Cyber-physical systems are no longer a sideline for computing—they are a core concern for computer scientists and engineers.
Read article (subscriber login)... Read More »
This installment of Computer’s series highlighting the work published in IEEE Computer Society journals comes from IEEE Transactions on Visualization and Comput... Read More »
Internet-connected toys provide an often-overlooked avenue for breaching personal data, especially of those most vulnerable. Government and private measures can... Read More »
Partisan consultancies like Cambridge Analytica that use data analytics to sway the electorate rely on social network users’ participation in their own psycholo... Read More »
More disgruntled customers are filing lawsuits against vendors when their IT projects go bad, typically alleging the vendors didn’t live up to their promises. C... Read More »
Mobile and embedded devices increasingly rely on deep neural networks to understand the world—a feat that would have overwhelmed their system resources only a f... Read More »
In this first installment of Computer’s new column, the author gives an overview of the net neutrality policy and the FCC’s recent rulings that threaten it.
... Read More »
This installment of Computer’s series highlighting the work published in IEEE Computer Society journals comes from IEEE Transactions on Computers.
Read artic... Read More »
Instead of liberating us from the biases of the educated among us, the Internet has saddled us with the biases of the unreasoned among us.
Read article... Read More »
The IEEE Computer Society provides core standards for the benefit of industry including for networking, integrated circuit design and test, cloud computing and ... Read More »