Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

Computer

Issue 11 • Nov. 2016

Filter Results

Displaying Results 1 - 25 of 27
  • Front Cover 
  • Front Cover

    Publication Year: 2016, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (255 KB)
    Freely Available from IEEE
  • House Advertisement 
  • New Membership Options for a Better Fit [Advertisement]

    Publication Year: 2016, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (145 KB)
    Freely Available from IEEE
  • IEEE Computer Society Is Where You Choose the Resources that Fit Your Career [Advertisement]

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • Masthead 
  • Masthead

    Publication Year: 2016, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • Table of Contents 
  • Table of Contents

    Publication Year: 2016, Page(s):3 - 4
    Request permission for commercial reuse | PDF file iconPDF (227 KB)
    Freely Available from IEEE
  • 70th Anniversary Milestones 
  • IEEE Computer Society Technical Committees

    Publication Year: 2016, Page(s): 5
    Request permission for commercial reuse | PDF file iconPDF (293 KB) | HTML iconHTML
    Freely Available from IEEE
  • 32 & 16 Years Ago 
  • 32 & 16 Years Ago

    Publication Year: 2016, Page(s):6 - 7
    Request permission for commercial reuse | PDF file iconPDF (1063 KB) | HTML iconHTML
    Freely Available from IEEE
  • Elsewhere in the CS 
  • Computer Highlights Society Magazines

    Publication Year: 2016, Page(s):8 - 9
    Request permission for commercial reuse | PDF file iconPDF (415 KB)
    Freely Available from IEEE
  • Spotlight on Transactions 
  • Finding Flaws in Natural Language Requirements

    Publication Year: 2016, Page(s): 10
    Request permission for commercial reuse | PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • Guest Editors' Introduction 
  • Smart Health and Well-Being

    Publication Year: 2016, Page(s):11 - 13
    Request permission for commercial reuse | PDF file iconPDF (1269 KB) | HTML iconHTML
    Freely Available from IEEE
  • Smart Health and Well-Being 
  • The Future of Smart Health

    Publication Year: 2016, Page(s):14 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (334 KB) | HTML iconHTML

    Longitudinal individual and crowdsourced health data from wearable sensors can be leveraged to increase the quality and length of life, giving rise to a new health data economy. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Key Success Factors for Smart and Connected Health Software Solutions

    Publication Year: 2016, Page(s):22 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    Healthcare delivery is being transformed by technology that personalizes, tracks, and manages patient information across devices. Smart and connected health will develop safer and more effective, efficient, equitable, and user-centered services through pervasive computing innovations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Smart Homes to Detect and Analyze Health Events

    Publication Year: 2016, Page(s):29 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (853 KB) | HTML iconHTML

    Smart homes offer an unprecedented opportunity to unobtrusively monitor human behavior in everyday environments and to determine whether relationships exist between behavior and health changes. Behavior change detection (BCD) can be used to identify changes that accompany health events, which can potentially save lives. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Machine Learning in Cardiac Health Monitoring and Decision Support

    Publication Year: 2016, Page(s):38 - 48
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB) | HTML iconHTML

    Portable medical devices generate volumes of data that could be useful in identifying health risks. The proposed method filters patients' electrocardiograms (ECGs) and applies machine-learning classifiers to identify cardiac health risks and estimate severity. The authors present the results of applying their method in a case study. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy as a Service: Protecting the Individual in Healthcare Data Processing

    Publication Year: 2016, Page(s):49 - 59
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB) | HTML iconHTML

    Health applications involve many data sources, individuals, and services that work against guarantees that an individual's personal data will not be used without consent. The proposed privacy-centered architecture integrates data security and semantic descriptions into a trust-query framework, enabling the provision of user consent as a service. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computing Practices 
  • Architectural Approaches to Security: Four Case Studies

    Publication Year: 2016, Page(s):60 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    An examination of the security approaches in industrial and open source projects shows that a strategic, systemwide architectural approach, implemented as a security framework or as a platform built using these frameworks, results in the highest security and lowest maintenance costs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research Feature 
  • Balanced Service Chaining in Software-Defined Networks with Network Function Virtualization

    Publication Year: 2016, Page(s):68 - 76
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (859 KB) | HTML iconHTML

    Balanced Hash Tree (BHT) is a mechanism for service function (SF) chaining, service routing, and traffic steering that enables switches to select SF instances for load balancing without involving the controller. In an experimental evaluation, BHT decreased packet-in message-processing time by 92.5 percent and achieved near-perfect load-balancing performance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computing Education 
  • Engineering the New Boundaries of AI

    Publication Year: 2016, Page(s):77 - 79
    Request permission for commercial reuse | PDF file iconPDF (291 KB) | HTML iconHTML
    Freely Available from IEEE
  • Aftershock 
  • Equity, Safety, and Privacy in the Autonomous Vehicle Era

    Publication Year: 2016, Page(s):80 - 83
    Request permission for commercial reuse | PDF file iconPDF (266 KB) | HTML iconHTML
    Freely Available from IEEE
  • Cybertrust 
  • The Fog of War in Cyberspace

    Publication Year: 2016, Page(s):84 - 87
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB) | HTML iconHTML

    A "cyberfog" security approach that splits data into numerous fragments and continually disperses them across multiple end-user devices could provide greater attack resiliency but also presents formidable technical challenges. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Student Design Showcase 
  • Tactile Digital Braille Display

    Publication Year: 2016, Page(s):88 - 90
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (398 KB) | HTML iconHTML

    Students at North Carolina State University enhanced Polymer Braille's multiline braille display by adding new interactive features, additional rows of characters, and a mobile-device interface. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Out of Band 
  • Chasing Elbridge's Ghost: The Digital Gerrymander

    Publication Year: 2016, Page(s):91 - 95
    Request permission for commercial reuse | PDF file iconPDF (384 KB) | HTML iconHTML
    Freely Available from IEEE
  • Cloud Cover 
  • Cloud Federation and the Evolution of Cloud Computing

    Publication Year: 2016, Page(s):96 - 99
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (322 KB) | HTML iconHTML

    To satisfy the demand for collective and collaborative cloud use, academia and industry want to interconnect heterogeneous clouds to form a federated system. This approach is promising but also faces significant challenges. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call and Calendar 
  • Call and Calendar

    Publication Year: 2016, Page(s):100 - 103
    Request permission for commercial reuse | PDF file iconPDF (330 KB)
    Freely Available from IEEE
  • The Errant Hashtag 
  • "I'm Not a Computer Scientist, but ..."

    Publication Year: 2016, Page(s): 104
    Request permission for commercial reuse | PDF file iconPDF (99 KB) | HTML iconHTML
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org