Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/computer/computer51.bht:"
@article{DBLP:journals/computer/AbdelzaherABDDG18, author = {Tarek F. Abdelzaher and Nora Ayanian and Tamer Basar and Suhas N. Diggavi and Jana Diesner and Deepak Ganesan and Ramesh Govindan and Susmit Jha and Tancr{\`{e}}de Lepoint and Benjamin M. Marlin and Klara Nahrstedt and David M. Nicol and Raj Rajkumar and Stephen Russell and Sanjit A. Seshia and Fei Sha and Prashant J. Shenoy and Mani B. Srivastava and Gaurav S. Sukhatme and Ananthram Swami and Paulo Tabuada and Don Towsley and Nitin H. Vaidya and Venugopal V. Veeravalli}, title = {Toward an Internet of Battlefield Things: {A} Resilience Perspective}, journal = {Computer}, volume = {51}, number = {11}, pages = {24--36}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2876048}, doi = {10.1109/MC.2018.2876048}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/AbdelzaherABDDG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/AhnLBLK18, author = {Jungmo Ahn and Huynh Nguyen Loc and Rajesh Krishna Balan and Youngki Lee and JeongGil Ko}, title = {Finding Small-Bowel Lesions: Challenges in Endoscopy-Image-Based Learning Systems}, journal = {Computer}, volume = {51}, number = {5}, pages = {68--76}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2381116}, doi = {10.1109/MC.2018.2381116}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/AhnLBLK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/AkmandorJ18, author = {Ayten Ozge Akmandor and Niraj K. Jha}, title = {Detecting and Alleviating Stress with SoDA}, journal = {Computer}, volume = {51}, number = {7}, pages = {4--5}, year = {2018}, url = {http://doi.ieeecomputersociety.org/10.1109/MC.2018.3011032}, doi = {10.1109/MC.2018.3011032}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/AkmandorJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/AngelovG18, author = {Plamen P. Angelov and Xiaowei Gu}, title = {Toward Anthropomorphic Machine Learning}, journal = {Computer}, volume = {51}, number = {9}, pages = {18--27}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3620973}, doi = {10.1109/MC.2018.3620973}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/AngelovG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BanosN18, author = {Oresti Banos and Christopher Nugent}, title = {E-Coaching for Health}, journal = {Computer}, volume = {51}, number = {3}, pages = {12--15}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.1731070}, doi = {10.1109/MC.2018.1731070}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BanosN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BanosN18a, author = {Oresti Banos and Chris D. Nugent}, title = {M-Coaching: Towards the Next Generation of Mobile-Driven Healthcare Support Services}, journal = {Computer}, volume = {51}, number = {8}, pages = {14--17}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3191267}, doi = {10.1109/MC.2018.3191267}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BanosN18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Beck18, author = {Roman Beck}, title = {Beyond Bitcoin: The Rise of Blockchain World}, journal = {Computer}, volume = {51}, number = {2}, pages = {54--58}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.1451660}, doi = {10.1109/MC.2018.1451660}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Beck18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BellN18, author = {C. Gordon Bell and Ike Nassi}, title = {Revisiting Scalable Coherent Shared Memory}, journal = {Computer}, volume = {51}, number = {1}, pages = {40--49}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.1151020}, doi = {10.1109/MC.2018.1151020}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BellN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Bergel18, author = {Hal Berghel}, title = {Election Integrity 2018: Are We Better Off Than We Were in 2016? [Aftershock]}, journal = {Computer}, volume = {51}, number = {11}, pages = {90--94}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2885315}, doi = {10.1109/MC.2018.2885315}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Bergel18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel18, author = {Hal Berghel}, title = {Disinformatics: The Discipline behind Grand Deceptions}, journal = {Computer}, volume = {51}, number = {1}, pages = {89--93}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.1151023}, doi = {10.1109/MC.2018.1151023}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel18a, author = {Hal Berghel}, title = {Bruce Schneier on Future Digital Threats}, journal = {Computer}, volume = {51}, number = {2}, pages = {64--67}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.1451653}, doi = {10.1109/MC.2018.1451653}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel18b, author = {Hal Berghel}, title = {Trolling Pathologies}, journal = {Computer}, volume = {51}, number = {3}, pages = {66--69}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.1731067}, doi = {10.1109/MC.2018.1731067}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel18b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel18c, author = {Hal Berghel}, title = {Weaponizing Twitter Litter: Abuse-Forming Networks and Social Media}, journal = {Computer}, volume = {51}, number = {4}, pages = {70--73}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2141019}, doi = {10.1109/MC.2018.2141019}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel18c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel18d, author = {Hal Berghel}, title = {Malice Domestic: The Cambridge Analytica Dystopia}, journal = {Computer}, volume = {51}, number = {5}, pages = {84--89}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2381135}, doi = {10.1109/MC.2018.2381135}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel18d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel18e, author = {Hal Berghel}, title = {Newton's Great Insight}, journal = {Computer}, volume = {51}, number = {7}, pages = {86--90}, year = {2018}, url = {http://doi.ieeecomputersociety.org/10.1109/MC.2018.3011036}, doi = {10.1109/MC.2018.3011036}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel18e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel18f, author = {Hal Berghel}, title = {The Genesis of Postmodern Disinformatics [Out of Band]}, journal = {Computer}, volume = {51}, number = {11}, pages = {102--105}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2876183}, doi = {10.1109/MC.2018.2876183}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel18f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BerghelB18, author = {Hal Berghel and Daniel Berleant}, title = {The Online Trolling Ecosystem}, journal = {Computer}, volume = {51}, number = {8}, pages = {44--51}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3191256}, doi = {10.1109/MC.2018.3191256}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BerghelB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Bhat18, author = {Wasim Ahmad Bhat}, title = {Is a Data-Capacity Gap Inevitable in Big Data Storage?}, journal = {Computer}, volume = {51}, number = {9}, pages = {54--62}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3620975}, doi = {10.1109/MC.2018.3620975}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Bhat18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BhattaraiW18, author = {Sulabh Bhattarai and Yong Wang}, title = {End-to-End Trust and Security for Internet of Things Applications}, journal = {Computer}, volume = {51}, number = {4}, pages = {20--27}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2141038}, doi = {10.1109/MC.2018.2141038}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BhattaraiW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BloomfieldBBS18, author = {Robin Bloomfield and Peter Bishop and Eoin Butler and Robert J. Stroud}, title = {Security-Informed Safety: Supporting Stakeholders with Codes of Practice}, journal = {Computer}, volume = {51}, number = {8}, pages = {60--65}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3191260}, doi = {10.1109/MC.2018.3191260}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BloomfieldBBS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BouchardACDDDDF18, author = {Kristofer E. Bouchard and James B. Aimone and Miyoung Chun and Thomas Dean and Michael Denker and Markus Diesmann and David Donofrio and Loren M. Frank and Narayanan Kasthuri and Christof Koch and Oliver R{\"{u}}bel and Horst D. Simon and Friedrich T. Sommer and Prabhat}, title = {International Neuroscience Initiatives through the Lens of High-Performance Computing}, journal = {Computer}, volume = {51}, number = {4}, pages = {50--59}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2141039}, doi = {10.1109/MC.2018.2141039}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BouchardACDDDDF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BruneoDLMP18, author = {Dario Bruneo and Salvatore Distefano and Francesco Longo and Giovanni Merlino and Antonio Puliafito}, title = {I/Ocloud: Adding an IoT Dimension to Cloud Infrastructures}, journal = {Computer}, volume = {51}, number = {1}, pages = {57--65}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.1151016}, doi = {10.1109/MC.2018.1151016}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BruneoDLMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Buzzelli18, author = {Timothy Buzzelli}, title = {University of Central Florida Takes the Bronze at Annual International Programming Competition}, journal = {Computer}, volume = {51}, number = {7}, pages = {78--81}, year = {2018}, url = {http://doi.ieeecomputersociety.org/10.1109/MC.2018.3011049}, doi = {10.1109/MC.2018.3011049}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Buzzelli18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Cameron18, author = {Lori Cameron}, title = {[Elsewhere in the {CS]}}, journal = {Computer}, volume = {51}, number = {11}, pages = {4--6}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2876160}, doi = {10.1109/MC.2018.2876160}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Cameron18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Cameron18a, author = {Lori Cameron}, title = {[Elsewhere in the {CS]}}, journal = {Computer}, volume = {51}, number = {12}, pages = {4--6}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2879991}, doi = {10.1109/MC.2018.2879991}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Cameron18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/CastroLG18, author = {Rodrigo Roman Castro and Javier L{\'{o}}pez and Stefanos Gritzalis}, title = {Evolution and Trends in IoT Security}, journal = {Computer}, volume = {51}, number = {7}, pages = {16--25}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3011051}, doi = {10.1109/MC.2018.3011051}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/CastroLG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Charette18, author = {Robert N. Charette}, title = {Puncturing Pernicious Project Pufferies}, journal = {Computer}, volume = {51}, number = {5}, pages = {78--83}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2381127}, doi = {10.1109/MC.2018.2381127}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Charette18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/CharetteK18, author = {Robert N. Charette and John Leslie King}, title = {Winning and Losing in {IT}}, journal = {Computer}, volume = {51}, number = {10}, pages = {10--15}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3971361}, doi = {10.1109/MC.2018.3971361}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/CharetteK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ChatterjeeRB18, author = {Tanusree Chatterjee and Sushmita Ruj and Sipra Das Bit}, title = {Security Issues in Named Data Networks}, journal = {Computer}, volume = {51}, number = {1}, pages = {66--75}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.1151010}, doi = {10.1109/MC.2018.1151010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ChatterjeeRB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ChauhanSHMSL18, author = {Jagmohan Chauhan and Suranga Seneviratne and Yining Hu and Archan Misra and Aruna Seneviratne and Youngki Lee}, title = {Breathing-Based Authentication on Resource-Constrained IoT Devices using Recurrent Neural Networks}, journal = {Computer}, volume = {51}, number = {5}, pages = {60--67}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2381119}, doi = {10.1109/MC.2018.2381119}, timestamp = {Wed, 16 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ChauhanSHMSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ChenZLS18, author = {Chung{-}Kuan Chen and Zhi{-}Kai Zhang and Shan{-}Hsin Lee and Shiuhpyng Shieh}, title = {Penetration Testing in the IoT Age}, journal = {Computer}, volume = {51}, number = {4}, pages = {82--85}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2141033}, doi = {10.1109/MC.2018.2141033}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ChenZLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/CoferGBWPFPKKAH18, author = {Darren D. Cofer and Andrew Gacek and John Backes and Michael W. Whalen and Lee Pike and Adam Foltzer and Michal Podhradsky and Gerwin Klein and Ihor Kuz and June Andronick and Gernot Heiser and Douglas Stuart}, title = {A Formal Approach to Constructing Secure Air Vehicle Software}, journal = {Computer}, volume = {51}, number = {11}, pages = {14--23}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2876051}, doi = {10.1109/MC.2018.2876051}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/CoferGBWPFPKKAH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ConteDMM18, author = {Thomas M. Conte and Erik P. DeBenedictis and Avi Mendelson and Dejan S. Milojicic}, title = {Rebooting Computers to Avoid Meltdown and Spectre}, journal = {Computer}, volume = {51}, number = {4}, pages = {74--77}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2141022}, doi = {10.1109/MC.2018.2141022}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ConteDMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Conway18, author = {Lynn Conway}, title = {The Disappeared: Beyond Winning and Losing}, journal = {Computer}, volume = {51}, number = {10}, pages = {66--73}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3971344}, doi = {10.1109/MC.2018.3971344}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Conway18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/DeBenedictis18, author = {Erik P. DeBenedictis}, title = {A Future with Quantum Machine Learning}, journal = {Computer}, volume = {51}, number = {2}, pages = {68--71}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.1451646}, doi = {10.1109/MC.2018.1451646}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/DeBenedictis18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/DeBenedictis18a, author = {Erik P. DeBenedictis}, title = {Accelerated Architectures Create Programming Opportunities}, journal = {Computer}, volume = {51}, number = {6}, pages = {82--85}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2701625}, doi = {10.1109/MC.2018.2701625}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/DeBenedictis18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/DeBenedictis18b, author = {Erik P. DeBenedictis}, title = {A Role for {IEEE} in Quantum Computing}, journal = {Computer}, volume = {51}, number = {8}, pages = {52--55}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3191257}, doi = {10.1109/MC.2018.3191257}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/DeBenedictis18b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/DeBenedictisF18, author = {Erik P. DeBenedictis and Michael P. Frank}, title = {The National Quantum Initiative Will Also Benefit Classical Computers [Rebooting Computing]}, journal = {Computer}, volume = {51}, number = {12}, pages = {69--73}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2880025}, doi = {10.1109/MC.2018.2880025}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/DeBenedictisF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/DeBenedictisHG18, author = {Erik P. DeBenedictis and Travis S. Humble and Paolo A. Gargini}, title = {Quantum Computer Scale-up}, journal = {Computer}, volume = {51}, number = {10}, pages = {86--89}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3971356}, doi = {10.1109/MC.2018.3971356}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/DeBenedictisHG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/DeMaraM18, author = {Ronald F. DeMara and Paolo Montuschi}, title = {Non-Volatile Memory Trends: Toward Improving Density and Energy Profiles across the System Stack}, journal = {Computer}, volume = {51}, number = {4}, pages = {12--13}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2141044}, doi = {10.1109/MC.2018.2141044}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/DeMaraM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Denning18, author = {Peter J. Denning}, title = {Winning at Innovation}, journal = {Computer}, volume = {51}, number = {10}, pages = {32--39}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3971353}, doi = {10.1109/MC.2018.3971353}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Denning18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/DhekneRC18, author = {Ashutosh Dhekne and Umberto Ravaioli and Romit Roy Choudhury}, title = {P2PLoc: Peer-to-Peer Localization of Fast-Moving Entities}, journal = {Computer}, volume = {51}, number = {10}, pages = {94--98}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3971349}, doi = {10.1109/MC.2018.3971349}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/DhekneRC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/DinhT18, author = {Thang N. Dinh and My T. Thai}, title = {{AI} and Blockchain: {A} Disruptive Integration}, journal = {Computer}, volume = {51}, number = {9}, pages = {48--53}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3620971}, doi = {10.1109/MC.2018.3620971}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/DinhT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/DongarraGW18, author = {Jack J. Dongarra and Vladimir Getov and Kevin Walsh}, title = {The 30th Anniversary of the Supercomputing Conference: Bringing the Future Closer - Supercomputing History and the Immortality of Now}, journal = {Computer}, volume = {51}, number = {10}, pages = {74--85}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3971352}, doi = {10.1109/MC.2018.3971352}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/DongarraGW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/EgyedZHD18, author = {Alexander Egyed and Klaus Zeman and Peter Hehenberger and Andreas Demuth}, title = {Maintaining Consistency across Engineering Artifacts}, journal = {Computer}, volume = {51}, number = {2}, pages = {28--35}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.1451666}, doi = {10.1109/MC.2018.1451666}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/EgyedZHD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Ernst18, author = {Rolf Ernst}, title = {Automated Driving: The Cyber-Physical Perspective}, journal = {Computer}, volume = {51}, number = {9}, pages = {76--79}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3620974}, doi = {10.1109/MC.2018.3620974}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Ernst18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Floriani18, author = {Leila De Floriani}, title = {Globe Browsing in OpenSpace}, journal = {Computer}, volume = {51}, number = {5}, pages = {8--9}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2381132}, doi = {10.1109/MC.2018.2381132}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Floriani18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/FuentesGSV18, author = {Jos{\'{e}} Mar{\'{\i}}a de Fuentes and Lorena Gonz{\'{a}}lez{-}Manzano and Agusti Solanas and Fatbardh Veseli}, title = {Attribute-Based Credentials for Privacy-Aware Smart Health Services in IoT-Based Smart Cities}, journal = {Computer}, volume = {51}, number = {7}, pages = {44--53}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3011042}, doi = {10.1109/MC.2018.3011042}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/FuentesGSV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GaoLW18, author = {Hui Gao and Chi Harold Liu and Wendong Wang}, title = {Hybrid Vehicular Crowdsourcing With Driverless Cars: Challenges and a Solution}, journal = {Computer}, volume = {51}, number = {12}, pages = {24--31}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2879994}, doi = {10.1109/MC.2018.2879994}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GaoLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GastilM18, author = {John Gastil and Sascha D. Meinrath}, title = {Bringing Citizens and Policymakers Together Online: Imagining the Possibilities and Taking Stock of Privacy and Transparency Hazards}, journal = {Computer}, volume = {51}, number = {6}, pages = {30--40}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2701623}, doi = {10.1109/MC.2018.2701623}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/GastilM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GreeneST18, author = {Kristen K. Greene and Michelle Steves and Mary Theofanos}, title = {No Phishing beyond This Point}, journal = {Computer}, volume = {51}, number = {6}, pages = {86--89}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2701632}, doi = {10.1109/MC.2018.2701632}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GreeneST18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grudin18, author = {Jonathan Grudin}, title = {Innovation and Inertia: Information Technology and Education in the United States}, journal = {Computer}, volume = {51}, number = {10}, pages = {40--47}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3971346}, doi = {10.1109/MC.2018.3971346}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grudin18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Hagras18, author = {Hani Hagras}, title = {Toward Human-Understandable, Explainable {AI}}, journal = {Computer}, volume = {51}, number = {9}, pages = {28--36}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3620965}, doi = {10.1109/MC.2018.3620965}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/Hagras18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HallTJ18, author = {Wendy Hall and Ramine Tinati and Will Jennings}, title = {From Brexit to Trump: Social Media's Role in Democracy}, journal = {Computer}, volume = {51}, number = {1}, pages = {18--27}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.1151005}, doi = {10.1109/MC.2018.1151005}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/HallTJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HalleKA18, author = {Sylvain Hall{\'{e}} and Rapha{\"{e}}l Khoury and Mewena Awesso}, title = {Streamlining the Inclusion of Computer Experiments In a Research Paper}, journal = {Computer}, volume = {51}, number = {11}, pages = {78--89}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2876075}, doi = {10.1109/MC.2018.2876075}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HalleKA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HanJJL18, author = {Kyungsik Han and Hyunggu Jung and Jin Yea Jang and Dongwon Lee}, title = {Understanding Users' Privacy Attitudes through Subjective and Objective Assessments: An Instagram Case Study}, journal = {Computer}, volume = {51}, number = {6}, pages = {18--28}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2701648}, doi = {10.1109/MC.2018.2701648}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/HanJJL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Handler18, author = {Ivan Handler}, title = {Data Sharing Defined - Really!}, journal = {Computer}, volume = {51}, number = {2}, pages = {36--42}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.1451659}, doi = {10.1109/MC.2018.1451659}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Handler18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Hanna18, author = {Mina J. Hanna}, title = {Net Neutrality: {A} Brief Overview of the Policy and the FCC's Ruling to Upend It}, journal = {Computer}, volume = {51}, number = {4}, pages = {78--81}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2141045}, doi = {10.1109/MC.2018.2141045}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Hanna18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HaqueNET18, author = {Mohammad Shihabul Haque and Daniel Jun Xian Ng and Arvind Easwaran and Karthikeyan Thangamariappan}, title = {Contract-Based Hierarchical Resilience Management for Cyber-Physical Systems}, journal = {Computer}, volume = {51}, number = {11}, pages = {56--65}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2876071}, doi = {10.1109/MC.2018.2876071}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HaqueNET18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HarelKMM18, author = {David Harel and Guy Katz and Rami Marelly and Assaf Marron}, title = {Wise Computing: Toward Endowing System Development with Proactive Wisdom}, journal = {Computer}, volume = {51}, number = {2}, pages = {14--26}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.1451652}, doi = {10.1109/MC.2018.1451652}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HarelKMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HassanHLSKD18, author = {Mahbub Hassan and Wen Hu and Guohao Lan and Aruna Seneviratne and Sara Khalifa and Sajal K. Das}, title = {Kinetic-Powered Health Wearables: Challenges and Opportunities}, journal = {Computer}, volume = {51}, number = {9}, pages = {64--74}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3620960}, doi = {10.1109/MC.2018.3620960}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/HassanHLSKD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Helal18, author = {Sumi Helal}, title = {2018 Outlook: The Emerging Web and Information Sciences}, journal = {Computer}, volume = {51}, number = {1}, pages = {14--16}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.1151022}, doi = {10.1109/MC.2018.1151022}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Helal18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Helal18a, author = {Sumi Helal}, title = {The Expanding Frontier of Artificial Intelligence}, journal = {Computer}, volume = {51}, number = {9}, pages = {14--17}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3620976}, doi = {10.1109/MC.2018.3620976}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Helal18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HendlerHC18, author = {James A. Hendler and Wendy Hall and Noshir Contractor}, title = {Web Science: Now More Than Ever}, journal = {Computer}, volume = {51}, number = {6}, pages = {12--17}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2701637}, doi = {10.1109/MC.2018.2701637}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/HendlerHC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Hicks18, author = {Marie Hicks}, title = {When Winning Is Losing: Why the Nation that Invented the Computer Lost Its Lead}, journal = {Computer}, volume = {51}, number = {10}, pages = {48--57}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3971355}, doi = {10.1109/MC.2018.3971355}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Hicks18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HosioKBOG18, author = {Simo Hosio and Jaro Karppinen and Niels van Berkel and Jonas Oppenlaender and Jorge Gon{\c{c}}alves}, title = {Mobile Decision Support and Data Provisioning for Low Back Pain}, journal = {Computer}, volume = {51}, number = {8}, pages = {34--43}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3191250}, doi = {10.1109/MC.2018.3191250}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/HosioKBOG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HuKF18, author = {Vincent C. Hu and D. Richard Kuhn and David F. Ferraiolo}, title = {Access Control for Emerging Distributed Systems}, journal = {Computer}, volume = {51}, number = {10}, pages = {100--103}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3971347}, doi = {10.1109/MC.2018.3971347}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HuKF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HudsonC18, author = {Florence D. Hudson and Chris Clark}, title = {Wearables and Medical Interoperability: The Evolving Frontier}, journal = {Computer}, volume = {51}, number = {9}, pages = {86--90}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3620987}, doi = {10.1109/MC.2018.3620987}, timestamp = {Fri, 24 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/HudsonC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Hurlburt18, author = {George F. Hurlburt}, title = {Toward Applied Cyberethics}, journal = {Computer}, volume = {51}, number = {9}, pages = {80--84}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3620959}, doi = {10.1109/MC.2018.3620959}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/Hurlburt18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/IsaakH18, author = {Jim Isaak and Mina J. Hanna}, title = {User Data Privacy: Facebook, Cambridge Analytica, and Privacy Protection}, journal = {Computer}, volume = {51}, number = {8}, pages = {56--59}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3191268}, doi = {10.1109/MC.2018.3191268}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/IsaakH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/IshidaMLNO18, author = {Toru Ishida and Yohei Murakami and Donghui Lin and Takao Nakaguchi and Masayuki Otani}, title = {Language Service Infrastructure on the Web: The Language Grid}, journal = {Computer}, volume = {51}, number = {6}, pages = {72--81}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2701643}, doi = {10.1109/MC.2018.2701643}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/IshidaMLNO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Joshi18, author = {James Joshi}, title = {Front Cover}, journal = {Computer}, volume = {51}, number = {11}, pages = {1}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2880358}, doi = {10.1109/MC.2018.2880358}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Joshi18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Kasahara18, author = {Hironori Kasahara}, title = {Satisfaction and Sustainability}, journal = {Computer}, volume = {51}, number = {1}, pages = {4--6}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.1151006}, doi = {10.1109/MC.2018.1151006}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Kasahara18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KimDPMM18, author = {Ryan Gary Kim and Janardhan Rao Doppa and Partha Pratim Pande and Diana Marculescu and Radu Marculescu}, title = {Machine Learning and Manycore Systems Design: {A} Serendipitous Symbiosis}, journal = {Computer}, volume = {51}, number = {7}, pages = {66--77}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3011040}, doi = {10.1109/MC.2018.3011040}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/KimDPMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KoshizukaHS18, author = {Noboru Koshizuka and Stephan Haller and Ken Sakamura}, title = {CPaaS.io: An EU-Japan Collaboration on Open Smart-City Platforms}, journal = {Computer}, volume = {51}, number = {12}, pages = {50--58}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2880019}, doi = {10.1109/MC.2018.2880019}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KoshizukaHS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KoulamasK18, author = {Christos Koulamas and Athanasios P. Kalogeras}, title = {Cyber-Physical Systems and Digital Twins in the Industrial Internet of Things [Cyber-Physical Systems]}, journal = {Computer}, volume = {51}, number = {11}, pages = {95--98}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2876181}, doi = {10.1109/MC.2018.2876181}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KoulamasK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KrishnaWAMS18, author = {Varun Badrinath Krishna and Ziping Wu and Vaidehi V. Ambardekar and Richard Macwan and William H. Sanders}, title = {Cyberattacks on Primary Frequency Response Mechanisms in Power Grids}, journal = {Computer}, volume = {51}, number = {11}, pages = {37--45}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2876053}, doi = {10.1109/MC.2018.2876053}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KrishnaWAMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Kshetri18, author = {Nir Kshetri}, title = {Cryptocurrencies: Transparency Versus Privacy [Cybertrust]}, journal = {Computer}, volume = {51}, number = {11}, pages = {99--111}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2876182}, doi = {10.1109/MC.2018.2876182}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Kshetri18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Kshetri18a, author = {Nir Kshetri}, title = {Blockchain and Electronic Healthcare Records [Cybertrust]}, journal = {Computer}, volume = {51}, number = {12}, pages = {59--63}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2880021}, doi = {10.1109/MC.2018.2880021}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Kshetri18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KshetriV18, author = {Nir Kshetri and Jeffrey M. Voas}, title = {Hackings Brand-Equity Nexus}, journal = {Computer}, volume = {51}, number = {3}, pages = {74--77}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.1731061}, doi = {10.1109/MC.2018.1731061}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KshetriV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KshetriV18a, author = {Nir Kshetri and Jeffrey M. Voas}, title = {Cyberthreats under the Bed}, journal = {Computer}, volume = {51}, number = {5}, pages = {92--95}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2381121}, doi = {10.1109/MC.2018.2381121}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KshetriV18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KuhnRK18, author = {Rick Kuhn and Mohammad S. Raunak and Raghu Kacker}, title = {Can Reducing Faults Prevent Vulnerabilities?}, journal = {Computer}, volume = {51}, number = {7}, pages = {82--85}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3011039}, doi = {10.1109/MC.2018.3011039}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KuhnRK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KumarPALHY18, author = {Tanesh Kumar and Pawani Porambage and Ijaz Ahmad and Madhusanka Liyanage and Erkki Harjula and Mika Ylianttila}, title = {Securing Gadget-Free Digital Services}, journal = {Computer}, volume = {51}, number = {11}, pages = {66--77}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2876017}, doi = {10.1109/MC.2018.2876017}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KumarPALHY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/LaneW18, author = {Nicholas D. Lane and Pete Warden}, title = {The Deep (Learning) Transformation of Mobile and Embedded Computing}, journal = {Computer}, volume = {51}, number = {5}, pages = {12--16}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2381129}, doi = {10.1109/MC.2018.2381129}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/LaneW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/LeeL18, author = {Yongsuk Lee and Gyungho Lee}, title = {Detecting Code Reuse Attacks with Branch Prediction}, journal = {Computer}, volume = {51}, number = {4}, pages = {40--47}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2141035}, doi = {10.1109/MC.2018.2141035}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/LeeL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Lima18, author = {Claudio Lima}, title = {Developing Open and Interoperable DLT{\textbackslash}/Blockchain Standards [Standards]}, journal = {Computer}, volume = {51}, number = {11}, pages = {106--111}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2876184}, doi = {10.1109/MC.2018.2876184}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Lima18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/LinWCCDLW18, author = {Chit{-}Kwan Lin and Andreas Wild and Gautham N. Chinya and Yongqiang Cao and Mike Davies and Daniel M. Lavery and Hong Wang}, title = {Programming Spiking Neural Networks on Intel's Loihi}, journal = {Computer}, volume = {51}, number = {3}, pages = {52--61}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.157113521}, doi = {10.1109/MC.2018.157113521}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/LinWCCDLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Maitland18, author = {Carleen F. Maitland}, title = {Now You See It, Now You Don't: Digital Connectivity in Marginalized Communities}, journal = {Computer}, volume = {51}, number = {6}, pages = {62--71}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2701624}, doi = {10.1109/MC.2018.2701624}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Maitland18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/McGraw18, author = {Gary McGraw}, title = {The New Killer App for Security: Software Inventory}, journal = {Computer}, volume = {51}, number = {2}, pages = {60--62}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.1451662}, doi = {10.1109/MC.2018.1451662}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/McGraw18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/McMillin18, author = {Bruce M. McMillin}, title = {Software Engineering}, journal = {Computer}, volume = {51}, number = {2}, pages = {10--12}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.1451647}, doi = {10.1109/MC.2018.1451647}, timestamp = {Sun, 29 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/McMillin18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/MeiG18, author = {Hong Mei and Yao Guo}, title = {Toward Ubiquitous Operating Systems: {A} Software-Defined Perspective}, journal = {Computer}, volume = {51}, number = {1}, pages = {50--56}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.1151018}, doi = {10.1109/MC.2018.1151018}, timestamp = {Tue, 09 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/MeiG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Meng18, author = {Weizhi Meng}, title = {Intrusion Detection in the Era of IoT: Building Trust via Traffic Filtering and Sampling}, journal = {Computer}, volume = {51}, number = {7}, pages = {36--43}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3011034}, doi = {10.1109/MC.2018.3011034}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Meng18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/MoshovosAJLSPHA18, author = {Andreas Moshovos and Jorge Albericio and Patrick Judd and Alberto Delmas Lascorz and Sayeh Sharify and Zissis Poulos and Tayler H. Hetherington and Tor M. Aamodt and Natalie D. Enright Jerger}, title = {Exploiting Typical Values to Accelerate Deep Learning}, journal = {Computer}, volume = {51}, number = {5}, pages = {18--30}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2381114}, doi = {10.1109/MC.2018.2381114}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/MoshovosAJLSPHA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/NamK18, author = {Daye Nam and Mayank Kejriwal}, title = {How Do Organizations Publish Semantic Markup? Three Case Studies Using Public Schema.org Crawls}, journal = {Computer}, volume = {51}, number = {6}, pages = {42--51}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2701635}, doi = {10.1109/MC.2018.2701635}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/NamK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Neuhold18, author = {Erich J. Neuhold}, title = {Computer, 1968 and 1993}, journal = {Computer}, volume = {51}, number = {5}, pages = {10--11}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2381130}, doi = {10.1109/MC.2018.2381130}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Neuhold18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Neuhold18a, author = {Erich J. Neuhold}, title = {{[50} {\&} 25 Years Ago]}, journal = {Computer}, volume = {51}, number = {11}, pages = {7--9}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2876180}, doi = {10.1109/MC.2018.2876180}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Neuhold18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Neuhold18b, author = {Erich J. Neuhold}, title = {Computer, December 1968 and 1993 {[50} {\&} 25 Years Ago]}, journal = {Computer}, volume = {51}, number = {12}, pages = {7--9}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2879992}, doi = {10.1109/MC.2018.2879992}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Neuhold18b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/NiLL18, author = {Zhen Ni and Qianmu Li and Gang Liu}, title = {Game-Model-Based Network Security Risk Control}, journal = {Computer}, volume = {51}, number = {4}, pages = {28--38}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2141032}, doi = {10.1109/MC.2018.2141032}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/NiLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/OchoaG18, author = {Sergio F. Ochoa and Francisco J. Gutierrez}, title = {Architecting E-Coaching Systems: {A} First Step for Dealing with Their Intrinsic Design Complexity}, journal = {Computer}, volume = {51}, number = {3}, pages = {16--23}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.1731079}, doi = {10.1109/MC.2018.1731079}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/OchoaG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/OsiaSTRH18, author = {Seyed Ali Ossia and Ali Shahin Shamsabadi and Ali Taheri and Hamid R. Rabiee and Hamed Haddadi}, title = {Private and Scalable Personal Data Analytics Using Hybrid Edge-to-Cloud Deep Learning}, journal = {Computer}, volume = {51}, number = {5}, pages = {42--49}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2381113}, doi = {10.1109/MC.2018.2381113}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/OsiaSTRH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/PalK18, author = {Amitangshu Pal and Krishna Kant}, title = {IoT-Based Sensing and Communications Infrastructure for the Fresh Food Supply Chain}, journal = {Computer}, volume = {51}, number = {2}, pages = {76--80}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.1451665}, doi = {10.1109/MC.2018.1451665}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/PalK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/PapadimitriouM18, author = {Stergios Papadimitriou and Lefteris Moussiades}, title = {Mac {OS} versus FreeBSD: {A} Comparative Evaluation}, journal = {Computer}, volume = {51}, number = {2}, pages = {44--53}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.1451648}, doi = {10.1109/MC.2018.1451648}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/PapadimitriouM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ParraFCM18, author = {Mario O. Parra and Jes{\'{u}}s Favela and Lu{\'{\i}}s A. Castro and Arturo Morales}, title = {Monitoring Eating Behaviors for a Nutritionist E-Assistant Using Crowdsourcing}, journal = {Computer}, volume = {51}, number = {3}, pages = {43--51}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.1731078}, doi = {10.1109/MC.2018.1731078}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/ParraFCM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/PeringFD18, author = {Trevor Pering and Kathy Farrington and Thorsten Dahm}, title = {Taming the IoT: Operationalized Testing to Secure Connected Devices}, journal = {Computer}, volume = {51}, number = {6}, pages = {90--94}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2701633}, doi = {10.1109/MC.2018.2701633}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/PeringFD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/PilloniPCFMB18, author = {Paolo Pilloni and Luca Piras and Salvatore Carta and Gianni Fenu and Fabrizio Mulas and Ludovico Boratto}, title = {Recommender System Lets Coaches Identify and Help Athletes Who Begin Losing Motivation}, journal = {Computer}, volume = {51}, number = {3}, pages = {36--42}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.1731060}, doi = {10.1109/MC.2018.1731060}, timestamp = {Sun, 03 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/PilloniPCFMB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/PlotzG18, author = {Thomas Pl{\"{o}}tz and Yu Guan}, title = {Deep Learning for Human Activity Recognition in Mobile Computing}, journal = {Computer}, volume = {51}, number = {5}, pages = {50--59}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2381112}, doi = {10.1109/MC.2018.2381112}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/PlotzG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Prince18, author = {Daniel Prince}, title = {Cybersecurity: The Security and Protection Challenges of Our Digital World}, journal = {Computer}, volume = {51}, number = {4}, pages = {16--19}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2141025}, doi = {10.1109/MC.2018.2141025}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Prince18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/RajP18, author = {Rajendra K. Raj and Allen Parrish}, title = {Toward Standards in Undergraduate Cybersecurity Education in 2018}, journal = {Computer}, volume = {51}, number = {2}, pages = {72--75}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.1451658}, doi = {10.1109/MC.2018.1451658}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/RajP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/RobillardH18, author = {Julie M. Robillard and Jesse Hoey}, title = {Emotion and Motivation in Cognitive Assistive Technologies for Dementia}, journal = {Computer}, volume = {51}, number = {3}, pages = {24--34}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.1731059}, doi = {10.1109/MC.2018.1731059}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/RobillardH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Rosdahl18, author = {Jon Rosdahl}, title = {Computer Society Standards Drive Industry}, journal = {Computer}, volume = {51}, number = {4}, pages = {90--94}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2141017}, doi = {10.1109/MC.2018.2141017}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Rosdahl18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/RubinovB18, author = {Konstantin Rubinov and Luciano Baresi}, title = {What Are We Missing When Testing Our Android Apps?}, journal = {Computer}, volume = {51}, number = {4}, pages = {60--68}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2141024}, doi = {10.1109/MC.2018.2141024}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/RubinovB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Scacchi18, author = {Walt Scacchi}, title = {Winning and Losing in Large-Scale Software Development: {A} Multi-Decade Perspective}, journal = {Computer}, volume = {51}, number = {10}, pages = {58--65}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3971348}, doi = {10.1109/MC.2018.3971348}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Scacchi18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SchaumontM18, author = {Patrick Schaumont and Paolo Montuschi}, title = {The Rise of Hardware Security in Computer Architectures}, journal = {Computer}, volume = {51}, number = {8}, pages = {4--5}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3191252}, doi = {10.1109/MC.2018.3191252}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SchaumontM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Schuller18, author = {Bj{\"{o}}rn W. Schuller}, title = {What Affective Computing Reveals about Autistic Children's Facial Expressions of Joy or Fear}, journal = {Computer}, volume = {51}, number = {6}, pages = {7--8}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2701647}, doi = {10.1109/MC.2018.2701647}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Schuller18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SchullerS18, author = {Dagmar Schuller and Bj{\"{o}}rn W. Schuller}, title = {The Age of Artificial Emotional Intelligence}, journal = {Computer}, volume = {51}, number = {9}, pages = {38--46}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3620963}, doi = {10.1109/MC.2018.3620963}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SchullerS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SeidelBMLLN18, author = {Stefan Seidel and Nicholas Berente and Benoit Martinez and Aron Lindberg and Kalle Lyytinen and Jeffrey V. Nickerson}, title = {Autonomous Tools in System Design: Reflective Practice in Ubisofts Ghost Recon Wildlands Project}, journal = {Computer}, volume = {51}, number = {10}, pages = {16--23}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3971341}, doi = {10.1109/MC.2018.3971341}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SeidelBMLLN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Serpanos18, author = {Dimitrios Serpanos}, title = {The Cyber-Physical Systems Revolution}, journal = {Computer}, volume = {51}, number = {3}, pages = {70--73}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.1731058}, doi = {10.1109/MC.2018.1731058}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Serpanos18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Shedroff18, author = {Nathan Shedroff}, title = {Self-Managing Real Estate}, journal = {Computer}, volume = {51}, number = {1}, pages = {104}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.1151007}, doi = {10.1109/MC.2018.1151007}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Shedroff18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ShiroishiUS18, author = {Yoshihiro Shiroishi and Kunio Uchiyama and Norihiro Suzuki}, title = {Society 5.0: For Human Security and Well-Being}, journal = {Computer}, volume = {51}, number = {7}, pages = {91--95}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3011041}, doi = {10.1109/MC.2018.3011041}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ShiroishiUS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SinghMRCC18, author = {Jatinder Singh and Christopher Millard and Chris Reed and Jennifer Cobbe and Jon Crowcroft}, title = {Accountability in the IoT: Systems, Law, and Ways Forward}, journal = {Computer}, volume = {51}, number = {7}, pages = {54--65}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3011052}, doi = {10.1109/MC.2018.3011052}, timestamp = {Wed, 09 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SinghMRCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SokolskyB18, author = {Oleg Sokolsky and Nicola Bezzo}, title = {Resiliency in Cyber-Physical Systems [Guest Editors' Introduction]}, journal = {Computer}, volume = {51}, number = {11}, pages = {10--12}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2876018}, doi = {10.1109/MC.2018.2876018}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SokolskyB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Sorin18, author = {Daniel J. Sorin}, title = {Low-Power Content Addressable Memory}, journal = {Computer}, volume = {51}, number = {3}, pages = {8--9}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.1731073}, doi = {10.1109/MC.2018.1731073}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Sorin18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SumitomoK18, author = {Takahiro Sumitomo and Noboru Koshizuka}, title = {Progress and Initiatives for Open Data Policy in Japan}, journal = {Computer}, volume = {51}, number = {12}, pages = {14--23}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2879993}, doi = {10.1109/MC.2018.2879993}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SumitomoK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SunSK18, author = {Jun Sun and Steffen Staab and J{\'{e}}r{\^{o}}me Kunegis}, title = {Understanding Social Networks Using Transfer Learning}, journal = {Computer}, volume = {51}, number = {6}, pages = {52--60}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2701640}, doi = {10.1109/MC.2018.2701640}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SunSK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SzpankowskiG18, author = {Wojciech Szpankowski and Ananth Grama}, title = {Frontiers of Science of Information: Shannon Meets Turing}, journal = {Computer}, volume = {51}, number = {1}, pages = {28--38}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.1151004}, doi = {10.1109/MC.2018.1151004}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SzpankowskiG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/TingleySTPLBVM18, author = {Connor Tingley and George Serwin and Rohan Tuli and Jenya Kirsch Posner and Celvi Lisy and Lily Bresee and Keaton Viadro and Chip Morimoto}, title = {Turning an International Competition into a Valuable Learning Experience}, journal = {Computer}, volume = {51}, number = {1}, pages = {76--79}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.1151017}, doi = {10.1109/MC.2018.1151017}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/TingleySTPLBVM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/TschanzDHD18, author = {Mauro Tschanz and Tim Lucas Dorner and J{\"{u}}rgen Holm and Kerstin Denecke}, title = {Using eMMA to Manage Medication}, journal = {Computer}, volume = {51}, number = {8}, pages = {18--25}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3191254}, doi = {10.1109/MC.2018.3191254}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/TschanzDHD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Vaidya18, author = {Jaideep Vaidya}, title = {Privacy-Preserving Statistics}, journal = {Computer}, volume = {51}, number = {9}, pages = {8--9}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3620968}, doi = {10.1109/MC.2018.3620968}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Vaidya18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/VassilevMB18, author = {Apostol Vassilev and Nicky Mouha and Luis Brandao}, title = {Psst, Can You Keep a Secret?}, journal = {Computer}, volume = {51}, number = {1}, pages = {94--97}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.1151029}, doi = {10.1109/MC.2018.1151029}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/VassilevMB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Vedder18, author = {Richard Vedder}, title = {Benefits of College - By Degrees}, journal = {Computer}, volume = {51}, number = {6}, pages = {96--99}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2701646}, doi = {10.1109/MC.2018.2701646}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Vedder18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/VlajicZ18, author = {Natalija Vlajic and Daiwei Zhou}, title = {IoT as a Land of Opportunity for DDoS Hackers}, journal = {Computer}, volume = {51}, number = {7}, pages = {26--34}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3011046}, doi = {10.1109/MC.2018.3011046}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/VlajicZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/VoasKKSK18, author = {Jeffrey M. Voas and Rick Kuhn and Constantinos Kolias and Angelos Stavrou and Georgios Kambourakis}, title = {Cybertrust in the IoT Age}, journal = {Computer}, volume = {51}, number = {7}, pages = {12--15}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3011043}, doi = {10.1109/MC.2018.3011043}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/VoasKKSK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/VoasKPS18, author = {Jeffrey M. Voas and Rick Kuhn and Celia Paulsen and Kim Schaffer}, title = {Educating Next-Gen Computer Scientists}, journal = {Computer}, volume = {51}, number = {1}, pages = {80--88}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.1151019}, doi = {10.1109/MC.2018.1151019}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/VoasKPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/VoasL18, author = {Jeffrey M. Voas and Phillip A. Laplante}, title = {IoT's Certification Quagmire}, journal = {Computer}, volume = {51}, number = {4}, pages = {86--89}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2141036}, doi = {10.1109/MC.2018.2141036}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/VoasL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/WangCFXJB18, author = {Ju Wang and Xiaojiang Chen and Dingyi Fang and Jie Xiong and Hongbo Jiang and Rajesh Krishna Balan}, title = {Material Identification and Target Imaging with RFIDs [IoT Connection]}, journal = {Computer}, volume = {51}, number = {12}, pages = {64--68}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2880022}, doi = {10.1109/MC.2018.2880022}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/WangCFXJB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/WangGY18, author = {Leye Wang and Bin Guo and Qiang Yang}, title = {Smart City Development With Urban Transfer Learning}, journal = {Computer}, volume = {51}, number = {12}, pages = {32--41}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2880015}, doi = {10.1109/MC.2018.2880015}, timestamp = {Thu, 21 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/WangGY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/WangY18, author = {Yasha Wang and Katsuyuki Yamazaki}, title = {Governments in the Age of Big Data and Smart Cities [Guest Editors' Introduction]}, journal = {Computer}, volume = {51}, number = {12}, pages = {10--12}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2886652}, doi = {10.1109/MC.2018.2886652}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/WangY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/WangZIL18, author = {Haolin Wang and Qingpeng Zhang and Mary Ip and Joseph Tak Fai Lau}, title = {Social Media-based Conversational Agents for Health Management and Interventions}, journal = {Computer}, volume = {51}, number = {8}, pages = {26--33}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3191249}, doi = {10.1109/MC.2018.3191249}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/WangZIL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/WangZZPLX18, author = {Jiangtao Wang and Junfeng Zhao and Yong Zhang and Xin Peng and Ying Li and Yun Xie}, title = {Enabling Human-Centric Smart Cities: Crowdsourcing-Based Practice in China}, journal = {Computer}, volume = {51}, number = {12}, pages = {42--49}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2880016}, doi = {10.1109/MC.2018.2880016}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/WangZZPLX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/WantWC18, author = {Roy Want and Wei Wang and Stan Chesnutt}, title = {Accurate Indoor Location for the IoT}, journal = {Computer}, volume = {51}, number = {8}, pages = {66--70}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3191259}, doi = {10.1109/MC.2018.3191259}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/WantWC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/WhitneyT18, author = {Telle Whitney and Valerie Taylor}, title = {Increasing Women and Underrepresented Minorities in Computing: The Landscape and What You Can Do}, journal = {Computer}, volume = {51}, number = {10}, pages = {24--31}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3971359}, doi = {10.1109/MC.2018.3971359}, timestamp = {Fri, 18 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/WhitneyT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Willis18, author = {Scooter Willis}, title = {The Maker Revolution}, journal = {Computer}, volume = {51}, number = {3}, pages = {62--65}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.1731074}, doi = {10.1109/MC.2018.1731074}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Willis18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Willis18a, author = {Scooter Willis}, title = {Make Learning Fun and Get Out of the Way of the Smartphone Generation}, journal = {Computer}, volume = {51}, number = {10}, pages = {90--92}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3971354}, doi = {10.1109/MC.2018.3971354}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Willis18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Wolf18, author = {Marilyn Wolf}, title = {Computing in the Real World Is the Grandest of Challenges}, journal = {Computer}, volume = {51}, number = {5}, pages = {90--91}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2381128}, doi = {10.1109/MC.2018.2381128}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Wolf18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/WonYPPJBKLSPE18, author = {Yuchang Won and Buyeon Yu and Jaegeun Park and In{-}Hee Park and Haegeon Jeong and Jeanseong Baik and Kyungtae Kang and Insup Lee and Sang Hyuk Son and Kyung{-}Joon Park and Yongsoon Eun}, title = {An Attack-Resilient {CPS} Architecture for Hierarchical Control: {A} Case Study on Train Control Systems}, journal = {Computer}, volume = {51}, number = {11}, pages = {46--55}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2876054}, doi = {10.1109/MC.2018.2876054}, timestamp = {Thu, 26 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/WonYPPJBKLSPE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Wright18, author = {F. D. Wright}, title = {Standards: Engaging for the Future}, journal = {Computer}, volume = {51}, number = {2}, pages = {81--83}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.1451654}, doi = {10.1109/MC.2018.1451654}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Wright18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/WrightC18, author = {F. D. Wright and Thomas M. Conte}, title = {Standards: Roadmapping Computer Technology Trends Enlightens Industry}, journal = {Computer}, volume = {51}, number = {6}, pages = {100--103}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2701628}, doi = {10.1109/MC.2018.2701628}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/WrightC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/YaoZZHSZSA18, author = {Shuochao Yao and Yiran Zhao and Aston Zhang and Shaohan Hu and Huajie Shao and Chao Zhang and Lu Su and Tarek F. Abdelzaher}, title = {Deep Learning for the Internet of Things}, journal = {Computer}, volume = {51}, number = {5}, pages = {32--41}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2381131}, doi = {10.1109/MC.2018.2381131}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/YaoZZHSZSA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.