Computer

Issue 5 • May 2017

Filter Results

Displaying Results 1 - 25 of 34
  • Front Cover 
  • Front Cover

    Publication Year: 2017, Page(s): c1
    Request permission for commercial reuse | |PDF file iconPDF (499 KB)
    Freely Available from IEEE
  • House Advertisement 
  • New Membership Options for a Better Fit

    Publication Year: 2017, Page(s): c2
    Request permission for commercial reuse | |PDF file iconPDF (144 KB)
    Freely Available from IEEE
  • Table of Contents 
  • Table of Contents

    Publication Year: 2017, Page(s):1 - 2
    Request permission for commercial reuse | |PDF file iconPDF (370 KB)
    Freely Available from IEEE
  • Masthead 
  • Masthead

    Publication Year: 2017, Page(s): 3
    Request permission for commercial reuse | |PDF file iconPDF (75 KB)
    Freely Available from IEEE
  • Elsewhere in the CS 
  • Computer Highlights Society Magazines

    Publication Year: 2017, Page(s):4 - 5
    Request permission for commercial reuse | |PDF file iconPDF (799 KB)
    Freely Available from IEEE
  • 50 & 25 Years Ago 
  • 50 & 25 Years Ago

    Publication Year: 2017, Page(s):6 - 7
    Request permission for commercial reuse | |PDF file iconPDF (779 KB) | HTML iconHTML
    Freely Available from IEEE
  • Computing 
  • Cloud Computing

    Publication Year: 2017, Page(s):8 - 9
    Request permission for commercial reuse | |PDF file iconPDF (3836 KB) | HTML iconHTML
    Freely Available from IEEE
  • Computer's Legacy 
  • Networks on Chips: 15 Years Later

    Publication Year: 2017, Page(s):10 - 11
    Request permission for commercial reuse | |PDF file iconPDF (244 KB) | HTML iconHTML
    Freely Available from IEEE
  • House Advertisement 
  • Rock Stars Cybersecurity Technologies

    Publication Year: 2017, Page(s): 12
    Request permission for commercial reuse | |PDF file iconPDF (391 KB)
    Freely Available from IEEE
  • Spotlight on Transactions 
  • Can Affective Computing Save Lives? Meet Mobile Health

    Publication Year: 2017, Page(s): 13
    Request permission for commercial reuse | |PDF file iconPDF (156 KB)
    Freely Available from IEEE
  • Guest Editors' Introduction 
  • Advances in Learning Technologies

    Publication Year: 2017, Page(s):14 - 17
    Request permission for commercial reuse | |PDF file iconPDF (354 KB) | HTML iconHTML
    Freely Available from IEEE
  • Advances in Learning Technologies 
  • BlockPy: An Open Access Data-Science Environment for Introductory Programmers

    Publication Year: 2017, Page(s):18 - 26
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (560 KB) | HTML iconHTML

    Non-computer science majors often struggle to find relevance in traditional computing curricula that tend to emphasize abstract concepts, focus on nonpractical entertainment, or rely on decontextualized settings. BlockPy, a web-based, open access Python programming environment, supports introductory programmers in a data-science context through a dual block/text programming view. The web extra at ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating Collaborative and Live Coding for Distance Education

    Publication Year: 2017, Page(s):27 - 35
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1206 KB) | HTML iconHTML

    What does an online programming course need to engage students and improve their skills? To answer this question, the authors designed and tested a feature-rich collaborative environment for an online class and found that it enhanced learning through methods such as remote pair programming, live coding, and a tight code-to-artifact feedback loop. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Sentiment Analysis System to Improve Teaching and Learning

    Publication Year: 2017, Page(s):36 - 43
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (675 KB) | HTML iconHTML

    Natural language processing and machine learning can be applied to student feedback to help university administrators and teachers address problematic areas in teaching and learning. The proposed system analyzes student comments from both course surveys and online sources to identify sentiment polarity, the emotions expressed, and satisfaction versus dissatisfaction. A comparison with direct-asses... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interdisciplinary Education for Design Innovation

    Publication Year: 2017, Page(s):44 - 52
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (520 KB) | HTML iconHTML

    A design education program must unite traditionally siloed disciplines, spanning rigid academic boundaries from engineering to social sciences. Work to establish the Kyoto University Design School had to meet these challenges in promoting interdisciplinary cooperation and provides a solid model for others to build on. The web extra at https://youtu.be/bTWoIew-lpg features interviews and further de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • House Advertisement 
  • IEEE Computer Society

    Publication Year: 2017, Page(s): 53
    Request permission for commercial reuse | |PDF file iconPDF (51 KB)
    Freely Available from IEEE
  • Advances in Learning Technologies 
  • Internet of Education Resources Using a Chemistry-Inspired Framework

    Publication Year: 2017, Page(s):54 - 60
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (528 KB) | HTML iconHTML

    Open education resources (OERs) are public domain learning objects used extensively in both online and traditional education settings. To facilitate the use of OERs, a novel chemistry-inspired framework links learning objects to help the education community contribute, augment, and locate these valuable resources. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • House Advertisement 
  • Conferences in the Palm of Your Hand

    Publication Year: 2017, Page(s): 61
    Request permission for commercial reuse | |PDF file iconPDF (229 KB)
    Freely Available from IEEE
  • Research Feature 
  • Security-Aware 2.5D Integrated Circuit Design Flow Against Hardware IP Piracy

    Publication Year: 2017, Page(s):62 - 71
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (757 KB)

    To combat security threats to integrated circuit (IC) fabrication outsourcing, 2.5D integration can obfuscate the outsourced design by lifting a portion of the wires into an interposer layer. A security-aware physical design flow for 2.5D IC technology can then help defend against attacks by increasing the layout and functionality obfuscation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Perspectives 
  • The Top Eight Misconceptions about NP-Hardness

    Publication Year: 2017, Page(s):72 - 79
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (399 KB) | HTML iconHTML

    References to NP-completeness and NP-hardness are common in the computer science literature, but unfortunately they are often in error or misguided. This article explains the most widespread misconceptions, why they are wrong, and why we should care. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computing Practices 
  • Better Now Than Later: Managing Technical Debt in Systems Development

    Publication Year: 2017, Page(s):80 - 87
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (653 KB) | HTML iconHTML

    Technical debt is incurred when development project tasks are deferred either unintentionally or deliberately. Detecting and mitigating this debt, including controlling it through risk management techniques, can help avoid or address common project pitfalls, such as late delivery, team burnout, and cost overruns. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual Roundtable 
  • What Happened to Software Metrics?

    Publication Year: 2017, Page(s):88 - 98
    Request permission for commercial reuse | |PDF file iconPDF (363 KB)
    Freely Available from IEEE
  • The Future Today 
  • Sentient Tools and the Future of Work

    Publication Year: 2017, Page(s): 99
    Request permission for commercial reuse | |PDF file iconPDF (94 KB) | HTML iconHTML
    Freely Available from IEEE
  • Cybertrust 
  • Six Tech Trends Impacting Software Security

    Publication Year: 2017, Page(s):100 - 102
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (851 KB) | HTML iconHTML

    The past few years have seen radical shifts in the way software is developed, in terms of both process and the technology stack. We must actively track these changes to ensure that software security solutions remain relevant. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computing Education 
  • How Computer Science Departments and Faculty Can Contribute to the CS for All Initiative

    Publication Year: 2017, Page(s):103 - 105
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (311 KB) | HTML iconHTML

    As the role of computer science becomes increasingly central to our way of life, ensuring the successful education of future computer scientists is imperative. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org