IEEE Transactions on Emerging Topics in Computing
IEEE Transactions on Emerging Topics in Computing publishes papers on emerging aspects of computer science, computing technology, and computing applications not currently covered by other IEEE Computer Society Transactions.
Additional Information:
Some examples of emerging topics in computing include: IT for Green, Synthetic and organic computing structures and systems, Advanced analytics, Social/occupational computing, Location-based/client computer systems, Morphic computer design, Electronic game systems, & Health-care IT.
IEEE Transactions on Emerging Topics in Computing publishes papers on emerging aspects of computer science, computing technology, and computing applications not currently covered by other IEEE Computer Society Transactions.
Additional Information:
Some examples of emerging topics in computing include: IT for Green, Synthetic and organic computing structures and systems, Advanced analytics, Social/occupational computing, Location-based/client computer systems, Morphic computer design, Electronic game systems, & Health-care IT.
Latest Published Articles
-
Equivalence Among Stochastic Logic Circuits and its Application to Synthesis
Tue Nov 01 00:00:00 EDT 2016 Tue Nov 01 00:00:00 EDT 2016 -
Computing Arithmetic Functions Using Stochastic Logic by Series Expansion
Tue Oct 18 00:00:00 EDT 2016 Tue Oct 18 00:00:00 EDT 2016 -
On Reliable Task Assignment for Spatial Crowdsourcing
Wed Sep 28 00:00:00 EDT 2016 Wed Sep 28 00:00:00 EDT 2016 -
Design of Stochastic Machines Dedicated to Approximate Bayesian Inferences
Thu Sep 15 00:00:00 EDT 2016 Thu Sep 15 00:00:00 EDT 2016 -
Compact and Accurate Digital Filters Based on Stochastic Computing
Tue Sep 13 00:00:00 EDT 2016 Tue Sep 13 00:00:00 EDT 2016
Popular Articles
-
A Survey of Clustering Algorithms for Big Data: Taxonomy and Empirical Analysis
Adil Fahad ; Najlaa Alshatri ; Zahir Tari ; Abdullah Alamri ; Ibrahim Khalil ; Albert Y. Zomaya ; Sebti Foufou ; Abdelaziz BourasThu Jun 12 00:00:00 EDT 2014 Thu Jun 12 00:00:00 EDT 2014 -
A Comprehensive Study of Security of Internet-of-Things
Wed Sep 07 00:00:00 EDT 2016 Wed Sep 07 00:00:00 EDT 2016 -
Characterizing User Behavior in Mobile Internet
Thu Dec 18 00:00:00 EST 2014 Thu Dec 18 00:00:00 EST 2014 -
The Emerging Internet of Things Marketplace From an Industrial Perspective: A Survey
Thu Jan 08 00:00:00 EST 2015 Thu Jan 08 00:00:00 EST 2015 -
Weird machines, exploitability, and provable unexploitability
Tue Dec 19 00:00:00 EST 2017 Tue Dec 19 00:00:00 EST 2017
Publish in this Journal
Meet Our Editors
Editor-in-Chief
Paolo Montuschi
Professor of Computer Engineering and IEEE Fellow
Polytechnic University of Turin, Italy
http://staff.polito.it/paolo.montuschi
eic.tetc@polito.it
Popular Documents (February 2019)
Feed
Sponsor

-
A Survey of Clustering Algorithms for Big Data: Taxonomy and Empirical Analysis
Adil Fahad ; Najlaa Alshatri ; Zahir Tari ; Abdullah Alamri ; Ibrahim Khalil ; Albert Y. Zomaya ; Sebti Foufou ; Abdelaziz BourasPublication Year: 2014, Page(s):267 - 279
Cited by: Papers (206)Clustering algorithms have emerged as an alternative powerful meta-learning tool to accurately analyze the massive volume of data generated by modern applications. In particular, their main goal is to categorize data into clusters such that objects are grouped in the same cluster when they are similar according to specific metrics. There is a vast body of knowledge in the area of clustering and th... View full abstract»
-
A Comprehensive Study of Security of Internet-of-Things
Publication Year: 2017, Page(s):586 - 602
Cited by: Papers (22)Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a transformative approach for providing numerous services. Compact smart devices constitute an essential part of IoT. They range widely in use, size, energy capacity, and computation power. However, the integration of these smart things into the standard Internet introduces several security challenges because t... View full abstract»
-
Characterizing User Behavior in Mobile Internet
Publication Year: 2015, Page(s):95 - 106
Cited by: Papers (39)Smart devices bring us the ubiquitous mobile accessing to Internet, making mobile Internet grow rapidly. Using the mobile traffic data collected at core metropolitan 2G and 3G networks of China over a week, this paper studies the mobile user behavior from three aspects: 1) data usage; 2) mobility pattern; and 3) application usage. We classify mobile users into different groups to study the resourc... View full abstract»
-
The Emerging Internet of Things Marketplace From an Industrial Perspective: A Survey
Publication Year: 2015, Page(s):585 - 598
Cited by: Papers (110)The Internet of Things (IoT) is a dynamic global information network consisting of Internet-connected objects, such as Radio frequency identifications, sensors, actuators, as well as other instruments and smart appliances that are becoming an integral component of the future Internet. Over the last decade, we have seen a large number of the IoT solutions developed by start-ups, small and medium en... View full abstract»
-
Weird machines, exploitability, and provable unexploitability
Publication Year: 2018, Page(s): 1
Cited by: Papers (1)The concept of exploit is central to computer security, particularly in the context of memory corruptions. Yet, in spite of the centrality of the concept and voluminous descriptions of various exploitation techniques or countermeasures, a good theoretical framework for describing and reasoning about exploitation has not yet been put forward. View full abstract»
-
Towards Real-Time Object Detection on Embedded Systems
Publication Year: 2018, Page(s):417 - 431
Cited by: Papers (2)Convolutional neural network (CNN) based methods have achieved great success in image classification and object detection tasks. However, unlike the image classification task, object detection is much more computation-intensive and energy-consuming since a large number of possible object proposals need to be evaluated. Consequently, it is difficult for object detection methods to be integrated int... View full abstract»
-
Decentralized and Optimal Resource Cooperation in Geo-Distributed Mobile Cloud Computing
Publication Year: 2018, Page(s):72 - 84
Cited by: Papers (11)Mobile cloud computing is a key enabling technology in the era of the Internet of Things. Geo-distributed mobile cloud computing (GMCC) is a new scenario that adds geography consideration in mobile cloud computing. In GMCC, users are able to access cloud resources that are geographically close to their mobile devices. This is expected to reduce the communication delay and the service providers cos... View full abstract»
-
Cost Efficient Resource Management in Fog Computing Supported Medical Cyber-Physical System
Publication Year: 2017, Page(s):108 - 119
Cited by: Papers (57)With the recent development in information and communication technology, more and more smart devices penetrate into people's daily life to promote the life quality. As a growing healthcare trend, medical cyber-physical systems (MCPSs) enable seamless and intelligent interaction between the computational elements and the medical devices. To support MCPSs, cloud resources are usually explored to pro... View full abstract»
-
A Semantic IoT Early Warning System for Natural Environment Crisis Management
Publication Year: 2015, Page(s):246 - 257
Cited by: Papers (19)An early warning system (EWS) is a core type of data driven Internet of Things (IoTs) system used for environment disaster risk and effect management. The potential benefits of using a semantic-type EWS include easier sensor and data source plug-and-play, simpler, richer, and more dynamic metadata-driven data analysis and easier service interoperability and orchestration. The challenges faced duri... View full abstract»
-
Challenges and Opportunities of Underwater Cognitive Acoustic Networks
Publication Year: 2014, Page(s):198 - 211
Cited by: Papers (48)In oceans, both the natural acoustic systems (such as marine mammals) and artificial acoustic systems [like underwater acoustic networks (UANs) and sonar users] use acoustic signal for communication, echolocation, sensing, and detection. This makes the channel spectrum heavily shared by various underwater acoustic systems. Nevertheless, the precious spectrum resource is still underutilized tempora... View full abstract»
-
Cost Minimization for Big Data Processing in Geo-Distributed Data Centers
Publication Year: 2014, Page(s):314 - 323
Cited by: Papers (42)The explosive growth of demands on big data processing imposes a heavy burden on computation, storage, and communication in data centers, which hence incurs considerable operational expenditure to data center providers. Therefore, cost minimization has become an emergent issue for the upcoming big data era. Different from conventional cloud services, one of the main features of big data services i... View full abstract»
-
Auction-Based Resource Allocation for Sharing Cloudlets in Mobile Cloud Computing
Publication Year: 2018, Page(s):45 - 57
Cited by: Papers (11)Driven by pervasive mobile devices and ubiquitous wireless communication networks, mobile cloud computing emerges as an appealing paradigm to accommodate demands for running power-hungry or computation-intensive applications over resource-constrained mobile devices. Cloudlets that move available resources closer to the network edge offer a promising architecture to support real-time applications, ... View full abstract»
-
Economical and Balanced Energy Usage in the Smart Home Infrastructure: A Tutorial and New Results
Publication Year: 2015, Page(s):556 - 570
Cited by: Papers (24)The smart home infrastructure features the automatic control of various household appliances in the advanced metering infrastructure, which enables the connection of individual smart home systems to a smart grid. In such an infrastructure, each smart meter receives electricity price from utilities and uses a smart controller to schedule the household appliances accordingly. This helps shift the he... View full abstract»
-
Personalized Search Over Encrypted Data With Efficient and Secure Updates in Mobile Clouds
Publication Year: 2018, Page(s):97 - 109
Cited by: Papers (8)Mobile cloud computing has been involved as a key enabling technology to overcome the physical limitations of mobile devices toward scalable and flexible mobile services. In the mobile cloud environment, searchable encryption, which enables direct search over encrypted data, is a key technique to maintain both the privacy and usability of outsourced data in cloud. On addressing the issue, many res... View full abstract»
-
Challenges, Opportunities, and Future Trends of Emerging Techniques for Augmented Reality-Based Maintenance
Fabrizio Lamberti ; Federico Manuri ; Andrea Sanna ; Gianluca Paravati ; Pietro Pezzolla ; Paolo MontuschiPublication Year: 2014, Page(s):411 - 421
Cited by: Papers (14)Augmented reality (AR) is a well-known technology that can be exploited to provide mass-market users an effective and customizable support in a large spectrum of personal applications, by overlapping computer-generated hints to the real world. Mobile devices, such as smartphones and tablets, are playing a key role in the exponential growth of this kind of solutions. Nonetheless, there exists some ... View full abstract»
-
A Tensor-Based Approach for Big Data Representation and Dimensionality Reduction
Publication Year: 2014, Page(s):280 - 291
Cited by: Papers (46)Variety and veracity are two distinct characteristics of large-scale and heterogeneous data. It has been a great challenge to efficiently represent and process big data with a unified scheme. In this paper, a unified tensor model is proposed to represent the unstructured, semistructured, and structured data. With tensor extension operator, various types of data are represented as subtensors and th... View full abstract»
-
Open Social Student Modeling for Personalized Learning
Peter Brusilovsky ; Sibel Somyürek ; Julio Guerra ; Roya Hosseini ; Vladimir Zadorozhny ; Paula J. DurlachPublication Year: 2016, Page(s):450 - 461
Cited by: Papers (10)Open student modeling (OSM) is an approach to technology-based learning, which makes student models available to the learners for exploration. OSM is known for its ability to increase student engagement, motivation, and knowledge reflection. A recent extension of OSM known as open social student modeling (OSSM) complements cognitive aspects of OSM with social aspects by allowing students to explor... View full abstract»
-
Green Resource Allocation based on Deep Reinforcement Learning in Content-Centric IoT
Publication Year: 2018, Page(s): 1
Cited by: Papers (14)In the era of information, the green services of content-centric IoT are expected to offer users the better satisfaction of Quality of Experience (QoE) than that in a conventional IoT. Nevertheless, the network traffic and new demands from IoT users increase along with the promising of the content-centric computing system. Therefore, the satisfaction of QoE will become the major challenge in the c... View full abstract»
-
Then and Now: On the Maturity of the Cybercrime Markets The Lesson That Black-Hat Marketeers Learned
Publication Year: 2016, Page(s):35 - 46
Cited by: Papers (5)Cybercrime activities are supported by infrastructures and services originating from an underground economy. The current understanding of this phenomenon is that the cybercrime economy ought to be fraught with information asymmetry and adverse selection problems. They should make the effects that we observe every day impossible to sustain. In this paper, we show that the market structure and desig... View full abstract»
-
A Carpooling Recommendation System for Taxicab Services
Publication Year: 2014, Page(s):254 - 266
Cited by: Papers (20)Carpooling taxicab services hold the promise of providing additional transportation supply, especially in the extreme weather or rush hour when regular taxicab services are insufficient. Although many recommendation systems about regular taxicab services have been proposed recently, little research, if any, has been done to assist passengers to find a successful taxicab ride with carpooling. In th... View full abstract»
-
Remote Authentication via Biometrics: A Robust Video-Object Steganographic Mechanism Over Wireless Networks
Publication Year: 2016, Page(s):156 - 174
Cited by: Papers (8)In wireless communications, sensitive information is frequently exchanged, requiring remote authentication. Remote authentication involves the submission of encrypted information, along with visual and audio cues (facial images/videos, human voice, and so on). Nevertheless, Trojan horse and other attacks can cause serious problems, especially in the cases of remote examinations (in remote studying... View full abstract»
-
CONSUMER: A Novel Hybrid Intrusion Detection System for Distribution Networks in Smart Grid
Publication Year: 2013, Page(s):33 - 44
Cited by: Papers (39)Smart meters have been deployed worldwide in recent years that enable real-time communications and networking capabilities in power distribution systems. Problematically, recent reports have revealed incidents of energy theft in which dishonest customers would lower their electricity bills (aka stealing electricity) by tampering with their meters. The physical attack can be extended to a network a... View full abstract»
-
Hardware-Software Codesign of Wireless Transceivers on Zynq Heterogeneous Systems
Publication Year: 2018, Page(s):566 - 578
Cited by: Papers (2)Recently, wireless technology has seen many new devices, protocols, and applications. As standards adapt to keep pace with hardware availability and user needs, the trend points towards systems that achieve high data rates with low energy consumption. Moreover, there is an emerging vision of a transceiver architecture that can adapt to multiple protocols, existing and evolving. This architecture m... View full abstract»
-
Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage
Publication Year: 2015, Page(s):127 - 138
Cited by: Papers (63)In mobile cloud computing, a fundamental application is to outsource the mobile data to external cloud servers for scalable data storage. The outsourced data, however, need to be encrypted due to the privacy and confidentiality concerns of their owner. This results in the distinguished difficulties on the accurate search over the encrypted mobile cloud data. To tackle this issue, in this paper, we... View full abstract»
-
Vita: A Crowdsensing-Oriented Mobile Cyber-Physical System
Publication Year: 2013, Page(s):148 - 165
Cited by: Papers (97)As a prominent subcategory of cyber-physical systems, mobile cyber-physical systems could take advantage of widely used mobile devices, such as smartphones, as a convenient and economical platform that facilitates sophisticated and ubiquitous mobile sensing applications between humans and the surrounding physical world. This paper presents Vita, a novel mobile cyber-physical system for crowdsensin... View full abstract»
Aims & Scope
IEEE Transactions on Emerging Topics in Computing publishes papers on emerging aspects of computer science, computing technology, and computing applications not currently covered by other IEEE Computer Society Transactions.
Additional Information:
Some examples of emerging topics in computing include: IT for Green, Synthetic and organic computing structures and systems, Advanced analytics, Social/occupational computing, Location-based/client computer systems, Morphic computer design, Electronic game systems, & Health-care IT.
IEEE Transactions on Emerging Topics in Computing publishes papers on emerging aspects of computer science, computing technology, and computing applications not currently covered by other IEEE Computer Society Transactions.
Additional Information:
Some examples of emerging topics in computing include: IT for Green, Synthetic and organic computing structures and systems, Advanced analytics, Social/occupational computing, Location-based/client computer systems, Morphic computer design, Electronic game systems, & Health-care IT.
Meet Our Editors
Editor-in-Chief
Paolo Montuschi
Professor of Computer Engineering and IEEE Fellow
Polytechnic University of Turin, Italy
http://staff.polito.it/paolo.montuschi
eic.tetc@polito.it
Further Links
Aims & Scope
IEEE Transactions on Emerging Topics in Computing publishes papers on emerging aspects of computer science, computing technology, and computing applications not currently covered by other IEEE Computer Society Transactions. Some examples of emerging topics in computing include: IT for Green, Synthetic and organic computing structures and systems, Advanced analytics, Social/occupational computing, Location-based/client computer systems, Morphic computer design, Electronic game systems, & Health-care IT.
Persistent Link: https://ieeexplore.ieee.org/servlet/opac?punumber=6245516 More »
Frequency: 4
ISSN: 2168-6750
Publication Details:
Published by:
Subjects
- Computing & Processing
Contacts
Editor-in-Chief
Paolo Montuschi
Professor of Computer Engineering and IEEE Fellow
Polytechnic University of Turin, Italy
http://staff.polito.it/paolo.montuschi
eic.tetc@polito.it
About this Journal
Author Resources
Sponsor
Contacts
Editor-in-Chief
Paolo Montuschi
Professor of Computer Engineering and IEEE Fellow
Polytechnic University of Turin, Italy
http://staff.polito.it/paolo.montuschi
eic.tetc@polito.it
Abstract
Media