Computer

Issue 1 • January 2018

Filter Results

Displaying Results 1 - 25 of 27
  • Front Cover 
  • Front Cover

    Publication Year: 2018, Page(s): c1
    Request permission for commercial reuse | |PDF file iconPDF (1324 KB)
    Freely Available from IEEE
  • House Advertisement 
  • IEEE COMPUTER SOCIETY: Be at the Center of It All

    Publication Year: 2018, Page(s): c2
    Request permission for commercial reuse | |PDF file iconPDF (65 KB)
    Freely Available from IEEE
  • Table of Contents 
  • Table of contents

    Publication Year: 2018, Page(s):1 - 2
    Request permission for commercial reuse | |PDF file iconPDF (952 KB)
    Freely Available from IEEE
  • Masthead 
  • [Masthead]

    Publication Year: 2018, Page(s): 3
    Request permission for commercial reuse | |PDF file iconPDF (153 KB)
    Freely Available from IEEE
  • CS President’s Message 
  • Satisfaction and Sustainability

    Publication Year: 2018, Page(s):4 - 6
    Request permission for commercial reuse | |PDF file iconPDF (642 KB) | HTML iconHTML
    Freely Available from IEEE
  • House Advertisement 
  • IEEE Transactions on Big Data

    Publication Year: 2018, Page(s): 7
    Request permission for commercial reuse | |PDF file iconPDF (519 KB)
    Freely Available from IEEE
  • Elsewhere in the CS 
  • Highlights Society Magazines

    Publication Year: 2018, Page(s):8 - 10
    Request permission for commercial reuse | |PDF file iconPDF (1484 KB)
    Freely Available from IEEE
  • House Advertisement 
  • IEEE Cloud Computing Call for Papers

    Publication Year: 2018, Page(s): 11
    Request permission for commercial reuse | |PDF file iconPDF (566 KB)
    Freely Available from IEEE
  • 50 & 25 Years Ago 
  • 50 & 25 Years Ago

    Publication Year: 2018, Page(s):12 - 13
    Request permission for commercial reuse | |PDF file iconPDF (1901 KB) | HTML iconHTML
    Freely Available from IEEE
  • EIC’s Message 
  • 2018 Outlook: The Emerging Web and Information Sciences

    Publication Year: 2018, Page(s):14 - 16
    Request permission for commercial reuse | |PDF file iconPDF (1011 KB) | HTML iconHTML
    Freely Available from IEEE
  • House Advertisement 
  • myCS

    Publication Year: 2018, Page(s): 17
    Request permission for commercial reuse | |PDF file iconPDF (1874 KB)
    Freely Available from IEEE
  • Cover Feature 
  • From Brexit to Trump: Social Media’s Role in Democracy

    Publication Year: 2018, Page(s):18 - 27
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1463 KB) | HTML iconHTML

    The ability to share, access, and connect facts and opinions among like-minded (and not so) citizens has encouraged wholesale political adoption of platforms like Twitter and Facebook. Yet our ability to understand the impact that social networks have had on the democratic process is currently very limited. The authors analyze the role social media played in the outcome of the 2016 US presidential... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Frontiers of Science of Information: Shannon Meets Turing

    Publication Year: 2018, Page(s):28 - 38
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1355 KB) | HTML iconHTML

    The authors' vision for a Science of Information integrates key elements of Shannon and Turing postulates into an overarching framework for data analytics, privacy, and security that provides the critically needed formal basis for data science. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • House Advertisement 
  • IEEE Computer Society

    Publication Year: 2018, Page(s): 39
    Request permission for commercial reuse | |PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • Cover Feature 
  • Revisiting Scalable Coherent Shared Memory

    Publication Year: 2018, Page(s):40 - 49
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (880 KB) | HTML iconHTML

    Scalable and coherent shared memory has been a long-sought-after but elusive goal. In contrast to today's popular distributed-computing models, the authors present a software-defined server architecture that is a scale-up shared-memory multiprocessor, yet uses ubiquitous commodity scale-out clusters. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward Ubiquitous Operating Systems: A Software-Defined Perspective

    Publication Year: 2018, Page(s):50 - 56
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1125 KB) | HTML iconHTML

    In recent years, operating systems have expanded beyond traditional computing systems into the cloud, IoT devices, and other emerging technologies and will soon become ubiquitous. Despite the apparent differences among existing OSs, they all have in common so-called “software-defined” capabilities-namely, resource virtualization and function programmability. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research Feature 
  • I/Ocloud: Adding an IoT Dimension to Cloud Infrastructures

    Publication Year: 2018, Page(s):57 - 65
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1117 KB) | HTML iconHTML

    Infrastructure as a service is a successful cloud-based utility paradigm. Its effectiveness stems from employing virtualization and enabling cloud providers to leverage elastic datacenter capabilities. To expand the reach and benefits of IaaS, the cloud must embrace the Internet of Things infrastructure as virtualized I/O resources and first-class objects at the edge. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Issues in Named Data Networks

    Publication Year: 2018, Page(s):66 - 75
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (442 KB) | HTML iconHTML

    Today's IP and content distribution networks are unable to fulfill all data distribution and security requirements. The named data network (NDN) has emerged as a promising candidate to cope with the Internet usage of the 21st century. Although the NDN has many built-in security features, this survey reviews several pressing security issues and open research areas. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Challenge-Based Learning 
  • Turning an International Competition into a Valuable Learning Experience

    Publication Year: 2018, Page(s):76 - 79
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2709 KB) | HTML iconHTML

    A group of students competed in an international underwater-vehicle competition, and although they didn't do as well as they'd hoped, they enjoyed the experience and learned many important lessons. View full abstract»

    Open Access
  • Virtual Roundtable 
  • Educating Next-Gen Computer Scientists

    Publication Year: 2018, Page(s):80 - 88
    Request permission for commercial reuse | |PDF file iconPDF (739 KB)
    Freely Available from IEEE
  • Out of Band 
  • Disinformatics: The Discipline behind Grand Deceptions

    Publication Year: 2018, Page(s):89 - 93
    Request permission for commercial reuse | |PDF file iconPDF (1140 KB) | HTML iconHTML
    Freely Available from IEEE
  • Cybertrust 
  • Psst, Can You Keep a Secret?

    Publication Year: 2018, Page(s):94 - 97
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (779 KB) | HTML iconHTML

    The security of encrypted data depends not only on the theoretical properties of cryptographic primitives but also on the robustness of their implementations in software and hardware. Threshold cryptography introduces a computational paradigm that enables higher assurance for such implementations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CS Connection 
  • CS Connection

    Publication Year: 2018, Page(s):98 - 102
    Request permission for commercial reuse | |PDF file iconPDF (1077 KB)
    Freely Available from IEEE
  • House Advertisement 
  • Got flaws? [advertisement]

    Publication Year: 2018, Page(s): 103
    Request permission for commercial reuse | |PDF file iconPDF (54 KB)
    Freely Available from IEEE
  • The Future Today 
  • Self-Managing Real Estate

    Publication Year: 2018, Page(s): 104
    Request permission for commercial reuse | |PDF file iconPDF (776 KB) | HTML iconHTML
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org