Profile cover photo
Profile photo
IEEE Computer Society Google+
4,345 followers -
The Community for Technology Leaders
The Community for Technology Leaders

4,345 followers
About
Posts

Post has attachment
IEEE Transactions on Sustainable Computing
Language-Based Expression of Reliability and Parallelism for Low-Power Computing
Improving the energy-efficiency of computing systems while ensuring reliability is a challenge in all domains, ranging from low-power embedded devices to large-scale servers. In this context, a key issue is that many techniques aiming to reduce power consumption negatively affect reliability, while fault tolerance techniques require computation or state redundancy that increases power consumption, thereby leading to systematic tradeoffs.
https://www.computer.org/web/tsusc
Add a comment...

Post has attachment
IEEE Transactions on Knowledge and Data Engineering
Influence Maximization on Social Graphs: A Survey
Influence Maximization (IM), is a key algorithmic problem in social influence analysis that has been extensively studied in the past decade.
https://www.computer.org/web/tkde
Add a comment...

Post has attachment
IEEE Transactions on Knowledge and Data Engineering
Influence Maximization on Social Graphs: A Survey
Influence Maximization (IM), which selects a set of k users (called seed set) from a social network to maximize the expected number of influenced users (called influence spread), is a key algorithmic problem in social influence analysis. Due to its immense application potential and enormous technical challenges, IM has been extensively studied in the past decade.
https://www.computer.org/web/tkde
Add a comment...

Post has attachment
The August 2018 Spotlight on Transactions column from Computer features “The Rise of Hardware Security in Computer Architectures,” written by Patrick Schaumont and Paolo Montuschi, which highlights research on secure computer architectures recently published in the IEEE Transactions on Computers. Read more…
https://www.computer.org/csdl/mags/co/2018/08/mco2018080004-abs.html
Photo
Add a comment...

Post has attachment
Striking like a 'Bolt' Out of the Blue: A New Attack System Tests Security in Multi-Tenant Cloud Infrastructures
As more and more businesses adopt Software-as-a-Service, they face a choice between multi- or single-tenant cloud platforms. Single-tenancy comes with greater security and more control over design and management. However, multi-tenancy is a different story. Its higher security vulnerabilities are why Christina Delimitrou of Cornell University and Christos Kozyrakis of Stanford University, created a cloud attack system called “Bolt” to test those vulnerabilities and give developers ways to improve the design of future cloud systems.
Add a comment...

Post has attachment
Artificial Intelligence and Consent: Navigating the Ethics of Automation and Consumer Choice
Modern technology advances so quickly, it runs headlong into ethical dilemmas such as consent without the means to adjudicate them in a timely manner. When it comes to our online activity, artificial intelligence systems that collect, process, and generate our personal data intensify many ongoing problems with consent, such as giving us adequate notice, choice, and options to withdraw from sharing data.
https://publications.computer.org/security-and-privacy/2018/09/19/ai-and-the-ethics-of-automating-consent/
Add a comment...

Post has attachment
The IEEE Computer Society is seeking nominees for the IEEE Division VIII Delegate-Director-elect position. Division Delegate Directors represent the membership of his/her Division/Delegate in the IEEE Assembly as a voting delegate.
In addition, Division Delegate Director will be a voting member of the Technical Activities Board, and are encouraged to actively participate on TAB and its standing committees.
The IEEE Division Director also serves as a member of the IEEE Board of Directors, the governing body of IEEE. The IEEE Division VIII Delegate-Director serves a year as director-elect (2020) and two years as director (2021-2022).
Apply and learn more: https://www.computer.org/web/pressroom/nominees-sought-ieee-div-viii-director-elect
Photo
Add a comment...

Post has attachment
Hacking Power Grids: A Current Problem
Cyberattacks against power grids and other critical infrastructures are increasing in frequency and severity. Government and industry stakeholders must take more active steps to address the problem before a major catastrophe occurs.
https://www.computer.org/cms/Computer.org/computing-edge/ce8ksh.pdf?lf1=7201699948b580056052142a67922455
Photo
Add a comment...

Post has attachment
Operating in the new Information Environment: An Army Vision of Social Sensing? Social Computing technologies that harvest and analyze forensic social and digital media will boost agility of Command and Control (C2) through deep understanding of adversary perspectives, intent, and actions. The pooling of social science theory, aggregated data on social phenomena, and computational social science are enabled by the nature of human behavior in the new Information Environment (IE).
https://www.computer.org/csdl/proceedings/socialsens/2018/6165/00/616501a001.pdf
Photo
Add a comment...

Post has attachment
Therapy Robot Teaches Social Skills to Children With Autism
The QTrobot from LuxAI was designed to help children with autism learn to interact with humans.
https://spectrum.ieee.org/the-human-os/biomedical/devices/robot-therapy-for-autism
Add a comment...
Wait while more posts are being loaded