The articles in Computer are the result of hard work by many people. We deeply appreciate the efforts of everyone who reviewed the many articles submitted to th... Read More »
The discovery that Facebook gave unauthorized access to personally identifiable information (PII) of more than 87 million unsuspecting users to Cambridge Analyt... Read More »
Smartphones are revolutionizing the way people perceive and interact with both physical and cyber worlds. Mobile coaching (m-coaching) is expected to become a c... Read More »
The Japanese Cabinet’s “Society 5.0” initiative seeks to create a sustainable society for human security and well-being through a cyber-physical system. Keidanr... Read More »
Will our smart devices betray us? Can we trust our smart beds, pet feeders, and watches to maintain the level of privacy we want and expect? As the numbers of d... Read More »
No, not that kind of soda. In “Keep the Stress Away with SoDA: Stress Detection and Alleviation System" (IEEE Trans. Multi-Scale Computing Systems, vol. 3, no.... Read More »
Most security vulnerabilities result from ordinary coding errors. What does this mean for the prospects of more secure software?
Read article ... Read More »
Three programming team members from the University of Central Florida traveled across the world to compete in the ACM International Collegiate Programming Conte... Read More »
Newtonian indebtedness usually goes to Isaac. However, there’s another Newton to whom we owe a great deal: Newton Minow—a pioneer in the field of media crap det... Read More »
As mobile devices take over the world, researchers now study how to build deep learning networks that can keep up.
One collaboration between academia and ind... Read More »