Computer

Issue 5 • May 2018

Filter Results

Displaying Results 1 - 25 of 25
  • Front Cover 
  • [Front cover]

    Publication Year: 2018, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1156 KB)
    Freely Available from IEEE
  • House Advertisement 
  • myCS

    Publication Year: 2018, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (1908 KB)
    Freely Available from IEEE
  • Table of Contents 
  • Table of contents

    Publication Year: 2018, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (1260 KB)
    Freely Available from IEEE
  • Masthead 
  • [Masthead]

    Publication Year: 2018, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (153 KB)
    Freely Available from IEEE
  • Elsewhere in the CS 
  • Highlights Society Magazines

    Publication Year: 2018, Page(s):4 - 6
    Request permission for commercial reuse | PDF file iconPDF (1731 KB)
    Freely Available from IEEE
  • House Advertisement 
  • 2018 CSI-IEEE CS Joint Education Award

    Publication Year: 2018, Page(s): 7
    Request permission for commercial reuse | PDF file iconPDF (304 KB)
    Freely Available from IEEE
  • Spotlight on Transactions 
  • Globe Browsing in OpenSpace

    Publication Year: 2018, Page(s):8 - 9
    Request permission for commercial reuse | PDF file iconPDF (843 KB)
    Freely Available from IEEE
  • 50 & 25 Years Ago 
  • Computer, 1968 and 1993

    Publication Year: 2018, Page(s):10 - 11
    Request permission for commercial reuse | PDF file iconPDF (1225 KB) | HTML iconHTML
    Freely Available from IEEE
  • Guest Editors’ Introduction 
  • The Deep (Learning) Transformation of Mobile and Embedded Computing

    Publication Year: 2018, Page(s):12 - 16
    Request permission for commercial reuse | PDF file iconPDF (4535 KB) | HTML iconHTML
    Freely Available from IEEE
  • House Advertisement 
  • 2019 Richard E. Merwin Award for Distinguished Service

    Publication Year: 2018, Page(s): 17
    Request permission for commercial reuse | PDF file iconPDF (857 KB)
    Freely Available from IEEE
  • Cover Feature 
  • Exploiting Typical Values to Accelerate Deep Learning

    Publication Year: 2018, Page(s):18 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (806 KB) | HTML iconHTML

    To deliver the hardware computation power advances needed to support deep learning innovations, identifying deep learning properties that designers could potentially exploit is invaluable. This article articulates our strategy and overviews several value properties of deep learning models that we identified and some of our hardware designs that exploit them to reduce computation, and on- and off-c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • House Advertisement 
  • IEEE Computer Society Harlan D. Mills Award

    Publication Year: 2018, Page(s): 31
    Request permission for commercial reuse | PDF file iconPDF (162 KB)
    Freely Available from IEEE
  • Cover Feature 
  • Deep Learning for the Internet of Things

    Publication Year: 2018, Page(s):32 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (869 KB) | HTML iconHTML

    How can the advantages of deep learning be brought to the emerging world of embedded IoT devices? The authors discuss several core challenges in embedded and mobile deep learning, as well as recent solutions demonstrating the feasibility of building IoT applications that are powered by effective, efficient, and reliable deep learning models. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Private and Scalable Personal Data Analytics Using Hybrid Edge-to-Cloud Deep Learning

    Publication Year: 2018, Page(s):42 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (841 KB) | HTML iconHTML

    Although the ability to collect, collate, and analyze the vast amount of data generated from cyber-physical systems and Internet of Things devices can be beneficial to both users and industry, this process has led to a number of challenges, including privacy and scalability issues. The authors present a hybrid framework where user-centered edge devices and resources can complement the cloud for pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deep Learning for Human Activity Recognition in Mobile Computing

    Publication Year: 2018, Page(s):50 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (787 KB) | HTML iconHTML

    By leveraging advances in deep learning, challenging pattern recognition problems have been solved in computer vision, speech recognition, natural language processing, and more. Mobile computing has also adopted these powerful modeling approaches, delivering astonishing success in the field's core application domains, including the ongoing transformation of human activity recognition technology th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Breathing-Based Authentication on Resource-Constrained IoT Devices using Recurrent Neural Networks

    Publication Year: 2018, Page(s):60 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (778 KB) | HTML iconHTML

    Recurrent neural networks (RNNs) have shown promising results in audio and speech-processing applications. The increasing popularity of Internet of Things (IoT) devices makes a strong case for implementing RNN-based inferences for applications such as acoustics-based authentication and voice commands for smart homes. However, the feasibility and performance of these inferences on resource-constrai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finding Small-Bowel Lesions: Challenges in Endoscopy-Image-Based Learning Systems

    Publication Year: 2018, Page(s):68 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1269 KB) | HTML iconHTML

    Capsule endoscopy identifies damaged areas in a patient's small intestine but often outputs poor-quality images or misses lesions, leading to either misdiagnosis or repetition of the lengthy procedure. The authors propose applying deep-learning models to automatically process the captured images and identify lesions in real time, enabling the capsule to take additional images of a specific locatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • House Advertisement 
  • Call for Nominees Education Awards Nominations

    Publication Year: 2018, Page(s): 77
    Request permission for commercial reuse | PDF file iconPDF (783 KB)
    Freely Available from IEEE
  • Aftershock 
  • Puncturing Pernicious Project Pufferies

    Publication Year: 2018, Page(s):78 - 83
    Request permission for commercial reuse | PDF file iconPDF (495 KB) | HTML iconHTML
    Freely Available from IEEE
  • Out of Band 
  • Malice Domestic: The Cambridge Analytica Dystopia

    Publication Year: 2018, Page(s):84 - 89
    Request permission for commercial reuse | PDF file iconPDF (1893 KB) | HTML iconHTML
    Freely Available from IEEE
  • Cyber-Physical Systems 
  • Computing in the Real World Is the Grandest of Challenges

    Publication Year: 2018, Page(s):90 - 91
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (709 KB) | HTML iconHTML

    Cyber-physical systems are no longer a sideline for computing - they are a core concern for computer scientists and engineers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cybertrust 
  • Cyberthreats under the Bed

    Publication Year: 2018, Page(s):92 - 95
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1112 KB) | HTML iconHTML

    Internet-connected toys provide an often-overlooked avenue for breaching personal data, especially of those most vulnerable. Government and private measures can minimize the risks, but responsibility for monitoring smart toy usage ultimately lies with parents. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • House Advertisement 
  • IEEE Computer Society

    Publication Year: 2018, Page(s): 96
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • Recognizing Excellence in High Performance Computing Nominations are Solicited for the Seymour Cray Sidney Fernbach & Ken Kennedy Awards

    Publication Year: 2018, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (502 KB)
    Freely Available from IEEE
  • 2019 IEEE-CS Charles Babbage Award

    Publication Year: 2018, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (249 KB)
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org