Search dblp for Publications

export results for "toc:db/journals/computer/computer48.bht:"

 download as .bib file

@article{DBLP:journals/computer/Aiello15,
  author       = {Bob Aiello},
  title        = {Managing the High-Performance Computer Society Standards Working Group},
  journal      = {Computer},
  volume       = {48},
  number       = {3},
  pages        = {111--113},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.78},
  doi          = {10.1109/MC.2015.78},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Aiello15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/AlkhatibFFKLLMM15,
  author       = {Hasan Alkhatib and
                  Paolo Faraboschi and
                  Eitan Frachtenberg and
                  Hironori Kasahara and
                  Danny B. Lange and
                  Phillip A. Laplante and
                  Arif Merchant and
                  Dejan S. Milojicic and
                  Karsten Schwan},
  title        = {What Will 2022 Look Like? The {IEEE} {CS} 2022 Report},
  journal      = {Computer},
  volume       = {48},
  number       = {3},
  pages        = {68--76},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.92},
  doi          = {10.1109/MC.2015.92},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/AlkhatibFFKLLMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/AmorettiC15,
  author       = {Michele Amoretti and
                  Stefano Cagnoni},
  title        = {Toward Collective Self-Awareness and Self-Expression in Distributed
                  Systems},
  journal      = {Computer},
  volume       = {48},
  number       = {7},
  pages        = {29--36},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.208},
  doi          = {10.1109/MC.2015.208},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/AmorettiC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ArdisBHOSV15,
  author       = {Mark A. Ardis and
                  David Budgen and
                  Gregory W. Hislop and
                  Jeff Offutt and
                  Mark J. Sebern and
                  Willem Visser},
  title        = {{SE} 2014: Curriculum Guidelines for Undergraduate Degree Programs
                  in Software Engineering},
  journal      = {Computer},
  volume       = {48},
  number       = {11},
  pages        = {106--109},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.345},
  doi          = {10.1109/MC.2015.345},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/ArdisBHOSV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/AydayCHT15,
  author       = {Erman Ayday and
                  Emiliano De Cristofaro and
                  Jean{-}Pierre Hubaux and
                  Gene Tsudik},
  title        = {Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare?},
  journal      = {Computer},
  volume       = {48},
  number       = {2},
  pages        = {58--66},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.59},
  doi          = {10.1109/MC.2015.59},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/AydayCHT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BahgaM15,
  author       = {Arshdeep Bahga and
                  Vijay Krishna Madisetti},
  title        = {Healthcare Data Integration and Informatics in the Cloud},
  journal      = {Computer},
  volume       = {48},
  number       = {2},
  pages        = {50--57},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.46},
  doi          = {10.1109/MC.2015.46},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/BahgaM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Bandeira15,
  author       = {Afonso S. Bandeira},
  title        = {An Efficient Algorithm for Exact Recovery of Vertex Variables from
                  Edge Measurements},
  journal      = {Computer},
  volume       = {48},
  number       = {9},
  pages        = {8--9},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.272},
  doi          = {10.1109/MC.2015.272},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Bandeira15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BansalK15,
  author       = {Srividya K. Bansal and
                  Sebastian Kagemann},
  title        = {Integrating Big Data: {A} Semantic Extract-Transform-Load Framework},
  journal      = {Computer},
  volume       = {48},
  number       = {3},
  pages        = {42--50},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.76},
  doi          = {10.1109/MC.2015.76},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/BansalK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BealPV15,
  author       = {Jacob Beal and
                  Danilo Pianini and
                  Mirko Viroli},
  title        = {Aggregate Programming for the Internet of Things},
  journal      = {Computer},
  volume       = {48},
  number       = {9},
  pages        = {22--30},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.261},
  doi          = {10.1109/MC.2015.261},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/BealPV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BedriSTSBPRGG15,
  author       = {Abdelkareem Bedri and
                  Himanshu Sahni and
                  Pavleen Thukral and
                  Thad Starner and
                  David Byrd and
                  Peter Presti and
                  Gabriel Reyes and
                  Maysam Ghovanloo and
                  Zehua Guo},
  title        = {Toward Silent-Speech Control of Consumer Wearables},
  journal      = {Computer},
  volume       = {48},
  number       = {10},
  pages        = {54--62},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.310},
  doi          = {10.1109/MC.2015.310},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/BedriSTSBPRGG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BeekDHHI15,
  author       = {Vincent van Beek and
                  Jesse Donkervliet and
                  Tim Hegeman and
                  Stefan Hugtenburg and
                  Alexandru Iosup},
  title        = {Self-Expressive Management of Business-Critical Workloads in Virtualized
                  Datacenters},
  journal      = {Computer},
  volume       = {48},
  number       = {7},
  pages        = {46--54},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.206},
  doi          = {10.1109/MC.2015.206},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/BeekDHHI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BelliCDGMPF15,
  author       = {Laura Belli and
                  Simone Cirani and
                  Luca Davoli and
                  Andrea Gorrieri and
                  Mirko Mancin and
                  Marco Picone and
                  Gianluigi Ferrari},
  title        = {Design and Deployment of an IoT Application-Oriented Testbed},
  journal      = {Computer},
  volume       = {48},
  number       = {9},
  pages        = {32--40},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.253},
  doi          = {10.1109/MC.2015.253},
  timestamp    = {Fri, 23 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/BelliCDGMPF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel15,
  author       = {Hal Berghel},
  title        = {A Paperless Gamble},
  journal      = {Computer},
  volume       = {48},
  number       = {1},
  pages        = {76--78},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.3},
  doi          = {10.1109/MC.2015.3},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel15a,
  author       = {Hal Berghel},
  title        = {Cyber Chutzpah: The Sony Hack and the Celebration of Hyperbole},
  journal      = {Computer},
  volume       = {48},
  number       = {2},
  pages        = {77--80},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.41},
  doi          = {10.1109/MC.2015.41},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel15b,
  author       = {Hal Berghel},
  title        = {Noirware},
  journal      = {Computer},
  volume       = {48},
  number       = {3},
  pages        = {102--107},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.81},
  doi          = {10.1109/MC.2015.81},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel15c,
  author       = {Hal Berghel},
  title        = {Borderline Executive Disorder},
  journal      = {Computer},
  volume       = {48},
  number       = {4},
  pages        = {82--86},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.96},
  doi          = {10.1109/MC.2015.96},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel15c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel15d,
  author       = {Hal Berghel},
  title        = {What Makes a Good Column},
  journal      = {Computer},
  volume       = {48},
  number       = {5},
  pages        = {84--87},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.153},
  doi          = {10.1109/MC.2015.153},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel15d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel15e,
  author       = {Hal Berghel},
  title        = {A Farewell to Air Gaps, Part 1},
  journal      = {Computer},
  volume       = {48},
  number       = {6},
  pages        = {64--68},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.179},
  doi          = {10.1109/MC.2015.179},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel15e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel15f,
  author       = {Hal Berghel},
  title        = {A Farewell to Air Gaps, Part 2},
  journal      = {Computer},
  volume       = {48},
  number       = {7},
  pages        = {59--63},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.181},
  doi          = {10.1109/MC.2015.181},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel15f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel15g,
  author       = {Hal Berghel},
  title        = {{TSA:} Mission Creep Meets Waste},
  journal      = {Computer},
  volume       = {48},
  number       = {8},
  pages        = {90--94},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.227},
  doi          = {10.1109/MC.2015.227},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel15g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel15h,
  author       = {Hal Berghel},
  title        = {{STEM} Crazy},
  journal      = {Computer},
  volume       = {48},
  number       = {9},
  pages        = {75--80},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.256},
  doi          = {10.1109/MC.2015.256},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel15h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel15i,
  author       = {Hal Berghel},
  title        = {Legislating Technology (Badly)},
  journal      = {Computer},
  volume       = {48},
  number       = {10},
  pages        = {72--78},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.304},
  doi          = {10.1109/MC.2015.304},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel15i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel15j,
  author       = {Hal Berghel},
  title        = {The Dystory of Ahmed's Clock},
  journal      = {Computer},
  volume       = {48},
  number       = {11},
  pages        = {82--85},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.350},
  doi          = {10.1109/MC.2015.350},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel15j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel15k,
  author       = {Hal Berghel},
  title        = {What Price Gonzo Ethics?},
  journal      = {Computer},
  volume       = {48},
  number       = {12},
  pages        = {88--93},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.355},
  doi          = {10.1109/MC.2015.355},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel15k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Bertino15,
  author       = {Elisa Bertino},
  title        = {Denial-of-Service Attacks to {UMTS}},
  journal      = {Computer},
  volume       = {48},
  number       = {2},
  pages        = {6},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.42},
  doi          = {10.1109/MC.2015.42},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Bertino15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BlakeYDMJ15,
  author       = {Madison Blake and
                  Rabih Younes and
                  Jacob Dennis and
                  Thomas L. Martin and
                  Mark T. Jones},
  title        = {A User-Independent and Sensor-Tolerant Wearable Activity Classifier},
  journal      = {Computer},
  volume       = {48},
  number       = {10},
  pages        = {64--71},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.296},
  doi          = {10.1109/MC.2015.296},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/BlakeYDMJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BresnikerSW15,
  author       = {Kirk Bresniker and
                  Sharad Singhal and
                  R. Stanley Williams},
  title        = {Adapting to Thrive in a New Economy of Memory Abundance},
  journal      = {Computer},
  volume       = {48},
  number       = {12},
  pages        = {44--53},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.368},
  doi          = {10.1109/MC.2015.368},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/BresnikerSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Brown15,
  author       = {Steve Brown},
  title        = {The Power of Story},
  journal      = {Computer},
  volume       = {48},
  number       = {9},
  pages        = {82--83},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.271},
  doi          = {10.1109/MC.2015.271},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Brown15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Broy15,
  author       = {Manfred Broy},
  title        = {Rethinking Nonfunctional Software Requirements},
  journal      = {Computer},
  volume       = {48},
  number       = {5},
  pages        = {96--99},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.139},
  doi          = {10.1109/MC.2015.139},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Broy15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BrugaliCH15,
  author       = {Davide Brugali and
                  Rafael Capilla and
                  Mike Hinchey},
  title        = {Dynamic Variability Meets Robotics},
  journal      = {Computer},
  volume       = {48},
  number       = {12},
  pages        = {94--97},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.354},
  doi          = {10.1109/MC.2015.354},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/BrugaliCH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BruneliereCIASW15,
  author       = {Hugo Bruneliere and
                  Jordi Cabot and
                  Javier Luis C{\'{a}}novas Izquierdo and
                  Leire Orue{-}Echevarria Arrieta and
                  Oliver Strau{\ss} and
                  Manuel Wimmer},
  title        = {Software Modernization Revisited: Challenges and Prospects},
  journal      = {Computer},
  volume       = {48},
  number       = {8},
  pages        = {76--80},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.234},
  doi          = {10.1109/MC.2015.234},
  timestamp    = {Sun, 20 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/BruneliereCIASW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BuonoGQCPTL15,
  author       = {Daniele Buono and
                  John A. Gunnels and
                  Xinyu Que and
                  Fabio Checconi and
                  Fabrizio Petrini and
                  Tai{-}Ching Tuan and
                  Chris Long},
  title        = {Optimizing Sparse Linear Algebra for Large-Scale Graph Analytics},
  journal      = {Computer},
  volume       = {48},
  number       = {8},
  pages        = {26--34},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.228},
  doi          = {10.1109/MC.2015.228},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/BuonoGQCPTL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Byrd15,
  author       = {Greg Byrd},
  title        = {Spotlighting Student Innovation},
  journal      = {Computer},
  volume       = {48},
  number       = {2},
  pages        = {75--76},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.54},
  doi          = {10.1109/MC.2015.54},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Byrd15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Byrd15a,
  author       = {Greg Byrd},
  title        = {A Little Ingenuity Solves an Elephant-Sized Problem},
  journal      = {Computer},
  volume       = {48},
  number       = {4},
  pages        = {74--77},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.94},
  doi          = {10.1109/MC.2015.94},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Byrd15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Byrd15b,
  author       = {Greg Byrd},
  title        = {Tracking Cows Wirelessly},
  journal      = {Computer},
  volume       = {48},
  number       = {6},
  pages        = {60--63},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.154},
  doi          = {10.1109/MC.2015.154},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Byrd15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Byrd15c,
  author       = {Greg Byrd},
  title        = {Cycling through Cyberspace},
  journal      = {Computer},
  volume       = {48},
  number       = {8},
  pages        = {72--75},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.220},
  doi          = {10.1109/MC.2015.220},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Byrd15c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Byrd15d,
  author       = {Greg Byrd},
  title        = {21st Century Pong},
  journal      = {Computer},
  volume       = {48},
  number       = {10},
  pages        = {80--84},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.306},
  doi          = {10.1109/MC.2015.306},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Byrd15d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/CastellanaMWTHV15,
  author       = {Vito Giovanni Castellana and
                  Alessandro Morari and
                  Jesse Weaver and
                  Antonino Tumeo and
                  David Haglin and
                  Oreste Villa and
                  John Feo},
  title        = {In-Memory Graph Databases for Web-Scale Data},
  journal      = {Computer},
  volume       = {48},
  number       = {3},
  pages        = {24--35},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.74},
  doi          = {10.1109/MC.2015.74},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/CastellanaMWTHV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/CaviglioneM15,
  author       = {Luca Caviglione and
                  Wojciech Mazurczyk},
  title        = {Understanding Information Hiding in iOS},
  journal      = {Computer},
  volume       = {48},
  number       = {1},
  pages        = {62--65},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.31},
  doi          = {10.1109/MC.2015.31},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/CaviglioneM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Chai15,
  author       = {Sek Chai},
  title        = {Enabling Smart Camera Networks with Smartphone Processors},
  journal      = {Computer},
  volume       = {48},
  number       = {4},
  pages        = {56--63},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.105},
  doi          = {10.1109/MC.2015.105},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Chai15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ChenB15,
  author       = {Tao Chen and
                  Rami Bahsoon},
  title        = {Toward a Smarter Cloud: Self-Aware Autoscaling of Cloud Configurations
                  and Resources},
  journal      = {Computer},
  volume       = {48},
  number       = {9},
  pages        = {93--96},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.278},
  doi          = {10.1109/MC.2015.278},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ChenB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Conte15,
  author       = {Tom Conte},
  title        = {A Time of Change},
  journal      = {Computer},
  volume       = {48},
  number       = {1},
  pages        = {4--6},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.4},
  doi          = {10.1109/MC.2015.4},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Conte15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Conte15a,
  author       = {Thomas M. Conte},
  title        = {The Computer Society Must Change},
  journal      = {Computer},
  volume       = {48},
  number       = {12},
  pages        = {9},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.371},
  doi          = {10.1109/MC.2015.371},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Conte15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ConteTD15,
  author       = {Thomas M. Conte and
                  Elie K. Track and
                  Erik DeBenedictis},
  title        = {Rebooting Computing: New Strategies for Technology Scaling},
  journal      = {Computer},
  volume       = {48},
  number       = {12},
  pages        = {10--13},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.363},
  doi          = {10.1109/MC.2015.363},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ConteTD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Costley15,
  author       = {Jennifer Costley},
  title        = {Leveraging the Standards Life Cycle for Green {IT}},
  journal      = {Computer},
  volume       = {48},
  number       = {1},
  pages        = {73--75},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.19},
  doi          = {10.1109/MC.2015.19},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Costley15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/CragoW15,
  author       = {Stephen P. Crago and
                  John Paul Walters},
  title        = {Heterogeneous Cloud Computing: The Way Forward},
  journal      = {Computer},
  volume       = {48},
  number       = {1},
  pages        = {59--61},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.14},
  doi          = {10.1109/MC.2015.14},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/CragoW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Daniels15,
  author       = {Mitchell E. Daniels},
  title        = {Measuring Great Jobs and Great Lives: The Gallup-Purdue Index},
  journal      = {Computer},
  volume       = {48},
  number       = {1},
  pages        = {66--69},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.21},
  doi          = {10.1109/MC.2015.21},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Daniels15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Davis15,
  author       = {Darold Davis},
  title        = {Taming the Engineering of Information Services Websites with Standards},
  journal      = {Computer},
  volume       = {48},
  number       = {8},
  pages        = {84--89},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.239},
  doi          = {10.1109/MC.2015.239},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Davis15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/DraudtHHMSW15,
  author       = {Alida Draudt and
                  Jonjozuf Hadley and
                  Ryan Hogan and
                  Leticia Murray and
                  Gregory Stock and
                  Julia Rose West},
  title        = {Six Insights about Science Fiction Prototyping},
  journal      = {Computer},
  volume       = {48},
  number       = {5},
  pages        = {69--71},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.142},
  doi          = {10.1109/MC.2015.142},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/DraudtHHMSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Durant15,
  author       = {Eric Durant},
  title        = {{CE2016:} Guidelines for Forward-Looking Computer Engineering Curricula},
  journal      = {Computer},
  volume       = {48},
  number       = {9},
  pages        = {102--104},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.269},
  doi          = {10.1109/MC.2015.269},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Durant15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/EckSOMSB15,
  author       = {Adam Eck and
                  Leen{-}Kiat Soh and
                  Kristen Olson and
                  Allan L. McCutcheon and
                  Jolene Smyth and
                  Robert F. Belli},
  title        = {Understanding the Human Condition through Survey Informatics},
  journal      = {Computer},
  volume       = {48},
  number       = {11},
  pages        = {110--114},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.327},
  doi          = {10.1109/MC.2015.327},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/EckSOMSB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Finn15,
  author       = {Ed Finn},
  title        = {We Can Build the Future},
  journal      = {Computer},
  volume       = {48},
  number       = {11},
  pages        = {90--91},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.336},
  doi          = {10.1109/MC.2015.336},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Finn15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/FonashS15,
  author       = {Peter Fonash and
                  Phyllis A. Schneck},
  title        = {Cybersecurity: From Months to Milliseconds},
  journal      = {Computer},
  volume       = {48},
  number       = {1},
  pages        = {42--50},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.11},
  doi          = {10.1109/MC.2015.11},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/FonashS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Forsyth15,
  author       = {David A. Forsyth},
  title        = {Representation Learning},
  journal      = {Computer},
  volume       = {48},
  number       = {4},
  pages        = {6},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.117},
  doi          = {10.1109/MC.2015.117},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Forsyth15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Gaff15,
  author       = {Brian M. Gaff},
  title        = {{IP} Issues for Start-ups},
  journal      = {Computer},
  volume       = {48},
  number       = {1},
  pages        = {16--18},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.17},
  doi          = {10.1109/MC.2015.17},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Gaff15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Gaff15a,
  author       = {Brian M. Gaff},
  title        = {BYOD? OMG!},
  journal      = {Computer},
  volume       = {48},
  number       = {2},
  pages        = {10--11},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.34},
  doi          = {10.1109/MC.2015.34},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Gaff15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Gaff15b,
  author       = {Brian M. Gaff},
  title        = {Important {IP} Cases in 2015, Part One},
  journal      = {Computer},
  volume       = {48},
  number       = {4},
  pages        = {7--9},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.112},
  doi          = {10.1109/MC.2015.112},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Gaff15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Gaff15c,
  author       = {Brian M. Gaff},
  title        = {Important {IP} Cases in 2015, Part Two},
  journal      = {Computer},
  volume       = {48},
  number       = {5},
  pages        = {9--11},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.133},
  doi          = {10.1109/MC.2015.133},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Gaff15c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Gaff15d,
  author       = {Brian M. Gaff},
  title        = {"Curiouser and Curiouser!"-The Fallout from Alice},
  journal      = {Computer},
  volume       = {48},
  number       = {7},
  pages        = {12--14},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.200},
  doi          = {10.1109/MC.2015.200},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Gaff15d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Gaff15e,
  author       = {Brian M. Gaff},
  title        = {Legal Issues with Wearable Technology},
  journal      = {Computer},
  volume       = {48},
  number       = {9},
  pages        = {10--12},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.280},
  doi          = {10.1109/MC.2015.280},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Gaff15e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Gaff15f,
  author       = {Brian M. Gaff},
  title        = {Patent Infringement Damages},
  journal      = {Computer},
  volume       = {48},
  number       = {11},
  pages        = {7--9},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.330},
  doi          = {10.1109/MC.2015.330},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Gaff15f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Garber15,
  author       = {Lee Garber},
  title        = {News},
  journal      = {Computer},
  volume       = {48},
  number       = {3},
  pages        = {13--19},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.80},
  doi          = {10.1109/MC.2015.80},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Garber15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Gary15,
  author       = {Kevin Gary},
  title        = {Project-Based Learning},
  journal      = {Computer},
  volume       = {48},
  number       = {9},
  pages        = {98--100},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.268},
  doi          = {10.1109/MC.2015.268},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Gary15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Gaudiot15,
  author       = {Jean{-}Luc Gaudiot},
  title        = {The Times They Are A-Changin'},
  journal      = {Computer},
  volume       = {48},
  number       = {7},
  pages        = {4--6},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.197},
  doi          = {10.1109/MC.2015.197},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Gaudiot15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/GebaraHN15,
  author       = {Fadi H. Gebara and
                  H. Peter Hofstee and
                  Kevin J. Nowka},
  title        = {Second-Generation Big Data Systems},
  journal      = {Computer},
  volume       = {48},
  number       = {1},
  pages        = {36--41},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.25},
  doi          = {10.1109/MC.2015.25},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/GebaraHN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/GesslerS15,
  author       = {Damian D. G. Gessler and
                  Evren Sirin},
  title        = {{SSWAP:} Enabling Transaction-Time Reasoning for Semantic Workflows},
  journal      = {Computer},
  volume       = {48},
  number       = {9},
  pages        = {60--68},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.262},
  doi          = {10.1109/MC.2015.262},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/GesslerS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Getov15,
  author       = {Vladimir Getov},
  title        = {Scientific Grand Challenges: Toward Exascale Supercomputing and Beyond},
  journal      = {Computer},
  volume       = {48},
  number       = {11},
  pages        = {12--14},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.341},
  doi          = {10.1109/MC.2015.341},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Getov15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/GieseSVWHJLRXOR15,
  author       = {Martin Giese and
                  Ahmet Soylu and
                  Guillermo Vega{-}Gorgojo and
                  Arild Waaler and
                  Peter Haase and
                  Ernesto Jim{\'{e}}nez{-}Ruiz and
                  Davide Lanti and
                  Mart{\'{\i}}n Rezk and
                  Guohui Xiao and
                  {\"{O}}zg{\"{u}}r L. {\"{O}}z{\c{c}}ep and
                  Riccardo Rosati},
  title        = {Optique: Zooming in on Big Data},
  journal      = {Computer},
  volume       = {48},
  number       = {3},
  pages        = {60--67},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.82},
  doi          = {10.1109/MC.2015.82},
  timestamp    = {Thu, 02 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/GieseSVWHJLRXOR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/GillmanLMS15,
  author       = {David Gillman and
                  Yin Lin and
                  Bruce M. Maggs and
                  Ramesh K. Sitaraman},
  title        = {Protecting Websites from Attack with Secure Delivery Networks},
  journal      = {Computer},
  volume       = {48},
  number       = {4},
  pages        = {26--34},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.116},
  doi          = {10.1109/MC.2015.116},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/GillmanLMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier15,
  author       = {David Alan Grier},
  title        = {State Transitions},
  journal      = {Computer},
  volume       = {48},
  number       = {1},
  pages        = {92},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.27},
  doi          = {10.1109/MC.2015.27},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier15a,
  author       = {David Alan Grier},
  title        = {The Tyranny of Geography},
  journal      = {Computer},
  volume       = {48},
  number       = {2},
  pages        = {100},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.58},
  doi          = {10.1109/MC.2015.58},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier15b,
  author       = {David Alan Grier},
  title        = {Building Trust},
  journal      = {Computer},
  volume       = {48},
  number       = {3},
  pages        = {136},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.63},
  doi          = {10.1109/MC.2015.63},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier15c,
  author       = {David Alan Grier},
  title        = {Accidents Will Happen},
  journal      = {Computer},
  volume       = {48},
  number       = {4},
  pages        = {104},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.95},
  doi          = {10.1109/MC.2015.95},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier15c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier15d,
  author       = {David Alan Grier},
  title        = {The GitHub Effect},
  journal      = {Computer},
  volume       = {48},
  number       = {5},
  pages        = {116},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.146},
  doi          = {10.1109/MC.2015.146},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier15d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier15e,
  author       = {David Alan Grier},
  title        = {Disruptive Computing},
  journal      = {Computer},
  volume       = {48},
  number       = {6},
  pages        = {100},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.162},
  doi          = {10.1109/MC.2015.162},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier15e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier15f,
  author       = {David Alan Grier},
  title        = {Do We Need a Software Czar?},
  journal      = {Computer},
  volume       = {48},
  number       = {7},
  pages        = {104},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.198},
  doi          = {10.1109/MC.2015.198},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier15f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier15g,
  author       = {David Alan Grier},
  title        = {In Search of the Diabolical Disconnect},
  journal      = {Computer},
  volume       = {48},
  number       = {8},
  pages        = {128},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.241},
  doi          = {10.1109/MC.2015.241},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier15g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier15h,
  author       = {David Alan Grier},
  title        = {Industrial Leadership},
  journal      = {Computer},
  volume       = {48},
  number       = {9},
  pages        = {120},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.284},
  doi          = {10.1109/MC.2015.284},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier15h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier15i,
  author       = {David Alan Grier},
  title        = {The Voracious Discipline},
  journal      = {Computer},
  volume       = {48},
  number       = {10},
  pages        = {120},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.288},
  doi          = {10.1109/MC.2015.288},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier15i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier15j,
  author       = {David Alan Grier},
  title        = {Hidden Persuaders},
  journal      = {Computer},
  volume       = {48},
  number       = {11},
  pages        = {136},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.348},
  doi          = {10.1109/MC.2015.348},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier15j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier15k,
  author       = {David Alan Grier},
  title        = {Quantum Imagination},
  journal      = {Computer},
  volume       = {48},
  number       = {12},
  pages        = {128},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.365},
  doi          = {10.1109/MC.2015.365},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier15k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/GudivadaBR15,
  author       = {Venkat N. Gudivada and
                  Ricardo Baeza{-}Yates and
                  Vijay V. Raghavan},
  title        = {Big Data: Promises and Problems},
  journal      = {Computer},
  volume       = {48},
  number       = {3},
  pages        = {20--23},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.62},
  doi          = {10.1109/MC.2015.62},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/GudivadaBR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/GudivadaRP15,
  author       = {Venkat N. Gudivada and
                  Dhana Rao and
                  Jordan Paris},
  title        = {Understanding Search-Engine Optimization},
  journal      = {Computer},
  volume       = {48},
  number       = {10},
  pages        = {43--52},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.297},
  doi          = {10.1109/MC.2015.297},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/GudivadaRP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Gundy-Burlet15,
  author       = {Karen Gundy{-}Burlet},
  title        = {The Use of Standards on the {LADEE} Mission},
  journal      = {Computer},
  volume       = {48},
  number       = {5},
  pages        = {92--95},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.148},
  doi          = {10.1109/MC.2015.148},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Gundy-Burlet15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/GuoWSSBG15,
  author       = {Anhong Guo and
                  Xiaolong Wu and
                  Zhengyang Shen and
                  Thad Starner and
                  Hannes Baumann and
                  Scott M. Gilliland},
  title        = {Order Picking with Head-Up Displays},
  journal      = {Computer},
  volume       = {48},
  number       = {6},
  pages        = {16--24},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.166},
  doi          = {10.1109/MC.2015.166},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/GuoWSSBG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HagarWKK15,
  author       = {Jon D. Hagar and
                  Thomas L. Wissink and
                  D. Richard Kuhn and
                  Raghu Kacker},
  title        = {Introducing Combinatorial Testing in a Large Organization},
  journal      = {Computer},
  volume       = {48},
  number       = {4},
  pages        = {64--72},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.114},
  doi          = {10.1109/MC.2015.114},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/HagarWKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HahnleJ15,
  author       = {Reiner H{\"{a}}hnle and
                  Einar Broch Johnsen},
  title        = {Designing Resource-Aware Cloud Applications},
  journal      = {Computer},
  volume       = {48},
  number       = {6},
  pages        = {72--75},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.172},
  doi          = {10.1109/MC.2015.172},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/HahnleJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HalappanavarPAM15,
  author       = {Mahantesh Halappanavar and
                  Alex Pothen and
                  Ariful Azad and
                  Fredrik Manne and
                  Johannes Langguth and
                  Arif M. Khan},
  title        = {Codesign Lessons Learned from Implementing Graph Matching on Multithreaded
                  Architectures},
  journal      = {Computer},
  volume       = {48},
  number       = {8},
  pages        = {46--55},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.215},
  doi          = {10.1109/MC.2015.215},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/HalappanavarPAM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HambruschL15,
  author       = {Susanne E. Hambrusch and
                  Ran Libeskind{-}Hadas},
  title        = {The PhD Pipeline},
  journal      = {Computer},
  volume       = {48},
  number       = {5},
  pages        = {76--79},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.147},
  doi          = {10.1109/MC.2015.147},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/HambruschL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HammerY15,
  author       = {Jon C. Hammer and
                  Tingxin Yan},
  title        = {Inferring Mobile User Status with Usage Cues},
  journal      = {Computer},
  volume       = {48},
  number       = {6},
  pages        = {34--40},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.169},
  doi          = {10.1109/MC.2015.169},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/HammerY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HeckmanSST15,
  author       = {Kristin E. Heckman and
                  Frank J. Stech and
                  Ben S. Schmoker and
                  Roshan K. Thomas},
  title        = {Denial and Deception in Cyber Defense},
  journal      = {Computer},
  volume       = {48},
  number       = {4},
  pages        = {36--44},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.104},
  doi          = {10.1109/MC.2015.104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/HeckmanSST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Helal15,
  author       = {Sumi Helal},
  title        = {Sustaining Computer's Impact and Adapting to Change},
  journal      = {Computer},
  volume       = {48},
  number       = {1},
  pages        = {7--9},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.28},
  doi          = {10.1109/MC.2015.28},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Helal15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Helal15a,
  author       = {Sumi Helal},
  title        = {However You Like It: Computer's Enhanced Digital Format or Affordable
                  Print Option},
  journal      = {Computer},
  volume       = {48},
  number       = {9},
  pages        = {6},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.281},
  doi          = {10.1109/MC.2015.281},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Helal15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HeuerHP15,
  author       = {J{\"{o}}rg Heuer and
                  Johannes Hund and
                  Oliver Pfaff},
  title        = {Toward the Web of Things: Applying Web Technologies to the Physical
                  World},
  journal      = {Computer},
  volume       = {48},
  number       = {5},
  pages        = {34--42},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.152},
  doi          = {10.1109/MC.2015.152},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/HeuerHP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HolmesKJ15,
  author       = {D. Scott Holmes and
                  Alan M. Kadin and
                  Mark W. Johnson},
  title        = {Superconducting Computing in Large-Scale Hybrid Systems},
  journal      = {Computer},
  volume       = {48},
  number       = {12},
  pages        = {34--42},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.375},
  doi          = {10.1109/MC.2015.375},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/HolmesKJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Hornbaek15,
  author       = {Kasper Hornb{\ae}k},
  title        = {Flexible Displays, Rigid Designs?},
  journal      = {Computer},
  volume       = {48},
  number       = {3},
  pages        = {92--96},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.70},
  doi          = {10.1109/MC.2015.70},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Hornbaek15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HsuMV15,
  author       = {D. Frank Hsu and
                  Dorothy Marinucci and
                  Jeffrey M. Voas},
  title        = {Cybersecurity: Toward a Secure and Sustainable Cyber Ecosystem},
  journal      = {Computer},
  volume       = {48},
  number       = {4},
  pages        = {12--14},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.103},
  doi          = {10.1109/MC.2015.103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/HsuMV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HuKF15,
  author       = {Vincent C. Hu and
                  D. Richard Kuhn and
                  David F. Ferraiolo},
  title        = {Attribute-Based Access Control},
  journal      = {Computer},
  volume       = {48},
  number       = {2},
  pages        = {85--88},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.33},
  doi          = {10.1109/MC.2015.33},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/HuKF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Hurlburt15,
  author       = {George F. Hurlburt},
  title        = {Cyberhuman Security},
  journal      = {Computer},
  volume       = {48},
  number       = {5},
  pages        = {88--91},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.127},
  doi          = {10.1109/MC.2015.127},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/Hurlburt15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/JacucciFS15,
  author       = {Giulio Jacucci and
                  Stephen Fairclough and
                  Erin Treacy Solovey},
  title        = {Physiological Computing},
  journal      = {Computer},
  volume       = {48},
  number       = {10},
  pages        = {12--16},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.291},
  doi          = {10.1109/MC.2015.291},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/JacucciFS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Johnson15,
  author       = {Brian David Johnson},
  title        = {Steve the Steampunk Robot},
  journal      = {Computer},
  volume       = {48},
  number       = {7},
  pages        = {70--72},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.189},
  doi          = {10.1109/MC.2015.189},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Johnson15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KangWHPS15,
  author       = {Kyungtae Kang and
                  Qixin Wang and
                  Junbeom Hur and
                  Kyung{-}Joon Park and
                  Lui Sha},
  title        = {Medical-Grade Quality of Service for Real-Time Mobile Healthcare},
  journal      = {Computer},
  volume       = {48},
  number       = {2},
  pages        = {41--49},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.52},
  doi          = {10.1109/MC.2015.52},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KangWHPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KaurR15,
  author       = {Karamjit Kaur and
                  Rinkle Rani},
  title        = {Managing Data in Healthcare Information Systems: Many Models, One
                  Solution},
  journal      = {Computer},
  volume       = {48},
  number       = {3},
  pages        = {52--59},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.77},
  doi          = {10.1109/MC.2015.77},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KaurR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Keckler15,
  author       = {Stephen W. Keckler},
  title        = {Increasing Interconnection Network Throughput with Virtual Channels},
  journal      = {Computer},
  volume       = {48},
  number       = {7},
  pages        = {10},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.191},
  doi          = {10.1109/MC.2015.191},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Keckler15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KeonPY15,
  author       = {Dylan Keon and
                  Cherri M. Pancake and
                  Harry Yeh},
  title        = {Protecting Our Shorelines: Modeling the Effects of Tsunamis and Storm
                  Waves},
  journal      = {Computer},
  volume       = {48},
  number       = {11},
  pages        = {23--32},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.339},
  doi          = {10.1109/MC.2015.339},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KeonPY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KhasanvisLRBFAB15,
  author       = {Santosh Khasanvis and
                  Mingyu Li and
                  Mostafizur Rahman and
                  Ayan Kumar Biswas and
                  Mohammad Salehi Fashami and
                  Jayasimha Atulasimha and
                  Supriyo Bandyopadhyay and
                  Csaba Andras Moritz},
  title        = {Architecting for Causal Intelligence at Nanoscale},
  journal      = {Computer},
  volume       = {48},
  number       = {12},
  pages        = {54--64},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.367},
  doi          = {10.1109/MC.2015.367},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/KhasanvisLRBFAB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Kirkham15,
  author       = {Reuben Kirkham},
  title        = {Can Disability Discrimination Law Expand the Availability of Wearable
                  Computers?},
  journal      = {Computer},
  volume       = {48},
  number       = {6},
  pages        = {25--33},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.167},
  doi          = {10.1109/MC.2015.167},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Kirkham15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Klamma15,
  author       = {Ralf Klamma},
  title        = {Near-Real-Time Social Computing},
  journal      = {Computer},
  volume       = {48},
  number       = {9},
  pages        = {90--92},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.266},
  doi          = {10.1109/MC.2015.266},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Klamma15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KoliasSV15,
  author       = {Constantinos Kolias and
                  Angelos Stavrou and
                  Jeffrey M. Voas},
  title        = {Securely Making "Things" Right},
  journal      = {Computer},
  volume       = {48},
  number       = {9},
  pages        = {84--88},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.258},
  doi          = {10.1109/MC.2015.258},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KoliasSV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KottAW15,
  author       = {Alexander Kott and
                  David S. Alberts and
                  Cliff Wang},
  title        = {Will Cybersecurity Dictate the Outcome of Future Wars?},
  journal      = {Computer},
  volume       = {48},
  number       = {12},
  pages        = {98--101},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.359},
  doi          = {10.1109/MC.2015.359},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KottAW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Kristensson15,
  author       = {Per Ola Kristensson},
  title        = {Next-Generation Text Entry},
  journal      = {Computer},
  volume       = {48},
  number       = {7},
  pages        = {84--87},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.185},
  doi          = {10.1109/MC.2015.185},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Kristensson15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Kshetri15,
  author       = {Nir Kshetri},
  title        = {Recent {US} Cybersecurity Policy Initiatives: Challenges and Implications},
  journal      = {Computer},
  volume       = {48},
  number       = {7},
  pages        = {64--69},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.188},
  doi          = {10.1109/MC.2015.188},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Kshetri15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Lee15,
  author       = {Ruby B. Lee},
  title        = {Rethinking Computers for Cybersecurity},
  journal      = {Computer},
  volume       = {48},
  number       = {4},
  pages        = {16--25},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.118},
  doi          = {10.1109/MC.2015.118},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Lee15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/LenharthP15,
  author       = {Andrew Lenharth and
                  Keshav Pingali},
  title        = {Scaling Runtimes for Irregular Algorithms to Large-Scale {NUMA} Systems},
  journal      = {Computer},
  volume       = {48},
  number       = {8},
  pages        = {35--44},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.229},
  doi          = {10.1109/MC.2015.229},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/LenharthP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/LewisCFGCBTY15,
  author       = {Peter R. Lewis and
                  Arjun Chandra and
                  Funmilade Faniyi and
                  Kyrre Glette and
                  Tao Chen and
                  Rami Bahsoon and
                  Jim T{\o}rresen and
                  Xin Yao},
  title        = {Architectural Aspects of Self-Aware and Self-Expressive Computing
                  Systems: From Psychology to Engineering},
  journal      = {Computer},
  volume       = {48},
  number       = {8},
  pages        = {62--70},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.235},
  doi          = {10.1109/MC.2015.235},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/LewisCFGCBTY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Li15,
  author       = {Jingquan Li},
  title        = {Ensuring Privacy in a Personal Health Record System},
  journal      = {Computer},
  volume       = {48},
  number       = {2},
  pages        = {24--31},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.43},
  doi          = {10.1109/MC.2015.43},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Li15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Liu15,
  author       = {Ling Liu},
  title        = {Enhancing Cloud Services through Multitier Workload Analysis},
  journal      = {Computer},
  volume       = {48},
  number       = {5},
  pages        = {6},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.128},
  doi          = {10.1109/MC.2015.128},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Liu15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/LiuF15,
  author       = {Shixia Liu and
                  Leila De Floriani},
  title        = {Multivariate Network Exploration and Presentations},
  journal      = {Computer},
  volume       = {48},
  number       = {8},
  pages        = {6},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.236},
  doi          = {10.1109/MC.2015.236},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/LiuF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/LiuXPCH15,
  author       = {Jia Liu and
                  Yong Xue and
                  Dominic Palmer{-}Brown and
                  Ziqiang Chen and
                  Xingwei He},
  title        = {High-Throughput Geocomputational Workflows in a Grid Environment},
  journal      = {Computer},
  volume       = {48},
  number       = {11},
  pages        = {70--80},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.331},
  doi          = {10.1109/MC.2015.331},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/LiuXPCH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/LloydG15,
  author       = {G. Scott Lloyd and
                  Maya B. Gokhale},
  title        = {In-Memory Data Rearrangement for Irregular, Data-Intensive Computing},
  journal      = {Computer},
  volume       = {48},
  number       = {8},
  pages        = {18--25},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.230},
  doi          = {10.1109/MC.2015.230},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/LloydG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/LucaL15,
  author       = {Alexander De Luca and
                  Janne Lindqvist},
  title        = {Is Secure and Usable Smartphone Authentication Asking Too Much?},
  journal      = {Computer},
  volume       = {48},
  number       = {5},
  pages        = {64--68},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.134},
  doi          = {10.1109/MC.2015.134},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/LucaL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/MensG15,
  author       = {Tom Mens and
                  Philippe Grosjean},
  title        = {The Ecology of Software Ecosystems},
  journal      = {Computer},
  volume       = {48},
  number       = {10},
  pages        = {85--87},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.298},
  doi          = {10.1109/MC.2015.298},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/MensG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Menzies15,
  author       = {Tim Menzies},
  title        = {Cross-Project Data for Software Engineering},
  journal      = {Computer},
  volume       = {48},
  number       = {12},
  pages        = {6},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.381},
  doi          = {10.1109/MC.2015.381},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/Menzies15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Michael15,
  author       = {James Bret Michael},
  title        = {Trusted Computing: An Elusive Goal},
  journal      = {Computer},
  volume       = {48},
  number       = {3},
  pages        = {99--101},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.90},
  doi          = {10.1109/MC.2015.90},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Michael15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/MikuszCJHWD15,
  author       = {Mateusz Mikusz and
                  Sarah Clinch and
                  Rachel Jones and
                  Mike Harding and
                  Christopher Winstanley and
                  Nigel Davies},
  title        = {Repurposing Web Analytics to Support the IoT},
  journal      = {Computer},
  volume       = {48},
  number       = {9},
  pages        = {42--49},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.260},
  doi          = {10.1109/MC.2015.260},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/MikuszCJHWD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/MiyoshiKT15,
  author       = {Takemasa Miyoshi and
                  Keiichi Kondo and
                  Koji Terasaki},
  title        = {Big Ensemble Data Assimilation in Numerical Weather Prediction},
  journal      = {Computer},
  volume       = {48},
  number       = {11},
  pages        = {15--21},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.332},
  doi          = {10.1109/MC.2015.332},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/MiyoshiKT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Mohapatra15,
  author       = {Prasant Mohapatra},
  title        = {Distributed Optimal Channel Access in Cognitive Radio Networks},
  journal      = {Computer},
  volume       = {48},
  number       = {6},
  pages        = {6},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.163},
  doi          = {10.1109/MC.2015.163},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Mohapatra15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/MontalvoMFC15,
  author       = {Soto Montalvo and
                  Raquel Mart{\'{\i}}nez{-}Unanue and
                  V{\'{\i}}ctor Fresno and
                  Rafael Capilla},
  title        = {Multilingual Information Access on the Web},
  journal      = {Computer},
  volume       = {48},
  number       = {7},
  pages        = {73--75},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.203},
  doi          = {10.1109/MC.2015.203},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/MontalvoMFC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Montuschi15,
  author       = {Paolo Montuschi},
  title        = {Spiking Neural Network Architecture},
  journal      = {Computer},
  volume       = {48},
  number       = {10},
  pages        = {6},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.293},
  doi          = {10.1109/MC.2015.293},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Montuschi15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/MountainMPPK15,
  author       = {David J. Mountain and
                  Mark R. McLean and
                  Doug Palmer and
                  Joshua D. Prucnal and
                  Christopher D. Krieger},
  title        = {Ohmic Weave: Memristor-Based Threshold Gate Networks},
  journal      = {Computer},
  volume       = {48},
  number       = {12},
  pages        = {65--71},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.369},
  doi          = {10.1109/MC.2015.369},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/MountainMPPK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/NettoCS15,
  author       = {Marco A. S. Netto and
                  Renato Luiz de Freitas Cunha and
                  Nicole Sultanum},
  title        = {Deciding When and How to Move {HPC} Jobs to the Cloud},
  journal      = {Computer},
  volume       = {48},
  number       = {11},
  pages        = {86--89},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.351},
  doi          = {10.1109/MC.2015.351},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/NettoCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/PapamichaelH15,
  author       = {Michael K. Papamichael and
                  James C. Hoe},
  title        = {The {CONNECT} Network-on-Chip Generator},
  journal      = {Computer},
  volume       = {48},
  number       = {12},
  pages        = {72--79},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.378},
  doi          = {10.1109/MC.2015.378},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/PapamichaelH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Parhami15,
  author       = {Behrooz Parhami},
  title        = {Amdahl's Reliability Law: {A} Simple Quantification of the Weakest-Link
                  Phenomenon},
  journal      = {Computer},
  volume       = {48},
  number       = {7},
  pages        = {55--58},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.202},
  doi          = {10.1109/MC.2015.202},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Parhami15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ParssianYE15,
  author       = {Amir Parssian and
                  William Yeoh and
                  Mong{-}Shan Ee},
  title        = {Quality-Based {SQL:} Specifying Information Quality in Relational
                  Database Queries},
  journal      = {Computer},
  volume       = {48},
  number       = {9},
  pages        = {69--74},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.264},
  doi          = {10.1109/MC.2015.264},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ParssianYE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/PatsakisLCBS15,
  author       = {Constantinos Patsakis and
                  Paul Laird and
                  Michael Clear and
                  M{\'{e}}lanie Bouroche and
                  Agusti Solanas},
  title        = {Interoperable Privacy-Aware E-Participation within Smart Cities},
  journal      = {Computer},
  volume       = {48},
  number       = {1},
  pages        = {52--58},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.16},
  doi          = {10.1109/MC.2015.16},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/PatsakisLCBS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/PeckCJ15,
  author       = {Evan M. Peck and
                  Emily Carlin and
                  Robert J. K. Jacob},
  title        = {Designing Brain-Computer Interfaces for Attention-Aware Systems},
  journal      = {Computer},
  volume       = {48},
  number       = {10},
  pages        = {34--42},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.315},
  doi          = {10.1109/MC.2015.315},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/PeckCJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/PendyalaSB15,
  author       = {Vishnu S. Pendyala and
                  Simon S. Y. Shim and
                  Christoph Bussler},
  title        = {The Web That Extends beyond the World},
  journal      = {Computer},
  volume       = {48},
  number       = {5},
  pages        = {18--25},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.150},
  doi          = {10.1109/MC.2015.150},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/PendyalaSB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Popper15,
  author       = {Ari Popper},
  title        = {Transforming Business through Science Fiction Prototyping},
  journal      = {Computer},
  volume       = {48},
  number       = {1},
  pages        = {70--72},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.30},
  doi          = {10.1109/MC.2015.30},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Popper15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/PredenTJLRC15,
  author       = {J{\"{u}}rgo{-}S{\"{o}}ren Preden and
                  Kalle Tammem{\"{a}}e and
                  Axel Jantsch and
                  Mairo Leier and
                  Andri Riid and
                  Emine Calis},
  title        = {The Benefits of Self-Awareness and Attention in Fog and Mist Computing},
  journal      = {Computer},
  volume       = {48},
  number       = {7},
  pages        = {37--45},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.207},
  doi          = {10.1109/MC.2015.207},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/PredenTJLRC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Raggett15,
  author       = {Dave Raggett},
  title        = {The Web of Things: Challenges and Opportunities},
  journal      = {Computer},
  volume       = {48},
  number       = {5},
  pages        = {26--32},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.149},
  doi          = {10.1109/MC.2015.149},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Raggett15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/RajputSK15,
  author       = {Hitesh Rajput and
                  Tanmoy Som and
                  Soumitra Kar},
  title        = {An Automated Vehicle License Plate Recognition System},
  journal      = {Computer},
  volume       = {48},
  number       = {8},
  pages        = {56--61},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.244},
  doi          = {10.1109/MC.2015.244},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/RajputSK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Rao15,
  author       = {Dhananjai Madhava Rao},
  title        = {Computing Efficiency in Education},
  journal      = {Computer},
  volume       = {48},
  number       = {7},
  pages        = {76--79},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.199},
  doi          = {10.1109/MC.2015.199},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Rao15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Riehle15,
  author       = {Dirk Riehle},
  title        = {How Open Source Is Changing the Software Developer's Career},
  journal      = {Computer},
  volume       = {48},
  number       = {5},
  pages        = {51--57},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.132},
  doi          = {10.1109/MC.2015.132},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Riehle15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/RinnerESNPDL15,
  author       = {Bernhard Rinner and
                  Lukas Esterle and
                  Jennifer Simonjan and
                  Georg Nebehay and
                  Roman P. Pflugfelder and
                  Gustavo Fern{\'{a}}ndez Dom{\'{\i}}nguez and
                  Peter R. Lewis},
  title        = {Self-Aware and Self-Expressive Camera Networks},
  journal      = {Computer},
  volume       = {48},
  number       = {7},
  pages        = {21--28},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.209},
  doi          = {10.1109/MC.2015.209},
  timestamp    = {Wed, 19 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/RinnerESNPDL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/RoachS15,
  author       = {Steve Roach and
                  Mehran Sahami},
  title        = {{CS2013:} Computer Science Curricula 2013},
  journal      = {Computer},
  volume       = {48},
  number       = {3},
  pages        = {114--116},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.68},
  doi          = {10.1109/MC.2015.68},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/RoachS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/RomeroNRSKVM15,
  author       = {Nichols A. Romero and
                  Aiichiro Nakano and
                  Katherine Riley and
                  Fuyuki Shimojo and
                  Rajiv K. Kalia and
                  Priya Vashishta and
                  Paul C. Messina},
  title        = {Quantum Molecular Dynamics in the Post-Petaflops Era},
  journal      = {Computer},
  volume       = {48},
  number       = {11},
  pages        = {33--41},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.337},
  doi          = {10.1109/MC.2015.337},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/RomeroNRSKVM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/RosalesSB15,
  author       = {Andrea Rosales and
                  Sergio Sayago and
                  Josep Blat},
  title        = {Beeping Socks and Chirping Arm Bands: Wearables That Foster Free Play},
  journal      = {Computer},
  volume       = {48},
  number       = {6},
  pages        = {41--48},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.168},
  doi          = {10.1109/MC.2015.168},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/RosalesSB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/RozadoD15,
  author       = {David Rozado Fernandez and
                  Andreas D{\"{u}}nser},
  title        = {Combining {EEG} with Pupillometry to Improve Cognitive Workload Detection},
  journal      = {Computer},
  volume       = {48},
  number       = {10},
  pages        = {18--25},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.314},
  doi          = {10.1109/MC.2015.314},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/RozadoD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SabryGHLPSWABFG15,
  author       = {Mohamed M. Sabry and
                  Mingyu Gao and
                  Gage Hills and
                  Chi{-}Shuen Lee and
                  Greg Pitner and
                  Max M. Shulaker and
                  Tony F. Wu and
                  Mehdi Asheghi and
                  Jeffrey Bokor and
                  Franz Franchetti and
                  Kenneth E. Goodson and
                  Christos Kozyrakis and
                  Igor L. Markov and
                  Kunle Olukotun and
                  Larry T. Pileggi and
                  Eric Pop and
                  Jan M. Rabaey and
                  Christopher R{\'{e}} and
                  H.{-}S. Philip Wong and
                  Subhasish Mitra},
  title        = {Energy-Efficient Abundant-Data Computing: The {N3XT} 1, 000x},
  journal      = {Computer},
  volume       = {48},
  number       = {12},
  pages        = {24--33},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.376},
  doi          = {10.1109/MC.2015.376},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/SabryGHLPSWABFG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SainiE15,
  author       = {Mukesh Kumar Saini and
                  Abdulmotaleb El{-}Saddik},
  title        = {Absence Privacy Loss},
  journal      = {Computer},
  volume       = {48},
  number       = {11},
  pages        = {102--105},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.346},
  doi          = {10.1109/MC.2015.346},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/SainiE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Schaffer15,
  author       = {Kim Schaffer},
  title        = {Expanding Continuous Authentication with Mobile Devices},
  journal      = {Computer},
  volume       = {48},
  number       = {11},
  pages        = {92--95},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.333},
  doi          = {10.1109/MC.2015.333},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Schaffer15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SchlessmanW15,
  author       = {Jason Schlessman and
                  Marilyn Wolf},
  title        = {Tailoring Design for Embedded Computer Vision Applications},
  journal      = {Computer},
  volume       = {48},
  number       = {5},
  pages        = {58--62},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.145},
  doi          = {10.1109/MC.2015.145},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/SchlessmanW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Schlieski15,
  author       = {Tawny Schlieski},
  title        = {Virtual Dystopia},
  journal      = {Computer},
  volume       = {48},
  number       = {3},
  pages        = {97--98},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.91},
  doi          = {10.1109/MC.2015.91},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Schlieski15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Schuller15,
  author       = {Bj{\"{o}}rn W. Schuller},
  title        = {Do Computers Have Personality?},
  journal      = {Computer},
  volume       = {48},
  number       = {3},
  pages        = {6--7},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.69},
  doi          = {10.1109/MC.2015.69},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Schuller15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Severance15,
  author       = {Charles R. Severance},
  title        = {Khan Academy and Computer Science},
  journal      = {Computer},
  volume       = {48},
  number       = {1},
  pages        = {14--15},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.18},
  doi          = {10.1109/MC.2015.18},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Severance15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Severance15a,
  author       = {Charles R. Severance},
  title        = {Guido van Rossum: The Early Years of Python},
  journal      = {Computer},
  volume       = {48},
  number       = {2},
  pages        = {7--9},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.45},
  doi          = {10.1109/MC.2015.45},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Severance15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Severance15b,
  author       = {Charles R. Severance},
  title        = {Guido van Rossum: The Modern Era of Python},
  journal      = {Computer},
  volume       = {48},
  number       = {3},
  pages        = {8--10},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.73},
  doi          = {10.1109/MC.2015.73},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Severance15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Severance15c,
  author       = {Charles R. Severance},
  title        = {John Resig: Building JQuery},
  journal      = {Computer},
  volume       = {48},
  number       = {5},
  pages        = {7--8},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.135},
  doi          = {10.1109/MC.2015.135},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Severance15c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Severance15d,
  author       = {Charles R. Severance},
  title        = {Roy T. Fielding: Understanding the {REST} Style},
  journal      = {Computer},
  volume       = {48},
  number       = {6},
  pages        = {7--9},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.170},
  doi          = {10.1109/MC.2015.170},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Severance15d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Severance15e,
  author       = {Charles R. Severance},
  title        = {Anil Jain: 25 Years of Biometric Recognition},
  journal      = {Computer},
  volume       = {48},
  number       = {8},
  pages        = {8--10},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.232},
  doi          = {10.1109/MC.2015.232},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Severance15e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Severance15f,
  author       = {Charles R. Severance},
  title        = {Anant Agarwal: Inside edX},
  journal      = {Computer},
  volume       = {48},
  number       = {10},
  pages        = {8--9},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.308},
  doi          = {10.1109/MC.2015.308},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Severance15f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ShalfL15,
  author       = {John M. Shalf and
                  Robert Leland},
  title        = {Computing beyond Moore's Law},
  journal      = {Computer},
  volume       = {48},
  number       = {12},
  pages        = {14--23},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.374},
  doi          = {10.1109/MC.2015.374},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ShalfL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Sharples15,
  author       = {Mike Sharples},
  title        = {Seamless Learning: Using Location-Aware Technology to Support Art
                  Education},
  journal      = {Computer},
  volume       = {48},
  number       = {11},
  pages        = {6},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.323},
  doi          = {10.1109/MC.2015.323},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Sharples15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ShenVCV15,
  author       = {Emily Shen and
                  Mayank Varia and
                  Robert K. Cunningham and
                  W. Konrad Vesey},
  title        = {Cryptographically Secure Computation},
  journal      = {Computer},
  volume       = {48},
  number       = {4},
  pages        = {78--81},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.101},
  doi          = {10.1109/MC.2015.101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ShenVCV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ShimLKD15,
  author       = {Keun Sup Shim and
                  Mieszko Lis and
                  Omer Khan and
                  Srinivas Devadas},
  title        = {The Execution Migration Machine: Directoryless Shared-Memory Architecture},
  journal      = {Computer},
  volume       = {48},
  number       = {9},
  pages        = {50--59},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.263},
  doi          = {10.1109/MC.2015.263},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ShimLKD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SioniC15,
  author       = {Riccardo Sioni and
                  Luca Chittaro},
  title        = {Stress Detection Using Physiological Sensors},
  journal      = {Computer},
  volume       = {48},
  number       = {10},
  pages        = {26--33},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.316},
  doi          = {10.1109/MC.2015.316},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/SioniC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Spring15,
  author       = {Adam P. Spring},
  title        = {Creating Substance from a Cloud: Low-Cost Product Generation},
  journal      = {Computer},
  volume       = {48},
  number       = {2},
  pages        = {67--74},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.39},
  doi          = {10.1109/MC.2015.39},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Spring15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/StarnerM15,
  author       = {Thad Starner and
                  Tom L. Martin},
  title        = {Wearable Computing: The New Dress Code [Guest editors' introduction]},
  journal      = {Computer},
  volume       = {48},
  number       = {6},
  pages        = {12--15},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.176},
  doi          = {10.1109/MC.2015.176},
  timestamp    = {Fri, 28 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/StarnerM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/StrohmaierMDS15,
  author       = {Erich Strohmaier and
                  Hans Werner Meuer and
                  Jack J. Dongarra and
                  Horst D. Simon},
  title        = {The {TOP500} List and Progress in High-Performance Computing},
  journal      = {Computer},
  volume       = {48},
  number       = {11},
  pages        = {42--49},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.338},
  doi          = {10.1109/MC.2015.338},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/StrohmaierMDS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ThakoorABSM15,
  author       = {Ninad S. Thakoor and
                  Le An and
                  Bir Bhanu and
                  Santhoshkumar Sunderrajan and
                  B. S. Manjunath},
  title        = {People Tracking in Camera Networks: Three Open Questions},
  journal      = {Computer},
  volume       = {48},
  number       = {3},
  pages        = {78--86},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.83},
  doi          = {10.1109/MC.2015.83},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ThakoorABSM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/TimmererE015,
  author       = {Christian Timmerer and
                  Touradj Ebrahimi and
                  Fernando Pereira},
  title        = {Toward a New Assessment of Quality},
  journal      = {Computer},
  volume       = {48},
  number       = {3},
  pages        = {108--110},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.89},
  doi          = {10.1109/MC.2015.89},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/TimmererE015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Tockey15,
  author       = {Steve Tockey},
  title        = {Insanity, Hiring, and the Software Industry},
  journal      = {Computer},
  volume       = {48},
  number       = {11},
  pages        = {96--101},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.318},
  doi          = {10.1109/MC.2015.318},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Tockey15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/TorresenPY15,
  author       = {Jim T{\o}rresen and
                  Christian Plessl and
                  Xin Yao},
  title        = {Self-Aware and Self-Expressive Systems},
  journal      = {Computer},
  volume       = {48},
  number       = {7},
  pages        = {18--20},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.205},
  doi          = {10.1109/MC.2015.205},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/TorresenPY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/TruongD15,
  author       = {Hong Linh Truong and
                  Schahram Dustdar},
  title        = {Programming Elasticity in the Cloud},
  journal      = {Computer},
  volume       = {48},
  number       = {3},
  pages        = {87--90},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.84},
  doi          = {10.1109/MC.2015.84},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/TruongD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/TumeoF15,
  author       = {Antonino Tumeo and
                  John Feo},
  title        = {Irregular Applications: From Architectures to Algorithms [Guest editors'
                  introduction]},
  journal      = {Computer},
  volume       = {48},
  number       = {8},
  pages        = {14--16},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.233},
  doi          = {10.1109/MC.2015.233},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/TumeoF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/UllahMV15,
  author       = {Najeeb Ullah and
                  Maurizio Morisio and
                  Antonio Vetr{\`{o}}},
  title        = {Selecting the Best Reliability Model to Predict Residual Defects in
                  Open Source Software},
  journal      = {Computer},
  volume       = {48},
  number       = {6},
  pages        = {50--58},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2013.446},
  doi          = {10.1109/MC.2013.446},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/UllahMV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/VagounS15,
  author       = {Tomas Vagoun and
                  George O. Strawn},
  title        = {Implementing the Federal Cybersecurity R{\&}D Strategy},
  journal      = {Computer},
  volume       = {48},
  number       = {4},
  pages        = {45--55},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.111},
  doi          = {10.1109/MC.2015.111},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/VagounS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ValdiLBQZM15,
  author       = {Andrea Valdi and
                  Eros Lever and
                  Simone Benefico and
                  Davide Quarta and
                  Stefano Zanero and
                  Federico Maggi},
  title        = {Scalable Testing of Mobile Antivirus Applications},
  journal      = {Computer},
  volume       = {48},
  number       = {11},
  pages        = {60--68},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.320},
  doi          = {10.1109/MC.2015.320},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ValdiLBQZM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/VassevH15,
  author       = {Emil Vassev and
                  Mike Hinchey},
  title        = {KnowLang: Knowledge Representation for Self-Adaptive Systems},
  journal      = {Computer},
  volume       = {48},
  number       = {2},
  pages        = {81--84},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.50},
  doi          = {10.1109/MC.2015.50},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/VassevH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/VelikovaLH15,
  author       = {Marina Velikova and
                  Peter J. F. Lucas and
                  Maarten van der Heijden},
  title        = {Intelligent Disease Self-Management with Mobile Technology},
  journal      = {Computer},
  volume       = {48},
  number       = {2},
  pages        = {32--39},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.48},
  doi          = {10.1109/MC.2015.48},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/VelikovaLH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/VetterM15,
  author       = {Ron Vetter and
                  San Murugesan},
  title        = {The Web: The Next 25 Years},
  journal      = {Computer},
  volume       = {48},
  number       = {5},
  pages        = {14--17},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.151},
  doi          = {10.1109/MC.2015.151},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/VetterM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/VetterM15a,
  author       = {Ron Vetter and
                  San Murugesan},
  title        = {Roundtable Discussion: The Web We Look Forward To},
  journal      = {Computer},
  volume       = {48},
  number       = {5},
  pages        = {44--50},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.141},
  doi          = {10.1109/MC.2015.141},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/VetterM15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Voas15,
  author       = {Jeffrey M. Voas},
  title        = {Vetting Mobile App Vendors},
  journal      = {Computer},
  volume       = {48},
  number       = {6},
  pages        = {69--71},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.165},
  doi          = {10.1109/MC.2015.165},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Voas15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/VoasH15,
  author       = {Jeffrey M. Voas and
                  George F. Hurlburt},
  title        = {Third-Party Software's Trust Quagmire},
  journal      = {Computer},
  volume       = {48},
  number       = {12},
  pages        = {80--87},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.372},
  doi          = {10.1109/MC.2015.372},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/VoasH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/WangCWS15,
  author       = {Chia{-}Wei Wang and
                  Michael Cheng Yi Cho and
                  Chi{-}Wei Wang and
                  Shiuhpyng Winston Shieh},
  title        = {Combating Software Piracy in Public Clouds},
  journal      = {Computer},
  volume       = {48},
  number       = {10},
  pages        = {88--91},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.317},
  doi          = {10.1109/MC.2015.317},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/WangCWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/WantD15,
  author       = {Roy Want and
                  Schahram Dustdar},
  title        = {Activating the Internet of Things [Guest editors' introduction]},
  journal      = {Computer},
  volume       = {48},
  number       = {9},
  pages        = {16--20},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.282},
  doi          = {10.1109/MC.2015.282},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/WantD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/WantSJ15,
  author       = {Roy Want and
                  Bill N. Schilit and
                  Scott Jenson},
  title        = {Enabling the Internet of Things},
  journal      = {Computer},
  volume       = {48},
  number       = {1},
  pages        = {28--35},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.12},
  doi          = {10.1109/MC.2015.12},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/WantSJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/WeaverB15,
  author       = {Alf Weaver and
                  Ren{\'{e}}e C. Bryce},
  title        = {Technological Advances in Medicine: It's Personal [Guest editors'
                  introduction]},
  journal      = {Computer},
  volume       = {48},
  number       = {2},
  pages        = {21--23},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.57},
  doi          = {10.1109/MC.2015.57},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/WeaverB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Xu15,
  author       = {Ying Xu},
  title        = {Carrying out Phylogenetic Analyses through Computational Model Checking},
  journal      = {Computer},
  volume       = {48},
  number       = {1},
  pages        = {12},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.8},
  doi          = {10.1109/MC.2015.8},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Xu15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/XuSZFD15,
  author       = {Xiaofei Xu and
                  Quan Z. Sheng and
                  Liang{-}Jie Zhang and
                  Yushun Fan and
                  Schahram Dustdar},
  title        = {From Big Data to Big Service},
  journal      = {Computer},
  volume       = {48},
  number       = {7},
  pages        = {80--83},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.182},
  doi          = {10.1109/MC.2015.182},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/XuSZFD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ZhangCWS15,
  author       = {Zhi{-}Kai Zhang and
                  Michael Cheng Yi Cho and
                  Zong{-}Yu Wu and
                  Shiuhpyng Winston Shieh},
  title        = {Identifying and Authenticating IoT Objects in a Natural Context},
  journal      = {Computer},
  volume       = {48},
  number       = {8},
  pages        = {81--83},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.213},
  doi          = {10.1109/MC.2015.213},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ZhangCWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Zhanikeev15,
  author       = {Marat Zhanikeev},
  title        = {A Cloud Visitation Platform to Facilitate Cloud Federation and Fog
                  Computing},
  journal      = {Computer},
  volume       = {48},
  number       = {5},
  pages        = {80--83},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.122},
  doi          = {10.1109/MC.2015.122},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Zhanikeev15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ZhouL15,
  author       = {Wenqi Zhou and
                  Yuhong Liu},
  title        = {Online Product Rating Manipulation and Market Performance},
  journal      = {Computer},
  volume       = {48},
  number       = {5},
  pages        = {72--75},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.138},
  doi          = {10.1109/MC.2015.138},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ZhouL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ZhuangRX15,
  author       = {Zhenyun Zhuang and
                  Haricharan Ramachandra and
                  Chaoyue Xiong},
  title        = {Taming Replication Latency of Big Data Events with Capacity Planning},
  journal      = {Computer},
  volume       = {48},
  number       = {3},
  pages        = {36--41},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.88},
  doi          = {10.1109/MC.2015.88},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ZhuangRX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ZwartB15,
  author       = {Simon Portegies Zwart and
                  Jeroen B{\'{e}}dorf},
  title        = {Using GPUs to Enable Simulation with Computational Gravitational Dynamics
                  in Astrophysics},
  journal      = {Computer},
  volume       = {48},
  number       = {11},
  pages        = {50--58},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.334},
  doi          = {10.1109/MC.2015.334},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ZwartB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics