Computer

Issue 6 • June 2016

Filter Results

Displaying Results 1 - 25 of 31
  • Front Cover 
  • Front Cover

    Publication Year: 2016, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (4597 KB)
    Freely Available from IEEE
  • Table of Contents 
  • Table of Contents

    Publication Year: 2016, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (2566 KB)
    Freely Available from IEEE
  • Masthead 
  • Masthead

    Publication Year: 2016, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (457 KB)
    Freely Available from IEEE
  • 32 & 16 Years Ago 
  • 32 & 16 Years Ago

    Publication Year: 2016, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (1290 KB) | HTML iconHTML
    Freely Available from IEEE
  • Elsewhere in the CS 
  • Computer Highlights Society Magazines

    Publication Year: 2016, Page(s):6 - 7
    Request permission for commercial reuse | PDF file iconPDF (2104 KB)
    Freely Available from IEEE
  • Spotlight on Transactions 
  • Digital-Microfluidic Biochips

    Publication Year: 2016, Page(s):8 - 9
    Request permission for commercial reuse | PDF file iconPDF (2805 KB)
    Freely Available from IEEE
  • 70th Anniversary Milestones 
  • IEEE Floating Point Standard

    Publication Year: 2016, Page(s): 10
    Request permission for commercial reuse | PDF file iconPDF (3016 KB) | HTML iconHTML
    Freely Available from IEEE
  • Guest Editor's Introduction 
  • Security Threats: Protecting the New Cyberfrontier

    Publication Year: 2016, Page(s):11 - 14
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (4468 KB) | HTML iconHTML
    Freely Available from IEEE
  • Security Threats 
  • The Perils of Android Security Configuration

    Publication Year: 2016, Page(s):15 - 21
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1874 KB) | HTML iconHTML

    Recent analysis of the popular Android platform highlights common security misconfigurations as well as the respective roles that users, manufacturers, and researchers play in protecting devices against cyberattacks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy and Security in Mobile Health: A Research Agenda

    Publication Year: 2016, Page(s):22 - 30
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1694 KB) | HTML iconHTML

    Mobile health technology has great potential to increase healthcare quality, expand access to services, reduce costs, and improve personal wellness and public health. However, mHealth also raises significant privacy and security challenges. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How to Survive a Cyber Pearl Harbor

    Publication Year: 2016, Page(s):31 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1645 KB) | HTML iconHTML

    An examination of parallels between the "Day of Infamy" and a major cyberattack reveals lessons for organizations about vulnerability, the nature of survival, and the tenets of protection that can help boost resilience against hackers and other cyberthreats. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The DARPA Twitter Bot Challenge

    Publication Year: 2016, Page(s):38 - 46
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3034 KB) | HTML iconHTML

    From politicians and nation states to terrorist groups, numerous organizations reportedly conduct explicit campaigns to influence opinions on social media, posing a risk to freedom of expression. Thus, there is a need to identify and eliminate "influence bots" - realistic, automated identities that illicitly shape discussions on sites like Twitter and Facebook - before they get too influential. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • House Advertisement 
  • Computer Write for Us

    Publication Year: 2016, Page(s): 47
    Request permission for commercial reuse | PDF file iconPDF (556 KB)
    Freely Available from IEEE
  • Security Threats 
  • Metamorphic Testing for Cybersecurity

    Publication Year: 2016, Page(s):48 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2079 KB) | HTML iconHTML

    Metamorphic testing (MT) can enhance security testing by providing an alternative to using a test oracle, which is often unavailable or impractical. The authors report how MT detected previously unknown bugs in real-world critical applications such as code obfuscators, giving evidence that software testing requires diverse perspectives to achieve greater cybersecurity. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research Feature 
  • Brokers or Bridges? Exploring Structural Holes in a Crowdsourcing System

    Publication Year: 2016, Page(s):56 - 64
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1555 KB) | HTML iconHTML

    A method to measure the contributions of crowdsourcing participants identifies how roles relate to an incident's investigation and discussion. Using data on the South China tiger incident, the authors evaluate the performance of brokers--those who connect separate groups within a platform and across platforms--and show how results compare with structural hole theory. The supplemental material at h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • House Advertisement 
  • Move Your Career Forward IEEE Computer Society Membership

    Publication Year: 2016, Page(s): 65
    Request permission for commercial reuse | PDF file iconPDF (490 KB)
    Freely Available from IEEE
  • Computing Practices 
  • Optimizing the Memory Management of a Virtual Machine Monitor on a NUMA System

    Publication Year: 2016, Page(s):66 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2397 KB) | HTML iconHTML

    Virtualization significantly degrades computational performance on nonuniform memory access (NUMA) systems. The authors propose an optimization scheme based on a memory-access model that covers the entire access path and accommodates the chain-reacting behavior of memory subsystems. A quantitative evaluation shows significant performance improvement with negligible overhead. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • House Advertisement 
  • Rock Stars of Big Data

    Publication Year: 2016, Page(s): 75
    Request permission for commercial reuse | PDF file iconPDF (1514 KB)
    Freely Available from IEEE
  • Call for Nominees

    Publication Year: 2016, Page(s): 76
    Request permission for commercial reuse | PDF file iconPDF (1163 KB)
    Freely Available from IEEE
  • Computing Education 
  • Opening the Instructional Doors to Computer Science and IT--Finally

    Publication Year: 2016, Page(s):77 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1499 KB) | HTML iconHTML

    With unprecedented access to open and free digital resources, applications, and data, educators can draw upon a bounty of educational tools. A new initiative enables computing educators and students to more easily find, use, and share these resources. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The IoT Connection 
  • Demystifying the Internet of Things

    Publication Year: 2016, Page(s):80 - 83
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (597 KB) | HTML iconHTML

    Industrial Internet of Things (IoT) is a distributed network of smart sensors that enables precise control and monitoring of complex processes over arbitrary distances. The concept of Internet of Things ... is that every object in the Internet infrastructure is interconnected into a global dynamic expanding network. In what's called the Internet of Things, sensors actuators embedded in physical ob... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rebooting Computing 
  • Rebooting Computers as Learning Machines

    Publication Year: 2016, Page(s):84 - 87
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1436 KB) | HTML iconHTML

    Artificial neural networks could become the technological driver that replaces Moore's law, boosting computers' utlity through a process akin to automatic programming--although physics and computer architecture would also factor in. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Indistinguishable from Magic 
  • Social Robots for the 21st Century

    Publication Year: 2016, Page(s):88 - 92
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2054 KB) | HTML iconHTML

    Two colleagues engage in a fictitious dialogue about the future of robotics. In the Web extra at https://youtu.be/ecTYYebQpnY, the Miserable Murphy robot interacts with children in the waiting room of a pediatric practice. Using established psychological interventions, Murphy activates the young patients' positive resources, cognitive attitudes, and coping skills. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • House Advertisement 
  • Impact a Broader Audience

    Publication Year: 2016, Page(s): 93
    Request permission for commercial reuse | PDF file iconPDF (910 KB)
    Freely Available from IEEE
  • IEEE Computer Society 2016 Call for Major Award Nominations

    Publication Year: 2016, Page(s): 94
    Request permission for commercial reuse | PDF file iconPDF (602 KB)
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org