Computer

Issue 8 • Aug. 2016

Filter Results

Displaying Results 1 - 25 of 40
  • Front Cover 
  • Front Cover

    Publication Year: 2016, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (3045 KB)
    Freely Available from IEEE
  • House Advertisement 
  • 31st IEEE International Parallel and Distributed Processing Symposium

    Publication Year: 2016, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • Table of Contents 
  • Table of Contents

    Publication Year: 2016, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (3867 KB)
    Freely Available from IEEE
  • Masthead 
  • Masthead

    Publication Year: 2016, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • House Advertisement 
  • Call for Nominees Education Awards Nominations

    Publication Year: 2016, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (782 KB)
    Freely Available from IEEE
  • 70th Anniversary Milestones 
  • IEEE Computer Society Digital Library: IEEE's First Digital Library

    Publication Year: 2016, Page(s): 5
    Request permission for commercial reuse | PDF file iconPDF (427 KB) | HTML iconHTML
    Freely Available from IEEE
  • 32 & 16 Years Ago 
  • 32 & 16 Years Ago

    Publication Year: 2016, Page(s):6 - 7
    Request permission for commercial reuse | PDF file iconPDF (894 KB) | HTML iconHTML
    Freely Available from IEEE
  • Elsewhere in the CS 
  • Computer Highlights Society Magazines

    Publication Year: 2016, Page(s):8 - 9
    Request permission for commercial reuse | PDF file iconPDF (2100 KB) | HTML iconHTML
    Freely Available from IEEE
  • Spotlight on Transactions 
  • Evolving MPI+X Toward Exascale

    Publication Year: 2016, Page(s): 10
    Request permission for commercial reuse | PDF file iconPDF (498 KB)
    Freely Available from IEEE
  • House Advertisement 
  • Rock Stars of Pervasive, Predictive Analytics

    Publication Year: 2016, Page(s): 11
    Request permission for commercial reuse | PDF file iconPDF (1700 KB)
    Freely Available from IEEE
  • Guest Editors' Introduction 
  • Supply-Chain Security for Cyberinfrastructure [Guest editors' introduction]

    Publication Year: 2016, Page(s):12 - 16
    Request permission for commercial reuse | PDF file iconPDF (3249 KB) | HTML iconHTML
    Freely Available from IEEE
  • House Advertisement 
  • Not so Secure

    Publication Year: 2016, Page(s): 17
    Request permission for commercial reuse | PDF file iconPDF (1502 KB)
    Freely Available from IEEE
  • Supply-Chain Security for Cyberinfrastructure 
  • Defeating counterfeiters with microscopic dielets embedded in electronic components

    Publication Year: 2016, Page(s):18 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1795 KB) | HTML iconHTML

    Supply-chain traceability and electronics counterfeiting have become increasingly widespread issues for military and commercial electronics systems. In response to a DARPA SHIELD program directive, Northrop Grumman is leading a team to develop tiny, passive, near-field RFID chips, called dielets, which will be embedded in electronic component packaging. The design and implementation of dielets min... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • House Advertisement 
  • 2017 Richard E. Merwin Award for Distinguished Service

    Publication Year: 2016, Page(s): 27
    Request permission for commercial reuse | PDF file iconPDF (6052 KB)
    Freely Available from IEEE
  • Supply-Chain Security for Cyberinfrastructure 
  • A Platform Solution for Secure Supply-Chain and Chip Life-Cycle Management

    Publication Year: 2016, Page(s):28 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (701 KB) | HTML iconHTML

    Fragmentation of the system-on-chip supply chain has introduced many vulnerabilities in electronic devices. A proposed platform solution lets supply-chain participants authenticate, track, provision, and analyze their products during the entire chip life cycle through a single root of trust in the form of unique chip IDs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • House Advertisement 
  • IEEE Security & Privacy

    Publication Year: 2016, Page(s): 35
    Request permission for commercial reuse | PDF file iconPDF (3128 KB)
    Freely Available from IEEE
  • Supply-Chain Security for Cyberinfrastructure 
  • Supply-Chain Security of Digital Microfluidic Biochips

    Publication Year: 2016, Page(s):36 - 43
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2898 KB) | HTML iconHTML

    Digital microfluidic biochips (DMFBs) implement novel protocols for highly sensitive and specific biomolecular recognition. However, attackers can exploit supply-chain vulnerabilities to pirate DMFBs' proprietary protocols or modify their results, with serious consequences for laboratory analysis, healthcare, and biotechnology innovation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting Hardware Trojans with Gate-Level Information-Flow Tracking

    Publication Year: 2016, Page(s):44 - 52
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2506 KB) | HTML iconHTML

    A method based on information-flow tracking uses gate-level logic to detect hardware Trojans that violate the confidentiality and integrity properties of third-party IP cores. Experiments on trust-HUB benchmarks show that the method reveals Trojan behavior and unintentional design vulnerabilities that functional testing cannot pinpoint. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • House Advertisement 
  • IEEE Computer Society 2016 Call for Major Award Nominations

    Publication Year: 2016, Page(s): 53
    Request permission for commercial reuse | PDF file iconPDF (222 KB)
    Freely Available from IEEE
  • Supply-Chain Security for Cyberinfrastructure 
  • Security Rule Checking in IC Design

    Publication Year: 2016, Page(s):54 - 61
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1668 KB) | HTML iconHTML

    The Design Security Rule Check (DSeRC) framework is a first step toward automating the analysis of integrated circuit design vulnerabilities. By mathematically modeling vulnerabilities at each abstraction level and associating them with metrics and rules, DSeRC aims to help designers quantitatively assess potential problems early on, improving security and reducing design costs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vendor Malware: Detection Limits and Mitigation

    Publication Year: 2016, Page(s):62 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1183 KB) | HTML iconHTML

    Computing device vendors can introduce malware that is nearly impossible to detect with known methods, but microservice solutions can limit the negative impact. Malware contains instructions whose execution negatively impacts stakeholders, typically leading to unauthorized access and computation, data theft, loss of privacy, inability to inspect data, or prolonged downtime. A computing system's ro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual Roundtable 
  • What Happened to Formal Methods for Security?

    Publication Year: 2016, Page(s):70 - 79
    Cited by:  Papers (2)
    Request permission for commercial reuse | PDF file iconPDF (1442 KB)
    Freely Available from IEEE
  • The IOT Connection 
  • Toward a New Approach to IoT Fault Tolerance

    Publication Year: 2016, Page(s):80 - 83
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (278 KB) | HTML iconHTML

    Although it offers effective fault tolerance, three-way replication triples a system's purchase price. The natural redundancy of functionality across devices within the home, as well as usage scenarios, should be exploited in a new approach to IoT fault tolerance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Standards 
  • Systems and Software Engineering Standards for Very Small Entities: Accomplishments and Overview

    Publication Year: 2016, Page(s):84 - 87
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (806 KB) | HTML iconHTML

    ISO/IEC 29110 offers a customized set of standards and guides for very small entities to help them improve their competitiveness in quality, cost, and schedule. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rebooting Computing 
  • The Search for Computing's Secretariat

    Publication Year: 2016, Page(s):88 - 91
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1434 KB) | HTML iconHTML

    The slowing of Moore's law offers IEEE and its members the unique opportunity to influence research toward continued growth in computing performance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org