default search action
IEEE Transactions on Emerging Topics in Computing, Volume 8
Volume 8, Number 1, January - March 2020
- Paolo Montuschi
:
Thank-you State of the Journal Editorial by the 2019 Outgoing (Acting) Editor-in-Chief. 3 - Mianxiong Dong
, Nirwan Ansari
:
Guest Editorial: Special Section on Cyber-Physical Social Systems - Integrating Human into Computing. 4-5 - Ognjen Scekic
, Tommaso Schiavinotto, Svetoslav Videnov, Michael Rovatsos, Hong Linh Truong, Daniele Miorandi
, Schahram Dustdar
:
A Programming Model for Hybrid Collaborative Adaptive Systems. 6-19 - Gai-Ge Wang
, Xingjuan Cai, Zhihua Cui, Geyong Min
, Jinjun Chen
:
High Performance Computing for Cyber Physical Social Systems by Using Evolutionary Multi-Objective Optimization Algorithm. 20-30 - Tanveer Ahmed
, Abhishek Srivastava:
A Prototype Model to Predict Human Interest: Data Based Design to Combine Humans and Machines. 31-44 - Baris Aksanli
, Tajana Simunic Rosing:
Human Behavior Aware Energy Management in Residential Cyber-Physical Systems. 45-57 - Chun-Cheng Lin
, Der-Jiunn Deng
, Shun-Yu Jhong:
A Triangular NodeTrix Visualization Interface for Overlapping Social Community Structures of Cyber-Physical-Social Systems in Smart Factories. 58-68 - Yaliang Zhao
, Laurence T. Yang
, Ronghao Zhang:
Tensor-Based Multiple Clustering Approaches for Cyber-Physical-Social Applications. 69-81 - Shangguang Wang
, Ao Zhou, Mingzhe Yang, Lei Sun, Ching-Hsien Hsu
, Fangchun Yang:
Service Composition in Cyber-Physical-Social Systems. 82-91 - Zhou Su
, Qifan Qi, Qichao Xu
, Song Guo, Xiaowei Wang
:
Incentive Scheme for Cyber Physical Social Systems Based on User Behaviors. 92-103 - Nei Kato, Song Guo:
Guest Editor's Introduction: Special Section on Emerging Technologies for Disaster Management. 104-105 - Amjad Mehmood
, Zhihan Lv
, Jaime Lloret
, Muhammad Muneer Umar
:
ELDC: An Artificial Neural Network Based Energy-Efficient and Robust Routing Scheme for Pollution Monitoring in WSNs. 106-114 - Guangjie Han
, Xuan Yang, Li Liu
, Wenbo Zhang
, Mohsen Guizani
:
A Disaster Management-Oriented Path Planning for Mobile Anchor Node-Based Localization in Wireless Sensor Networks. 115-125 - Jiaxing Ye
, Takumi Kobayashi, Xiaoyan Wang, Hiroshi Tsuda, Masahiro Murakawa:
Audio Data Mining for Anthropogenic Disaster Identification: An Automatic Taxonomy Approach. 126-136 - Lei Shu, Yuanfang Chen
, Zhihong Sun, Fei Tong
, Mithun Mukherjee
:
Detecting the Dangerous Area of Toxic Gases with Wireless Sensor Networks. 137-147 - Qianlong Wang
, Yifan Guo
, Lixing Yu
, Pan Li
:
Earthquake Prediction Based on Spatio-Temporal Data Mining: An LSTM Network Approach. 148-158 - Shigenori Tani
, Katsuyuki Motoyoshi, Hiroyasu Sano, Atsushi Okamura, Hiroki Nishiyama
, Nei Kato
:
Flexibility-Enhanced HTS System for Disaster Management: Responding to Communication Demand Explosion in a Disaster. 159-167 - Kazuya Ogasawara, Tomo Miyazaki
, Yoshihiro Sugaya
, Shinichiro Omachi
:
Object-Based Video Coding by Visual Saliency and Temporal Correlation. 168-178 - Fabrizio Lamberti
, Gwo-Jen Hwang, Baltasar Fernández-Manjón, Wenping Wang:
Guest Editorial: Joint Special Issue on "Innovation in Technologies for Educational Computing". 179-181 - Austin Cory Bart
, Javier Tibau
, Dennis G. Kafura, Clifford A. Shaffer
, Eli Tilevich
:
Design and Evaluation of a Block-based Environment with a Data Science Context. 182-192 - Jesús Moreno-León
, Gregorio Robles
, Marcos Román-González
:
Towards Data-Driven Learning Paths to Develop Computational Thinking with Scratch. 193-205 - I-Han Hsiao
, Po-Kai Huang, Hannah E. Murphy:
Integrating Programming Learning Analytics Across Physical and Digital Space. 206-217 - Robert Shewaga, Alvaro Uribe-Quevedo, Bill Kapralos
, Fahad Alam:
A Comparison of Seated and Room-Scale Virtual Reality in a Serious Game for Epidural Preparation. 218-232 - Maria Roussou
, Mel Slater:
Comparison of the Effect of Interactive versus Passive Virtual Reality Learning Activities in Evoking and Sustaining Conceptual Change. 233-244 - Laila Shoukry
, Stefan Göbel:
Reasons and Responses: A Multimodal Serious Games Evaluation Framework. 245-255 - Andoni Eguíluz
, Mariluz Guenaga
, Pablo Garaizar
, Cristian Olivares-Rodríguez
:
Exploring the Progression of Early Programmers in a Set of Computational Thinking Challenges via Clickstream Analysis. 256-261
Volume 8, Number 2, April - June 2020
- Zhe Liu
, Kim-Kwang Raymond Choo
, Weiqiang Liu
, Muhammad Khurram Khan
:
Guest Editorial: Introduction to the Special Section on Cyber Security Threats and Defense Advance. 264-266 - Fu Xiao
, Letian Sha, Zai-Ping Yuan, Ruchuan Wang:
VulHunter: A Discovery for Unknown Bugs Based on Analysis for Known Patches in Industry Internet of Things. 267-279 - Jian Shen
, Dengzhi Liu, Md. Zakirul Alam Bhuiyan
, Jun Shen, Xingming Sun, Aniello Castiglione
:
Secure Verifiable Database Supporting Efficient Dynamic Operations in Cloud Computing. 280-290 - Jinhua Ma
, Jianghua Liu
, Xinyi Huang
, Yang Xiang
, Wei Wu
:
Authenticated Data Redaction with Fine-Grained Control. 291-302 - Lu Zhou, Chunhua Su
, Wayne Chiu
, Kuo-Hui Yeh
:
You Think, Therefore You Are: Transparent Authentication System with Brainwave-Oriented Bio-Features for IoT Networks. 303-312 - Muhammad Ajmal Azad
, Samiran Bag
, Shazia Tabassum
, Feng Hao
:
privy: Privacy Preserving Collaboration Across Multiple Service Providers to Combat Telecom Spams. 313-327 - Mauro Conti
, Fabio De Gaspari
, Luigi V. Mancini
:
A Novel Stealthy Attack to Gather SDN Configuration-Information. 328-340 - Sajad Homayoun
, Ali Dehghantanha
, Marzieh Ahmadzadeh, Sattar Hashemi
, Raouf Khayami
:
Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence. 341-351 - Xiaoqiang Sun, Peng Zhang, Joseph K. Liu, Jianping Yu, Weixin Xie:
Private Machine Learning Classification Based on Fully Homomorphic Encryption. 352-364 - Yunhui Zhuang, Anjia Yang
, Gerhard P. Hancke
, Duncan S. Wong, Guomin Yang
:
Energy-Efficient Distance-Bounding with Residual Charge Computation. 365-376 - Yong Yu
, Yannan Li
, Bo Yang, Willy Susilo
, Guomin Yang
, Jian Bai
:
Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage. 377-390 - Thomas Dullien
:
Weird Machines, Exploitability, and Provable Unexploitability. 391-403 - Giovanni Apruzzese
, Fabio Pierazzi
, Michele Colajanni
, Mirco Marchetti
:
Detection and Threat Prioritization of Pivoting Attacks in Large Networks. 404-415 - Cecilia Metra, Matteo Sonza Reorda
:
Guest Editor's Introduction: Special Section on High Dependability Systems. 416-417 - Eberle A. Rambo
, Christoph Seitz, Selma Saidi, Rolf Ernst
:
Bridging the Gap between Resilient Networks-on-Chip and Real-Time Systems. 418-430 - Farshad Baharvand
, Seyed Ghassem Miremadi
:
LEXACT: Low Energy N-Modular Redundancy Using Approximate Computing for Real-Time Multicore Processors. 431-441 - Doohwang Chang
, Jennifer N. Kitchen
, Sayfe Kiaei, Sule Ozev
:
In-Field Recovery of RF Circuits from Wearout Based Performance Degradation. 442-452 - Francisco E. Rangel-Patino
, Andres Viveros-Wacher
, José Ernesto Rayas-Sánchez
, Ismael Duron-Rosales, Edgar-Andrei Vega-Ochoa, Nagib Hakim, Enrique Lopez-Miralrio
:
A Holistic Formulation for System Margining and Jitter Tolerance Optimization in Industrial Post-Silicon Validation. 453-463 - Paolo Bernardi
, Riccardo Cantoro
, Sergio de Luca, Ernesto Sánchez, Alessandro Sansonetti, Giovanni Squillero
:
Software-Based Self-Test Techniques for Dual-Issue Embedded Processors. 464-477 - Wenjian Luo
, Zhenglong Yan, Chenyang Bu
, Daofu Zhang:
Community Detection by Fuzzy Relations. 478-492 - Seiji Kasuya
, Xiaokang Zhou
, Kiichi Tago
, Shoji Nishimura
, Qun Jin
:
Cyber-Enabled Well-Being Oriented Daily Living Support Based on Personal Data Analysis. 493-502 - Yong Chen
, Emil Matús, Sadia Moriam, Gerhard P. Fettweis
:
High Performance Dynamic Resource Allocation for Guaranteed Service in Network-on-Chips. 503-516 - Muhammad Yasin
, Bodhisatwa Mazumdar
, Ozgur Sinanoglu
, Jeyavijayan Rajendran:
Removal Attacks on Logic Locking and Camouflaging Techniques. 517-532 - Achraf Ben Ahmed
, Tsutomu Yoshinaga
, Abderazek Ben Abdallah
:
Scalable Photonic Networks-on-Chip Architecture Based on a Novel Wavelength-Shifting Mechanism. 533-544 - Jintao Yu
, Razvan Nane
, Imran Ashraf
, Mottaqiallah Taouil
, Said Hamdioui
, Henk Corporaal
, Koen Bertels
:
Skeleton-Based Synthesis Flow for Computation-in-Memory Architectures. 545-558
Volume 8, Number 3, July - September 2020
- Antonio Miele
, Qiaoyan Yu
, Maria K. Michael
:
Guest Editor's Introduction: Special Section on Reliability-Aware Design and Analysis Methods for Digital Systems: From Gate to System Level. 561-563 - Aitzan Sari, Mihalis Psarakis
:
Scrubbing-Aware Placement for Reliable FPGA Systems. 564-576 - Khanh N. Dang
, Akram Ben Ahmed
, Yuichi Okuyama
, Abderazek Ben Abdallah
:
Scalable Design Methodology and Online Algorithm for TSV-Cluster Defects Recovery in Highly Reliable 3D-NoC Systems. 577-590 - Takaaki Kato
, Senling Wang, Yasuo Sato, Seiji Kajihara, Xiaoqing Wen:
A Flexible Scan-in Power Control Method in Logic BIST and Its Evaluation with TEG Chips. 591-601 - Nicoleta Cucu Laurenciu
, Sorin Dan Cotofana
:
Reliability Aware Design and Lifetime Management of Computing Platforms. 602-615 - Adam Watkins
, Spyros Tragoudas:
Radiation Hardened Latch Designs for Double and Triple Node Upsets. 616-626 - Somayeh Sadeghi Kohan
, Mehdi Kamal
, Zainalabedin Navabi:
Self-Adjusting Monitor for Measuring Aging Rate and Advancement. 627-641 - Amir Charif
, Alexandre Coelho
, Nacer-Eddine Zergainoh, Michael Nicolaidis
:
A Dynamic Sufficient Condition of Deadlock-Freedom for High-Performance Fault-Tolerant Routing in Networks-on-Chips. 642-654 - Chen Liu
, Patrick Cronin
, Chengmo Yang:
Securing Cyber-Physical Systems from Hardware Trojan Collusion. 655-667 - Vadim Geurkov
:
On the Theory and Design of Polynomial Division Circuits. 668-687 - Vijaypal Singh Rathor
, Bharat Garg, G. K. Sharma:
A Novel Low Complexity Logic Encryption Technique for Design-for-Trust. 688-699 - Gurgen Harutyunyan
, Suren Martirosyan
, Samvel K. Shoukourian, Yervant Zorian:
Memory Physical Aware Multi-Level Fault Diagnosis Flow. 700-711 - Hamzeh Ahangari
, Funda Atik
, Yusuf Ibrahim Ozkok, Asil Yildirim, Serdar Oguz Ata, Özcan Özturk
:
Analysis of Design Parameters in Safety-Critical Computers. 712-723 - Soheil Salehi
, Navid Khoshavi
, Ronald F. DeMara
:
Mitigating Process Variability for Non-Volatile Cache Resilience and Yield. 724-737 - Shilpa Pendyala
, Sheikh Ariful Islam
, Srinivas Katkoori
:
Gate Level NBTI and Leakage Co-Optimization in Combinational Circuits with Input Vector Cycling. 738-749 - Haijun Zhang, Didier El Baz
, Victor C. M. Leung
:
Guest Editor's Introduction: Special Section on Green Computing in Internet of Things. 750-751 - Fu Xiao
, Jing Chen, Xiaohui Xie, Linqing Gui
, Lijuan Sun, Ruchuan Wang:
SEARE: A System for Exercise Activity Recognition and Quality Evaluation Based on Green Sensing. 752-761 - John Panneerselvam
, Lu Liu
, Nick Antonopoulos:
An Approach to Optimise Resource Provision with Energy-Awareness in Datacentres by Combating Task Heterogeneity. 762-780 - Xiaoming He, Kun Wang
, Huawei Huang
, Toshiaki Miyazaki
, Yixuan Wang, Song Guo
:
Green Resource Allocation Based on Deep Reinforcement Learning in Content-Centric IoT. 781-796 - Zhetao Li
, Yuxin Liu
, Anfeng Liu
, Shiguo Wang
, Haolin Liu:
Minimizing Convergecast Time and Energy Consumption in Green Internet of Things. 797-813 - Maryam Sajjad, Aakash Ahmad
, Asad Waqar Malik
, Ahmed B. Altamimi
, Ibrahim Alseadoon:
Classification and Mapping of Adaptive Security for Mobile Computing. 814-832 - Jian Shen
, Anxi Wang
, Chen Wang
, Jiguo Li
, Yan Zhang
:
Content-Centric Group User Authentication for Secure Social Networks. 833-844 - Jianwen Xu
, Kaoru Ota
, Mianxiong Dong
:
Fast Networking for Disaster Recovery. 845-854 - Xiang Li
, J. David Smith, Tianyi Pan
, Thang N. Dinh
, My T. Thai
:
Quantifying Privacy Vulnerability to Socialbot Attacks: An Adaptive Non-Submodular Model. 855-868 - Giovanni Piumatti, Fabrizio Lamberti
, Andrea Sanna
, Paolo Montuschi
:
Robust Robot Tracking for Next-Generation Collaborative Robotics-Based Gaming Environments. 869-882
Volume 8, Number 4, October - December 2020
- Cecilia Metra
:
Message from the Editor-in-Chief. 885-886 - Ozgur Sinanoglu, Ümit Y. Ogras
:
Guest Editors' Introduction: Special Issue on Emerging Technologies in Computer Design. 887-888 - Madiha Gul, Mohamed F. Chouikha, Mamadou I. Wade:
Joint Crosstalk Aware Burst Error Fault Tolerance Mechanism for Reliable on-Chip Communication. 889-896 - Mohammad Khavari Tavana, Yunsi Fei
, David R. Kaeli:
Nacre**Nacre, or mother-of-pearl, is one of nature's remarkable examples of a durable and break-resistant structure.: Durable, Secure and Energy-Efficient Non-Volatile Memory Utilizing Data Versioning. 897-906 - Kamran Rahmani, Prabhat Mishra
:
Feature-Based Signal Selection for Post-Silicon Debug Using Machine Learning. 907-915 - Hao Liu, Linpeng Huang, Yanmin Zhu, Yanyan Shen:
LibreKV: A Persistent in-Memory Key-Value Store. 916-927 - Thomas Fehmel, Dominik Stoffel, Wolfgang Kunz:
Generation of Abstract Driver Models for IP Integration Verification. 938-947 - Pranesh Das
, Dushmanta Kumar Das
, Shouvik Dey:
A New Class Topper Optimization Algorithm with an Application to Data Clustering. 948-959 - Xiaotong Cui
, Samah Mohamed Saeed, Alwin Zulehner, Robert Wille, Kaijie Wu
, Rolf Drechsler
, Ramesh Karri
:
On the Difficulty of Inserting Trojans in Reversible Computing Architectures. 960-972 - Prasanna Kansakar
, Arslan Munir
:
Selecting Microarchitecture Configuration of Processors for Internet of Things. 973-985 - Prabal Basu, Pramesh Pandey, Aatreyi Bal, Chidhambaranathan Rajamanikkam, Koushik Chakraborty
, Sanghamitra Roy
:
TITAN: Uncovering the Paradigm Shift in Security Vulnerability at Near-Threshold Computing. 986-997
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.