Match!
IEEE Computer
IF
3.56
Papers
8586
Papers 8562
1 page of 857 pages (8,562 results)
Newest
#1Claudio Bettini (University of Milan)H-Index: 36
#2Salil S. Kanhere (UNSW: University of New South Wales)H-Index: 40
Last. Delphine Reinhardt (GAU: University of Göttingen)H-Index: 1
view all 5 authors...
Privacy legislation has often been identified as a roadblock for advanced context-aware applications. The feedback collected from more than 150 researchers in pervasive computing reveals a different attitude. Has pervasive computing?s privacy challenge been solved?
Source
#1Mehmet Demir (RyeU: Ryerson University)H-Index: 1
#2Ozgur Turetken (RyeU: Ryerson University)H-Index: 13
Last. Atefeh Mashatan (RyeU: Ryerson University)H-Index: 1
view all 3 authors...
Blockchain technology presents significant potential along with risk. The blockchain technology transformation framework informs decision makers on how blockchain fits in their processes, what data will be in the transactions, and who the participants will be, allowing users to lower risks and increase their chances for a successful blockchain solution.
Source
Our recent architectural risk analysis of machine learning systems identified 78 particular risks associated with nine specific components found in most machine learning systems. In this article, we describe and discuss the 10 most important security risks of those 78.
Source
#1Marcello Caleffi (University of Naples Federico II)H-Index: 21
#2Daryus Chandra (University of Naples Federico II)
Last. Angela Sara Cacciapuoti (University of Naples Federico II)H-Index: 21
view all 5 authors...
The Internet just turned 50 five decades that shaped the world we live in. But what comes next, the so-called Quantum Internet, will be even more revolutionary, likely in ways we can't imagine yet.
Source
Source
Source
#1Sean W. Smith (Dartmouth College)H-Index: 38
The challenges, bugs, and trouble spots that we've had in building and securing the Internet of Computers can provide a starting point for analyzing the challenges that will be manifested in this brave new world. Members of the IT community have their work cut out here.
Source
#1Behrooz Parhami (UCSB: University of California, Santa Barbara)H-Index: 26
Reliability analysis is often based on worst-case assumptions to produce guaranteed lower bounds on system survival probability. Reliability engineers make lower bounds as tight as possible, but sometimes system structure is unfriendly to the derivation of tight bounds. Unfortunately, loose reliability lower bounds make it difficult to compare design alternatives or to select among competing systems.
Source
#1Nikolay Harutyunyan (FAU: University of Erlangen-Nuremberg)H-Index: 1
Source
Source
12345678910
Top fields of study
The Internet
Software engineering
Software
Computer security
Computer science
Software development