Li, Yan Zhang, Jiaxin Zhang, Hailing Li, Shuo Wang

, Danyang Wang:
Information Caching Strategy for Cyber Social Computing Based Wireless Networks. 391-402 - Zheng Xu, Neil Y. Yen, Hui Zhang, Xiao Wei

, Zhihan Lv
, Kim-Kwang Raymond Choo, Lin Mei, Xiangfeng Luo:
Social Sensors Based Online Attention Computing of Public Safety Events. 403-411 - Jianwei Niu

, Shihao Wang, Yiming Su, Song Guo:
Temporal Factor-Aware Video Affective Analysis and Recommendation for Cyber-Based Social Media. 412-424 - Chung-Ming Huang, Chih-Hsiang Shao, Shouzhi Xu, Huan Zhou:

The Social Internet of Thing (S-IOT)-Based Mobile Group Handoff Architecture and Schemes for Proximity Service. 425-437 - Peng Li, Toshiaki Miyazaki, Kun Wang, Song Guo

, Weihua Zhuang
:
Vehicle-Assist Resilient Information and Network System for Disaster Management. 438-448
Volume 5, Number 4, October - December 2017
- Pengfei Chen, Yong Qi, Di Hou:

InvarNet-X: A Black-Box Invariant-Based Approach to Diagnosing Big Data Systems. 450-465 - Mainak Ghosh, Wenting Wang, Gopalakrishna Holla, Indranil Gupta:

Morphus: Supporting Online Reconfigurations in Sharded NoSQL Systems. 466-479 - Josep Lluis Berral

, Nicolás Poggi, David Carrera
, Aaron Call
, Rob Reinauer, Daron Green:
ALOJA: A Framework for Benchmarking and Predictive Analytics in Hadoop Deployments. 480-493 - Sabita Maharjan, Yan Zhang, Stein Gjessing, Danny H. K. Tsang:

User-Centric Demand Response Management in the Smart Grid With Multiple Providers. 494-505 - Song Tan, Wen-Zhan Song

, Dan Huang, Qifen Dong, Lang Tong:
Distributed Software Emulator for Cyber-Physical Analysis in Smart Grid. 506-517 - Jinhong Guo, Zhi Chen, Yong-Ling Ban, Yuejun Kang:

Precise Enumeration of Circulating Tumor Cells Using Support Vector Machine Algorithm on a Microfluidic Sensor. 518-525 - Takuya Maekawa, Naomi Yamashita, Yasushi Sakurai:

How Well Can a User's Location Privacy Preferences be Determined Without Using GPS Location Data? 526-539 - Chin-Yu Huang, Tzu-Yu Kuo:

Queueing-Theory-Based Models for Software Reliability Analysis and Management. 540-550 - David Watson, Gordon Morison, Ali Ahmadinia, Tom Buggy:

A Novel Hardware Accelerator for Embedded Object Detection Applications. 551-562 - AbdelRahman Abdou

, Ashraf Matrawy, Paul C. van Oorschot
:
Location Verification of Wireless Internet Clients: Evaluation and Improvements. 563-575 - Nandeesha Veeranna

, Benjamin Carrión Schäfer
:
Hardware Trojan Detection in Behavioral Intellectual Properties (IP's) Using Property Checking Techniques. 576-585 - Arsalan Mosenia

, Niraj K. Jha:
A Comprehensive Study of Security of Internet-of-Things. 586-602

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














