Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/computer/computer48.bht:"
@article{DBLP:journals/computer/Aiello15, author = {Bob Aiello}, title = {Managing the High-Performance Computer Society Standards Working Group}, journal = {Computer}, volume = {48}, number = {3}, pages = {111--113}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.78}, doi = {10.1109/MC.2015.78}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Aiello15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/AlkhatibFFKLLMM15, author = {Hasan Alkhatib and Paolo Faraboschi and Eitan Frachtenberg and Hironori Kasahara and Danny B. Lange and Phillip A. Laplante and Arif Merchant and Dejan S. Milojicic and Karsten Schwan}, title = {What Will 2022 Look Like? The {IEEE} {CS} 2022 Report}, journal = {Computer}, volume = {48}, number = {3}, pages = {68--76}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.92}, doi = {10.1109/MC.2015.92}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/AlkhatibFFKLLMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/AmorettiC15, author = {Michele Amoretti and Stefano Cagnoni}, title = {Toward Collective Self-Awareness and Self-Expression in Distributed Systems}, journal = {Computer}, volume = {48}, number = {7}, pages = {29--36}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.208}, doi = {10.1109/MC.2015.208}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/AmorettiC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ArdisBHOSV15, author = {Mark A. Ardis and David Budgen and Gregory W. Hislop and Jeff Offutt and Mark J. Sebern and Willem Visser}, title = {{SE} 2014: Curriculum Guidelines for Undergraduate Degree Programs in Software Engineering}, journal = {Computer}, volume = {48}, number = {11}, pages = {106--109}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.345}, doi = {10.1109/MC.2015.345}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/ArdisBHOSV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/AydayCHT15, author = {Erman Ayday and Emiliano De Cristofaro and Jean{-}Pierre Hubaux and Gene Tsudik}, title = {Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare?}, journal = {Computer}, volume = {48}, number = {2}, pages = {58--66}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.59}, doi = {10.1109/MC.2015.59}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/AydayCHT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BahgaM15, author = {Arshdeep Bahga and Vijay Krishna Madisetti}, title = {Healthcare Data Integration and Informatics in the Cloud}, journal = {Computer}, volume = {48}, number = {2}, pages = {50--57}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.46}, doi = {10.1109/MC.2015.46}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BahgaM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Bandeira15, author = {Afonso S. Bandeira}, title = {An Efficient Algorithm for Exact Recovery of Vertex Variables from Edge Measurements}, journal = {Computer}, volume = {48}, number = {9}, pages = {8--9}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.272}, doi = {10.1109/MC.2015.272}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Bandeira15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BansalK15, author = {Srividya K. Bansal and Sebastian Kagemann}, title = {Integrating Big Data: {A} Semantic Extract-Transform-Load Framework}, journal = {Computer}, volume = {48}, number = {3}, pages = {42--50}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.76}, doi = {10.1109/MC.2015.76}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BansalK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BealPV15, author = {Jacob Beal and Danilo Pianini and Mirko Viroli}, title = {Aggregate Programming for the Internet of Things}, journal = {Computer}, volume = {48}, number = {9}, pages = {22--30}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.261}, doi = {10.1109/MC.2015.261}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BealPV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BedriSTSBPRGG15, author = {Abdelkareem Bedri and Himanshu Sahni and Pavleen Thukral and Thad Starner and David Byrd and Peter Presti and Gabriel Reyes and Maysam Ghovanloo and Zehua Guo}, title = {Toward Silent-Speech Control of Consumer Wearables}, journal = {Computer}, volume = {48}, number = {10}, pages = {54--62}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.310}, doi = {10.1109/MC.2015.310}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BedriSTSBPRGG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BeekDHHI15, author = {Vincent van Beek and Jesse Donkervliet and Tim Hegeman and Stefan Hugtenburg and Alexandru Iosup}, title = {Self-Expressive Management of Business-Critical Workloads in Virtualized Datacenters}, journal = {Computer}, volume = {48}, number = {7}, pages = {46--54}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.206}, doi = {10.1109/MC.2015.206}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BeekDHHI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BelliCDGMPF15, author = {Laura Belli and Simone Cirani and Luca Davoli and Andrea Gorrieri and Mirko Mancin and Marco Picone and Gianluigi Ferrari}, title = {Design and Deployment of an IoT Application-Oriented Testbed}, journal = {Computer}, volume = {48}, number = {9}, pages = {32--40}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.253}, doi = {10.1109/MC.2015.253}, timestamp = {Fri, 23 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BelliCDGMPF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel15, author = {Hal Berghel}, title = {A Paperless Gamble}, journal = {Computer}, volume = {48}, number = {1}, pages = {76--78}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.3}, doi = {10.1109/MC.2015.3}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel15a, author = {Hal Berghel}, title = {Cyber Chutzpah: The Sony Hack and the Celebration of Hyperbole}, journal = {Computer}, volume = {48}, number = {2}, pages = {77--80}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.41}, doi = {10.1109/MC.2015.41}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel15b, author = {Hal Berghel}, title = {Noirware}, journal = {Computer}, volume = {48}, number = {3}, pages = {102--107}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.81}, doi = {10.1109/MC.2015.81}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel15c, author = {Hal Berghel}, title = {Borderline Executive Disorder}, journal = {Computer}, volume = {48}, number = {4}, pages = {82--86}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.96}, doi = {10.1109/MC.2015.96}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel15c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel15d, author = {Hal Berghel}, title = {What Makes a Good Column}, journal = {Computer}, volume = {48}, number = {5}, pages = {84--87}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.153}, doi = {10.1109/MC.2015.153}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel15d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel15e, author = {Hal Berghel}, title = {A Farewell to Air Gaps, Part 1}, journal = {Computer}, volume = {48}, number = {6}, pages = {64--68}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.179}, doi = {10.1109/MC.2015.179}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel15e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel15f, author = {Hal Berghel}, title = {A Farewell to Air Gaps, Part 2}, journal = {Computer}, volume = {48}, number = {7}, pages = {59--63}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.181}, doi = {10.1109/MC.2015.181}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel15f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel15g, author = {Hal Berghel}, title = {{TSA:} Mission Creep Meets Waste}, journal = {Computer}, volume = {48}, number = {8}, pages = {90--94}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.227}, doi = {10.1109/MC.2015.227}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel15g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel15h, author = {Hal Berghel}, title = {{STEM} Crazy}, journal = {Computer}, volume = {48}, number = {9}, pages = {75--80}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.256}, doi = {10.1109/MC.2015.256}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel15h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel15i, author = {Hal Berghel}, title = {Legislating Technology (Badly)}, journal = {Computer}, volume = {48}, number = {10}, pages = {72--78}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.304}, doi = {10.1109/MC.2015.304}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel15i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel15j, author = {Hal Berghel}, title = {The Dystory of Ahmed's Clock}, journal = {Computer}, volume = {48}, number = {11}, pages = {82--85}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.350}, doi = {10.1109/MC.2015.350}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel15j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel15k, author = {Hal Berghel}, title = {What Price Gonzo Ethics?}, journal = {Computer}, volume = {48}, number = {12}, pages = {88--93}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.355}, doi = {10.1109/MC.2015.355}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel15k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Bertino15, author = {Elisa Bertino}, title = {Denial-of-Service Attacks to {UMTS}}, journal = {Computer}, volume = {48}, number = {2}, pages = {6}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.42}, doi = {10.1109/MC.2015.42}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Bertino15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BlakeYDMJ15, author = {Madison Blake and Rabih Younes and Jacob Dennis and Thomas L. Martin and Mark T. Jones}, title = {A User-Independent and Sensor-Tolerant Wearable Activity Classifier}, journal = {Computer}, volume = {48}, number = {10}, pages = {64--71}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.296}, doi = {10.1109/MC.2015.296}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BlakeYDMJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BresnikerSW15, author = {Kirk Bresniker and Sharad Singhal and R. Stanley Williams}, title = {Adapting to Thrive in a New Economy of Memory Abundance}, journal = {Computer}, volume = {48}, number = {12}, pages = {44--53}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.368}, doi = {10.1109/MC.2015.368}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/BresnikerSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Brown15, author = {Steve Brown}, title = {The Power of Story}, journal = {Computer}, volume = {48}, number = {9}, pages = {82--83}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.271}, doi = {10.1109/MC.2015.271}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Brown15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Broy15, author = {Manfred Broy}, title = {Rethinking Nonfunctional Software Requirements}, journal = {Computer}, volume = {48}, number = {5}, pages = {96--99}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.139}, doi = {10.1109/MC.2015.139}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Broy15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BrugaliCH15, author = {Davide Brugali and Rafael Capilla and Mike Hinchey}, title = {Dynamic Variability Meets Robotics}, journal = {Computer}, volume = {48}, number = {12}, pages = {94--97}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.354}, doi = {10.1109/MC.2015.354}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BrugaliCH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BruneliereCIASW15, author = {Hugo Bruneliere and Jordi Cabot and Javier Luis C{\'{a}}novas Izquierdo and Leire Orue{-}Echevarria Arrieta and Oliver Strau{\ss} and Manuel Wimmer}, title = {Software Modernization Revisited: Challenges and Prospects}, journal = {Computer}, volume = {48}, number = {8}, pages = {76--80}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.234}, doi = {10.1109/MC.2015.234}, timestamp = {Sun, 20 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/BruneliereCIASW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BuonoGQCPTL15, author = {Daniele Buono and John A. Gunnels and Xinyu Que and Fabio Checconi and Fabrizio Petrini and Tai{-}Ching Tuan and Chris Long}, title = {Optimizing Sparse Linear Algebra for Large-Scale Graph Analytics}, journal = {Computer}, volume = {48}, number = {8}, pages = {26--34}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.228}, doi = {10.1109/MC.2015.228}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BuonoGQCPTL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Byrd15, author = {Greg Byrd}, title = {Spotlighting Student Innovation}, journal = {Computer}, volume = {48}, number = {2}, pages = {75--76}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.54}, doi = {10.1109/MC.2015.54}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Byrd15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Byrd15a, author = {Greg Byrd}, title = {A Little Ingenuity Solves an Elephant-Sized Problem}, journal = {Computer}, volume = {48}, number = {4}, pages = {74--77}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.94}, doi = {10.1109/MC.2015.94}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Byrd15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Byrd15b, author = {Greg Byrd}, title = {Tracking Cows Wirelessly}, journal = {Computer}, volume = {48}, number = {6}, pages = {60--63}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.154}, doi = {10.1109/MC.2015.154}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Byrd15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Byrd15c, author = {Greg Byrd}, title = {Cycling through Cyberspace}, journal = {Computer}, volume = {48}, number = {8}, pages = {72--75}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.220}, doi = {10.1109/MC.2015.220}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Byrd15c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Byrd15d, author = {Greg Byrd}, title = {21st Century Pong}, journal = {Computer}, volume = {48}, number = {10}, pages = {80--84}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.306}, doi = {10.1109/MC.2015.306}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Byrd15d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/CastellanaMWTHV15, author = {Vito Giovanni Castellana and Alessandro Morari and Jesse Weaver and Antonino Tumeo and David Haglin and Oreste Villa and John Feo}, title = {In-Memory Graph Databases for Web-Scale Data}, journal = {Computer}, volume = {48}, number = {3}, pages = {24--35}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.74}, doi = {10.1109/MC.2015.74}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/CastellanaMWTHV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/CaviglioneM15, author = {Luca Caviglione and Wojciech Mazurczyk}, title = {Understanding Information Hiding in iOS}, journal = {Computer}, volume = {48}, number = {1}, pages = {62--65}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.31}, doi = {10.1109/MC.2015.31}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/CaviglioneM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Chai15, author = {Sek Chai}, title = {Enabling Smart Camera Networks with Smartphone Processors}, journal = {Computer}, volume = {48}, number = {4}, pages = {56--63}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.105}, doi = {10.1109/MC.2015.105}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Chai15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ChenB15, author = {Tao Chen and Rami Bahsoon}, title = {Toward a Smarter Cloud: Self-Aware Autoscaling of Cloud Configurations and Resources}, journal = {Computer}, volume = {48}, number = {9}, pages = {93--96}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.278}, doi = {10.1109/MC.2015.278}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ChenB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Conte15, author = {Tom Conte}, title = {A Time of Change}, journal = {Computer}, volume = {48}, number = {1}, pages = {4--6}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.4}, doi = {10.1109/MC.2015.4}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Conte15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Conte15a, author = {Thomas M. Conte}, title = {The Computer Society Must Change}, journal = {Computer}, volume = {48}, number = {12}, pages = {9}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.371}, doi = {10.1109/MC.2015.371}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Conte15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ConteTD15, author = {Thomas M. Conte and Elie K. Track and Erik DeBenedictis}, title = {Rebooting Computing: New Strategies for Technology Scaling}, journal = {Computer}, volume = {48}, number = {12}, pages = {10--13}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.363}, doi = {10.1109/MC.2015.363}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ConteTD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Costley15, author = {Jennifer Costley}, title = {Leveraging the Standards Life Cycle for Green {IT}}, journal = {Computer}, volume = {48}, number = {1}, pages = {73--75}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.19}, doi = {10.1109/MC.2015.19}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Costley15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/CragoW15, author = {Stephen P. Crago and John Paul Walters}, title = {Heterogeneous Cloud Computing: The Way Forward}, journal = {Computer}, volume = {48}, number = {1}, pages = {59--61}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.14}, doi = {10.1109/MC.2015.14}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/CragoW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Daniels15, author = {Mitchell E. Daniels}, title = {Measuring Great Jobs and Great Lives: The Gallup-Purdue Index}, journal = {Computer}, volume = {48}, number = {1}, pages = {66--69}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.21}, doi = {10.1109/MC.2015.21}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Daniels15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Davis15, author = {Darold Davis}, title = {Taming the Engineering of Information Services Websites with Standards}, journal = {Computer}, volume = {48}, number = {8}, pages = {84--89}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.239}, doi = {10.1109/MC.2015.239}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Davis15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/DraudtHHMSW15, author = {Alida Draudt and Jonjozuf Hadley and Ryan Hogan and Leticia Murray and Gregory Stock and Julia Rose West}, title = {Six Insights about Science Fiction Prototyping}, journal = {Computer}, volume = {48}, number = {5}, pages = {69--71}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.142}, doi = {10.1109/MC.2015.142}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/DraudtHHMSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Durant15, author = {Eric Durant}, title = {{CE2016:} Guidelines for Forward-Looking Computer Engineering Curricula}, journal = {Computer}, volume = {48}, number = {9}, pages = {102--104}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.269}, doi = {10.1109/MC.2015.269}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Durant15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/EckSOMSB15, author = {Adam Eck and Leen{-}Kiat Soh and Kristen Olson and Allan L. McCutcheon and Jolene Smyth and Robert F. Belli}, title = {Understanding the Human Condition through Survey Informatics}, journal = {Computer}, volume = {48}, number = {11}, pages = {110--114}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.327}, doi = {10.1109/MC.2015.327}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/EckSOMSB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Finn15, author = {Ed Finn}, title = {We Can Build the Future}, journal = {Computer}, volume = {48}, number = {11}, pages = {90--91}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.336}, doi = {10.1109/MC.2015.336}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Finn15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/FonashS15, author = {Peter Fonash and Phyllis A. Schneck}, title = {Cybersecurity: From Months to Milliseconds}, journal = {Computer}, volume = {48}, number = {1}, pages = {42--50}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.11}, doi = {10.1109/MC.2015.11}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/FonashS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Forsyth15, author = {David A. Forsyth}, title = {Representation Learning}, journal = {Computer}, volume = {48}, number = {4}, pages = {6}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.117}, doi = {10.1109/MC.2015.117}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Forsyth15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Gaff15, author = {Brian M. Gaff}, title = {{IP} Issues for Start-ups}, journal = {Computer}, volume = {48}, number = {1}, pages = {16--18}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.17}, doi = {10.1109/MC.2015.17}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Gaff15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Gaff15a, author = {Brian M. Gaff}, title = {BYOD? OMG!}, journal = {Computer}, volume = {48}, number = {2}, pages = {10--11}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.34}, doi = {10.1109/MC.2015.34}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Gaff15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Gaff15b, author = {Brian M. Gaff}, title = {Important {IP} Cases in 2015, Part One}, journal = {Computer}, volume = {48}, number = {4}, pages = {7--9}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.112}, doi = {10.1109/MC.2015.112}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Gaff15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Gaff15c, author = {Brian M. Gaff}, title = {Important {IP} Cases in 2015, Part Two}, journal = {Computer}, volume = {48}, number = {5}, pages = {9--11}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.133}, doi = {10.1109/MC.2015.133}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Gaff15c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Gaff15d, author = {Brian M. Gaff}, title = {"Curiouser and Curiouser!"-The Fallout from Alice}, journal = {Computer}, volume = {48}, number = {7}, pages = {12--14}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.200}, doi = {10.1109/MC.2015.200}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Gaff15d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Gaff15e, author = {Brian M. Gaff}, title = {Legal Issues with Wearable Technology}, journal = {Computer}, volume = {48}, number = {9}, pages = {10--12}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.280}, doi = {10.1109/MC.2015.280}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Gaff15e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Gaff15f, author = {Brian M. Gaff}, title = {Patent Infringement Damages}, journal = {Computer}, volume = {48}, number = {11}, pages = {7--9}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.330}, doi = {10.1109/MC.2015.330}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Gaff15f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Garber15, author = {Lee Garber}, title = {News}, journal = {Computer}, volume = {48}, number = {3}, pages = {13--19}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.80}, doi = {10.1109/MC.2015.80}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Garber15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Gary15, author = {Kevin Gary}, title = {Project-Based Learning}, journal = {Computer}, volume = {48}, number = {9}, pages = {98--100}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.268}, doi = {10.1109/MC.2015.268}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Gary15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Gaudiot15, author = {Jean{-}Luc Gaudiot}, title = {The Times They Are A-Changin'}, journal = {Computer}, volume = {48}, number = {7}, pages = {4--6}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.197}, doi = {10.1109/MC.2015.197}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Gaudiot15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GebaraHN15, author = {Fadi H. Gebara and H. Peter Hofstee and Kevin J. Nowka}, title = {Second-Generation Big Data Systems}, journal = {Computer}, volume = {48}, number = {1}, pages = {36--41}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.25}, doi = {10.1109/MC.2015.25}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GebaraHN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GesslerS15, author = {Damian D. G. Gessler and Evren Sirin}, title = {{SSWAP:} Enabling Transaction-Time Reasoning for Semantic Workflows}, journal = {Computer}, volume = {48}, number = {9}, pages = {60--68}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.262}, doi = {10.1109/MC.2015.262}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GesslerS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Getov15, author = {Vladimir Getov}, title = {Scientific Grand Challenges: Toward Exascale Supercomputing and Beyond}, journal = {Computer}, volume = {48}, number = {11}, pages = {12--14}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.341}, doi = {10.1109/MC.2015.341}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Getov15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GieseSVWHJLRXOR15, author = {Martin Giese and Ahmet Soylu and Guillermo Vega{-}Gorgojo and Arild Waaler and Peter Haase and Ernesto Jim{\'{e}}nez{-}Ruiz and Davide Lanti and Mart{\'{\i}}n Rezk and Guohui Xiao and {\"{O}}zg{\"{u}}r L. {\"{O}}z{\c{c}}ep and Riccardo Rosati}, title = {Optique: Zooming in on Big Data}, journal = {Computer}, volume = {48}, number = {3}, pages = {60--67}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.82}, doi = {10.1109/MC.2015.82}, timestamp = {Thu, 02 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/GieseSVWHJLRXOR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GillmanLMS15, author = {David Gillman and Yin Lin and Bruce M. Maggs and Ramesh K. Sitaraman}, title = {Protecting Websites from Attack with Secure Delivery Networks}, journal = {Computer}, volume = {48}, number = {4}, pages = {26--34}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.116}, doi = {10.1109/MC.2015.116}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/GillmanLMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier15, author = {David Alan Grier}, title = {State Transitions}, journal = {Computer}, volume = {48}, number = {1}, pages = {92}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.27}, doi = {10.1109/MC.2015.27}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier15a, author = {David Alan Grier}, title = {The Tyranny of Geography}, journal = {Computer}, volume = {48}, number = {2}, pages = {100}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.58}, doi = {10.1109/MC.2015.58}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier15b, author = {David Alan Grier}, title = {Building Trust}, journal = {Computer}, volume = {48}, number = {3}, pages = {136}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.63}, doi = {10.1109/MC.2015.63}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier15c, author = {David Alan Grier}, title = {Accidents Will Happen}, journal = {Computer}, volume = {48}, number = {4}, pages = {104}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.95}, doi = {10.1109/MC.2015.95}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier15c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier15d, author = {David Alan Grier}, title = {The GitHub Effect}, journal = {Computer}, volume = {48}, number = {5}, pages = {116}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.146}, doi = {10.1109/MC.2015.146}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier15d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier15e, author = {David Alan Grier}, title = {Disruptive Computing}, journal = {Computer}, volume = {48}, number = {6}, pages = {100}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.162}, doi = {10.1109/MC.2015.162}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier15e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier15f, author = {David Alan Grier}, title = {Do We Need a Software Czar?}, journal = {Computer}, volume = {48}, number = {7}, pages = {104}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.198}, doi = {10.1109/MC.2015.198}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier15f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier15g, author = {David Alan Grier}, title = {In Search of the Diabolical Disconnect}, journal = {Computer}, volume = {48}, number = {8}, pages = {128}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.241}, doi = {10.1109/MC.2015.241}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier15g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier15h, author = {David Alan Grier}, title = {Industrial Leadership}, journal = {Computer}, volume = {48}, number = {9}, pages = {120}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.284}, doi = {10.1109/MC.2015.284}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier15h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier15i, author = {David Alan Grier}, title = {The Voracious Discipline}, journal = {Computer}, volume = {48}, number = {10}, pages = {120}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.288}, doi = {10.1109/MC.2015.288}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier15i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier15j, author = {David Alan Grier}, title = {Hidden Persuaders}, journal = {Computer}, volume = {48}, number = {11}, pages = {136}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.348}, doi = {10.1109/MC.2015.348}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier15j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier15k, author = {David Alan Grier}, title = {Quantum Imagination}, journal = {Computer}, volume = {48}, number = {12}, pages = {128}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.365}, doi = {10.1109/MC.2015.365}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier15k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GudivadaBR15, author = {Venkat N. Gudivada and Ricardo Baeza{-}Yates and Vijay V. Raghavan}, title = {Big Data: Promises and Problems}, journal = {Computer}, volume = {48}, number = {3}, pages = {20--23}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.62}, doi = {10.1109/MC.2015.62}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/GudivadaBR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GudivadaRP15, author = {Venkat N. Gudivada and Dhana Rao and Jordan Paris}, title = {Understanding Search-Engine Optimization}, journal = {Computer}, volume = {48}, number = {10}, pages = {43--52}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.297}, doi = {10.1109/MC.2015.297}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GudivadaRP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Gundy-Burlet15, author = {Karen Gundy{-}Burlet}, title = {The Use of Standards on the {LADEE} Mission}, journal = {Computer}, volume = {48}, number = {5}, pages = {92--95}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.148}, doi = {10.1109/MC.2015.148}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Gundy-Burlet15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GuoWSSBG15, author = {Anhong Guo and Xiaolong Wu and Zhengyang Shen and Thad Starner and Hannes Baumann and Scott M. Gilliland}, title = {Order Picking with Head-Up Displays}, journal = {Computer}, volume = {48}, number = {6}, pages = {16--24}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.166}, doi = {10.1109/MC.2015.166}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GuoWSSBG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HagarWKK15, author = {Jon D. Hagar and Thomas L. Wissink and D. Richard Kuhn and Raghu Kacker}, title = {Introducing Combinatorial Testing in a Large Organization}, journal = {Computer}, volume = {48}, number = {4}, pages = {64--72}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.114}, doi = {10.1109/MC.2015.114}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HagarWKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HahnleJ15, author = {Reiner H{\"{a}}hnle and Einar Broch Johnsen}, title = {Designing Resource-Aware Cloud Applications}, journal = {Computer}, volume = {48}, number = {6}, pages = {72--75}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.172}, doi = {10.1109/MC.2015.172}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HahnleJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HalappanavarPAM15, author = {Mahantesh Halappanavar and Alex Pothen and Ariful Azad and Fredrik Manne and Johannes Langguth and Arif M. Khan}, title = {Codesign Lessons Learned from Implementing Graph Matching on Multithreaded Architectures}, journal = {Computer}, volume = {48}, number = {8}, pages = {46--55}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.215}, doi = {10.1109/MC.2015.215}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HalappanavarPAM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HambruschL15, author = {Susanne E. Hambrusch and Ran Libeskind{-}Hadas}, title = {The PhD Pipeline}, journal = {Computer}, volume = {48}, number = {5}, pages = {76--79}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.147}, doi = {10.1109/MC.2015.147}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HambruschL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HammerY15, author = {Jon C. Hammer and Tingxin Yan}, title = {Inferring Mobile User Status with Usage Cues}, journal = {Computer}, volume = {48}, number = {6}, pages = {34--40}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.169}, doi = {10.1109/MC.2015.169}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HammerY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HeckmanSST15, author = {Kristin E. Heckman and Frank J. Stech and Ben S. Schmoker and Roshan K. Thomas}, title = {Denial and Deception in Cyber Defense}, journal = {Computer}, volume = {48}, number = {4}, pages = {36--44}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.104}, doi = {10.1109/MC.2015.104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HeckmanSST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Helal15, author = {Sumi Helal}, title = {Sustaining Computer's Impact and Adapting to Change}, journal = {Computer}, volume = {48}, number = {1}, pages = {7--9}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.28}, doi = {10.1109/MC.2015.28}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Helal15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Helal15a, author = {Sumi Helal}, title = {However You Like It: Computer's Enhanced Digital Format or Affordable Print Option}, journal = {Computer}, volume = {48}, number = {9}, pages = {6}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.281}, doi = {10.1109/MC.2015.281}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Helal15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HeuerHP15, author = {J{\"{o}}rg Heuer and Johannes Hund and Oliver Pfaff}, title = {Toward the Web of Things: Applying Web Technologies to the Physical World}, journal = {Computer}, volume = {48}, number = {5}, pages = {34--42}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.152}, doi = {10.1109/MC.2015.152}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HeuerHP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HolmesKJ15, author = {D. Scott Holmes and Alan M. Kadin and Mark W. Johnson}, title = {Superconducting Computing in Large-Scale Hybrid Systems}, journal = {Computer}, volume = {48}, number = {12}, pages = {34--42}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.375}, doi = {10.1109/MC.2015.375}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HolmesKJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Hornbaek15, author = {Kasper Hornb{\ae}k}, title = {Flexible Displays, Rigid Designs?}, journal = {Computer}, volume = {48}, number = {3}, pages = {92--96}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.70}, doi = {10.1109/MC.2015.70}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Hornbaek15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HsuMV15, author = {D. Frank Hsu and Dorothy Marinucci and Jeffrey M. Voas}, title = {Cybersecurity: Toward a Secure and Sustainable Cyber Ecosystem}, journal = {Computer}, volume = {48}, number = {4}, pages = {12--14}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.103}, doi = {10.1109/MC.2015.103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HsuMV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HuKF15, author = {Vincent C. Hu and D. Richard Kuhn and David F. Ferraiolo}, title = {Attribute-Based Access Control}, journal = {Computer}, volume = {48}, number = {2}, pages = {85--88}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.33}, doi = {10.1109/MC.2015.33}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HuKF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Hurlburt15, author = {George F. Hurlburt}, title = {Cyberhuman Security}, journal = {Computer}, volume = {48}, number = {5}, pages = {88--91}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.127}, doi = {10.1109/MC.2015.127}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/Hurlburt15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/JacucciFS15, author = {Giulio Jacucci and Stephen Fairclough and Erin Treacy Solovey}, title = {Physiological Computing}, journal = {Computer}, volume = {48}, number = {10}, pages = {12--16}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.291}, doi = {10.1109/MC.2015.291}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/JacucciFS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Johnson15, author = {Brian David Johnson}, title = {Steve the Steampunk Robot}, journal = {Computer}, volume = {48}, number = {7}, pages = {70--72}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.189}, doi = {10.1109/MC.2015.189}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Johnson15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KangWHPS15, author = {Kyungtae Kang and Qixin Wang and Junbeom Hur and Kyung{-}Joon Park and Lui Sha}, title = {Medical-Grade Quality of Service for Real-Time Mobile Healthcare}, journal = {Computer}, volume = {48}, number = {2}, pages = {41--49}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.52}, doi = {10.1109/MC.2015.52}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KangWHPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KaurR15, author = {Karamjit Kaur and Rinkle Rani}, title = {Managing Data in Healthcare Information Systems: Many Models, One Solution}, journal = {Computer}, volume = {48}, number = {3}, pages = {52--59}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.77}, doi = {10.1109/MC.2015.77}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KaurR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Keckler15, author = {Stephen W. Keckler}, title = {Increasing Interconnection Network Throughput with Virtual Channels}, journal = {Computer}, volume = {48}, number = {7}, pages = {10}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.191}, doi = {10.1109/MC.2015.191}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Keckler15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KeonPY15, author = {Dylan Keon and Cherri M. Pancake and Harry Yeh}, title = {Protecting Our Shorelines: Modeling the Effects of Tsunamis and Storm Waves}, journal = {Computer}, volume = {48}, number = {11}, pages = {23--32}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.339}, doi = {10.1109/MC.2015.339}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KeonPY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KhasanvisLRBFAB15, author = {Santosh Khasanvis and Mingyu Li and Mostafizur Rahman and Ayan Kumar Biswas and Mohammad Salehi Fashami and Jayasimha Atulasimha and Supriyo Bandyopadhyay and Csaba Andras Moritz}, title = {Architecting for Causal Intelligence at Nanoscale}, journal = {Computer}, volume = {48}, number = {12}, pages = {54--64}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.367}, doi = {10.1109/MC.2015.367}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/KhasanvisLRBFAB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Kirkham15, author = {Reuben Kirkham}, title = {Can Disability Discrimination Law Expand the Availability of Wearable Computers?}, journal = {Computer}, volume = {48}, number = {6}, pages = {25--33}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.167}, doi = {10.1109/MC.2015.167}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Kirkham15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Klamma15, author = {Ralf Klamma}, title = {Near-Real-Time Social Computing}, journal = {Computer}, volume = {48}, number = {9}, pages = {90--92}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.266}, doi = {10.1109/MC.2015.266}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Klamma15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KoliasSV15, author = {Constantinos Kolias and Angelos Stavrou and Jeffrey M. Voas}, title = {Securely Making "Things" Right}, journal = {Computer}, volume = {48}, number = {9}, pages = {84--88}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.258}, doi = {10.1109/MC.2015.258}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KoliasSV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KottAW15, author = {Alexander Kott and David S. Alberts and Cliff Wang}, title = {Will Cybersecurity Dictate the Outcome of Future Wars?}, journal = {Computer}, volume = {48}, number = {12}, pages = {98--101}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.359}, doi = {10.1109/MC.2015.359}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KottAW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Kristensson15, author = {Per Ola Kristensson}, title = {Next-Generation Text Entry}, journal = {Computer}, volume = {48}, number = {7}, pages = {84--87}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.185}, doi = {10.1109/MC.2015.185}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Kristensson15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Kshetri15, author = {Nir Kshetri}, title = {Recent {US} Cybersecurity Policy Initiatives: Challenges and Implications}, journal = {Computer}, volume = {48}, number = {7}, pages = {64--69}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.188}, doi = {10.1109/MC.2015.188}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Kshetri15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Lee15, author = {Ruby B. Lee}, title = {Rethinking Computers for Cybersecurity}, journal = {Computer}, volume = {48}, number = {4}, pages = {16--25}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.118}, doi = {10.1109/MC.2015.118}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Lee15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/LenharthP15, author = {Andrew Lenharth and Keshav Pingali}, title = {Scaling Runtimes for Irregular Algorithms to Large-Scale {NUMA} Systems}, journal = {Computer}, volume = {48}, number = {8}, pages = {35--44}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.229}, doi = {10.1109/MC.2015.229}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/LenharthP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/LewisCFGCBTY15, author = {Peter R. Lewis and Arjun Chandra and Funmilade Faniyi and Kyrre Glette and Tao Chen and Rami Bahsoon and Jim T{\o}rresen and Xin Yao}, title = {Architectural Aspects of Self-Aware and Self-Expressive Computing Systems: From Psychology to Engineering}, journal = {Computer}, volume = {48}, number = {8}, pages = {62--70}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.235}, doi = {10.1109/MC.2015.235}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/LewisCFGCBTY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Li15, author = {Jingquan Li}, title = {Ensuring Privacy in a Personal Health Record System}, journal = {Computer}, volume = {48}, number = {2}, pages = {24--31}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.43}, doi = {10.1109/MC.2015.43}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Li15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Liu15, author = {Ling Liu}, title = {Enhancing Cloud Services through Multitier Workload Analysis}, journal = {Computer}, volume = {48}, number = {5}, pages = {6}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.128}, doi = {10.1109/MC.2015.128}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Liu15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/LiuF15, author = {Shixia Liu and Leila De Floriani}, title = {Multivariate Network Exploration and Presentations}, journal = {Computer}, volume = {48}, number = {8}, pages = {6}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.236}, doi = {10.1109/MC.2015.236}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/LiuF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/LiuXPCH15, author = {Jia Liu and Yong Xue and Dominic Palmer{-}Brown and Ziqiang Chen and Xingwei He}, title = {High-Throughput Geocomputational Workflows in a Grid Environment}, journal = {Computer}, volume = {48}, number = {11}, pages = {70--80}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.331}, doi = {10.1109/MC.2015.331}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/LiuXPCH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/LloydG15, author = {G. Scott Lloyd and Maya B. Gokhale}, title = {In-Memory Data Rearrangement for Irregular, Data-Intensive Computing}, journal = {Computer}, volume = {48}, number = {8}, pages = {18--25}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.230}, doi = {10.1109/MC.2015.230}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/LloydG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/LucaL15, author = {Alexander De Luca and Janne Lindqvist}, title = {Is Secure and Usable Smartphone Authentication Asking Too Much?}, journal = {Computer}, volume = {48}, number = {5}, pages = {64--68}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.134}, doi = {10.1109/MC.2015.134}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/LucaL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/MensG15, author = {Tom Mens and Philippe Grosjean}, title = {The Ecology of Software Ecosystems}, journal = {Computer}, volume = {48}, number = {10}, pages = {85--87}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.298}, doi = {10.1109/MC.2015.298}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/MensG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Menzies15, author = {Tim Menzies}, title = {Cross-Project Data for Software Engineering}, journal = {Computer}, volume = {48}, number = {12}, pages = {6}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.381}, doi = {10.1109/MC.2015.381}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/Menzies15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Michael15, author = {James Bret Michael}, title = {Trusted Computing: An Elusive Goal}, journal = {Computer}, volume = {48}, number = {3}, pages = {99--101}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.90}, doi = {10.1109/MC.2015.90}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Michael15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/MikuszCJHWD15, author = {Mateusz Mikusz and Sarah Clinch and Rachel Jones and Mike Harding and Christopher Winstanley and Nigel Davies}, title = {Repurposing Web Analytics to Support the IoT}, journal = {Computer}, volume = {48}, number = {9}, pages = {42--49}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.260}, doi = {10.1109/MC.2015.260}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/MikuszCJHWD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/MiyoshiKT15, author = {Takemasa Miyoshi and Keiichi Kondo and Koji Terasaki}, title = {Big Ensemble Data Assimilation in Numerical Weather Prediction}, journal = {Computer}, volume = {48}, number = {11}, pages = {15--21}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.332}, doi = {10.1109/MC.2015.332}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/MiyoshiKT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Mohapatra15, author = {Prasant Mohapatra}, title = {Distributed Optimal Channel Access in Cognitive Radio Networks}, journal = {Computer}, volume = {48}, number = {6}, pages = {6}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.163}, doi = {10.1109/MC.2015.163}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Mohapatra15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/MontalvoMFC15, author = {Soto Montalvo and Raquel Mart{\'{\i}}nez{-}Unanue and V{\'{\i}}ctor Fresno and Rafael Capilla}, title = {Multilingual Information Access on the Web}, journal = {Computer}, volume = {48}, number = {7}, pages = {73--75}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.203}, doi = {10.1109/MC.2015.203}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/MontalvoMFC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Montuschi15, author = {Paolo Montuschi}, title = {Spiking Neural Network Architecture}, journal = {Computer}, volume = {48}, number = {10}, pages = {6}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.293}, doi = {10.1109/MC.2015.293}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Montuschi15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/MountainMPPK15, author = {David J. Mountain and Mark R. McLean and Doug Palmer and Joshua D. Prucnal and Christopher D. Krieger}, title = {Ohmic Weave: Memristor-Based Threshold Gate Networks}, journal = {Computer}, volume = {48}, number = {12}, pages = {65--71}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.369}, doi = {10.1109/MC.2015.369}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/MountainMPPK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/NettoCS15, author = {Marco A. S. Netto and Renato Luiz de Freitas Cunha and Nicole Sultanum}, title = {Deciding When and How to Move {HPC} Jobs to the Cloud}, journal = {Computer}, volume = {48}, number = {11}, pages = {86--89}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.351}, doi = {10.1109/MC.2015.351}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/NettoCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/PapamichaelH15, author = {Michael K. Papamichael and James C. Hoe}, title = {The {CONNECT} Network-on-Chip Generator}, journal = {Computer}, volume = {48}, number = {12}, pages = {72--79}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.378}, doi = {10.1109/MC.2015.378}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/PapamichaelH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Parhami15, author = {Behrooz Parhami}, title = {Amdahl's Reliability Law: {A} Simple Quantification of the Weakest-Link Phenomenon}, journal = {Computer}, volume = {48}, number = {7}, pages = {55--58}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.202}, doi = {10.1109/MC.2015.202}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Parhami15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ParssianYE15, author = {Amir Parssian and William Yeoh and Mong{-}Shan Ee}, title = {Quality-Based {SQL:} Specifying Information Quality in Relational Database Queries}, journal = {Computer}, volume = {48}, number = {9}, pages = {69--74}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.264}, doi = {10.1109/MC.2015.264}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ParssianYE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/PatsakisLCBS15, author = {Constantinos Patsakis and Paul Laird and Michael Clear and M{\'{e}}lanie Bouroche and Agusti Solanas}, title = {Interoperable Privacy-Aware E-Participation within Smart Cities}, journal = {Computer}, volume = {48}, number = {1}, pages = {52--58}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.16}, doi = {10.1109/MC.2015.16}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/PatsakisLCBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/PeckCJ15, author = {Evan M. Peck and Emily Carlin and Robert J. K. Jacob}, title = {Designing Brain-Computer Interfaces for Attention-Aware Systems}, journal = {Computer}, volume = {48}, number = {10}, pages = {34--42}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.315}, doi = {10.1109/MC.2015.315}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/PeckCJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/PendyalaSB15, author = {Vishnu S. Pendyala and Simon S. Y. Shim and Christoph Bussler}, title = {The Web That Extends beyond the World}, journal = {Computer}, volume = {48}, number = {5}, pages = {18--25}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.150}, doi = {10.1109/MC.2015.150}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/PendyalaSB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Popper15, author = {Ari Popper}, title = {Transforming Business through Science Fiction Prototyping}, journal = {Computer}, volume = {48}, number = {1}, pages = {70--72}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.30}, doi = {10.1109/MC.2015.30}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Popper15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/PredenTJLRC15, author = {J{\"{u}}rgo{-}S{\"{o}}ren Preden and Kalle Tammem{\"{a}}e and Axel Jantsch and Mairo Leier and Andri Riid and Emine Calis}, title = {The Benefits of Self-Awareness and Attention in Fog and Mist Computing}, journal = {Computer}, volume = {48}, number = {7}, pages = {37--45}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.207}, doi = {10.1109/MC.2015.207}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/PredenTJLRC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Raggett15, author = {Dave Raggett}, title = {The Web of Things: Challenges and Opportunities}, journal = {Computer}, volume = {48}, number = {5}, pages = {26--32}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.149}, doi = {10.1109/MC.2015.149}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Raggett15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/RajputSK15, author = {Hitesh Rajput and Tanmoy Som and Soumitra Kar}, title = {An Automated Vehicle License Plate Recognition System}, journal = {Computer}, volume = {48}, number = {8}, pages = {56--61}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.244}, doi = {10.1109/MC.2015.244}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/RajputSK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Rao15, author = {Dhananjai Madhava Rao}, title = {Computing Efficiency in Education}, journal = {Computer}, volume = {48}, number = {7}, pages = {76--79}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.199}, doi = {10.1109/MC.2015.199}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Rao15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Riehle15, author = {Dirk Riehle}, title = {How Open Source Is Changing the Software Developer's Career}, journal = {Computer}, volume = {48}, number = {5}, pages = {51--57}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.132}, doi = {10.1109/MC.2015.132}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Riehle15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/RinnerESNPDL15, author = {Bernhard Rinner and Lukas Esterle and Jennifer Simonjan and Georg Nebehay and Roman P. Pflugfelder and Gustavo Fern{\'{a}}ndez Dom{\'{\i}}nguez and Peter R. Lewis}, title = {Self-Aware and Self-Expressive Camera Networks}, journal = {Computer}, volume = {48}, number = {7}, pages = {21--28}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.209}, doi = {10.1109/MC.2015.209}, timestamp = {Wed, 19 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/RinnerESNPDL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/RoachS15, author = {Steve Roach and Mehran Sahami}, title = {{CS2013:} Computer Science Curricula 2013}, journal = {Computer}, volume = {48}, number = {3}, pages = {114--116}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.68}, doi = {10.1109/MC.2015.68}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/RoachS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/RomeroNRSKVM15, author = {Nichols A. Romero and Aiichiro Nakano and Katherine Riley and Fuyuki Shimojo and Rajiv K. Kalia and Priya Vashishta and Paul C. Messina}, title = {Quantum Molecular Dynamics in the Post-Petaflops Era}, journal = {Computer}, volume = {48}, number = {11}, pages = {33--41}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.337}, doi = {10.1109/MC.2015.337}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/RomeroNRSKVM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/RosalesSB15, author = {Andrea Rosales and Sergio Sayago and Josep Blat}, title = {Beeping Socks and Chirping Arm Bands: Wearables That Foster Free Play}, journal = {Computer}, volume = {48}, number = {6}, pages = {41--48}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.168}, doi = {10.1109/MC.2015.168}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/RosalesSB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/RozadoD15, author = {David Rozado Fernandez and Andreas D{\"{u}}nser}, title = {Combining {EEG} with Pupillometry to Improve Cognitive Workload Detection}, journal = {Computer}, volume = {48}, number = {10}, pages = {18--25}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.314}, doi = {10.1109/MC.2015.314}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/RozadoD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SabryGHLPSWABFG15, author = {Mohamed M. Sabry and Mingyu Gao and Gage Hills and Chi{-}Shuen Lee and Greg Pitner and Max M. Shulaker and Tony F. Wu and Mehdi Asheghi and Jeffrey Bokor and Franz Franchetti and Kenneth E. Goodson and Christos Kozyrakis and Igor L. Markov and Kunle Olukotun and Larry T. Pileggi and Eric Pop and Jan M. Rabaey and Christopher R{\'{e}} and H.{-}S. Philip Wong and Subhasish Mitra}, title = {Energy-Efficient Abundant-Data Computing: The {N3XT} 1, 000x}, journal = {Computer}, volume = {48}, number = {12}, pages = {24--33}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.376}, doi = {10.1109/MC.2015.376}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SabryGHLPSWABFG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SainiE15, author = {Mukesh Kumar Saini and Abdulmotaleb El{-}Saddik}, title = {Absence Privacy Loss}, journal = {Computer}, volume = {48}, number = {11}, pages = {102--105}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.346}, doi = {10.1109/MC.2015.346}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/SainiE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Schaffer15, author = {Kim Schaffer}, title = {Expanding Continuous Authentication with Mobile Devices}, journal = {Computer}, volume = {48}, number = {11}, pages = {92--95}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.333}, doi = {10.1109/MC.2015.333}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Schaffer15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SchlessmanW15, author = {Jason Schlessman and Marilyn Wolf}, title = {Tailoring Design for Embedded Computer Vision Applications}, journal = {Computer}, volume = {48}, number = {5}, pages = {58--62}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.145}, doi = {10.1109/MC.2015.145}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SchlessmanW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Schlieski15, author = {Tawny Schlieski}, title = {Virtual Dystopia}, journal = {Computer}, volume = {48}, number = {3}, pages = {97--98}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.91}, doi = {10.1109/MC.2015.91}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Schlieski15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Schuller15, author = {Bj{\"{o}}rn W. Schuller}, title = {Do Computers Have Personality?}, journal = {Computer}, volume = {48}, number = {3}, pages = {6--7}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.69}, doi = {10.1109/MC.2015.69}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Schuller15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Severance15, author = {Charles R. Severance}, title = {Khan Academy and Computer Science}, journal = {Computer}, volume = {48}, number = {1}, pages = {14--15}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.18}, doi = {10.1109/MC.2015.18}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Severance15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Severance15a, author = {Charles R. Severance}, title = {Guido van Rossum: The Early Years of Python}, journal = {Computer}, volume = {48}, number = {2}, pages = {7--9}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.45}, doi = {10.1109/MC.2015.45}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Severance15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Severance15b, author = {Charles R. Severance}, title = {Guido van Rossum: The Modern Era of Python}, journal = {Computer}, volume = {48}, number = {3}, pages = {8--10}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.73}, doi = {10.1109/MC.2015.73}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Severance15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Severance15c, author = {Charles R. Severance}, title = {John Resig: Building JQuery}, journal = {Computer}, volume = {48}, number = {5}, pages = {7--8}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.135}, doi = {10.1109/MC.2015.135}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Severance15c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Severance15d, author = {Charles R. Severance}, title = {Roy T. Fielding: Understanding the {REST} Style}, journal = {Computer}, volume = {48}, number = {6}, pages = {7--9}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.170}, doi = {10.1109/MC.2015.170}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Severance15d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Severance15e, author = {Charles R. Severance}, title = {Anil Jain: 25 Years of Biometric Recognition}, journal = {Computer}, volume = {48}, number = {8}, pages = {8--10}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.232}, doi = {10.1109/MC.2015.232}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Severance15e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Severance15f, author = {Charles R. Severance}, title = {Anant Agarwal: Inside edX}, journal = {Computer}, volume = {48}, number = {10}, pages = {8--9}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.308}, doi = {10.1109/MC.2015.308}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Severance15f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ShalfL15, author = {John M. Shalf and Robert Leland}, title = {Computing beyond Moore's Law}, journal = {Computer}, volume = {48}, number = {12}, pages = {14--23}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.374}, doi = {10.1109/MC.2015.374}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ShalfL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Sharples15, author = {Mike Sharples}, title = {Seamless Learning: Using Location-Aware Technology to Support Art Education}, journal = {Computer}, volume = {48}, number = {11}, pages = {6}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.323}, doi = {10.1109/MC.2015.323}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Sharples15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ShenVCV15, author = {Emily Shen and Mayank Varia and Robert K. Cunningham and W. Konrad Vesey}, title = {Cryptographically Secure Computation}, journal = {Computer}, volume = {48}, number = {4}, pages = {78--81}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.101}, doi = {10.1109/MC.2015.101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ShenVCV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ShimLKD15, author = {Keun Sup Shim and Mieszko Lis and Omer Khan and Srinivas Devadas}, title = {The Execution Migration Machine: Directoryless Shared-Memory Architecture}, journal = {Computer}, volume = {48}, number = {9}, pages = {50--59}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.263}, doi = {10.1109/MC.2015.263}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ShimLKD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SioniC15, author = {Riccardo Sioni and Luca Chittaro}, title = {Stress Detection Using Physiological Sensors}, journal = {Computer}, volume = {48}, number = {10}, pages = {26--33}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.316}, doi = {10.1109/MC.2015.316}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SioniC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Spring15, author = {Adam P. Spring}, title = {Creating Substance from a Cloud: Low-Cost Product Generation}, journal = {Computer}, volume = {48}, number = {2}, pages = {67--74}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.39}, doi = {10.1109/MC.2015.39}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Spring15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/StarnerM15, author = {Thad Starner and Tom L. Martin}, title = {Wearable Computing: The New Dress Code [Guest editors' introduction]}, journal = {Computer}, volume = {48}, number = {6}, pages = {12--15}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.176}, doi = {10.1109/MC.2015.176}, timestamp = {Fri, 28 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/StarnerM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/StrohmaierMDS15, author = {Erich Strohmaier and Hans Werner Meuer and Jack J. Dongarra and Horst D. Simon}, title = {The {TOP500} List and Progress in High-Performance Computing}, journal = {Computer}, volume = {48}, number = {11}, pages = {42--49}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.338}, doi = {10.1109/MC.2015.338}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/StrohmaierMDS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ThakoorABSM15, author = {Ninad S. Thakoor and Le An and Bir Bhanu and Santhoshkumar Sunderrajan and B. S. Manjunath}, title = {People Tracking in Camera Networks: Three Open Questions}, journal = {Computer}, volume = {48}, number = {3}, pages = {78--86}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.83}, doi = {10.1109/MC.2015.83}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ThakoorABSM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/TimmererE015, author = {Christian Timmerer and Touradj Ebrahimi and Fernando Pereira}, title = {Toward a New Assessment of Quality}, journal = {Computer}, volume = {48}, number = {3}, pages = {108--110}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.89}, doi = {10.1109/MC.2015.89}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/TimmererE015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Tockey15, author = {Steve Tockey}, title = {Insanity, Hiring, and the Software Industry}, journal = {Computer}, volume = {48}, number = {11}, pages = {96--101}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.318}, doi = {10.1109/MC.2015.318}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Tockey15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/TorresenPY15, author = {Jim T{\o}rresen and Christian Plessl and Xin Yao}, title = {Self-Aware and Self-Expressive Systems}, journal = {Computer}, volume = {48}, number = {7}, pages = {18--20}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.205}, doi = {10.1109/MC.2015.205}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/TorresenPY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/TruongD15, author = {Hong Linh Truong and Schahram Dustdar}, title = {Programming Elasticity in the Cloud}, journal = {Computer}, volume = {48}, number = {3}, pages = {87--90}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.84}, doi = {10.1109/MC.2015.84}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/TruongD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/TumeoF15, author = {Antonino Tumeo and John Feo}, title = {Irregular Applications: From Architectures to Algorithms [Guest editors' introduction]}, journal = {Computer}, volume = {48}, number = {8}, pages = {14--16}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.233}, doi = {10.1109/MC.2015.233}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/TumeoF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/UllahMV15, author = {Najeeb Ullah and Maurizio Morisio and Antonio Vetr{\`{o}}}, title = {Selecting the Best Reliability Model to Predict Residual Defects in Open Source Software}, journal = {Computer}, volume = {48}, number = {6}, pages = {50--58}, year = {2015}, url = {https://doi.org/10.1109/MC.2013.446}, doi = {10.1109/MC.2013.446}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/UllahMV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/VagounS15, author = {Tomas Vagoun and George O. Strawn}, title = {Implementing the Federal Cybersecurity R{\&}D Strategy}, journal = {Computer}, volume = {48}, number = {4}, pages = {45--55}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.111}, doi = {10.1109/MC.2015.111}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/VagounS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ValdiLBQZM15, author = {Andrea Valdi and Eros Lever and Simone Benefico and Davide Quarta and Stefano Zanero and Federico Maggi}, title = {Scalable Testing of Mobile Antivirus Applications}, journal = {Computer}, volume = {48}, number = {11}, pages = {60--68}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.320}, doi = {10.1109/MC.2015.320}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ValdiLBQZM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/VassevH15, author = {Emil Vassev and Mike Hinchey}, title = {KnowLang: Knowledge Representation for Self-Adaptive Systems}, journal = {Computer}, volume = {48}, number = {2}, pages = {81--84}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.50}, doi = {10.1109/MC.2015.50}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/VassevH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/VelikovaLH15, author = {Marina Velikova and Peter J. F. Lucas and Maarten van der Heijden}, title = {Intelligent Disease Self-Management with Mobile Technology}, journal = {Computer}, volume = {48}, number = {2}, pages = {32--39}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.48}, doi = {10.1109/MC.2015.48}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/VelikovaLH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/VetterM15, author = {Ron Vetter and San Murugesan}, title = {The Web: The Next 25 Years}, journal = {Computer}, volume = {48}, number = {5}, pages = {14--17}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.151}, doi = {10.1109/MC.2015.151}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/VetterM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/VetterM15a, author = {Ron Vetter and San Murugesan}, title = {Roundtable Discussion: The Web We Look Forward To}, journal = {Computer}, volume = {48}, number = {5}, pages = {44--50}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.141}, doi = {10.1109/MC.2015.141}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/VetterM15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Voas15, author = {Jeffrey M. Voas}, title = {Vetting Mobile App Vendors}, journal = {Computer}, volume = {48}, number = {6}, pages = {69--71}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.165}, doi = {10.1109/MC.2015.165}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Voas15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/VoasH15, author = {Jeffrey M. Voas and George F. Hurlburt}, title = {Third-Party Software's Trust Quagmire}, journal = {Computer}, volume = {48}, number = {12}, pages = {80--87}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.372}, doi = {10.1109/MC.2015.372}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/VoasH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/WangCWS15, author = {Chia{-}Wei Wang and Michael Cheng Yi Cho and Chi{-}Wei Wang and Shiuhpyng Winston Shieh}, title = {Combating Software Piracy in Public Clouds}, journal = {Computer}, volume = {48}, number = {10}, pages = {88--91}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.317}, doi = {10.1109/MC.2015.317}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/WangCWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/WantD15, author = {Roy Want and Schahram Dustdar}, title = {Activating the Internet of Things [Guest editors' introduction]}, journal = {Computer}, volume = {48}, number = {9}, pages = {16--20}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.282}, doi = {10.1109/MC.2015.282}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/WantD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/WantSJ15, author = {Roy Want and Bill N. Schilit and Scott Jenson}, title = {Enabling the Internet of Things}, journal = {Computer}, volume = {48}, number = {1}, pages = {28--35}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.12}, doi = {10.1109/MC.2015.12}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/WantSJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/WeaverB15, author = {Alf Weaver and Ren{\'{e}}e C. Bryce}, title = {Technological Advances in Medicine: It's Personal [Guest editors' introduction]}, journal = {Computer}, volume = {48}, number = {2}, pages = {21--23}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.57}, doi = {10.1109/MC.2015.57}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/WeaverB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Xu15, author = {Ying Xu}, title = {Carrying out Phylogenetic Analyses through Computational Model Checking}, journal = {Computer}, volume = {48}, number = {1}, pages = {12}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.8}, doi = {10.1109/MC.2015.8}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Xu15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/XuSZFD15, author = {Xiaofei Xu and Quan Z. Sheng and Liang{-}Jie Zhang and Yushun Fan and Schahram Dustdar}, title = {From Big Data to Big Service}, journal = {Computer}, volume = {48}, number = {7}, pages = {80--83}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.182}, doi = {10.1109/MC.2015.182}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/XuSZFD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ZhangCWS15, author = {Zhi{-}Kai Zhang and Michael Cheng Yi Cho and Zong{-}Yu Wu and Shiuhpyng Winston Shieh}, title = {Identifying and Authenticating IoT Objects in a Natural Context}, journal = {Computer}, volume = {48}, number = {8}, pages = {81--83}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.213}, doi = {10.1109/MC.2015.213}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ZhangCWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Zhanikeev15, author = {Marat Zhanikeev}, title = {A Cloud Visitation Platform to Facilitate Cloud Federation and Fog Computing}, journal = {Computer}, volume = {48}, number = {5}, pages = {80--83}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.122}, doi = {10.1109/MC.2015.122}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Zhanikeev15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ZhouL15, author = {Wenqi Zhou and Yuhong Liu}, title = {Online Product Rating Manipulation and Market Performance}, journal = {Computer}, volume = {48}, number = {5}, pages = {72--75}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.138}, doi = {10.1109/MC.2015.138}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ZhouL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ZhuangRX15, author = {Zhenyun Zhuang and Haricharan Ramachandra and Chaoyue Xiong}, title = {Taming Replication Latency of Big Data Events with Capacity Planning}, journal = {Computer}, volume = {48}, number = {3}, pages = {36--41}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.88}, doi = {10.1109/MC.2015.88}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ZhuangRX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ZwartB15, author = {Simon Portegies Zwart and Jeroen B{\'{e}}dorf}, title = {Using GPUs to Enable Simulation with Computational Gravitational Dynamics in Astrophysics}, journal = {Computer}, volume = {48}, number = {11}, pages = {50--58}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.334}, doi = {10.1109/MC.2015.334}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ZwartB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.