default search action
IEEE Transactions on Emerging Topics in Computing, Volume 5
Volume 5, Number 1, January - March 2017
- Fabrizio Lombardi:
Message from the Editor-in-Chief. 3-4 - Phillip A. Laplante, Claudio Demartini, Fabrizio Lamberti, Colin J. Neill:
Guest Editorial: Special Issue on Emerging Trends in Education - Part II. 5-6 - Guillaume Jourjon, Johann Márquez-Barja, Thierry Rakotoarivelo, Alexander Mikroyannidis, Kostas Lampropoulos, Spyros G. Denazis, Christos Tranoris, Daan Pareit, John Domingue, Luiz A. DaSilva, Max Ott:
FORGE Toolkit: Leveraging Distributed Systems in eLearning Platforms. 7-19 - Leana Copeland, Tamás D. Gedeon:
Tutorials in eLearning - How Presentation Affects Outcomes. 20-31 - Chih-Yueh Chou, Shu-Fen Tseng, Wen-Chieh Chih, Zhi-Hong Chen, Po-Yao Chao, K. Robert Lai, Chien-Lung Chan, Liang-Chih Yu, Yi-Lung Lin:
Open Student Models of Core Competencies at the Curriculum Level: Using Learning Analytics for Student Reflection. 32-44 - Jui-Long Hung, Morgan C. Wang, Shuyan Wang, Maha M. Abdelrasoul, Yaohang Li, Wu He:
Identifying At-Risk Students for Early Interventions - A Time-Series Clustering Approach. 45-55 - Sergio Gutiérrez Santos, Manolis Mavrikis, Eirini Geraniou, Alexandra Poulovassilis:
Similarity-Based Grouping to Support Teachers on Collaborative Activities in an Exploratory Mathematical Microworld. 56-68 - Yusuke Sunaga, Hironori Washizaki, Katsuhiko Kakehi, Yoshiaki Fukazawa, Shoso Yamato, Masashi Okubo:
Relation Between Combinations of Personal Characteristic Types and Educational Effectiveness for a Controlled Project-Based Learning Course. 69-76 - Michael James Callaghan, Maggi Savin-Baden, Niall McShane, Augusto Gomez Eguiluz:
Mapping Learning and Game Mechanics for Serious Games Analysis in Engineering Education. 77-83 - Javier Melero, Davinia Hernández Leo:
Design and Implementation of Location-Based Learning Games: Four Case Studies with "QuesTInSitu: The Game". 84-94 - Ramakrishna Nittala, Andrea Acquaviva, Enrico Macii:
A Software Toolchain for Variability Awareness on Heterogenous Multicore Platforms. 95-107 - Lin Gu, Deze Zeng, Song Guo, Ahmed Barnawi, Yong Xiang:
Cost Efficient Resource Management in Fog Computing Supported Medical Cyber-Physical System. 108-119 - Alireza Khoshkbarforoushha, Rajiv Ranjan, Raj Gaire, Ehsan Abbasnejad, Lizhe Wang, Albert Y. Zomaya:
Distribution Based Workload Modelling of Continuous Queries in Clouds. 120-133 - Jun Huang, Xiang Li, Cong-Cong Xing, Wei Wang, Kun Hua, Song Guo:
DTD: A Novel Double-Track Approach to Clone Detection for RFID-Enabled Supply Chains. 134-140
Volume 5, Number 2, April - June 2017
- Weiqiang Liu, Earl E. Swartzlander Jr., Máire O'Neill:
Guest Editorial: Introduction to the Special Issue on Emerging Technologies and Designs for Application-Specific Computing. 148-150 - Naoya Onizawa, Akira Mochizuki, Akira Tamakoshi, Takahiro Hanyu:
Sudden Power-Outage Resilient In-Processor Checkpointing for Energy-Harvesting Nonvolatile Processors. 151-163 - Duckhwan Kim, Jaeha Kung, Saibal Mukhopadhyay:
A Power-Aware Digital Multilayer Perceptron Accelerator with On-Chip Training Based on Approximate Computing. 164-178 - George Razvan Voicu, Sorin Dan Cotofana:
High-Performance, Cost-Effective 3D Stacked Wide-Operand Adders. 179-192 - David Bruce Cousins, Kurt Rohloff, Daniel Sumorok:
Designing an FPGA-Accelerated Homomorphic Encryption Co-Processor. 193-206 - Ronald F. DeMara, Marco Platzner, Marco Ottavi:
Guest Editorial: IEEE Transactions on Computers and IEEE Transactions on Emerging Topics in Computing Joint Special Section on Innovation in Reconfigurable Computing Fabrics from Devices to Architectures. 207-209 - Xifan Tang, Giovanni De Micheli, Pierre-Emmanuel Gaillardon:
A High-Performance FPGA Architecture Using One-Level RRAM-Based Multiplexers. 210-222 - Zhezhi He, Deliang Fan:
Energy Efficient Reconfigurable Threshold Logic Circuit with Spintronic Devices. 223-237 - Jordi Carrabina, Mohammad Mashayekhi, Jofre Pallares Cuxart, Lluís Terés:
Inkjet-Configurable Gate Arrays (IGA). 238-246 - Vinícius Dal Bem, Felipe S. Marranghello, André Inácio Reis, Renato P. Ribas:
SAT-Based Formulation for Logical Capacity Evaluation of VIA-Configurable Structured ASIC. 247-259 - Rajat Subhra Chakraborty, Samuel Pagliarini, Jimson Mathew, Sree Ranjani Rajendran, M. Nirmala Devi:
A Flexible Online Checking Technique to Enhance Hardware Trojan Horse Detectability by Reliability Analysis. 260-270 - Yang Shi, Hongfei Fan, Qin Liu:
An Obfuscatable Designated Verifier Signature Scheme. 271-285 - Jiajun Shi, Mingyu Li, Mostafizur Rahman, Santosh Khasanvis, Csaba Andras Moritz:
NP-Dynamic Skybridge: A Fine-Grained 3D IC Technology with NP-Dynamic Logic. 286-299
Volume 5, Number 3, July - September 2017
- Swarup Bhunia, An Chen, Ozgur Sinanoglu, Jason M. Fung:
Guest Editors Introduction: Security of Beyond CMOS Devices: Issues and Opportunities. 302-303 - Karsten Beckmann, Harika Manem, Nathaniel C. Cady:
Performance Enhancement of a Time-Delay PUF Design by Utilizing Integrated Nanoscale ReRAM Devices. 304-316 - Bodhisatwa Mazumdar, Samah Mohamed Saeed, Sk Subidh Ali, Ozgur Sinanoglu:
Timing Attack and Countermeasure on NEMS Relay Based Design of Block Ciphers. 317-328 - Davide Bellizia, Simone Bongiovanni, Pietro Monsurrò, Giuseppe Scotti, Alessandro Trifiletti:
Univariate Power Analysis Attacks Exploiting Static Dissipation of Nanometer CMOS VLSI Circuits for Cryptographic Applications. 329-339 - Yu Bi, Kaveh Shamsi, Jiann-Shiun Yuan, Yier Jin, Michael T. Niemier, Xiaobo Sharon Hu:
Tunnel FET Current Mode Logic for DPA-Resilient Circuit Designs. 340-352 - Ying Feng, Radu Stoleru, Chien-An Chen, Geoffrey G. Xie:
A Routing-Protocol-Independent Caching Framework for Mobile Clouds. 353-366 - Yan Sun, Tin-Yu Wu, Xinming Li, Mohsen Guizani:
A Rule Verification System for Smart Buildings. 367-379 - Li Qiang, Jie Li, Corinne Touati:
A User Centered Multi-Objective Handoff Scheme for Hybrid 5G Environments. 380-390 - Xing Zhang, Yongjing Li, Yan Zhang, Jiaxin Zhang, Hailing Li, Shuo Wang, Danyang Wang:
Information Caching Strategy for Cyber Social Computing Based Wireless Networks. 391-402 - Zheng Xu, Neil Y. Yen, Hui Zhang, Xiao Wei, Zhihan Lv, Kim-Kwang Raymond Choo, Lin Mei, Xiangfeng Luo:
Social Sensors Based Online Attention Computing of Public Safety Events. 403-411 - Jianwei Niu, Shihao Wang, Yiming Su, Song Guo:
Temporal Factor-Aware Video Affective Analysis and Recommendation for Cyber-Based Social Media. 412-424 - Chung-Ming Huang, Chih-Hsiang Shao, Shouzhi Xu, Huan Zhou:
The Social Internet of Thing (S-IOT)-Based Mobile Group Handoff Architecture and Schemes for Proximity Service. 425-437 - Peng Li, Toshiaki Miyazaki, Kun Wang, Song Guo, Weihua Zhuang:
Vehicle-Assist Resilient Information and Network System for Disaster Management. 438-448
Volume 5, Number 4, October - December 2017
- Pengfei Chen, Yong Qi, Di Hou:
InvarNet-X: A Black-Box Invariant-Based Approach to Diagnosing Big Data Systems. 450-465 - Mainak Ghosh, Wenting Wang, Gopalakrishna Holla, Indranil Gupta:
Morphus: Supporting Online Reconfigurations in Sharded NoSQL Systems. 466-479 - Josep Lluis Berral, Nicolás Poggi, David Carrera, Aaron Call, Rob Reinauer, Daron Green:
ALOJA: A Framework for Benchmarking and Predictive Analytics in Hadoop Deployments. 480-493 - Sabita Maharjan, Yan Zhang, Stein Gjessing, Danny H. K. Tsang:
User-Centric Demand Response Management in the Smart Grid With Multiple Providers. 494-505 - Song Tan, Wen-Zhan Song, Dan Huang, Qifen Dong, Lang Tong:
Distributed Software Emulator for Cyber-Physical Analysis in Smart Grid. 506-517 - Jinhong Guo, Zhi Chen, Yong-Ling Ban, Yuejun Kang:
Precise Enumeration of Circulating Tumor Cells Using Support Vector Machine Algorithm on a Microfluidic Sensor. 518-525 - Takuya Maekawa, Naomi Yamashita, Yasushi Sakurai:
How Well Can a User's Location Privacy Preferences be Determined Without Using GPS Location Data? 526-539 - Chin-Yu Huang, Tzu-Yu Kuo:
Queueing-Theory-Based Models for Software Reliability Analysis and Management. 540-550 - David Watson, Gordon Morison, Ali Ahmadinia, Tom Buggy:
A Novel Hardware Accelerator for Embedded Object Detection Applications. 551-562 - AbdelRahman Abdou, Ashraf Matrawy, Paul C. van Oorschot:
Location Verification of Wireless Internet Clients: Evaluation and Improvements. 563-575 - Nandeesha Veeranna, Benjamin Carrión Schäfer:
Hardware Trojan Detection in Behavioral Intellectual Properties (IP's) Using Property Checking Techniques. 576-585 - Arsalan Mosenia, Niraj K. Jha:
A Comprehensive Study of Security of Internet-of-Things. 586-602
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.