Computer

Issue 5 • May 2016

Filter Results

Displaying Results 1 - 25 of 33
  • Front Cover

    Publication Year: 2016, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1637 KB)
    Freely Available from IEEE
  • House Advertisement 
  • Rock Stars of Big Data

    Publication Year: 2016, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (1128 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2016, Page(s):3 - 4
    Request permission for commercial reuse | PDF file iconPDF (288 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2016, Page(s): 5
    Request permission for commercial reuse | PDF file iconPDF (71 KB)
    Freely Available from IEEE
  • Elsewhere in the CS 
  • Computer Highlights Society Magazines

    Publication Year: 2016, Page(s):8 - 9
    Request permission for commercial reuse | PDF file iconPDF (1723 KB)
    Freely Available from IEEE
  • 32 & 16 Years Ago 
  • 32 & 16 Years Ago

    Publication Year: 2016, Page(s):10 - 11
    Request permission for commercial reuse | PDF file iconPDF (922 KB) | HTML iconHTML
    Freely Available from IEEE
  • House Advertisement 
  • Move Your Career Forward IEEE Computer Society Membership

    Publication Year: 2016, Page(s): 12
    Request permission for commercial reuse | PDF file iconPDF (139 KB)
    Freely Available from IEEE
  • 70th Anniversary Milestones 
  • IEEE Computer Society Conferences

    Publication Year: 2016, Page(s): 13
    Request permission for commercial reuse | PDF file iconPDF (283 KB) | HTML iconHTML
    Freely Available from IEEE
  • Spotlight on Transactions 
  • Virtual Learning and Object Reconstruction

    Publication Year: 2016, Page(s):14 - 15
    Request permission for commercial reuse | PDF file iconPDF (3537 KB)
    Freely Available from IEEE
  • Guest Editors' Introduction 
  • Computing Tools and Techniques for Emergency Response

    Publication Year: 2016, Page(s):16 - 18
    Request permission for commercial reuse | PDF file iconPDF (387 KB) | HTML iconHTML
    Freely Available from IEEE
  • Emergency Response 
  • Emergency Informatics: Using Computing to Improve Disaster Management

    Publication Year: 2016, Page(s):19 - 27
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2730 KB) | HTML iconHTML

    Three case studies of how two new emergency informatics tools--unmanned aerial vehicles and social media--were used to manage the 2015 Memorial Day weekend floods in Texas illustrate fundamental challenges and opportunities for computing research. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impromptu Crisis Mapping to Prioritize Emergency Response

    Publication Year: 2016, Page(s):28 - 37
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2556 KB) | HTML iconHTML

    To visualize post-emergency damage, a crisis-mapping system uses readily available semantic annotators, a machine-learning classifier to analyze relevant tweets, and interactive maps to rank extracted situational information. The system was validated against data from two recent disasters in Italy. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Biobotic Distributed Sensor Network for Under-Rubble Search and Rescue

    Publication Year: 2016, Page(s):38 - 46
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3703 KB) | HTML iconHTML

    Utilizing the latest neural engineering developments, researchers have enabled biobotic insects that function as search-and-rescue agents to help map under-rubble environments and locate survivors and hazardous conditions. The Web extra at http://youtu.be/oJXEPcv-FMw is a video in which authors Alper Bozkurt, Edgar Lobaton, and Mihail Sichitiu demonstrate the acoustic steering of roach biobots to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applications of Social Networks and Crowdsourcing for Disaster Management Improvement

    Publication Year: 2016, Page(s):47 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3239 KB) | HTML iconHTML

    Emergency resources are often insufficient to satisfy the demands for professional help and supplies in the wake of a public disaster. The authors provide insights into the trends, innovations, and challenges of contemporary crowdsourced e-health and medical informatics applications in the context of emergency preparedness and response. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research Feature 
  • A Medium-Scale Distributed System for Computer Science Research: Infrastructure for the Long Term

    Publication Year: 2016, Page(s):54 - 63
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (672 KB) | HTML iconHTML

    The Dutch Advanced School for Computing and Imaging has built five generations of a 200-node distributed system over nearly two decades while remaining aligned with the shifting computer science research agenda. The system has supported years of award-winning research, underlining the benefits of investing in a smaller-scale, tailored design. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computing Practices 
  • Lightweight Traceability for the Agile Architect

    Publication Year: 2016, Page(s):64 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1001 KB) | HTML iconHTML

    Although traceability information is vital to many software engineering activities, agile development approaches rarely use it because of the extra effort required. In this industry case study, the authors report the results of applying their lightweight semiautomated method that integrates traceability into software architecture developed with an agile process like Scrum. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Information

    Publication Year: 2016, Page(s): 72
    Request permission for commercial reuse | PDF file iconPDF (56 KB)
    Freely Available from IEEE
  • Out of Band 
  • Attenuated FAQs

    Publication Year: 2016, Page(s):73 - 77
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (984 KB) | HTML iconHTML
    Freely Available from IEEE
  • Cloud Cover 
  • The Promise of Edge Computing

    Publication Year: 2016, Page(s):78 - 81
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1309 KB) | HTML iconHTML

    The success of the Internet of Things and rich cloud services have helped create the need for edge computing, in which data processing occurs in part at the network edge, rather than completely in the cloud. Edge computing could address concerns such as latency, mobile devices' limited battery life, bandwidth costs, security, and privacy. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Aftershock 
  • Will Computers Put Us Out of Work?

    Publication Year: 2016, Page(s):82 - 85
    Request permission for commercial reuse | PDF file iconPDF (927 KB) | HTML iconHTML
    Freely Available from IEEE
  • House Advertisement 
  • Watch the World's Leading Experts Take Multi-Core Strategies to New Heights

    Publication Year: 2016, Page(s): 86
    Request permission for commercial reuse | PDF file iconPDF (292 KB)
    Freely Available from IEEE
  • Standards 
  • Standards for the Internet of Things: A Case Study in Disaster Response

    Publication Year: 2016, Page(s):87 - 90
    Request permission for commercial reuse | PDF file iconPDF (769 KB) | HTML iconHTML
    Freely Available from IEEE
  • House Advertisement 
  • IEEE Member Digital Library

    Publication Year: 2016, Page(s): 91
    Request permission for commercial reuse | PDF file iconPDF (1286 KB)
    Freely Available from IEEE
  • Social Computing 
  • Social Telemedia: The Relationship between Social Information and Networked Media

    Publication Year: 2016, Page(s):92 - 97
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3240 KB) | HTML iconHTML

    Social telemedia is a cross-breeding of social networks and networked media that allows users to capture and share live events collaboratively on mobile devices. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Student Design Showcase 
  • Home Sweet Mind-Controlled Home

    Publication Year: 2016, Page(s):98 - 101
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1885 KB) | HTML iconHTML

    Students at Colorado State University built a virtual reality prototype for experimenting with cognitive control of connected household devices. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org