Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/computer/computer49.bht:"
@article{DBLP:journals/computer/0002GR16, author = {Robert Koch and Mario Golling and Gabi Dreo Rodosek}, title = {How Anonymous Is the Tor Network? {A} Long-Term Black-Box Investigation}, journal = {Computer}, volume = {49}, number = {3}, pages = {42--49}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.73}, doi = {10.1109/MC.2016.73}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/0002GR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Abowd16, author = {Gregory D. Abowd}, title = {Beyond Weiser: From Ubiquitous to Collective Computing}, journal = {Computer}, volume = {49}, number = {1}, pages = {17--23}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.22}, doi = {10.1109/MC.2016.22}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Abowd16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/AcunLMMSTK16, author = {Bilge Acun and Akhil Langer and Esteban Meneses and Harshitha Menon and Osman Sarood and Ehsan Totoni and Laxmikant V. Kal{\'{e}}}, title = {Power, Reliability, and Performance: One System to Rule them All}, journal = {Computer}, volume = {49}, number = {10}, pages = {30--37}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.310}, doi = {10.1109/MC.2016.310}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/AcunLMMSTK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/AgarwalD16, author = {Yuvraj Agarwal and Anind K. Dey}, title = {Toward Building a Safe, Secure, and Easy-to-Use Internet of Things Infrastructure}, journal = {Computer}, volume = {49}, number = {4}, pages = {88--91}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.111}, doi = {10.1109/MC.2016.111}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/AgarwalD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/AliIRSC16, author = {Sk Subidh Ali and Mohamed Ibrahim and Jeyavijayan Rajendran and Ozgur Sinanoglu and Krishnendu Chakrabarty}, title = {Supply-Chain Security of Digital Microfluidic Biochips}, journal = {Computer}, volume = {49}, number = {8}, pages = {36--43}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.224}, doi = {10.1109/MC.2016.224}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/AliIRSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Atherton16, author = {Evan Atherton}, title = {Science Fiction Prototyping at Work}, journal = {Computer}, volume = {49}, number = {8}, pages = {109--111}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.229}, doi = {10.1109/MC.2016.229}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Atherton16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/AtluriMLK16, author = {Gowtham Atluri and Angus W. MacDonald III and Kelvin O. Lim and Vipin Kumar}, title = {The Brain-Network Paradigm: Using Functional Imaging Data to Study How the Brain Works}, journal = {Computer}, volume = {49}, number = {10}, pages = {65--71}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.307}, doi = {10.1109/MC.2016.307}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/AtluriMLK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/AvvenutiCVT16, author = {Marco Avvenuti and Stefano Cresci and Fabio Del Vigna and Maurizio Tesconi}, title = {Impromptu Crisis Mapping to Prioritize Emergency Response}, journal = {Computer}, volume = {49}, number = {5}, pages = {28--37}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.134}, doi = {10.1109/MC.2016.134}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/AvvenutiCVT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Bader16, author = {David A. Bader}, title = {Evolving {MPI+X} Toward Exascale}, journal = {Computer}, volume = {49}, number = {8}, pages = {10}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.232}, doi = {10.1109/MC.2016.232}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Bader16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BajcsyVACMB16, author = {Peter Bajcsy and Antoine Vandecreme and Julien Amelot and Joe Chalfoun and Michael Majurski and Mary Brady}, title = {Enabling Stem Cell Characterization from Large Microscopy Images}, journal = {Computer}, volume = {49}, number = {7}, pages = {70--79}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.191}, doi = {10.1109/MC.2016.191}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BajcsyVACMB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BalELNRSSW16, author = {Henri E. Bal and Dick H. J. Epema and Cees de Laat and Rob van Nieuwpoort and John W. Romein and Frank J. Seinstra and Cees Snoek and Harry A. G. Wijshoff}, title = {A Medium-Scale Distributed System for Computer Science Research: Infrastructure for the Long Term}, journal = {Computer}, volume = {49}, number = {5}, pages = {54--63}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.127}, doi = {10.1109/MC.2016.127}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/BalELNRSSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BanifatemiG16, author = {Amir Banifatemi and Jean{-}Luc Gaudiot}, title = {Engineering the New Boundaries of {AI}}, journal = {Computer}, volume = {49}, number = {11}, pages = {77--79}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.328}, doi = {10.1109/MC.2016.328}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BanifatemiG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BarhamgiBYBN16, author = {Mahmoud Barhamgi and Arosha K. Bandara and Yijun Yu and Khalid Belhajjame and Bashar Nuseibeh}, title = {Protecting Privacy in the Cloud: Current Practices, Future Directions}, journal = {Computer}, volume = {49}, number = {2}, pages = {68--72}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.59}, doi = {10.1109/MC.2016.59}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BarhamgiBYBN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Bartleson16, author = {Karen Bartleson}, title = {Practical Insights from the Peculiar World of Standards}, journal = {Computer}, volume = {49}, number = {3}, pages = {92--96}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.66}, doi = {10.1109/MC.2016.66}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Bartleson16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BellovinB016, author = {Steven M. Bellovin and Matt Blaze and Susan Landau}, title = {Insecure Surveillance: Technical Issues with Remote Computer Searches}, journal = {Computer}, volume = {49}, number = {3}, pages = {14--24}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.68}, doi = {10.1109/MC.2016.68}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BellovinB016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Bennett16, author = {Michael Bennett}, title = {Afrofuturism}, journal = {Computer}, volume = {49}, number = {4}, pages = {92--93}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.99}, doi = {10.1109/MC.2016.99}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Bennett16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel16, author = {Hal Berghel}, title = {Digital Politics 2016}, journal = {Computer}, volume = {49}, number = {1}, pages = {75--79}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.23}, doi = {10.1109/MC.2016.23}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel16a, author = {Hal Berghel}, title = {Secretocracy}, journal = {Computer}, volume = {49}, number = {2}, pages = {63--67}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.61}, doi = {10.1109/MC.2016.61}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel16b, author = {Hal Berghel}, title = {Net Neutrality vs. Net Neutering}, journal = {Computer}, volume = {49}, number = {3}, pages = {73--77}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.84}, doi = {10.1109/MC.2016.84}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel16c, author = {Hal Berghel}, title = {The Bogus Science Theorem (and the Junk Science Wager)}, journal = {Computer}, volume = {49}, number = {4}, pages = {74--78}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.112}, doi = {10.1109/MC.2016.112}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel16c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel16d, author = {Hal Berghel}, title = {Attenuated FAQs}, journal = {Computer}, volume = {49}, number = {5}, pages = {73--77}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.132}, doi = {10.1109/MC.2016.132}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel16d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel16e, author = {Hal Berghel}, title = {The Dictator's (False) Dilemma}, journal = {Computer}, volume = {49}, number = {7}, pages = {84--87}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.189}, doi = {10.1109/MC.2016.189}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel16e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel16f, author = {Hal Berghel}, title = {The Pollyanna Delusion}, journal = {Computer}, volume = {49}, number = {8}, pages = {98--102}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.252}, doi = {10.1109/MC.2016.252}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel16f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel16g, author = {Hal Berghel}, title = {Coda in the Key of F2654hD4}, journal = {Computer}, volume = {49}, number = {9}, pages = {104--109}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.273}, doi = {10.1109/MC.2016.273}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel16g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel16h, author = {Hal Berghel}, title = {Douglas Jones on Today's Voting Machines}, journal = {Computer}, volume = {49}, number = {10}, pages = {84--89}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.306}, doi = {10.1109/MC.2016.306}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel16h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel16i, author = {Hal Berghel}, title = {Chasing Elbridge's Ghost: The Digital Gerrymander}, journal = {Computer}, volume = {49}, number = {11}, pages = {91--95}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.330}, doi = {10.1109/MC.2016.330}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel16i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Bertino16, author = {Elisa Bertino}, title = {Securing Mobile Applications}, journal = {Computer}, volume = {49}, number = {2}, pages = {9}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.34}, doi = {10.1109/MC.2016.34}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Bertino16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Bertino16a, author = {Elisa Bertino}, title = {Security Threats: Protecting the New Cyberfrontier}, journal = {Computer}, volume = {49}, number = {6}, pages = {11--14}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.188}, doi = {10.1109/MC.2016.188}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Bertino16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BesalevaW16, author = {Liliya I. Besaleva and Alfred C. Weaver}, title = {Applications of Social Networks and Crowdsourcing for Disaster Management Improvement}, journal = {Computer}, volume = {49}, number = {5}, pages = {47--53}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.133}, doi = {10.1109/MC.2016.133}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BesalevaW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BozkurtLS16, author = {Alper Bozkurt and Edgar J. Lobaton and Mihail L. Sichitiu}, title = {A Biobotic Distributed Sensor Network for Under-Rubble Search and Rescue}, journal = {Computer}, volume = {49}, number = {5}, pages = {38--46}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.136}, doi = {10.1109/MC.2016.136}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/BozkurtLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Bulling16, author = {Andreas Bulling}, title = {Pervasive Attentive User Interfaces}, journal = {Computer}, volume = {49}, number = {1}, pages = {94--98}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.32}, doi = {10.1109/MC.2016.32}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Bulling16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BuresPKTH16, author = {Tom{\'{a}}s Bures and Frantisek Pl{\'{a}}sil and Michal Kit and Petr Tuma and Nicklas Hoch}, title = {Software Abstractions for Component Interaction in the Internet of Things}, journal = {Computer}, volume = {49}, number = {12}, pages = {50--59}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.377}, doi = {10.1109/MC.2016.377}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BuresPKTH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Byrd16, author = {Greg Byrd}, title = {{IEEE/IBM} Watson Student Showcase}, journal = {Computer}, volume = {49}, number = {1}, pages = {102--104}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.13}, doi = {10.1109/MC.2016.13}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Byrd16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Byrd16a, author = {Greg Byrd}, title = {Immortal Bits: Managing Our Digital Legacies}, journal = {Computer}, volume = {49}, number = {3}, pages = {100--103}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.71}, doi = {10.1109/MC.2016.71}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Byrd16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Byrd16b, author = {Greg Byrd}, title = {Home Sweet Mind-Controlled Home}, journal = {Computer}, volume = {49}, number = {5}, pages = {98--101}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.140}, doi = {10.1109/MC.2016.140}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Byrd16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Byrd16c, author = {Greg Byrd}, title = {Let the Sun Shine}, journal = {Computer}, volume = {49}, number = {7}, pages = {94--97}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.205}, doi = {10.1109/MC.2016.205}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Byrd16c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Byrd16d, author = {Greg Byrd}, title = {Seeing Is Understanding}, journal = {Computer}, volume = {49}, number = {9}, pages = {94--97}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.266}, doi = {10.1109/MC.2016.266}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Byrd16d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Byrd16e, author = {Greg Byrd}, title = {Tactile Digital Braille Display}, journal = {Computer}, volume = {49}, number = {11}, pages = {88--90}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.327}, doi = {10.1109/MC.2016.327}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Byrd16e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Campbell16, author = {Scott Campbell}, title = {Teaching Cloud Computing}, journal = {Computer}, volume = {49}, number = {9}, pages = {91--93}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.286}, doi = {10.1109/MC.2016.286}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Campbell16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Carroll16, author = {Noel Carroll}, title = {Key Success Factors for Smart and Connected Health Software Solutions}, journal = {Computer}, volume = {49}, number = {11}, pages = {22--28}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.340}, doi = {10.1109/MC.2016.340}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Carroll16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/CarrollCYH16, author = {John M. Carroll and Jiawei Chen and Tina Chien{-}Wen Yuan and Benjamin V. Hanrahan}, title = {In Search of Coproduction: Smart Services as Reciprocal Activities}, journal = {Computer}, volume = {49}, number = {7}, pages = {26--32}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.194}, doi = {10.1109/MC.2016.194}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/CarrollCYH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/CerfS16, author = {Vint Cerf and Max Senges}, title = {Taking the Internet to the Next Physical Level}, journal = {Computer}, volume = {49}, number = {2}, pages = {80--86}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.51}, doi = {10.1109/MC.2016.51}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/CerfS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/CervantesKRCJ16, author = {Humberto Cervantes and Rick Kazman and Jungwoo Ryoo and Duyoung Choi and Duksung Jang}, title = {Architectural Approaches to Security: Four Case Studies}, journal = {Computer}, volume = {49}, number = {11}, pages = {60--67}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.332}, doi = {10.1109/MC.2016.332}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/CervantesKRCJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Chang16, author = {Carl K. Chang}, title = {Situation Analytics: {A} Foundation for a New Software Engineering Paradigm}, journal = {Computer}, volume = {49}, number = {1}, pages = {24--33}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.21}, doi = {10.1109/MC.2016.21}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Chang16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Charette16, author = {Robert N. Charette}, title = {The {STEM} Anxiety Business}, journal = {Computer}, volume = {49}, number = {3}, pages = {82--87}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.91}, doi = {10.1109/MC.2016.91}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Charette16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Charette16a, author = {Robert N. Charette}, title = {Dragging Government Legacy Systems Out of the Shadows}, journal = {Computer}, volume = {49}, number = {9}, pages = {114--119}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.289}, doi = {10.1109/MC.2016.289}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Charette16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ChenKMSTVZ16, author = {Tsong Yueh Chen and Fei{-}Ching Kuo and Wenjuan Ma and Willy Susilo and Dave Towey and Jeffrey M. Voas and Zhi Quan Zhou}, title = {Metamorphic Testing for Cybersecurity}, journal = {Computer}, volume = {49}, number = {6}, pages = {48--55}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.176}, doi = {10.1109/MC.2016.176}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ChenKMSTVZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/CherubiniJV16, author = {Giovanni Cherubini and Jens Jelitto and Vinodh Venkatesan}, title = {Cognitive Storage for Big Data}, journal = {Computer}, volume = {49}, number = {4}, pages = {43--51}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.117}, doi = {10.1109/MC.2016.117}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/CherubiniJV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Coleman16, author = {Victoria Coleman}, title = {Embodied Molecular Computation: Potential and Challenges}, journal = {Computer}, volume = {49}, number = {9}, pages = {43--51}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.295}, doi = {10.1109/MC.2016.295}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Coleman16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/DastjerdiB16, author = {Amir Vahid Dastjerdi and Rajkumar Buyya}, title = {Fog Computing: Helping the Internet of Things Realize Its Potential}, journal = {Computer}, volume = {49}, number = {8}, pages = {112--116}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.245}, doi = {10.1109/MC.2016.245}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/DastjerdiB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/DeBenedictis16, author = {Erik P. DeBenedictis}, title = {The Boolean Logic Tax}, journal = {Computer}, volume = {49}, number = {4}, pages = {79--82}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.103}, doi = {10.1109/MC.2016.103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/DeBenedictis16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/DeBenedictis16a, author = {Erik P. DeBenedictis}, title = {Rebooting Computers as Learning Machines}, journal = {Computer}, volume = {49}, number = {6}, pages = {84--87}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.156}, doi = {10.1109/MC.2016.156}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/DeBenedictis16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/DeBenedictis16b, author = {Erik P. DeBenedictis}, title = {The Search for Computing's Secretariat}, journal = {Computer}, volume = {49}, number = {8}, pages = {88--91}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.240}, doi = {10.1109/MC.2016.240}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/DeBenedictis16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/DeBenedictis16c, author = {Erik P. DeBenedictis}, title = {Computational Complexity and New Computing Approaches}, journal = {Computer}, volume = {49}, number = {12}, pages = {76--79}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.353}, doi = {10.1109/MC.2016.353}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/DeBenedictis16c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/DeBenedictisW16, author = {Erik P. DeBenedictis and R. Stanley Williams}, title = {Help Wanted: {A} Modern-Day Turing}, journal = {Computer}, volume = {49}, number = {10}, pages = {76--79}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.299}, doi = {10.1109/MC.2016.299}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/DeBenedictisW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Dhar16, author = {Vasant Dhar}, title = {Equity, Safety, and Privacy in the Autonomous Vehicle Era}, journal = {Computer}, volume = {49}, number = {11}, pages = {80--83}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.326}, doi = {10.1109/MC.2016.326}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Dhar16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Dustdar16, author = {Schahram Dustdar}, title = {Cloud Computing}, journal = {Computer}, volume = {49}, number = {2}, pages = {12--13}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.46}, doi = {10.1109/MC.2016.46}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Dustdar16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Dwyer16, author = {Matthew B. Dwyer}, title = {Finding Flaws in Natural Language Requirements}, journal = {Computer}, volume = {49}, number = {11}, pages = {10}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.342}, doi = {10.1109/MC.2016.342}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/Dwyer16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ElbadrawyPRSKR16, author = {Asmaa Elbadrawy and Agoritsa Polyzou and Zhiyun Ren and Mackenzie Sweeney and George Karypis and Huzefa Rangwala}, title = {Predicting Student Performance Using Personalized Analytics}, journal = {Computer}, volume = {49}, number = {4}, pages = {61--69}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.119}, doi = {10.1109/MC.2016.119}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/ElbadrawyPRSKR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Farrell16, author = {Stephen Farrell}, title = {Requirements Analysis Required-Otherwise Targeted Monitoring Enables Pervasive Monitoring}, journal = {Computer}, volume = {49}, number = {3}, pages = {34--40}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.69}, doi = {10.1109/MC.2016.69}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Farrell16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Floriani16, author = {Leila De Floriani}, title = {Using 2D Maps for 3D Localization}, journal = {Computer}, volume = {49}, number = {3}, pages = {5}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.87}, doi = {10.1109/MC.2016.87}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Floriani16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/FortePKB16, author = {Domenic Forte and Ron Perez and Yongdae Kim and Swarup Bhunia}, title = {Supply-Chain Security for Cyberinfrastructure [Guest editors' introduction]}, journal = {Computer}, volume = {49}, number = {8}, pages = {12--16}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.260}, doi = {10.1109/MC.2016.260}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/FortePKB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Fujii16, author = {Roger U. Fujii}, title = {Raising the Bar: Ensuring Quality Products and Services for Our Members}, journal = {Computer}, volume = {49}, number = {1}, pages = {4}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.6}, doi = {10.1109/MC.2016.6}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Fujii16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Fujii16a, author = {Roger U. Fujii}, title = {Our Journey to the Future}, journal = {Computer}, volume = {49}, number = {12}, pages = {6--9}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.365}, doi = {10.1109/MC.2016.365}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Fujii16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Gaff16, author = {Brian M. Gaff}, title = {The Need for Speed}, journal = {Computer}, volume = {49}, number = {4}, pages = {10--12}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.104}, doi = {10.1109/MC.2016.104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Gaff16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GayerHKRA16, author = {Sebastian Gayer and Andrea Herrmann and Thorsten Keuler and Matthias Riebisch and Pablo Oliveira Antonino}, title = {Lightweight Traceability for the Agile Architect}, journal = {Computer}, volume = {49}, number = {5}, pages = {64--71}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.150}, doi = {10.1109/MC.2016.150}, timestamp = {Fri, 25 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/GayerHKRA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GetovHB16, author = {Vladimir Getov and Adolfy Hoisie and Pradip Bose}, title = {New Frontiers in Energy-Efficient Computing [Guest editors' introduction]}, journal = {Computer}, volume = {49}, number = {10}, pages = {14--18}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.315}, doi = {10.1109/MC.2016.315}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GetovHB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GrantLODPL16, author = {Ryan E. Grant and Michael J. Levenhagen and Stephen L. Olivier and David Debonis and Kevin T. Pedretti and James H. Laros III}, title = {Standardizing Power Monitoring and Control at Exascale}, journal = {Computer}, volume = {49}, number = {10}, pages = {38--46}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.308}, doi = {10.1109/MC.2016.308}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/GrantLODPL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier16, author = {David Alan Grier}, title = {New Cycles of Technology}, journal = {Computer}, volume = {49}, number = {1}, pages = {120}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.31}, doi = {10.1109/MC.2016.31}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier16a, author = {David Alan Grier}, title = {The Post-MOOC World}, journal = {Computer}, volume = {49}, number = {2}, pages = {104}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.39}, doi = {10.1109/MC.2016.39}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier16b, author = {David Alan Grier}, title = {Go, Stop, Go, Stop}, journal = {Computer}, volume = {49}, number = {3}, pages = {128}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.64}, doi = {10.1109/MC.2016.64}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier16c, author = {David Alan Grier}, title = {The Global Profession}, journal = {Computer}, volume = {49}, number = {4}, pages = {120}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.100}, doi = {10.1109/MC.2016.100}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier16c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier16d, author = {David Alan Grier}, title = {Technological Improvisation}, journal = {Computer}, volume = {49}, number = {5}, pages = {128}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.155}, doi = {10.1109/MC.2016.155}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier16d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier16e, author = {David Alan Grier}, title = {Scientific Conversations}, journal = {Computer}, volume = {49}, number = {6}, pages = {120}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.163}, doi = {10.1109/MC.2016.163}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier16e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier16f, author = {David Alan Grier}, title = {Free Tuition for Community College: {A} Role for the Tech Community?}, journal = {Computer}, volume = {49}, number = {7}, pages = {80--82}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.214}, doi = {10.1109/MC.2016.214}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier16f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier16g, author = {David Alan Grier}, title = {Aware of the Situation}, journal = {Computer}, volume = {49}, number = {7}, pages = {120}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.199}, doi = {10.1109/MC.2016.199}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier16g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier16h, author = {David Alan Grier}, title = {Changing Trust}, journal = {Computer}, volume = {49}, number = {8}, pages = {156}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.244}, doi = {10.1109/MC.2016.244}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier16h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier16i, author = {David Alan Grier}, title = {The Means of Production}, journal = {Computer}, volume = {49}, number = {9}, pages = {144}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.281}, doi = {10.1109/MC.2016.281}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier16i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier16j, author = {David Alan Grier}, title = {Innovating for Tomorrow}, journal = {Computer}, volume = {49}, number = {10}, pages = {112}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.316}, doi = {10.1109/MC.2016.316}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier16j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier16k, author = {David Alan Grier}, title = {"I'm Not a Computer Scientist, but ..."}, journal = {Computer}, volume = {49}, number = {11}, pages = {104}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.331}, doi = {10.1109/MC.2016.331}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier16k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier16l, author = {David Alan Grier}, title = {Fifteen Years to Open Source}, journal = {Computer}, volume = {49}, number = {12}, pages = {96}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.360}, doi = {10.1109/MC.2016.360}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier16l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GudivadaR016, author = {Venkat N. Gudivada and Dhana Rao and Vijay V. Raghavan}, title = {Renaissance in Database Management: Navigating the Landscape of Candidate Systems}, journal = {Computer}, volume = {49}, number = {4}, pages = {31--42}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.115}, doi = {10.1109/MC.2016.115}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GudivadaR016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Helal16, author = {Sumi Helal}, title = {2016 Outlook: Humans in the Technology Loop}, journal = {Computer}, volume = {49}, number = {1}, pages = {7--9}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.25}, doi = {10.1109/MC.2016.25}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Helal16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HijaziPKS16, author = {Shurouq Hijazi and Alex Page and Burak Kantarci and Tolga Soyata}, title = {Machine Learning in Cardiac Health Monitoring and Decision Support}, journal = {Computer}, volume = {49}, number = {11}, pages = {38--48}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.339}, doi = {10.1109/MC.2016.339}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HijaziPKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Hole16, author = {Kjell J{\o}rgen Hole}, title = {Building Trust in E-Government Services}, journal = {Computer}, volume = {49}, number = {1}, pages = {66--74}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.4}, doi = {10.1109/MC.2016.4}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Hole16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Holmes16, author = {W. Neville Holmes}, title = {32 {\&} 16 Years Ago}, journal = {Computer}, volume = {49}, number = {4}, pages = {16--17}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.101}, doi = {10.1109/MC.2016.101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Holmes16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HuK16, author = {Vincent C. Hu and Rick Kuhn}, title = {Access Control Policy Verification}, journal = {Computer}, volume = {49}, number = {12}, pages = {80--83}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.368}, doi = {10.1109/MC.2016.368}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HuK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HuMOK16, author = {Wei Hu and Baolei Mao and Jason Oberg and Ryan Kastner}, title = {Detecting Hardware Trojans with Gate-Level Information-Flow Tracking}, journal = {Computer}, volume = {49}, number = {8}, pages = {44--52}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.225}, doi = {10.1109/MC.2016.225}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HuMOK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Hurlburt16, author = {George F. Hurlburt}, title = {"Good Enough" Security: The Best We'll Ever Have}, journal = {Computer}, volume = {49}, number = {7}, pages = {98--101}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.212}, doi = {10.1109/MC.2016.212}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/Hurlburt16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/IbrahimC16, author = {Mohamed Ibrahim and Krishnendu Chakrabarty}, title = {Digital-Microfluidic Biochips}, journal = {Computer}, volume = {49}, number = {6}, pages = {8--9}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.187}, doi = {10.1109/MC.2016.187}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/IbrahimC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Jacucci16, author = {Giulio Jacucci}, title = {Beyond Search Queries}, journal = {Computer}, volume = {49}, number = {10}, pages = {90--93}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.298}, doi = {10.1109/MC.2016.298}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Jacucci16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Jadbabaie16, author = {Ali Jadbabaie}, title = {Defining Data Clusters}, journal = {Computer}, volume = {49}, number = {12}, pages = {15}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.369}, doi = {10.1109/MC.2016.369}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Jadbabaie16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/JiangAJM16, author = {Zhihao Jiang and Houssam Abbas and Kuk Jin Jang and Rahul Mangharam}, title = {The Challenges of High-Confidence Medical Device Software}, journal = {Computer}, volume = {49}, number = {1}, pages = {34--42}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.20}, doi = {10.1109/MC.2016.20}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/JiangAJM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Johnson16, author = {Brian David Johnson}, title = {Beyond Science Fiction: The American Dream}, journal = {Computer}, volume = {49}, number = {1}, pages = {91--93}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.16}, doi = {10.1109/MC.2016.16}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Johnson16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Johnson16a, author = {Brian David Johnson}, title = {Science Fiction and the Coming Age of Sentient Tools}, journal = {Computer}, volume = {49}, number = {6}, pages = {95--97}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.171}, doi = {10.1109/MC.2016.171}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Johnson16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Johnson16b, author = {Brian David Johnson}, title = {So Long, and Thanks for All the Robots}, journal = {Computer}, volume = {49}, number = {12}, pages = {84--85}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.372}, doi = {10.1109/MC.2016.372}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Johnson16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/JohnsonG16, author = {Brian David Johnson and David H. Guston}, title = {Futures We Want to Inhabit}, journal = {Computer}, volume = {49}, number = {2}, pages = {78--79}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.52}, doi = {10.1109/MC.2016.52}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/JohnsonG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Jones16, author = {Lynette A. Jones}, title = {Designing Effective Refreshable Braille Displays}, journal = {Computer}, volume = {49}, number = {1}, pages = {14}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.12}, doi = {10.1109/MC.2016.12}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Jones16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KatoIG16, author = {Jun Kato and Takeo Igarashi and Masataka Goto}, title = {Programming with Examples to Develop Data-Intensive User Interfaces}, journal = {Computer}, volume = {49}, number = {7}, pages = {34--42}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.217}, doi = {10.1109/MC.2016.217}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KatoIG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Khoshkbarforoushha16, author = {Alireza Khoshkbarforoushha and Meisong Wang and Rajiv Ranjan and Lizhe Wang and Leila Alem and Samee Ullah Khan and Boualem Benatallah}, title = {Dimensions for Evaluating Cloud Resource Orchestration Frameworks}, journal = {Computer}, volume = {49}, number = {2}, pages = {24--33}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.56}, doi = {10.1109/MC.2016.56}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Khoshkbarforoushha16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KingG16, author = {John Leslie King and Jonathan Grudin}, title = {Will Computers Put Us Out of Work?}, journal = {Computer}, volume = {49}, number = {5}, pages = {82--85}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.126}, doi = {10.1109/MC.2016.126}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KingG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KnightDNHC16, author = {John C. Knight and Jack W. Davidson and Anh Nguyen{-}Tuong and Jason Hiser and Michele Co}, title = {Diversity in Cybersecurity}, journal = {Computer}, volume = {49}, number = {4}, pages = {94--98}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.102}, doi = {10.1109/MC.2016.102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KnightDNHC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KogiasXP16, author = {Dimitrios G. Kogias and Michael G. Xevgenis and Charalampos Z. Patrikakis}, title = {Cloud Federation and the Evolution of Cloud Computing}, journal = {Computer}, volume = {49}, number = {11}, pages = {96--99}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.344}, doi = {10.1109/MC.2016.344}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KogiasXP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KottSW16, author = {Alexander Kott and Ananthram Swami and Bruce J. West}, title = {The Fog of War in Cyberspace}, journal = {Computer}, volume = {49}, number = {11}, pages = {84--87}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.333}, doi = {10.1109/MC.2016.333}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KottSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KottSW16a, author = {Alexander Kott and Ananthram Swami and Bruce J. West}, title = {The Internet of Battle Things}, journal = {Computer}, volume = {49}, number = {12}, pages = {70--75}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.355}, doi = {10.1109/MC.2016.355}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KottSW16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KotzGKW16, author = {David Kotz and Carl A. Gunter and Santosh Kumar and Jonathan P. Weiner}, title = {Privacy and Security in Mobile Health: {A} Research Agenda}, journal = {Computer}, volume = {49}, number = {6}, pages = {22--30}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.185}, doi = {10.1109/MC.2016.185}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KotzGKW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KounevHBZ16, author = {Samuel Kounev and Nikolaus Huber and Fabian Brosig and Xiaoyun Zhu}, title = {A Model-Based Approach to Designing Self-Aware {IT} Systems and Infrastructures}, journal = {Computer}, volume = {49}, number = {7}, pages = {53--61}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.198}, doi = {10.1109/MC.2016.198}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KounevHBZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Kshetri16, author = {Nir Kshetri}, title = {Gambling with Source Code}, journal = {Computer}, volume = {49}, number = {2}, pages = {74--77}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.45}, doi = {10.1109/MC.2016.45}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/Kshetri16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/LaneF16, author = {H. Chad Lane and David A. Forsyth}, title = {Virtual Learning and Object Reconstruction}, journal = {Computer}, volume = {49}, number = {5}, pages = {14--15}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.152}, doi = {10.1109/MC.2016.152}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/LaneF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/LaplanteVL16, author = {Phillip A. Laplante and Jeffrey M. Voas and Nancy L. Laplante}, title = {Standards for the Internet of Things: {A} Case Study in Disaster Response}, journal = {Computer}, volume = {49}, number = {5}, pages = {87--90}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.137}, doi = {10.1109/MC.2016.137}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/LaplanteVL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/LaporteO16, author = {Claude Y. Laporte and Rory V. O'Connor}, title = {Systems and Software Engineering Standards for Very Small Entities: Accomplishments and Overview}, journal = {Computer}, volume = {49}, number = {8}, pages = {84--87}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.242}, doi = {10.1109/MC.2016.242}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/LaporteO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Lee16, author = {Ryan Lee}, title = {Threatcasting}, journal = {Computer}, volume = {49}, number = {10}, pages = {94--95}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.305}, doi = {10.1109/MC.2016.305}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Lee16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/LeppanenPGHNT16, author = {Jarno Leppanen and Mikko Pelkonen and Haipeng Guo and Samuli Hemminki and Petteri Nurmi and Sasu Tarkoma}, title = {Collaborative and Energy-Efficient Speech Monitoring on Smart Devices}, journal = {Computer}, volume = {49}, number = {12}, pages = {22--30}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.380}, doi = {10.1109/MC.2016.380}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/LeppanenPGHNT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/LinLWLK16, author = {Po{-}Ching Lin and Ying{-}Dar Lin and Cheng{-}Ying Wu and Yuan{-}Cheng Lai and Yi{-}Chih Kao}, title = {Balanced Service Chaining in Software-Defined Networks with Network Function Virtualization}, journal = {Computer}, volume = {49}, number = {11}, pages = {68--76}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.349}, doi = {10.1109/MC.2016.349}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/LinLWLK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/LinVPM16, author = {Ying{-}Dar Lin and Jeffrey M. Voas and Antonio Pescap{\`{e}} and Peter Mueller}, title = {Communications and Privacy under Surveillance}, journal = {Computer}, volume = {49}, number = {3}, pages = {10--13}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.65}, doi = {10.1109/MC.2016.65}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/LinVPM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Linthicum16, author = {David S. Linthicum}, title = {Responsive Data Architecture for the Internet of Things}, journal = {Computer}, volume = {49}, number = {10}, pages = {72--75}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.302}, doi = {10.1109/MC.2016.302}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Linthicum16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/LouiL16, author = {Ronald Prescott Loui and Terrence D. Loui}, title = {How to Survive a Cyber Pearl Harbor}, journal = {Computer}, volume = {49}, number = {6}, pages = {31--37}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.186}, doi = {10.1109/MC.2016.186}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/LouiL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/LuoXMLCZ16, author = {Qiuming Luo and Feng Xiao and Zhong Ming and Hao Li and Jianyong Chen and Jianhua Zhang}, title = {Optimizing the Memory Management of a Virtual Machine Monitor on a {NUMA} System}, journal = {Computer}, volume = {49}, number = {6}, pages = {66--74}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.169}, doi = {10.1109/MC.2016.169}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/LuoXMLCZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/LysneHOYAT16, author = {Olav Lysne and Kjell J{\o}rgen Hole and Christian Otterstad and {\O}yvind Ytrehus and Raymond Aarseth and Jorgen Tellnes}, title = {Vendor Malware: Detection Limits and Mitigation}, journal = {Computer}, volume = {49}, number = {8}, pages = {62--69}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.227}, doi = {10.1109/MC.2016.227}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/LysneHOYAT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Madria16, author = {Sanjay Kumar Madria}, title = {Security and Risk Assessment in the Cloud}, journal = {Computer}, volume = {49}, number = {9}, pages = {110--113}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.280}, doi = {10.1109/MC.2016.280}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Madria16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Maresca16, author = {Massimo Maresca}, title = {The Spreadsheet Space: Eliminating the Boundaries of Data Cross-Referencing}, journal = {Computer}, volume = {49}, number = {9}, pages = {78--85}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.272}, doi = {10.1109/MC.2016.272}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Maresca16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Matloff16, author = {Norman S. Matloff}, title = {The {H-1B} Visa Controversy}, journal = {Computer}, volume = {49}, number = {7}, pages = {88--93}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.216}, doi = {10.1109/MC.2016.216}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Matloff16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/McGraw16, author = {Gary McGraw}, title = {Four Software Security Findings}, journal = {Computer}, volume = {49}, number = {1}, pages = {84--87}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.30}, doi = {10.1109/MC.2016.30}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/McGraw16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/MerkelHSKTAM16, author = {Cory E. Merkel and Raqibul Hasan and Nicholas Soures and Dhireesha Kudithipudi and Tarek M. Taha and Sapan Agarwal and Matthew J. Marinella}, title = {Neuromemristive Systems: Boosting Efficiency through Brain-Inspired Computing}, journal = {Computer}, volume = {49}, number = {10}, pages = {56--64}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.312}, doi = {10.1109/MC.2016.312}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/MerkelHSKTAM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/MeterD16, author = {Rodney Van Meter and Simon J. Devitt}, title = {The Path to Scalable Distributed Quantum Computing}, journal = {Computer}, volume = {49}, number = {9}, pages = {31--42}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.291}, doi = {10.1109/MC.2016.291}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/MeterD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/MetwalleyTM16, author = {Hassan Metwalley and Stefano Traverso and Marco Mellia}, title = {Using Passive Measurements to Demystify Online Trackers}, journal = {Computer}, volume = {49}, number = {3}, pages = {50--55}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.74}, doi = {10.1109/MC.2016.74}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/MetwalleyTM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/MilojicicR16, author = {Dejan S. Milojicic and Timothy Roscoe}, title = {Outlook on Operating Systems}, journal = {Computer}, volume = {49}, number = {1}, pages = {43--51}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.19}, doi = {10.1109/MC.2016.19}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/MilojicicR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/MisraS16, author = {Gaurav Misra and Jose M. Such}, title = {How Socially Aware Are Social Media Privacy Controls?}, journal = {Computer}, volume = {49}, number = {3}, pages = {96--99}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.83}, doi = {10.1109/MC.2016.83}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/MisraS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/MontuschiM16, author = {Paolo Montuschi and Jean{-}Michel Muller}, title = {Modern Computer Arithmetic}, journal = {Computer}, volume = {49}, number = {9}, pages = {12}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.277}, doi = {10.1109/MC.2016.277}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/MontuschiM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Murdoch16, author = {Steven J. Murdoch}, title = {Insecure by Design: Protocols for Encrypted Phone Calls}, journal = {Computer}, volume = {49}, number = {3}, pages = {25--33}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.70}, doi = {10.1109/MC.2016.70}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Murdoch16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Murphy16, author = {Robin R. Murphy}, title = {Emergency Informatics: Using Computing to Improve Disaster Management}, journal = {Computer}, volume = {49}, number = {5}, pages = {19--27}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.135}, doi = {10.1109/MC.2016.135}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Murphy16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/MurugesanC16, author = {San Murugesan and Bob Colwell}, title = {Next-Generation Computing Paradigms}, journal = {Computer}, volume = {49}, number = {9}, pages = {14--20}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.265}, doi = {10.1109/MC.2016.265}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/MurugesanC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/MyersKLY16, author = {Brad A. Myers and Amy J. Ko and Thomas D. LaToza and YoungSeok Yoon}, title = {Programmers Are Users Too: Human-Centered Methods for Improving Programming Tools}, journal = {Computer}, volume = {49}, number = {7}, pages = {44--52}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.200}, doi = {10.1109/MC.2016.200}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/MyersKLY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/NeateJE16, author = {Timothy Neate and Matt Jones and Michael Evans}, title = {Interdevice Media: Choreographing Content to Maximize Viewer Engagement}, journal = {Computer}, volume = {49}, number = {12}, pages = {42--49}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.375}, doi = {10.1109/MC.2016.375}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/NeateJE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/NetkachovaB16, author = {Kateryna Netkachova and Robin E. Bloomfield}, title = {Security-Informed Safety}, journal = {Computer}, volume = {49}, number = {6}, pages = {98--102}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.158}, doi = {10.1109/MC.2016.158}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/NetkachovaB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/NiamutMDR16, author = {Omar Niamut and Mu Mu and Spyros G. Denazis and Nicholas J. P. Race}, title = {Social Telemedia: The Relationship between Social Information and Networked Media}, journal = {Computer}, volume = {49}, number = {5}, pages = {92--97}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.146}, doi = {10.1109/MC.2016.146}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/NiamutMDR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/NikolichCC16, author = {Paul Nikolich and Kenneth J. Christensen and Lori Cameron}, title = {802 Standards}, journal = {Computer}, volume = {49}, number = {1}, pages = {10}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.7}, doi = {10.1109/MC.2016.7}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/NikolichCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/NoorSMZ16, author = {Talal H. Noor and Quan Z. Sheng and Zakaria Maamar and Sherali Zeadally}, title = {Managing Trust in the Cloud: State of the Art and Research Challenges}, journal = {Computer}, volume = {49}, number = {2}, pages = {34--45}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.57}, doi = {10.1109/MC.2016.57}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/NoorSMZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/OlshanskyCYMABR16, author = {S. Jay Olshansky and Bruce A. Carnes and Yang Claire Yang and Norvell Miller and Janet Anderson and Hiram Beltran{-}Sanchez and Karl Ricanek}, title = {The Future of Smart Health}, journal = {Computer}, volume = {49}, number = {11}, pages = {14--21}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.336}, doi = {10.1109/MC.2016.336}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/OlshanskyCYMABR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/OulasvirtaA16, author = {Antti Oulasvirta and Gregory D. Abowd}, title = {User Interface Design in the 21st Century}, journal = {Computer}, volume = {49}, number = {7}, pages = {11--13}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.201}, doi = {10.1109/MC.2016.201}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/OulasvirtaA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Parhami16, author = {Behrooz Parhami}, title = {Low Acceptance Rates of Conference Papers Considered Harmful}, journal = {Computer}, volume = {49}, number = {4}, pages = {70--73}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.106}, doi = {10.1109/MC.2016.106}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Parhami16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Patel16, author = {Jignesh M. Patel}, title = {Operational NoSQL Systems: What's New and What's Next?}, journal = {Computer}, volume = {49}, number = {4}, pages = {23--30}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.118}, doi = {10.1109/MC.2016.118}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Patel16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Paulsen16, author = {Celia Paulsen}, title = {Cybersecuring Small Businesses}, journal = {Computer}, volume = {49}, number = {8}, pages = {92--97}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.223}, doi = {10.1109/MC.2016.223}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Paulsen16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/PereraLRWZ16, author = {Charith Perera and Chang Liu and Rajiv Ranjan and Lizhe Wang and Albert Y. Zomaya}, title = {Privacy-Knowledge Modeling for the Internet of Things: {A} Look Back}, journal = {Computer}, volume = {49}, number = {12}, pages = {60--68}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.366}, doi = {10.1109/MC.2016.366}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/PereraLRWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Petkovic16, author = {Dragutin Petkovic}, title = {Using Learning Analytics to Assess Capstone Project Teams}, journal = {Computer}, volume = {49}, number = {1}, pages = {80--83}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.3}, doi = {10.1109/MC.2016.3}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Petkovic16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/PinciroliB16, author = {Carlo Pinciroli and Giovanni Beltrame}, title = {Swarm-Oriented Programming of Distributed Robot Networks}, journal = {Computer}, volume = {49}, number = {12}, pages = {32--41}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.376}, doi = {10.1109/MC.2016.376}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/PinciroliB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/RajputSK16, author = {Hitesh Rajput and Tanmoy Som and Soumitra Kar}, title = {Using Radon Transform to Recognize Skewed Images of Vehicular License Plates}, journal = {Computer}, volume = {49}, number = {1}, pages = {59--65}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.14}, doi = {10.1109/MC.2016.14}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/RajputSK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/RalstonFSWKK16, author = {Parrish Ralston and David Fry and Scott Suko and Bryce Winters and Matthew King and Robert Kober}, title = {Defeating counterfeiters with microscopic dielets embedded in electronic components}, journal = {Computer}, volume = {49}, number = {8}, pages = {18--26}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.262}, doi = {10.1109/MC.2016.262}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/RalstonFSWKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/RamakrishnanK16, author = {Naren Ramakrishnan and Ravi Kumar}, title = {Big Data}, journal = {Computer}, volume = {49}, number = {4}, pages = {20--22}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.109}, doi = {10.1109/MC.2016.109}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/RamakrishnanK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ReismanS16, author = {Sorel Reisman and Eli Shmueli}, title = {Opening the Instructional Doors to Computer Science and IT-Finally}, journal = {Computer}, volume = {49}, number = {6}, pages = {77--79}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.175}, doi = {10.1109/MC.2016.175}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ReismanS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Ren16, author = {Xiangshi Ren}, title = {Rethinking the Relationship between Humans and Computers}, journal = {Computer}, volume = {49}, number = {8}, pages = {104--108}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.253}, doi = {10.1109/MC.2016.253}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Ren16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/RioSS16, author = {Fernando D{\'{\i}}az{-}del{-}R{\'{\i}}o and Javier J. Salmer{\'{o}}n{-}Garc{\'{\i}}a and Jos{\'{e}} Luis Sevillano}, title = {Extending Amdahl's Law for the Cloud Computing Era}, journal = {Computer}, volume = {49}, number = {2}, pages = {14--22}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.49}, doi = {10.1109/MC.2016.49}, timestamp = {Fri, 25 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/RioSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/RotemWMGWA16, author = {Efraim Rotem and Uri C. Weiser and Avi Mendelson and Ran Ginosar and Eliezer Weissmann and Yoni Aizik}, title = {H-EARtH: Heterogeneous Multicore Platform Energy Management}, journal = {Computer}, volume = {49}, number = {10}, pages = {47--55}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.309}, doi = {10.1109/MC.2016.309}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/RotemWMGWA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SakamotoSII16, author = {Daisuke Sakamoto and Yuta Sugiura and Masahiko Inami and Takeo Igarashi}, title = {Graphical Instruction for Home Robots}, journal = {Computer}, volume = {49}, number = {7}, pages = {20--25}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.195}, doi = {10.1109/MC.2016.195}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/SakamotoSII16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SaprooFSSWBLLJ16, author = {Sameer Saproo and Josef Faller and Victor Shih and Paul Sajda and Nicholas R. Waytowich and Addison W. Bohannon and Vernon J. Lawhern and Brent J. Lance and David C. Jangraw}, title = {Cortically Coupled Computing: {A} New Paradigm for Synergistic Human-Machine Interaction}, journal = {Computer}, volume = {49}, number = {9}, pages = {60--68}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.294}, doi = {10.1109/MC.2016.294}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SaprooFSSWBLLJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SchafferV16, author = {Kim Schaffer and Jeffrey M. Voas}, title = {What Happened to Formal Methods for Security?}, journal = {Computer}, volume = {49}, number = {8}, pages = {70--79}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.228}, doi = {10.1109/MC.2016.228}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SchafferV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SchullerP16, author = {Bj{\"{o}}rn W. Schuller and Jian Pei}, title = {Using Computer Intelligence for Depression Diagnosis and Crowdsourcing}, journal = {Computer}, volume = {49}, number = {7}, pages = {8--9}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.206}, doi = {10.1109/MC.2016.206}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/SchullerP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Sethumadhavan16, author = {Simha Sethumadhavan}, title = {Hardware-Enforced Privacy}, journal = {Computer}, volume = {49}, number = {10}, pages = {10}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.318}, doi = {10.1109/MC.2016.318}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Sethumadhavan16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Severance16, author = {Charles R. Severance}, title = {Bruce Schneier: The Security Mindset}, journal = {Computer}, volume = {49}, number = {2}, pages = {7--8}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.38}, doi = {10.1109/MC.2016.38}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Severance16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Severance16a, author = {Charles R. Severance}, title = {Bruce Schneier: Building Cryptographic Systems}, journal = {Computer}, volume = {49}, number = {4}, pages = {13--15}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.114}, doi = {10.1109/MC.2016.114}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Severance16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Severance16b, author = {Charles R. Severance}, title = {The Living Computer Museum}, journal = {Computer}, volume = {49}, number = {10}, pages = {12--13}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.324}, doi = {10.1109/MC.2016.324}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Severance16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ShaCMKYPYKPAB16, author = {Lui Sha and Marco Caccamo and Renato Mancuso and Jung{-}Eun Kim and Man{-}Ki Yoon and Rodolfo Pellizzoni and Heechul Yun and Russell Kegley and Dennis R. Perlman and Greg Arundale and Richard M. Bradford}, title = {Real-Time Computing on Multicore Processors}, journal = {Computer}, volume = {49}, number = {9}, pages = {69--77}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.271}, doi = {10.1109/MC.2016.271}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ShaCMKYPYKPAB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ShethAH16, author = {Amit P. Sheth and Pramod Anantharam and Cory A. Henson}, title = {Semantic, Cognitive, and Perceptual Computing: Paradigms That Shape Human Experience}, journal = {Computer}, volume = {49}, number = {3}, pages = {64--72}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.75}, doi = {10.1109/MC.2016.75}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ShethAH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ShiD16, author = {Weisong Shi and Schahram Dustdar}, title = {The Promise of Edge Computing}, journal = {Computer}, volume = {49}, number = {5}, pages = {78--81}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.145}, doi = {10.1109/MC.2016.145}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ShiD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SimosKVK16, author = {Dimitris E. Simos and Rick Kuhn and Artemios G. Voyiatzis and Raghu Kacker}, title = {Combinatorial Methods in Security Testing}, journal = {Computer}, volume = {49}, number = {10}, pages = {80--83}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.314}, doi = {10.1109/MC.2016.314}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SimosKVK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SinghVT16, author = {Lalit Kumar Singh and Gopika Vinod and Anil Kumar Tripathi}, title = {Early Prediction of Software Reliability: {A} Case Study with a Nuclear Power Plant System}, journal = {Computer}, volume = {49}, number = {1}, pages = {52--58}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.15}, doi = {10.1109/MC.2016.15}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SinghVT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SkudlarekKC16, author = {Joseph P. Skudlarek and Tom Katsioulas and Michael Chen}, title = {A Platform Solution for Secure Supply-Chain and Chip Life-Cycle Management}, journal = {Computer}, volume = {49}, number = {8}, pages = {28--34}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.243}, doi = {10.1109/MC.2016.243}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SkudlarekKC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Spring16, author = {Michael B. Spring}, title = {The Future of Standardization: Are We Destined to Repeat History?}, journal = {Computer}, volume = {49}, number = {1}, pages = {99--101}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.17}, doi = {10.1109/MC.2016.17}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Spring16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SprintCFS16, author = {Gina Sprint and Diane J. Cook and Roschelle Fritz and Maureen Schmitter{-}Edgecombe}, title = {Using Smart Homes to Detect and Analyze Health Events}, journal = {Computer}, volume = {49}, number = {11}, pages = {29--37}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.338}, doi = {10.1109/MC.2016.338}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SprintCFS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/StavrouFK16, author = {Angelos Stavrou and Daniel Fleck and Constantinos Kolias}, title = {On the Move: Evading Distributed Denial-of-Service Attacks}, journal = {Computer}, volume = {49}, number = {3}, pages = {104--107}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.85}, doi = {10.1109/MC.2016.85}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/StavrouFK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Steimle16, author = {J{\"{u}}rgen Steimle}, title = {Skin-The Next User Interface}, journal = {Computer}, volume = {49}, number = {4}, pages = {83--87}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.93}, doi = {10.1109/MC.2016.93}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Steimle16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SuHRRSMHLH16, author = {Xiang Su and Jarkko Hyysalo and Mika Rautiainen and Jukka Riekki and Jaakko J. Sauvola and Altti Ilari Maarala and Harri Hirvonsalo and Pingjiang Li and Harri Honko}, title = {Privacy as a Service: Protecting the Individual in Healthcare Data Processing}, journal = {Computer}, volume = {49}, number = {11}, pages = {49--59}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.337}, doi = {10.1109/MC.2016.337}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SuHRRSMHLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SubrahmanianADK16, author = {V. S. Subrahmanian and Amos Azaria and Skylar Durst and Vadim Kagan and Aram Galstyan and Kristina Lerman and Linhong Zhu and Emilio Ferrara and Alessandro Flammini and Filippo Menczer}, title = {The {DARPA} Twitter Bot Challenge}, journal = {Computer}, volume = {49}, number = {6}, pages = {38--46}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.183}, doi = {10.1109/MC.2016.183}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SubrahmanianADK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SugiuraII16, author = {Yuta Sugiura and Takeo Igarashi and Masahiko Inami}, title = {Cuddly User Interfaces}, journal = {Computer}, volume = {49}, number = {7}, pages = {14--19}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.196}, doi = {10.1109/MC.2016.196}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/SugiuraII16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SvoreT16, author = {Krysta M. Svore and Matthias Troyer}, title = {The Quantum Future of Computation}, journal = {Computer}, volume = {49}, number = {9}, pages = {21--30}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.293}, doi = {10.1109/MC.2016.293}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SvoreT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Terry16, author = {Doug Terry}, title = {Toward a New Approach to IoT Fault Tolerance}, journal = {Computer}, volume = {49}, number = {8}, pages = {80--83}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.238}, doi = {10.1109/MC.2016.238}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Terry16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/UllrichB16, author = {Daniel Ullrich and Andreas Butz}, title = {Social Robots for the 21st Century}, journal = {Computer}, volume = {49}, number = {6}, pages = {88--92}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.172}, doi = {10.1109/MC.2016.172}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/UllrichB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/VarshneyC16, author = {Upkar Varshney and Carl K. Chang}, title = {Smart Health and Well-Being}, journal = {Computer}, volume = {49}, number = {11}, pages = {11--13}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.351}, doi = {10.1109/MC.2016.351}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/VarshneyC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/VassilevS16, author = {Apostol Vassilev and Robert Staples}, title = {Entropy as a Service: Unlocking Cryptography's Full Potential}, journal = {Computer}, volume = {49}, number = {9}, pages = {98--102}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.275}, doi = {10.1109/MC.2016.275}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/VassilevS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/VecchiatoVM16, author = {Daniel Vecchiato and Marco Vieira and Eliane Martins}, title = {The Perils of Android Security Configuration}, journal = {Computer}, volume = {49}, number = {6}, pages = {15--21}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.184}, doi = {10.1109/MC.2016.184}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/VecchiatoVM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Voas16, author = {Jeffrey M. Voas}, title = {Demystifying the Internet of Things}, journal = {Computer}, volume = {49}, number = {6}, pages = {80--83}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.162}, doi = {10.1109/MC.2016.162}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Voas16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/VoasS16, author = {Jeffrey M. Voas and Kim Schaffer}, title = {Insights on Formal Methods in Cybersecurity}, journal = {Computer}, volume = {49}, number = {5}, pages = {102--105}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.131}, doi = {10.1109/MC.2016.131}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/VoasS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Walrad16, author = {Charlene Chuck Walrad}, title = {The {IEEE} Computer Society and ACM's Collaboration on Computing Education}, journal = {Computer}, volume = {49}, number = {3}, pages = {88--91}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.67}, doi = {10.1109/MC.2016.67}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Walrad16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/WantPA16, author = {Roy Want and Trevor Pering and Yuvraj Agarwal}, title = {Multidevice Interaction}, journal = {Computer}, volume = {49}, number = {12}, pages = {16--20}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.370}, doi = {10.1109/MC.2016.370}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/WantPA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/WeaverBB16, author = {Alfred C. Weaver and Greg Byrd and Ren{\'{e}}e C. Bryce}, title = {Computing Tools and Techniques for Emergency Response}, journal = {Computer}, volume = {49}, number = {5}, pages = {16--18}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.128}, doi = {10.1109/MC.2016.128}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/WeaverBB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Wild16, author = {Fridolin Wild}, title = {The Future of Learning at the Workplace Is Augmented Reality}, journal = {Computer}, volume = {49}, number = {10}, pages = {96--98}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.301}, doi = {10.1109/MC.2016.301}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Wild16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Wolf16, author = {Marilyn Wolf}, title = {Embedded Software in Crisis}, journal = {Computer}, volume = {49}, number = {1}, pages = {88--90}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.18}, doi = {10.1109/MC.2016.18}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Wolf16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/WuTCM16, author = {Xingfu Wu and Valerie E. Taylor and Jeanine E. Cook and Philip J. Mucci}, title = {Using Performance-Power Modeling to Improve Energy Efficiency of {HPC} Applications}, journal = {Computer}, volume = {49}, number = {10}, pages = {20--29}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.311}, doi = {10.1109/MC.2016.311}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/WuTCM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/XiaoNT16, author = {Kan Xiao and Adib Nahiyan and Mark M. Tehranipoor}, title = {Security Rule Checking in {IC} Design}, journal = {Computer}, volume = {49}, number = {8}, pages = {54--61}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.226}, doi = {10.1109/MC.2016.226}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/XiaoNT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/XuJCWR16, author = {Lei Xu and Chunxiao Jiang and Yan Chen and Jian Wang and Yong Ren}, title = {A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining}, journal = {Computer}, volume = {49}, number = {2}, pages = {54--62}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.43}, doi = {10.1109/MC.2016.43}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/XuJCWR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Yang16, author = {Qiang Yang}, title = {Cross-Domain Data Fusion}, journal = {Computer}, volume = {49}, number = {4}, pages = {18}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.113}, doi = {10.1109/MC.2016.113}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Yang16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/YangDFHZ16, author = {Xin{-}She Yang and Suash Deb and Simon Fong and Xingshi He and Yuxin Zhao}, title = {From Swarm Intelligence to Metaheuristics: Nature-Inspired Optimization Algorithms}, journal = {Computer}, volume = {49}, number = {9}, pages = {52--59}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.292}, doi = {10.1109/MC.2016.292}, timestamp = {Wed, 18 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/YangDFHZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/YangSSZA16, author = {Xia Yang and Peng Shi and Haiyong Sun and Wenxuan Zheng and Jim Alves{-}Foss}, title = {A Fast Boot, Fast Shutdown Technique for Android {OS} Devices}, journal = {Computer}, volume = {49}, number = {7}, pages = {62--68}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.210}, doi = {10.1109/MC.2016.210}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/YangSSZA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/YuHYVD16, author = {Hsiang{-}Fu Yu and Cho{-}Jui Hsieh and Hyokun Yun and S. V. N. Vishwanathan and Inderjit S. Dhillon}, title = {Nomadic Computing for Big Data Analytics}, journal = {Computer}, volume = {49}, number = {4}, pages = {52--60}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.116}, doi = {10.1109/MC.2016.116}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/YuHYVD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/YusofP16, author = {Imran Yusof and Al{-}Sakib Khan Pathan}, title = {Mitigating Cross-Site Scripting Attacks with a Content Security Policy}, journal = {Computer}, volume = {49}, number = {3}, pages = {56--63}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.76}, doi = {10.1109/MC.2016.76}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/YusofP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ZawoadH16, author = {Shams Zawoad and Ragib Hasan}, title = {Trustworthy Digital Forensics in the Cloud}, journal = {Computer}, volume = {49}, number = {3}, pages = {78--81}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.89}, doi = {10.1109/MC.2016.89}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ZawoadH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Zemrowski16, author = {Kenneth M. Zemrowski}, title = {{NIST} Bases Flagship Security Engineering Publication on {ISO/IEC/IEEE} 15288: 2015}, journal = {Computer}, volume = {49}, number = {12}, pages = {86--88}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.373}, doi = {10.1109/MC.2016.373}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Zemrowski16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ZhangS16, author = {Quan Zhang and Weisong Shi}, title = {Energy-Efficient Workload Placement in Enterprise Datacenters}, journal = {Computer}, volume = {49}, number = {2}, pages = {46--52}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.58}, doi = {10.1109/MC.2016.58}, timestamp = {Wed, 02 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/ZhangS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ZhangYYMWEMZ16, author = {Xing Zhang and Zhenglei Yi and Zhi Yan and Geyong Min and Wenbo Wang and Ahmed Elmokashfi and Sabita Maharjan and Yan Zhang}, title = {Social Computing for Mobile Big Data}, journal = {Computer}, volume = {49}, number = {9}, pages = {86--90}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.267}, doi = {10.1109/MC.2016.267}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ZhangYYMWEMZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ZhangZWBH16, author = {Qingpeng Zhang and Daniel Dajun Zeng and Fei{-}Yue Wang and Ronald L. Breiger and James A. Hendler}, title = {Brokers or Bridges? Exploring Structural Holes in a Crowdsourcing System}, journal = {Computer}, volume = {49}, number = {6}, pages = {56--64}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.166}, doi = {10.1109/MC.2016.166}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ZhangZWBH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.