Search dblp for Publications

export results for "toc:db/journals/computer/computer51.bht:"

 download as .bib file

@article{DBLP:journals/computer/AbdelzaherABDDG18,
  author       = {Tarek F. Abdelzaher and
                  Nora Ayanian and
                  Tamer Basar and
                  Suhas N. Diggavi and
                  Jana Diesner and
                  Deepak Ganesan and
                  Ramesh Govindan and
                  Susmit Jha and
                  Tancr{\`{e}}de Lepoint and
                  Benjamin M. Marlin and
                  Klara Nahrstedt and
                  David M. Nicol and
                  Raj Rajkumar and
                  Stephen Russell and
                  Sanjit A. Seshia and
                  Fei Sha and
                  Prashant J. Shenoy and
                  Mani B. Srivastava and
                  Gaurav S. Sukhatme and
                  Ananthram Swami and
                  Paulo Tabuada and
                  Don Towsley and
                  Nitin H. Vaidya and
                  Venugopal V. Veeravalli},
  title        = {Toward an Internet of Battlefield Things: {A} Resilience Perspective},
  journal      = {Computer},
  volume       = {51},
  number       = {11},
  pages        = {24--36},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2876048},
  doi          = {10.1109/MC.2018.2876048},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/AbdelzaherABDDG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/AhnLBLK18,
  author       = {Jungmo Ahn and
                  Huynh Nguyen Loc and
                  Rajesh Krishna Balan and
                  Youngki Lee and
                  JeongGil Ko},
  title        = {Finding Small-Bowel Lesions: Challenges in Endoscopy-Image-Based Learning
                  Systems},
  journal      = {Computer},
  volume       = {51},
  number       = {5},
  pages        = {68--76},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2381116},
  doi          = {10.1109/MC.2018.2381116},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/AhnLBLK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/AkmandorJ18,
  author       = {Ayten Ozge Akmandor and
                  Niraj K. Jha},
  title        = {Detecting and Alleviating Stress with SoDA},
  journal      = {Computer},
  volume       = {51},
  number       = {7},
  pages        = {4--5},
  year         = {2018},
  url          = {http://doi.ieeecomputersociety.org/10.1109/MC.2018.3011032},
  doi          = {10.1109/MC.2018.3011032},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/AkmandorJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/AngelovG18,
  author       = {Plamen P. Angelov and
                  Xiaowei Gu},
  title        = {Toward Anthropomorphic Machine Learning},
  journal      = {Computer},
  volume       = {51},
  number       = {9},
  pages        = {18--27},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3620973},
  doi          = {10.1109/MC.2018.3620973},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/AngelovG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BanosN18,
  author       = {Oresti Banos and
                  Christopher Nugent},
  title        = {E-Coaching for Health},
  journal      = {Computer},
  volume       = {51},
  number       = {3},
  pages        = {12--15},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.1731070},
  doi          = {10.1109/MC.2018.1731070},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/BanosN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BanosN18a,
  author       = {Oresti Banos and
                  Chris D. Nugent},
  title        = {M-Coaching: Towards the Next Generation of Mobile-Driven Healthcare
                  Support Services},
  journal      = {Computer},
  volume       = {51},
  number       = {8},
  pages        = {14--17},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3191267},
  doi          = {10.1109/MC.2018.3191267},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/BanosN18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Beck18,
  author       = {Roman Beck},
  title        = {Beyond Bitcoin: The Rise of Blockchain World},
  journal      = {Computer},
  volume       = {51},
  number       = {2},
  pages        = {54--58},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.1451660},
  doi          = {10.1109/MC.2018.1451660},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Beck18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BellN18,
  author       = {C. Gordon Bell and
                  Ike Nassi},
  title        = {Revisiting Scalable Coherent Shared Memory},
  journal      = {Computer},
  volume       = {51},
  number       = {1},
  pages        = {40--49},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.1151020},
  doi          = {10.1109/MC.2018.1151020},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/BellN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Bergel18,
  author       = {Hal Berghel},
  title        = {Election Integrity 2018: Are We Better Off Than We Were in 2016? [Aftershock]},
  journal      = {Computer},
  volume       = {51},
  number       = {11},
  pages        = {90--94},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2885315},
  doi          = {10.1109/MC.2018.2885315},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Bergel18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel18,
  author       = {Hal Berghel},
  title        = {Disinformatics: The Discipline behind Grand Deceptions},
  journal      = {Computer},
  volume       = {51},
  number       = {1},
  pages        = {89--93},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.1151023},
  doi          = {10.1109/MC.2018.1151023},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel18a,
  author       = {Hal Berghel},
  title        = {Bruce Schneier on Future Digital Threats},
  journal      = {Computer},
  volume       = {51},
  number       = {2},
  pages        = {64--67},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.1451653},
  doi          = {10.1109/MC.2018.1451653},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel18b,
  author       = {Hal Berghel},
  title        = {Trolling Pathologies},
  journal      = {Computer},
  volume       = {51},
  number       = {3},
  pages        = {66--69},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.1731067},
  doi          = {10.1109/MC.2018.1731067},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel18b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel18c,
  author       = {Hal Berghel},
  title        = {Weaponizing Twitter Litter: Abuse-Forming Networks and Social Media},
  journal      = {Computer},
  volume       = {51},
  number       = {4},
  pages        = {70--73},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2141019},
  doi          = {10.1109/MC.2018.2141019},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel18c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel18d,
  author       = {Hal Berghel},
  title        = {Malice Domestic: The Cambridge Analytica Dystopia},
  journal      = {Computer},
  volume       = {51},
  number       = {5},
  pages        = {84--89},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2381135},
  doi          = {10.1109/MC.2018.2381135},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel18d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel18e,
  author       = {Hal Berghel},
  title        = {Newton's Great Insight},
  journal      = {Computer},
  volume       = {51},
  number       = {7},
  pages        = {86--90},
  year         = {2018},
  url          = {http://doi.ieeecomputersociety.org/10.1109/MC.2018.3011036},
  doi          = {10.1109/MC.2018.3011036},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel18e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel18f,
  author       = {Hal Berghel},
  title        = {The Genesis of Postmodern Disinformatics [Out of Band]},
  journal      = {Computer},
  volume       = {51},
  number       = {11},
  pages        = {102--105},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2876183},
  doi          = {10.1109/MC.2018.2876183},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel18f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BerghelB18,
  author       = {Hal Berghel and
                  Daniel Berleant},
  title        = {The Online Trolling Ecosystem},
  journal      = {Computer},
  volume       = {51},
  number       = {8},
  pages        = {44--51},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3191256},
  doi          = {10.1109/MC.2018.3191256},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/BerghelB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Bhat18,
  author       = {Wasim Ahmad Bhat},
  title        = {Is a Data-Capacity Gap Inevitable in Big Data Storage?},
  journal      = {Computer},
  volume       = {51},
  number       = {9},
  pages        = {54--62},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3620975},
  doi          = {10.1109/MC.2018.3620975},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Bhat18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BhattaraiW18,
  author       = {Sulabh Bhattarai and
                  Yong Wang},
  title        = {End-to-End Trust and Security for Internet of Things Applications},
  journal      = {Computer},
  volume       = {51},
  number       = {4},
  pages        = {20--27},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2141038},
  doi          = {10.1109/MC.2018.2141038},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/BhattaraiW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BloomfieldBBS18,
  author       = {Robin Bloomfield and
                  Peter Bishop and
                  Eoin Butler and
                  Robert J. Stroud},
  title        = {Security-Informed Safety: Supporting Stakeholders with Codes of Practice},
  journal      = {Computer},
  volume       = {51},
  number       = {8},
  pages        = {60--65},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3191260},
  doi          = {10.1109/MC.2018.3191260},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/BloomfieldBBS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BouchardACDDDDF18,
  author       = {Kristofer E. Bouchard and
                  James B. Aimone and
                  Miyoung Chun and
                  Thomas Dean and
                  Michael Denker and
                  Markus Diesmann and
                  David Donofrio and
                  Loren M. Frank and
                  Narayanan Kasthuri and
                  Christof Koch and
                  Oliver R{\"{u}}bel and
                  Horst D. Simon and
                  Friedrich T. Sommer and
                  Prabhat},
  title        = {International Neuroscience Initiatives through the Lens of High-Performance
                  Computing},
  journal      = {Computer},
  volume       = {51},
  number       = {4},
  pages        = {50--59},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2141039},
  doi          = {10.1109/MC.2018.2141039},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/BouchardACDDDDF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BruneoDLMP18,
  author       = {Dario Bruneo and
                  Salvatore Distefano and
                  Francesco Longo and
                  Giovanni Merlino and
                  Antonio Puliafito},
  title        = {I/Ocloud: Adding an IoT Dimension to Cloud Infrastructures},
  journal      = {Computer},
  volume       = {51},
  number       = {1},
  pages        = {57--65},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.1151016},
  doi          = {10.1109/MC.2018.1151016},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/BruneoDLMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Buzzelli18,
  author       = {Timothy Buzzelli},
  title        = {University of Central Florida Takes the Bronze at Annual International
                  Programming Competition},
  journal      = {Computer},
  volume       = {51},
  number       = {7},
  pages        = {78--81},
  year         = {2018},
  url          = {http://doi.ieeecomputersociety.org/10.1109/MC.2018.3011049},
  doi          = {10.1109/MC.2018.3011049},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Buzzelli18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Cameron18,
  author       = {Lori Cameron},
  title        = {[Elsewhere in the {CS]}},
  journal      = {Computer},
  volume       = {51},
  number       = {11},
  pages        = {4--6},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2876160},
  doi          = {10.1109/MC.2018.2876160},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Cameron18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Cameron18a,
  author       = {Lori Cameron},
  title        = {[Elsewhere in the {CS]}},
  journal      = {Computer},
  volume       = {51},
  number       = {12},
  pages        = {4--6},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2879991},
  doi          = {10.1109/MC.2018.2879991},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Cameron18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/CastroLG18,
  author       = {Rodrigo Roman Castro and
                  Javier L{\'{o}}pez and
                  Stefanos Gritzalis},
  title        = {Evolution and Trends in IoT Security},
  journal      = {Computer},
  volume       = {51},
  number       = {7},
  pages        = {16--25},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3011051},
  doi          = {10.1109/MC.2018.3011051},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/CastroLG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Charette18,
  author       = {Robert N. Charette},
  title        = {Puncturing Pernicious Project Pufferies},
  journal      = {Computer},
  volume       = {51},
  number       = {5},
  pages        = {78--83},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2381127},
  doi          = {10.1109/MC.2018.2381127},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Charette18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/CharetteK18,
  author       = {Robert N. Charette and
                  John Leslie King},
  title        = {Winning and Losing in {IT}},
  journal      = {Computer},
  volume       = {51},
  number       = {10},
  pages        = {10--15},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3971361},
  doi          = {10.1109/MC.2018.3971361},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/CharetteK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ChatterjeeRB18,
  author       = {Tanusree Chatterjee and
                  Sushmita Ruj and
                  Sipra Das Bit},
  title        = {Security Issues in Named Data Networks},
  journal      = {Computer},
  volume       = {51},
  number       = {1},
  pages        = {66--75},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.1151010},
  doi          = {10.1109/MC.2018.1151010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ChatterjeeRB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ChauhanSHMSL18,
  author       = {Jagmohan Chauhan and
                  Suranga Seneviratne and
                  Yining Hu and
                  Archan Misra and
                  Aruna Seneviratne and
                  Youngki Lee},
  title        = {Breathing-Based Authentication on Resource-Constrained IoT Devices
                  using Recurrent Neural Networks},
  journal      = {Computer},
  volume       = {51},
  number       = {5},
  pages        = {60--67},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2381119},
  doi          = {10.1109/MC.2018.2381119},
  timestamp    = {Wed, 16 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ChauhanSHMSL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ChenZLS18,
  author       = {Chung{-}Kuan Chen and
                  Zhi{-}Kai Zhang and
                  Shan{-}Hsin Lee and
                  Shiuhpyng Shieh},
  title        = {Penetration Testing in the IoT Age},
  journal      = {Computer},
  volume       = {51},
  number       = {4},
  pages        = {82--85},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2141033},
  doi          = {10.1109/MC.2018.2141033},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ChenZLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/CoferGBWPFPKKAH18,
  author       = {Darren D. Cofer and
                  Andrew Gacek and
                  John Backes and
                  Michael W. Whalen and
                  Lee Pike and
                  Adam Foltzer and
                  Michal Podhradsky and
                  Gerwin Klein and
                  Ihor Kuz and
                  June Andronick and
                  Gernot Heiser and
                  Douglas Stuart},
  title        = {A Formal Approach to Constructing Secure Air Vehicle Software},
  journal      = {Computer},
  volume       = {51},
  number       = {11},
  pages        = {14--23},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2876051},
  doi          = {10.1109/MC.2018.2876051},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/CoferGBWPFPKKAH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ConteDMM18,
  author       = {Thomas M. Conte and
                  Erik P. DeBenedictis and
                  Avi Mendelson and
                  Dejan S. Milojicic},
  title        = {Rebooting Computers to Avoid Meltdown and Spectre},
  journal      = {Computer},
  volume       = {51},
  number       = {4},
  pages        = {74--77},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2141022},
  doi          = {10.1109/MC.2018.2141022},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ConteDMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Conway18,
  author       = {Lynn Conway},
  title        = {The Disappeared: Beyond Winning and Losing},
  journal      = {Computer},
  volume       = {51},
  number       = {10},
  pages        = {66--73},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3971344},
  doi          = {10.1109/MC.2018.3971344},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Conway18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/DeBenedictis18,
  author       = {Erik P. DeBenedictis},
  title        = {A Future with Quantum Machine Learning},
  journal      = {Computer},
  volume       = {51},
  number       = {2},
  pages        = {68--71},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.1451646},
  doi          = {10.1109/MC.2018.1451646},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/DeBenedictis18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/DeBenedictis18a,
  author       = {Erik P. DeBenedictis},
  title        = {Accelerated Architectures Create Programming Opportunities},
  journal      = {Computer},
  volume       = {51},
  number       = {6},
  pages        = {82--85},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2701625},
  doi          = {10.1109/MC.2018.2701625},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/DeBenedictis18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/DeBenedictis18b,
  author       = {Erik P. DeBenedictis},
  title        = {A Role for {IEEE} in Quantum Computing},
  journal      = {Computer},
  volume       = {51},
  number       = {8},
  pages        = {52--55},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3191257},
  doi          = {10.1109/MC.2018.3191257},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/DeBenedictis18b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/DeBenedictisF18,
  author       = {Erik P. DeBenedictis and
                  Michael P. Frank},
  title        = {The National Quantum Initiative Will Also Benefit Classical Computers
                  [Rebooting Computing]},
  journal      = {Computer},
  volume       = {51},
  number       = {12},
  pages        = {69--73},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2880025},
  doi          = {10.1109/MC.2018.2880025},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/DeBenedictisF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/DeBenedictisHG18,
  author       = {Erik P. DeBenedictis and
                  Travis S. Humble and
                  Paolo A. Gargini},
  title        = {Quantum Computer Scale-up},
  journal      = {Computer},
  volume       = {51},
  number       = {10},
  pages        = {86--89},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3971356},
  doi          = {10.1109/MC.2018.3971356},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/DeBenedictisHG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/DeMaraM18,
  author       = {Ronald F. DeMara and
                  Paolo Montuschi},
  title        = {Non-Volatile Memory Trends: Toward Improving Density and Energy Profiles
                  across the System Stack},
  journal      = {Computer},
  volume       = {51},
  number       = {4},
  pages        = {12--13},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2141044},
  doi          = {10.1109/MC.2018.2141044},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/DeMaraM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Denning18,
  author       = {Peter J. Denning},
  title        = {Winning at Innovation},
  journal      = {Computer},
  volume       = {51},
  number       = {10},
  pages        = {32--39},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3971353},
  doi          = {10.1109/MC.2018.3971353},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Denning18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/DhekneRC18,
  author       = {Ashutosh Dhekne and
                  Umberto Ravaioli and
                  Romit Roy Choudhury},
  title        = {P2PLoc: Peer-to-Peer Localization of Fast-Moving Entities},
  journal      = {Computer},
  volume       = {51},
  number       = {10},
  pages        = {94--98},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3971349},
  doi          = {10.1109/MC.2018.3971349},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/DhekneRC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/DinhT18,
  author       = {Thang N. Dinh and
                  My T. Thai},
  title        = {{AI} and Blockchain: {A} Disruptive Integration},
  journal      = {Computer},
  volume       = {51},
  number       = {9},
  pages        = {48--53},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3620971},
  doi          = {10.1109/MC.2018.3620971},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/DinhT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/DongarraGW18,
  author       = {Jack J. Dongarra and
                  Vladimir Getov and
                  Kevin Walsh},
  title        = {The 30th Anniversary of the Supercomputing Conference: Bringing the
                  Future Closer - Supercomputing History and the Immortality of Now},
  journal      = {Computer},
  volume       = {51},
  number       = {10},
  pages        = {74--85},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3971352},
  doi          = {10.1109/MC.2018.3971352},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/DongarraGW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/EgyedZHD18,
  author       = {Alexander Egyed and
                  Klaus Zeman and
                  Peter Hehenberger and
                  Andreas Demuth},
  title        = {Maintaining Consistency across Engineering Artifacts},
  journal      = {Computer},
  volume       = {51},
  number       = {2},
  pages        = {28--35},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.1451666},
  doi          = {10.1109/MC.2018.1451666},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/EgyedZHD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Ernst18,
  author       = {Rolf Ernst},
  title        = {Automated Driving: The Cyber-Physical Perspective},
  journal      = {Computer},
  volume       = {51},
  number       = {9},
  pages        = {76--79},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3620974},
  doi          = {10.1109/MC.2018.3620974},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Ernst18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Floriani18,
  author       = {Leila De Floriani},
  title        = {Globe Browsing in OpenSpace},
  journal      = {Computer},
  volume       = {51},
  number       = {5},
  pages        = {8--9},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2381132},
  doi          = {10.1109/MC.2018.2381132},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Floriani18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/FuentesGSV18,
  author       = {Jos{\'{e}} Mar{\'{\i}}a de Fuentes and
                  Lorena Gonz{\'{a}}lez{-}Manzano and
                  Agusti Solanas and
                  Fatbardh Veseli},
  title        = {Attribute-Based Credentials for Privacy-Aware Smart Health Services
                  in IoT-Based Smart Cities},
  journal      = {Computer},
  volume       = {51},
  number       = {7},
  pages        = {44--53},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3011042},
  doi          = {10.1109/MC.2018.3011042},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/FuentesGSV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/GaoLW18,
  author       = {Hui Gao and
                  Chi Harold Liu and
                  Wendong Wang},
  title        = {Hybrid Vehicular Crowdsourcing With Driverless Cars: Challenges and
                  a Solution},
  journal      = {Computer},
  volume       = {51},
  number       = {12},
  pages        = {24--31},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2879994},
  doi          = {10.1109/MC.2018.2879994},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/GaoLW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/GastilM18,
  author       = {John Gastil and
                  Sascha D. Meinrath},
  title        = {Bringing Citizens and Policymakers Together Online: Imagining the
                  Possibilities and Taking Stock of Privacy and Transparency Hazards},
  journal      = {Computer},
  volume       = {51},
  number       = {6},
  pages        = {30--40},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2701623},
  doi          = {10.1109/MC.2018.2701623},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/GastilM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/GreeneST18,
  author       = {Kristen K. Greene and
                  Michelle Steves and
                  Mary Theofanos},
  title        = {No Phishing beyond This Point},
  journal      = {Computer},
  volume       = {51},
  number       = {6},
  pages        = {86--89},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2701632},
  doi          = {10.1109/MC.2018.2701632},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/GreeneST18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grudin18,
  author       = {Jonathan Grudin},
  title        = {Innovation and Inertia: Information Technology and Education in the
                  United States},
  journal      = {Computer},
  volume       = {51},
  number       = {10},
  pages        = {40--47},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3971346},
  doi          = {10.1109/MC.2018.3971346},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grudin18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Hagras18,
  author       = {Hani Hagras},
  title        = {Toward Human-Understandable, Explainable {AI}},
  journal      = {Computer},
  volume       = {51},
  number       = {9},
  pages        = {28--36},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3620965},
  doi          = {10.1109/MC.2018.3620965},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/Hagras18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HallTJ18,
  author       = {Wendy Hall and
                  Ramine Tinati and
                  Will Jennings},
  title        = {From Brexit to Trump: Social Media's Role in Democracy},
  journal      = {Computer},
  volume       = {51},
  number       = {1},
  pages        = {18--27},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.1151005},
  doi          = {10.1109/MC.2018.1151005},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/HallTJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HalleKA18,
  author       = {Sylvain Hall{\'{e}} and
                  Rapha{\"{e}}l Khoury and
                  Mewena Awesso},
  title        = {Streamlining the Inclusion of Computer Experiments In a Research Paper},
  journal      = {Computer},
  volume       = {51},
  number       = {11},
  pages        = {78--89},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2876075},
  doi          = {10.1109/MC.2018.2876075},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/HalleKA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HanJJL18,
  author       = {Kyungsik Han and
                  Hyunggu Jung and
                  Jin Yea Jang and
                  Dongwon Lee},
  title        = {Understanding Users' Privacy Attitudes through Subjective and Objective
                  Assessments: An Instagram Case Study},
  journal      = {Computer},
  volume       = {51},
  number       = {6},
  pages        = {18--28},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2701648},
  doi          = {10.1109/MC.2018.2701648},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/HanJJL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Handler18,
  author       = {Ivan Handler},
  title        = {Data Sharing Defined - Really!},
  journal      = {Computer},
  volume       = {51},
  number       = {2},
  pages        = {36--42},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.1451659},
  doi          = {10.1109/MC.2018.1451659},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Handler18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Hanna18,
  author       = {Mina J. Hanna},
  title        = {Net Neutrality: {A} Brief Overview of the Policy and the FCC's Ruling
                  to Upend It},
  journal      = {Computer},
  volume       = {51},
  number       = {4},
  pages        = {78--81},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2141045},
  doi          = {10.1109/MC.2018.2141045},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Hanna18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HaqueNET18,
  author       = {Mohammad Shihabul Haque and
                  Daniel Jun Xian Ng and
                  Arvind Easwaran and
                  Karthikeyan Thangamariappan},
  title        = {Contract-Based Hierarchical Resilience Management for Cyber-Physical
                  Systems},
  journal      = {Computer},
  volume       = {51},
  number       = {11},
  pages        = {56--65},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2876071},
  doi          = {10.1109/MC.2018.2876071},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/HaqueNET18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HarelKMM18,
  author       = {David Harel and
                  Guy Katz and
                  Rami Marelly and
                  Assaf Marron},
  title        = {Wise Computing: Toward Endowing System Development with Proactive
                  Wisdom},
  journal      = {Computer},
  volume       = {51},
  number       = {2},
  pages        = {14--26},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.1451652},
  doi          = {10.1109/MC.2018.1451652},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/HarelKMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HassanHLSKD18,
  author       = {Mahbub Hassan and
                  Wen Hu and
                  Guohao Lan and
                  Aruna Seneviratne and
                  Sara Khalifa and
                  Sajal K. Das},
  title        = {Kinetic-Powered Health Wearables: Challenges and Opportunities},
  journal      = {Computer},
  volume       = {51},
  number       = {9},
  pages        = {64--74},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3620960},
  doi          = {10.1109/MC.2018.3620960},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/HassanHLSKD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Helal18,
  author       = {Sumi Helal},
  title        = {2018 Outlook: The Emerging Web and Information Sciences},
  journal      = {Computer},
  volume       = {51},
  number       = {1},
  pages        = {14--16},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.1151022},
  doi          = {10.1109/MC.2018.1151022},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Helal18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Helal18a,
  author       = {Sumi Helal},
  title        = {The Expanding Frontier of Artificial Intelligence},
  journal      = {Computer},
  volume       = {51},
  number       = {9},
  pages        = {14--17},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3620976},
  doi          = {10.1109/MC.2018.3620976},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Helal18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HendlerHC18,
  author       = {James A. Hendler and
                  Wendy Hall and
                  Noshir Contractor},
  title        = {Web Science: Now More Than Ever},
  journal      = {Computer},
  volume       = {51},
  number       = {6},
  pages        = {12--17},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2701637},
  doi          = {10.1109/MC.2018.2701637},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/HendlerHC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Hicks18,
  author       = {Marie Hicks},
  title        = {When Winning Is Losing: Why the Nation that Invented the Computer
                  Lost Its Lead},
  journal      = {Computer},
  volume       = {51},
  number       = {10},
  pages        = {48--57},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3971355},
  doi          = {10.1109/MC.2018.3971355},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Hicks18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HosioKBOG18,
  author       = {Simo Hosio and
                  Jaro Karppinen and
                  Niels van Berkel and
                  Jonas Oppenlaender and
                  Jorge Gon{\c{c}}alves},
  title        = {Mobile Decision Support and Data Provisioning for Low Back Pain},
  journal      = {Computer},
  volume       = {51},
  number       = {8},
  pages        = {34--43},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3191250},
  doi          = {10.1109/MC.2018.3191250},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/HosioKBOG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HuKF18,
  author       = {Vincent C. Hu and
                  D. Richard Kuhn and
                  David F. Ferraiolo},
  title        = {Access Control for Emerging Distributed Systems},
  journal      = {Computer},
  volume       = {51},
  number       = {10},
  pages        = {100--103},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3971347},
  doi          = {10.1109/MC.2018.3971347},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/HuKF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HudsonC18,
  author       = {Florence D. Hudson and
                  Chris Clark},
  title        = {Wearables and Medical Interoperability: The Evolving Frontier},
  journal      = {Computer},
  volume       = {51},
  number       = {9},
  pages        = {86--90},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3620987},
  doi          = {10.1109/MC.2018.3620987},
  timestamp    = {Fri, 24 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/HudsonC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Hurlburt18,
  author       = {George F. Hurlburt},
  title        = {Toward Applied Cyberethics},
  journal      = {Computer},
  volume       = {51},
  number       = {9},
  pages        = {80--84},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3620959},
  doi          = {10.1109/MC.2018.3620959},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/Hurlburt18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/IsaakH18,
  author       = {Jim Isaak and
                  Mina J. Hanna},
  title        = {User Data Privacy: Facebook, Cambridge Analytica, and Privacy Protection},
  journal      = {Computer},
  volume       = {51},
  number       = {8},
  pages        = {56--59},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3191268},
  doi          = {10.1109/MC.2018.3191268},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/IsaakH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/IshidaMLNO18,
  author       = {Toru Ishida and
                  Yohei Murakami and
                  Donghui Lin and
                  Takao Nakaguchi and
                  Masayuki Otani},
  title        = {Language Service Infrastructure on the Web: The Language Grid},
  journal      = {Computer},
  volume       = {51},
  number       = {6},
  pages        = {72--81},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2701643},
  doi          = {10.1109/MC.2018.2701643},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/IshidaMLNO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Joshi18,
  author       = {James Joshi},
  title        = {Front Cover},
  journal      = {Computer},
  volume       = {51},
  number       = {11},
  pages        = {1},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2880358},
  doi          = {10.1109/MC.2018.2880358},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Joshi18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Kasahara18,
  author       = {Hironori Kasahara},
  title        = {Satisfaction and Sustainability},
  journal      = {Computer},
  volume       = {51},
  number       = {1},
  pages        = {4--6},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.1151006},
  doi          = {10.1109/MC.2018.1151006},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Kasahara18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KimDPMM18,
  author       = {Ryan Gary Kim and
                  Janardhan Rao Doppa and
                  Partha Pratim Pande and
                  Diana Marculescu and
                  Radu Marculescu},
  title        = {Machine Learning and Manycore Systems Design: {A} Serendipitous Symbiosis},
  journal      = {Computer},
  volume       = {51},
  number       = {7},
  pages        = {66--77},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3011040},
  doi          = {10.1109/MC.2018.3011040},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/KimDPMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KoshizukaHS18,
  author       = {Noboru Koshizuka and
                  Stephan Haller and
                  Ken Sakamura},
  title        = {CPaaS.io: An EU-Japan Collaboration on Open Smart-City Platforms},
  journal      = {Computer},
  volume       = {51},
  number       = {12},
  pages        = {50--58},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2880019},
  doi          = {10.1109/MC.2018.2880019},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KoshizukaHS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KoulamasK18,
  author       = {Christos Koulamas and
                  Athanasios P. Kalogeras},
  title        = {Cyber-Physical Systems and Digital Twins in the Industrial Internet
                  of Things [Cyber-Physical Systems]},
  journal      = {Computer},
  volume       = {51},
  number       = {11},
  pages        = {95--98},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2876181},
  doi          = {10.1109/MC.2018.2876181},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KoulamasK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KrishnaWAMS18,
  author       = {Varun Badrinath Krishna and
                  Ziping Wu and
                  Vaidehi V. Ambardekar and
                  Richard Macwan and
                  William H. Sanders},
  title        = {Cyberattacks on Primary Frequency Response Mechanisms in Power Grids},
  journal      = {Computer},
  volume       = {51},
  number       = {11},
  pages        = {37--45},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2876053},
  doi          = {10.1109/MC.2018.2876053},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KrishnaWAMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Kshetri18,
  author       = {Nir Kshetri},
  title        = {Cryptocurrencies: Transparency Versus Privacy [Cybertrust]},
  journal      = {Computer},
  volume       = {51},
  number       = {11},
  pages        = {99--111},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2876182},
  doi          = {10.1109/MC.2018.2876182},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Kshetri18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Kshetri18a,
  author       = {Nir Kshetri},
  title        = {Blockchain and Electronic Healthcare Records [Cybertrust]},
  journal      = {Computer},
  volume       = {51},
  number       = {12},
  pages        = {59--63},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2880021},
  doi          = {10.1109/MC.2018.2880021},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Kshetri18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KshetriV18,
  author       = {Nir Kshetri and
                  Jeffrey M. Voas},
  title        = {Hackings Brand-Equity Nexus},
  journal      = {Computer},
  volume       = {51},
  number       = {3},
  pages        = {74--77},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.1731061},
  doi          = {10.1109/MC.2018.1731061},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KshetriV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KshetriV18a,
  author       = {Nir Kshetri and
                  Jeffrey M. Voas},
  title        = {Cyberthreats under the Bed},
  journal      = {Computer},
  volume       = {51},
  number       = {5},
  pages        = {92--95},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2381121},
  doi          = {10.1109/MC.2018.2381121},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KshetriV18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KuhnRK18,
  author       = {Rick Kuhn and
                  Mohammad S. Raunak and
                  Raghu Kacker},
  title        = {Can Reducing Faults Prevent Vulnerabilities?},
  journal      = {Computer},
  volume       = {51},
  number       = {7},
  pages        = {82--85},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3011039},
  doi          = {10.1109/MC.2018.3011039},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KuhnRK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KumarPALHY18,
  author       = {Tanesh Kumar and
                  Pawani Porambage and
                  Ijaz Ahmad and
                  Madhusanka Liyanage and
                  Erkki Harjula and
                  Mika Ylianttila},
  title        = {Securing Gadget-Free Digital Services},
  journal      = {Computer},
  volume       = {51},
  number       = {11},
  pages        = {66--77},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2876017},
  doi          = {10.1109/MC.2018.2876017},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KumarPALHY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/LaneW18,
  author       = {Nicholas D. Lane and
                  Pete Warden},
  title        = {The Deep (Learning) Transformation of Mobile and Embedded Computing},
  journal      = {Computer},
  volume       = {51},
  number       = {5},
  pages        = {12--16},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2381129},
  doi          = {10.1109/MC.2018.2381129},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/LaneW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/LeeL18,
  author       = {Yongsuk Lee and
                  Gyungho Lee},
  title        = {Detecting Code Reuse Attacks with Branch Prediction},
  journal      = {Computer},
  volume       = {51},
  number       = {4},
  pages        = {40--47},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2141035},
  doi          = {10.1109/MC.2018.2141035},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/LeeL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Lima18,
  author       = {Claudio Lima},
  title        = {Developing Open and Interoperable DLT{\textbackslash}/Blockchain Standards
                  [Standards]},
  journal      = {Computer},
  volume       = {51},
  number       = {11},
  pages        = {106--111},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2876184},
  doi          = {10.1109/MC.2018.2876184},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Lima18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/LinWCCDLW18,
  author       = {Chit{-}Kwan Lin and
                  Andreas Wild and
                  Gautham N. Chinya and
                  Yongqiang Cao and
                  Mike Davies and
                  Daniel M. Lavery and
                  Hong Wang},
  title        = {Programming Spiking Neural Networks on Intel's Loihi},
  journal      = {Computer},
  volume       = {51},
  number       = {3},
  pages        = {52--61},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.157113521},
  doi          = {10.1109/MC.2018.157113521},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/LinWCCDLW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Maitland18,
  author       = {Carleen F. Maitland},
  title        = {Now You See It, Now You Don't: Digital Connectivity in Marginalized
                  Communities},
  journal      = {Computer},
  volume       = {51},
  number       = {6},
  pages        = {62--71},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2701624},
  doi          = {10.1109/MC.2018.2701624},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Maitland18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/McGraw18,
  author       = {Gary McGraw},
  title        = {The New Killer App for Security: Software Inventory},
  journal      = {Computer},
  volume       = {51},
  number       = {2},
  pages        = {60--62},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.1451662},
  doi          = {10.1109/MC.2018.1451662},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/McGraw18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/McMillin18,
  author       = {Bruce M. McMillin},
  title        = {Software Engineering},
  journal      = {Computer},
  volume       = {51},
  number       = {2},
  pages        = {10--12},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.1451647},
  doi          = {10.1109/MC.2018.1451647},
  timestamp    = {Sun, 29 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/McMillin18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/MeiG18,
  author       = {Hong Mei and
                  Yao Guo},
  title        = {Toward Ubiquitous Operating Systems: {A} Software-Defined Perspective},
  journal      = {Computer},
  volume       = {51},
  number       = {1},
  pages        = {50--56},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.1151018},
  doi          = {10.1109/MC.2018.1151018},
  timestamp    = {Tue, 09 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/MeiG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Meng18,
  author       = {Weizhi Meng},
  title        = {Intrusion Detection in the Era of IoT: Building Trust via Traffic
                  Filtering and Sampling},
  journal      = {Computer},
  volume       = {51},
  number       = {7},
  pages        = {36--43},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3011034},
  doi          = {10.1109/MC.2018.3011034},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Meng18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/MoshovosAJLSPHA18,
  author       = {Andreas Moshovos and
                  Jorge Albericio and
                  Patrick Judd and
                  Alberto Delmas Lascorz and
                  Sayeh Sharify and
                  Zissis Poulos and
                  Tayler H. Hetherington and
                  Tor M. Aamodt and
                  Natalie D. Enright Jerger},
  title        = {Exploiting Typical Values to Accelerate Deep Learning},
  journal      = {Computer},
  volume       = {51},
  number       = {5},
  pages        = {18--30},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2381114},
  doi          = {10.1109/MC.2018.2381114},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/MoshovosAJLSPHA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/NamK18,
  author       = {Daye Nam and
                  Mayank Kejriwal},
  title        = {How Do Organizations Publish Semantic Markup? Three Case Studies Using
                  Public Schema.org Crawls},
  journal      = {Computer},
  volume       = {51},
  number       = {6},
  pages        = {42--51},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2701635},
  doi          = {10.1109/MC.2018.2701635},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/NamK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Neuhold18,
  author       = {Erich J. Neuhold},
  title        = {Computer, 1968 and 1993},
  journal      = {Computer},
  volume       = {51},
  number       = {5},
  pages        = {10--11},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2381130},
  doi          = {10.1109/MC.2018.2381130},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Neuhold18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Neuhold18a,
  author       = {Erich J. Neuhold},
  title        = {{[50} {\&} 25 Years Ago]},
  journal      = {Computer},
  volume       = {51},
  number       = {11},
  pages        = {7--9},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2876180},
  doi          = {10.1109/MC.2018.2876180},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Neuhold18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Neuhold18b,
  author       = {Erich J. Neuhold},
  title        = {Computer, December 1968 and 1993 {[50} {\&} 25 Years Ago]},
  journal      = {Computer},
  volume       = {51},
  number       = {12},
  pages        = {7--9},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2879992},
  doi          = {10.1109/MC.2018.2879992},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Neuhold18b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/NiLL18,
  author       = {Zhen Ni and
                  Qianmu Li and
                  Gang Liu},
  title        = {Game-Model-Based Network Security Risk Control},
  journal      = {Computer},
  volume       = {51},
  number       = {4},
  pages        = {28--38},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2141032},
  doi          = {10.1109/MC.2018.2141032},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/NiLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/OchoaG18,
  author       = {Sergio F. Ochoa and
                  Francisco J. Gutierrez},
  title        = {Architecting E-Coaching Systems: {A} First Step for Dealing with Their
                  Intrinsic Design Complexity},
  journal      = {Computer},
  volume       = {51},
  number       = {3},
  pages        = {16--23},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.1731079},
  doi          = {10.1109/MC.2018.1731079},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/OchoaG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/OsiaSTRH18,
  author       = {Seyed Ali Ossia and
                  Ali Shahin Shamsabadi and
                  Ali Taheri and
                  Hamid R. Rabiee and
                  Hamed Haddadi},
  title        = {Private and Scalable Personal Data Analytics Using Hybrid Edge-to-Cloud
                  Deep Learning},
  journal      = {Computer},
  volume       = {51},
  number       = {5},
  pages        = {42--49},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2381113},
  doi          = {10.1109/MC.2018.2381113},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/OsiaSTRH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/PalK18,
  author       = {Amitangshu Pal and
                  Krishna Kant},
  title        = {IoT-Based Sensing and Communications Infrastructure for the Fresh
                  Food Supply Chain},
  journal      = {Computer},
  volume       = {51},
  number       = {2},
  pages        = {76--80},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.1451665},
  doi          = {10.1109/MC.2018.1451665},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/PalK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/PapadimitriouM18,
  author       = {Stergios Papadimitriou and
                  Lefteris Moussiades},
  title        = {Mac {OS} versus FreeBSD: {A} Comparative Evaluation},
  journal      = {Computer},
  volume       = {51},
  number       = {2},
  pages        = {44--53},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.1451648},
  doi          = {10.1109/MC.2018.1451648},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/PapadimitriouM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ParraFCM18,
  author       = {Mario O. Parra and
                  Jes{\'{u}}s Favela and
                  Lu{\'{\i}}s A. Castro and
                  Arturo Morales},
  title        = {Monitoring Eating Behaviors for a Nutritionist E-Assistant Using Crowdsourcing},
  journal      = {Computer},
  volume       = {51},
  number       = {3},
  pages        = {43--51},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.1731078},
  doi          = {10.1109/MC.2018.1731078},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/ParraFCM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/PeringFD18,
  author       = {Trevor Pering and
                  Kathy Farrington and
                  Thorsten Dahm},
  title        = {Taming the IoT: Operationalized Testing to Secure Connected Devices},
  journal      = {Computer},
  volume       = {51},
  number       = {6},
  pages        = {90--94},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2701633},
  doi          = {10.1109/MC.2018.2701633},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/PeringFD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/PilloniPCFMB18,
  author       = {Paolo Pilloni and
                  Luca Piras and
                  Salvatore Carta and
                  Gianni Fenu and
                  Fabrizio Mulas and
                  Ludovico Boratto},
  title        = {Recommender System Lets Coaches Identify and Help Athletes Who Begin
                  Losing Motivation},
  journal      = {Computer},
  volume       = {51},
  number       = {3},
  pages        = {36--42},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.1731060},
  doi          = {10.1109/MC.2018.1731060},
  timestamp    = {Sun, 03 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/PilloniPCFMB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/PlotzG18,
  author       = {Thomas Pl{\"{o}}tz and
                  Yu Guan},
  title        = {Deep Learning for Human Activity Recognition in Mobile Computing},
  journal      = {Computer},
  volume       = {51},
  number       = {5},
  pages        = {50--59},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2381112},
  doi          = {10.1109/MC.2018.2381112},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/PlotzG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Prince18,
  author       = {Daniel Prince},
  title        = {Cybersecurity: The Security and Protection Challenges of Our Digital
                  World},
  journal      = {Computer},
  volume       = {51},
  number       = {4},
  pages        = {16--19},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2141025},
  doi          = {10.1109/MC.2018.2141025},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Prince18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/RajP18,
  author       = {Rajendra K. Raj and
                  Allen Parrish},
  title        = {Toward Standards in Undergraduate Cybersecurity Education in 2018},
  journal      = {Computer},
  volume       = {51},
  number       = {2},
  pages        = {72--75},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.1451658},
  doi          = {10.1109/MC.2018.1451658},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/RajP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/RobillardH18,
  author       = {Julie M. Robillard and
                  Jesse Hoey},
  title        = {Emotion and Motivation in Cognitive Assistive Technologies for Dementia},
  journal      = {Computer},
  volume       = {51},
  number       = {3},
  pages        = {24--34},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.1731059},
  doi          = {10.1109/MC.2018.1731059},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/RobillardH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Rosdahl18,
  author       = {Jon Rosdahl},
  title        = {Computer Society Standards Drive Industry},
  journal      = {Computer},
  volume       = {51},
  number       = {4},
  pages        = {90--94},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2141017},
  doi          = {10.1109/MC.2018.2141017},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Rosdahl18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/RubinovB18,
  author       = {Konstantin Rubinov and
                  Luciano Baresi},
  title        = {What Are We Missing When Testing Our Android Apps?},
  journal      = {Computer},
  volume       = {51},
  number       = {4},
  pages        = {60--68},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2141024},
  doi          = {10.1109/MC.2018.2141024},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/RubinovB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Scacchi18,
  author       = {Walt Scacchi},
  title        = {Winning and Losing in Large-Scale Software Development: {A} Multi-Decade
                  Perspective},
  journal      = {Computer},
  volume       = {51},
  number       = {10},
  pages        = {58--65},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3971348},
  doi          = {10.1109/MC.2018.3971348},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Scacchi18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SchaumontM18,
  author       = {Patrick Schaumont and
                  Paolo Montuschi},
  title        = {The Rise of Hardware Security in Computer Architectures},
  journal      = {Computer},
  volume       = {51},
  number       = {8},
  pages        = {4--5},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3191252},
  doi          = {10.1109/MC.2018.3191252},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/SchaumontM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Schuller18,
  author       = {Bj{\"{o}}rn W. Schuller},
  title        = {What Affective Computing Reveals about Autistic Children's Facial
                  Expressions of Joy or Fear},
  journal      = {Computer},
  volume       = {51},
  number       = {6},
  pages        = {7--8},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2701647},
  doi          = {10.1109/MC.2018.2701647},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Schuller18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SchullerS18,
  author       = {Dagmar Schuller and
                  Bj{\"{o}}rn W. Schuller},
  title        = {The Age of Artificial Emotional Intelligence},
  journal      = {Computer},
  volume       = {51},
  number       = {9},
  pages        = {38--46},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3620963},
  doi          = {10.1109/MC.2018.3620963},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/SchullerS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SeidelBMLLN18,
  author       = {Stefan Seidel and
                  Nicholas Berente and
                  Benoit Martinez and
                  Aron Lindberg and
                  Kalle Lyytinen and
                  Jeffrey V. Nickerson},
  title        = {Autonomous Tools in System Design: Reflective Practice in Ubisofts
                  Ghost Recon Wildlands Project},
  journal      = {Computer},
  volume       = {51},
  number       = {10},
  pages        = {16--23},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3971341},
  doi          = {10.1109/MC.2018.3971341},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/SeidelBMLLN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Serpanos18,
  author       = {Dimitrios Serpanos},
  title        = {The Cyber-Physical Systems Revolution},
  journal      = {Computer},
  volume       = {51},
  number       = {3},
  pages        = {70--73},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.1731058},
  doi          = {10.1109/MC.2018.1731058},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Serpanos18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Shedroff18,
  author       = {Nathan Shedroff},
  title        = {Self-Managing Real Estate},
  journal      = {Computer},
  volume       = {51},
  number       = {1},
  pages        = {104},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.1151007},
  doi          = {10.1109/MC.2018.1151007},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Shedroff18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ShiroishiUS18,
  author       = {Yoshihiro Shiroishi and
                  Kunio Uchiyama and
                  Norihiro Suzuki},
  title        = {Society 5.0: For Human Security and Well-Being},
  journal      = {Computer},
  volume       = {51},
  number       = {7},
  pages        = {91--95},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3011041},
  doi          = {10.1109/MC.2018.3011041},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ShiroishiUS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SinghMRCC18,
  author       = {Jatinder Singh and
                  Christopher Millard and
                  Chris Reed and
                  Jennifer Cobbe and
                  Jon Crowcroft},
  title        = {Accountability in the IoT: Systems, Law, and Ways Forward},
  journal      = {Computer},
  volume       = {51},
  number       = {7},
  pages        = {54--65},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3011052},
  doi          = {10.1109/MC.2018.3011052},
  timestamp    = {Wed, 09 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/SinghMRCC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SokolskyB18,
  author       = {Oleg Sokolsky and
                  Nicola Bezzo},
  title        = {Resiliency in Cyber-Physical Systems [Guest Editors' Introduction]},
  journal      = {Computer},
  volume       = {51},
  number       = {11},
  pages        = {10--12},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2876018},
  doi          = {10.1109/MC.2018.2876018},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/SokolskyB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Sorin18,
  author       = {Daniel J. Sorin},
  title        = {Low-Power Content Addressable Memory},
  journal      = {Computer},
  volume       = {51},
  number       = {3},
  pages        = {8--9},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.1731073},
  doi          = {10.1109/MC.2018.1731073},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Sorin18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SumitomoK18,
  author       = {Takahiro Sumitomo and
                  Noboru Koshizuka},
  title        = {Progress and Initiatives for Open Data Policy in Japan},
  journal      = {Computer},
  volume       = {51},
  number       = {12},
  pages        = {14--23},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2879993},
  doi          = {10.1109/MC.2018.2879993},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/SumitomoK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SunSK18,
  author       = {Jun Sun and
                  Steffen Staab and
                  J{\'{e}}r{\^{o}}me Kunegis},
  title        = {Understanding Social Networks Using Transfer Learning},
  journal      = {Computer},
  volume       = {51},
  number       = {6},
  pages        = {52--60},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2701640},
  doi          = {10.1109/MC.2018.2701640},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/SunSK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SzpankowskiG18,
  author       = {Wojciech Szpankowski and
                  Ananth Grama},
  title        = {Frontiers of Science of Information: Shannon Meets Turing},
  journal      = {Computer},
  volume       = {51},
  number       = {1},
  pages        = {28--38},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.1151004},
  doi          = {10.1109/MC.2018.1151004},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/SzpankowskiG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/TingleySTPLBVM18,
  author       = {Connor Tingley and
                  George Serwin and
                  Rohan Tuli and
                  Jenya Kirsch Posner and
                  Celvi Lisy and
                  Lily Bresee and
                  Keaton Viadro and
                  Chip Morimoto},
  title        = {Turning an International Competition into a Valuable Learning Experience},
  journal      = {Computer},
  volume       = {51},
  number       = {1},
  pages        = {76--79},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.1151017},
  doi          = {10.1109/MC.2018.1151017},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/TingleySTPLBVM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/TschanzDHD18,
  author       = {Mauro Tschanz and
                  Tim Lucas Dorner and
                  J{\"{u}}rgen Holm and
                  Kerstin Denecke},
  title        = {Using eMMA to Manage Medication},
  journal      = {Computer},
  volume       = {51},
  number       = {8},
  pages        = {18--25},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3191254},
  doi          = {10.1109/MC.2018.3191254},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/TschanzDHD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Vaidya18,
  author       = {Jaideep Vaidya},
  title        = {Privacy-Preserving Statistics},
  journal      = {Computer},
  volume       = {51},
  number       = {9},
  pages        = {8--9},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3620968},
  doi          = {10.1109/MC.2018.3620968},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Vaidya18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/VassilevMB18,
  author       = {Apostol Vassilev and
                  Nicky Mouha and
                  Luis Brandao},
  title        = {Psst, Can You Keep a Secret?},
  journal      = {Computer},
  volume       = {51},
  number       = {1},
  pages        = {94--97},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.1151029},
  doi          = {10.1109/MC.2018.1151029},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/VassilevMB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Vedder18,
  author       = {Richard Vedder},
  title        = {Benefits of College - By Degrees},
  journal      = {Computer},
  volume       = {51},
  number       = {6},
  pages        = {96--99},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2701646},
  doi          = {10.1109/MC.2018.2701646},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Vedder18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/VlajicZ18,
  author       = {Natalija Vlajic and
                  Daiwei Zhou},
  title        = {IoT as a Land of Opportunity for DDoS Hackers},
  journal      = {Computer},
  volume       = {51},
  number       = {7},
  pages        = {26--34},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3011046},
  doi          = {10.1109/MC.2018.3011046},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/VlajicZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/VoasKKSK18,
  author       = {Jeffrey M. Voas and
                  Rick Kuhn and
                  Constantinos Kolias and
                  Angelos Stavrou and
                  Georgios Kambourakis},
  title        = {Cybertrust in the IoT Age},
  journal      = {Computer},
  volume       = {51},
  number       = {7},
  pages        = {12--15},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3011043},
  doi          = {10.1109/MC.2018.3011043},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/VoasKKSK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/VoasKPS18,
  author       = {Jeffrey M. Voas and
                  Rick Kuhn and
                  Celia Paulsen and
                  Kim Schaffer},
  title        = {Educating Next-Gen Computer Scientists},
  journal      = {Computer},
  volume       = {51},
  number       = {1},
  pages        = {80--88},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.1151019},
  doi          = {10.1109/MC.2018.1151019},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/VoasKPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/VoasL18,
  author       = {Jeffrey M. Voas and
                  Phillip A. Laplante},
  title        = {IoT's Certification Quagmire},
  journal      = {Computer},
  volume       = {51},
  number       = {4},
  pages        = {86--89},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2141036},
  doi          = {10.1109/MC.2018.2141036},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/VoasL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/WangCFXJB18,
  author       = {Ju Wang and
                  Xiaojiang Chen and
                  Dingyi Fang and
                  Jie Xiong and
                  Hongbo Jiang and
                  Rajesh Krishna Balan},
  title        = {Material Identification and Target Imaging with RFIDs [IoT Connection]},
  journal      = {Computer},
  volume       = {51},
  number       = {12},
  pages        = {64--68},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2880022},
  doi          = {10.1109/MC.2018.2880022},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/WangCFXJB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/WangGY18,
  author       = {Leye Wang and
                  Bin Guo and
                  Qiang Yang},
  title        = {Smart City Development With Urban Transfer Learning},
  journal      = {Computer},
  volume       = {51},
  number       = {12},
  pages        = {32--41},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2880015},
  doi          = {10.1109/MC.2018.2880015},
  timestamp    = {Thu, 21 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/WangGY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/WangY18,
  author       = {Yasha Wang and
                  Katsuyuki Yamazaki},
  title        = {Governments in the Age of Big Data and Smart Cities [Guest Editors'
                  Introduction]},
  journal      = {Computer},
  volume       = {51},
  number       = {12},
  pages        = {10--12},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2886652},
  doi          = {10.1109/MC.2018.2886652},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/WangY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/WangZIL18,
  author       = {Haolin Wang and
                  Qingpeng Zhang and
                  Mary Ip and
                  Joseph Tak Fai Lau},
  title        = {Social Media-based Conversational Agents for Health Management and
                  Interventions},
  journal      = {Computer},
  volume       = {51},
  number       = {8},
  pages        = {26--33},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3191249},
  doi          = {10.1109/MC.2018.3191249},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/WangZIL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/WangZZPLX18,
  author       = {Jiangtao Wang and
                  Junfeng Zhao and
                  Yong Zhang and
                  Xin Peng and
                  Ying Li and
                  Yun Xie},
  title        = {Enabling Human-Centric Smart Cities: Crowdsourcing-Based Practice
                  in China},
  journal      = {Computer},
  volume       = {51},
  number       = {12},
  pages        = {42--49},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2880016},
  doi          = {10.1109/MC.2018.2880016},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/WangZZPLX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/WantWC18,
  author       = {Roy Want and
                  Wei Wang and
                  Stan Chesnutt},
  title        = {Accurate Indoor Location for the IoT},
  journal      = {Computer},
  volume       = {51},
  number       = {8},
  pages        = {66--70},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3191259},
  doi          = {10.1109/MC.2018.3191259},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/WantWC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/WhitneyT18,
  author       = {Telle Whitney and
                  Valerie Taylor},
  title        = {Increasing Women and Underrepresented Minorities in Computing: The
                  Landscape and What You Can Do},
  journal      = {Computer},
  volume       = {51},
  number       = {10},
  pages        = {24--31},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3971359},
  doi          = {10.1109/MC.2018.3971359},
  timestamp    = {Fri, 18 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/WhitneyT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Willis18,
  author       = {Scooter Willis},
  title        = {The Maker Revolution},
  journal      = {Computer},
  volume       = {51},
  number       = {3},
  pages        = {62--65},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.1731074},
  doi          = {10.1109/MC.2018.1731074},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Willis18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Willis18a,
  author       = {Scooter Willis},
  title        = {Make Learning Fun and Get Out of the Way of the Smartphone Generation},
  journal      = {Computer},
  volume       = {51},
  number       = {10},
  pages        = {90--92},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3971354},
  doi          = {10.1109/MC.2018.3971354},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Willis18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Wolf18,
  author       = {Marilyn Wolf},
  title        = {Computing in the Real World Is the Grandest of Challenges},
  journal      = {Computer},
  volume       = {51},
  number       = {5},
  pages        = {90--91},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2381128},
  doi          = {10.1109/MC.2018.2381128},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Wolf18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/WonYPPJBKLSPE18,
  author       = {Yuchang Won and
                  Buyeon Yu and
                  Jaegeun Park and
                  In{-}Hee Park and
                  Haegeon Jeong and
                  Jeanseong Baik and
                  Kyungtae Kang and
                  Insup Lee and
                  Sang Hyuk Son and
                  Kyung{-}Joon Park and
                  Yongsoon Eun},
  title        = {An Attack-Resilient {CPS} Architecture for Hierarchical Control: {A}
                  Case Study on Train Control Systems},
  journal      = {Computer},
  volume       = {51},
  number       = {11},
  pages        = {46--55},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2876054},
  doi          = {10.1109/MC.2018.2876054},
  timestamp    = {Thu, 26 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/WonYPPJBKLSPE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Wright18,
  author       = {F. D. Wright},
  title        = {Standards: Engaging for the Future},
  journal      = {Computer},
  volume       = {51},
  number       = {2},
  pages        = {81--83},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.1451654},
  doi          = {10.1109/MC.2018.1451654},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Wright18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/WrightC18,
  author       = {F. D. Wright and
                  Thomas M. Conte},
  title        = {Standards: Roadmapping Computer Technology Trends Enlightens Industry},
  journal      = {Computer},
  volume       = {51},
  number       = {6},
  pages        = {100--103},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2701628},
  doi          = {10.1109/MC.2018.2701628},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/WrightC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/YaoZZHSZSA18,
  author       = {Shuochao Yao and
                  Yiran Zhao and
                  Aston Zhang and
                  Shaohan Hu and
                  Huajie Shao and
                  Chao Zhang and
                  Lu Su and
                  Tarek F. Abdelzaher},
  title        = {Deep Learning for the Internet of Things},
  journal      = {Computer},
  volume       = {51},
  number       = {5},
  pages        = {32--41},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2381131},
  doi          = {10.1109/MC.2018.2381131},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/YaoZZHSZSA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics