default search action
IEEE Transactions on Emerging Topics in Computing, Volume 8
Volume 8, Number 1, January - March 2020
- Paolo Montuschi:
Thank-you State of the Journal Editorial by the 2019 Outgoing (Acting) Editor-in-Chief. 3 - Mianxiong Dong, Nirwan Ansari:
Guest Editorial: Special Section on Cyber-Physical Social Systems - Integrating Human into Computing. 4-5 - Ognjen Scekic, Tommaso Schiavinotto, Svetoslav Videnov, Michael Rovatsos, Hong Linh Truong, Daniele Miorandi, Schahram Dustdar:
A Programming Model for Hybrid Collaborative Adaptive Systems. 6-19 - Gai-Ge Wang, Xingjuan Cai, Zhihua Cui, Geyong Min, Jinjun Chen:
High Performance Computing for Cyber Physical Social Systems by Using Evolutionary Multi-Objective Optimization Algorithm. 20-30 - Tanveer Ahmed, Abhishek Srivastava:
A Prototype Model to Predict Human Interest: Data Based Design to Combine Humans and Machines. 31-44 - Baris Aksanli, Tajana Simunic Rosing:
Human Behavior Aware Energy Management in Residential Cyber-Physical Systems. 45-57 - Chun-Cheng Lin, Der-Jiunn Deng, Shun-Yu Jhong:
A Triangular NodeTrix Visualization Interface for Overlapping Social Community Structures of Cyber-Physical-Social Systems in Smart Factories. 58-68 - Yaliang Zhao, Laurence T. Yang, Ronghao Zhang:
Tensor-Based Multiple Clustering Approaches for Cyber-Physical-Social Applications. 69-81 - Shangguang Wang, Ao Zhou, Mingzhe Yang, Lei Sun, Ching-Hsien Hsu, Fangchun Yang:
Service Composition in Cyber-Physical-Social Systems. 82-91 - Zhou Su, Qifan Qi, Qichao Xu, Song Guo, Xiaowei Wang:
Incentive Scheme for Cyber Physical Social Systems Based on User Behaviors. 92-103 - Nei Kato, Song Guo:
Guest Editor's Introduction: Special Section on Emerging Technologies for Disaster Management. 104-105 - Amjad Mehmood, Zhihan Lv, Jaime Lloret, Muhammad Muneer Umar:
ELDC: An Artificial Neural Network Based Energy-Efficient and Robust Routing Scheme for Pollution Monitoring in WSNs. 106-114 - Guangjie Han, Xuan Yang, Li Liu, Wenbo Zhang, Mohsen Guizani:
A Disaster Management-Oriented Path Planning for Mobile Anchor Node-Based Localization in Wireless Sensor Networks. 115-125 - Jiaxing Ye, Takumi Kobayashi, Xiaoyan Wang, Hiroshi Tsuda, Masahiro Murakawa:
Audio Data Mining for Anthropogenic Disaster Identification: An Automatic Taxonomy Approach. 126-136 - Lei Shu, Yuanfang Chen, Zhihong Sun, Fei Tong, Mithun Mukherjee:
Detecting the Dangerous Area of Toxic Gases with Wireless Sensor Networks. 137-147 - Qianlong Wang, Yifan Guo, Lixing Yu, Pan Li:
Earthquake Prediction Based on Spatio-Temporal Data Mining: An LSTM Network Approach. 148-158 - Shigenori Tani, Katsuyuki Motoyoshi, Hiroyasu Sano, Atsushi Okamura, Hiroki Nishiyama, Nei Kato:
Flexibility-Enhanced HTS System for Disaster Management: Responding to Communication Demand Explosion in a Disaster. 159-167 - Kazuya Ogasawara, Tomo Miyazaki, Yoshihiro Sugaya, Shinichiro Omachi:
Object-Based Video Coding by Visual Saliency and Temporal Correlation. 168-178 - Fabrizio Lamberti, Gwo-Jen Hwang, Baltasar Fernández-Manjón, Wenping Wang:
Guest Editorial: Joint Special Issue on "Innovation in Technologies for Educational Computing". 179-181 - Austin Cory Bart, Javier Tibau, Dennis G. Kafura, Clifford A. Shaffer, Eli Tilevich:
Design and Evaluation of a Block-based Environment with a Data Science Context. 182-192 - Jesús Moreno-León, Gregorio Robles, Marcos Román-González:
Towards Data-Driven Learning Paths to Develop Computational Thinking with Scratch. 193-205 - I-Han Hsiao, Po-Kai Huang, Hannah E. Murphy:
Integrating Programming Learning Analytics Across Physical and Digital Space. 206-217 - Robert Shewaga, Alvaro Uribe-Quevedo, Bill Kapralos, Fahad Alam:
A Comparison of Seated and Room-Scale Virtual Reality in a Serious Game for Epidural Preparation. 218-232 - Maria Roussou, Mel Slater:
Comparison of the Effect of Interactive versus Passive Virtual Reality Learning Activities in Evoking and Sustaining Conceptual Change. 233-244 - Laila Shoukry, Stefan Göbel:
Reasons and Responses: A Multimodal Serious Games Evaluation Framework. 245-255 - Andoni Eguíluz, Mariluz Guenaga, Pablo Garaizar, Cristian Olivares-Rodríguez:
Exploring the Progression of Early Programmers in a Set of Computational Thinking Challenges via Clickstream Analysis. 256-261
Volume 8, Number 2, April - June 2020
- Zhe Liu, Kim-Kwang Raymond Choo, Weiqiang Liu, Muhammad Khurram Khan:
Guest Editorial: Introduction to the Special Section on Cyber Security Threats and Defense Advance. 264-266 - Fu Xiao, Letian Sha, Zai-Ping Yuan, Ruchuan Wang:
VulHunter: A Discovery for Unknown Bugs Based on Analysis for Known Patches in Industry Internet of Things. 267-279 - Jian Shen, Dengzhi Liu, Md. Zakirul Alam Bhuiyan, Jun Shen, Xingming Sun, Aniello Castiglione:
Secure Verifiable Database Supporting Efficient Dynamic Operations in Cloud Computing. 280-290 - Jinhua Ma, Jianghua Liu, Xinyi Huang, Yang Xiang, Wei Wu:
Authenticated Data Redaction with Fine-Grained Control. 291-302 - Lu Zhou, Chunhua Su, Wayne Chiu, Kuo-Hui Yeh:
You Think, Therefore You Are: Transparent Authentication System with Brainwave-Oriented Bio-Features for IoT Networks. 303-312 - Muhammad Ajmal Azad, Samiran Bag, Shazia Tabassum, Feng Hao:
privy: Privacy Preserving Collaboration Across Multiple Service Providers to Combat Telecom Spams. 313-327 - Mauro Conti, Fabio De Gaspari, Luigi V. Mancini:
A Novel Stealthy Attack to Gather SDN Configuration-Information. 328-340 - Sajad Homayoun, Ali Dehghantanha, Marzieh Ahmadzadeh, Sattar Hashemi, Raouf Khayami:
Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence. 341-351 - Xiaoqiang Sun, Peng Zhang, Joseph K. Liu, Jianping Yu, Weixin Xie:
Private Machine Learning Classification Based on Fully Homomorphic Encryption. 352-364 - Yunhui Zhuang, Anjia Yang, Gerhard P. Hancke, Duncan S. Wong, Guomin Yang:
Energy-Efficient Distance-Bounding with Residual Charge Computation. 365-376 - Yong Yu, Yannan Li, Bo Yang, Willy Susilo, Guomin Yang, Jian Bai:
Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage. 377-390 - Thomas Dullien:
Weird Machines, Exploitability, and Provable Unexploitability. 391-403 - Giovanni Apruzzese, Fabio Pierazzi, Michele Colajanni, Mirco Marchetti:
Detection and Threat Prioritization of Pivoting Attacks in Large Networks. 404-415 - Cecilia Metra, Matteo Sonza Reorda:
Guest Editor's Introduction: Special Section on High Dependability Systems. 416-417 - Eberle A. Rambo, Christoph Seitz, Selma Saidi, Rolf Ernst:
Bridging the Gap between Resilient Networks-on-Chip and Real-Time Systems. 418-430 - Farshad Baharvand, Seyed Ghassem Miremadi:
LEXACT: Low Energy N-Modular Redundancy Using Approximate Computing for Real-Time Multicore Processors. 431-441 - Doohwang Chang, Jennifer N. Kitchen, Sayfe Kiaei, Sule Ozev:
In-Field Recovery of RF Circuits from Wearout Based Performance Degradation. 442-452 - Francisco E. Rangel-Patino, Andres Viveros-Wacher, José Ernesto Rayas-Sánchez, Ismael Duron-Rosales, Edgar-Andrei Vega-Ochoa, Nagib Hakim, Enrique Lopez-Miralrio:
A Holistic Formulation for System Margining and Jitter Tolerance Optimization in Industrial Post-Silicon Validation. 453-463 - Paolo Bernardi, Riccardo Cantoro, Sergio de Luca, Ernesto Sánchez, Alessandro Sansonetti, Giovanni Squillero:
Software-Based Self-Test Techniques for Dual-Issue Embedded Processors. 464-477 - Wenjian Luo, Zhenglong Yan, Chenyang Bu, Daofu Zhang:
Community Detection by Fuzzy Relations. 478-492 - Seiji Kasuya, Xiaokang Zhou, Kiichi Tago, Shoji Nishimura, Qun Jin:
Cyber-Enabled Well-Being Oriented Daily Living Support Based on Personal Data Analysis. 493-502 - Yong Chen, Emil Matús, Sadia Moriam, Gerhard P. Fettweis:
High Performance Dynamic Resource Allocation for Guaranteed Service in Network-on-Chips. 503-516 - Muhammad Yasin, Bodhisatwa Mazumdar, Ozgur Sinanoglu, Jeyavijayan Rajendran:
Removal Attacks on Logic Locking and Camouflaging Techniques. 517-532 - Achraf Ben Ahmed, Tsutomu Yoshinaga, Abderazek Ben Abdallah:
Scalable Photonic Networks-on-Chip Architecture Based on a Novel Wavelength-Shifting Mechanism. 533-544 - Jintao Yu, Razvan Nane, Imran Ashraf, Mottaqiallah Taouil, Said Hamdioui, Henk Corporaal, Koen Bertels:
Skeleton-Based Synthesis Flow for Computation-in-Memory Architectures. 545-558
Volume 8, Number 3, July - September 2020
- Antonio Miele, Qiaoyan Yu, Maria K. Michael:
Guest Editor's Introduction: Special Section on Reliability-Aware Design and Analysis Methods for Digital Systems: From Gate to System Level. 561-563 - Aitzan Sari, Mihalis Psarakis:
Scrubbing-Aware Placement for Reliable FPGA Systems. 564-576 - Khanh N. Dang, Akram Ben Ahmed, Yuichi Okuyama, Abderazek Ben Abdallah:
Scalable Design Methodology and Online Algorithm for TSV-Cluster Defects Recovery in Highly Reliable 3D-NoC Systems. 577-590 - Takaaki Kato, Senling Wang, Yasuo Sato, Seiji Kajihara, Xiaoqing Wen:
A Flexible Scan-in Power Control Method in Logic BIST and Its Evaluation with TEG Chips. 591-601 - Nicoleta Cucu Laurenciu, Sorin Dan Cotofana:
Reliability Aware Design and Lifetime Management of Computing Platforms. 602-615 - Adam Watkins, Spyros Tragoudas:
Radiation Hardened Latch Designs for Double and Triple Node Upsets. 616-626 - Somayeh Sadeghi Kohan, Mehdi Kamal, Zainalabedin Navabi:
Self-Adjusting Monitor for Measuring Aging Rate and Advancement. 627-641 - Amir Charif, Alexandre Coelho, Nacer-Eddine Zergainoh, Michael Nicolaidis:
A Dynamic Sufficient Condition of Deadlock-Freedom for High-Performance Fault-Tolerant Routing in Networks-on-Chips. 642-654 - Chen Liu, Patrick Cronin, Chengmo Yang:
Securing Cyber-Physical Systems from Hardware Trojan Collusion. 655-667 - Vadim Geurkov:
On the Theory and Design of Polynomial Division Circuits. 668-687 - Vijaypal Singh Rathor, Bharat Garg, G. K. Sharma:
A Novel Low Complexity Logic Encryption Technique for Design-for-Trust. 688-699 - Gurgen Harutyunyan, Suren Martirosyan, Samvel K. Shoukourian, Yervant Zorian:
Memory Physical Aware Multi-Level Fault Diagnosis Flow. 700-711 - Hamzeh Ahangari, Funda Atik, Yusuf Ibrahim Ozkok, Asil Yildirim, Serdar Oguz Ata, Özcan Özturk:
Analysis of Design Parameters in Safety-Critical Computers. 712-723 - Soheil Salehi, Navid Khoshavi, Ronald F. DeMara:
Mitigating Process Variability for Non-Volatile Cache Resilience and Yield. 724-737 - Shilpa Pendyala, Sheikh Ariful Islam, Srinivas Katkoori:
Gate Level NBTI and Leakage Co-Optimization in Combinational Circuits with Input Vector Cycling. 738-749 - Haijun Zhang, Didier El Baz, Victor C. M. Leung:
Guest Editor's Introduction: Special Section on Green Computing in Internet of Things. 750-751 - Fu Xiao, Jing Chen, Xiaohui Xie, Linqing Gui, Lijuan Sun, Ruchuan Wang:
SEARE: A System for Exercise Activity Recognition and Quality Evaluation Based on Green Sensing. 752-761 - John Panneerselvam, Lu Liu, Nick Antonopoulos:
An Approach to Optimise Resource Provision with Energy-Awareness in Datacentres by Combating Task Heterogeneity. 762-780 - Xiaoming He, Kun Wang, Huawei Huang, Toshiaki Miyazaki, Yixuan Wang, Song Guo:
Green Resource Allocation Based on Deep Reinforcement Learning in Content-Centric IoT. 781-796 - Zhetao Li, Yuxin Liu, Anfeng Liu, Shiguo Wang, Haolin Liu:
Minimizing Convergecast Time and Energy Consumption in Green Internet of Things. 797-813 - Maryam Sajjad, Aakash Ahmad, Asad Waqar Malik, Ahmed B. Altamimi, Ibrahim Alseadoon:
Classification and Mapping of Adaptive Security for Mobile Computing. 814-832 - Jian Shen, Anxi Wang, Chen Wang, Jiguo Li, Yan Zhang:
Content-Centric Group User Authentication for Secure Social Networks. 833-844 - Jianwen Xu, Kaoru Ota, Mianxiong Dong:
Fast Networking for Disaster Recovery. 845-854 - Xiang Li, J. David Smith, Tianyi Pan, Thang N. Dinh, My T. Thai:
Quantifying Privacy Vulnerability to Socialbot Attacks: An Adaptive Non-Submodular Model. 855-868 - Giovanni Piumatti, Fabrizio Lamberti, Andrea Sanna, Paolo Montuschi:
Robust Robot Tracking for Next-Generation Collaborative Robotics-Based Gaming Environments. 869-882
Volume 8, Number 4, October - December 2020
- Cecilia Metra:
Message from the Editor-in-Chief. 885-886 - Ozgur Sinanoglu, Ümit Y. Ogras:
Guest Editors' Introduction: Special Issue on Emerging Technologies in Computer Design. 887-888 - Madiha Gul, Mohamed F. Chouikha, Mamadou I. Wade:
Joint Crosstalk Aware Burst Error Fault Tolerance Mechanism for Reliable on-Chip Communication. 889-896 - Mohammad Khavari Tavana, Yunsi Fei, David R. Kaeli:
Nacre**Nacre, or mother-of-pearl, is one of nature's remarkable examples of a durable and break-resistant structure.: Durable, Secure and Energy-Efficient Non-Volatile Memory Utilizing Data Versioning. 897-906 - Kamran Rahmani, Prabhat Mishra:
Feature-Based Signal Selection for Post-Silicon Debug Using Machine Learning. 907-915 - Hao Liu, Linpeng Huang, Yanmin Zhu, Yanyan Shen:
LibreKV: A Persistent in-Memory Key-Value Store. 916-927 - Thomas Fehmel, Dominik Stoffel, Wolfgang Kunz:
Generation of Abstract Driver Models for IP Integration Verification. 938-947 - Pranesh Das, Dushmanta Kumar Das, Shouvik Dey:
A New Class Topper Optimization Algorithm with an Application to Data Clustering. 948-959 - Xiaotong Cui, Samah Mohamed Saeed, Alwin Zulehner, Robert Wille, Kaijie Wu, Rolf Drechsler, Ramesh Karri:
On the Difficulty of Inserting Trojans in Reversible Computing Architectures. 960-972 - Prasanna Kansakar, Arslan Munir:
Selecting Microarchitecture Configuration of Processors for Internet of Things. 973-985 - Prabal Basu, Pramesh Pandey, Aatreyi Bal, Chidhambaranathan Rajamanikkam, Koushik Chakraborty, Sanghamitra Roy:
TITAN: Uncovering the Paradigm Shift in Security Vulnerability at Near-Threshold Computing. 986-997
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.