The articles in IEEE Internet Computing are the result of hard work by many people. We deeply appreciate the efforts of everyone who reviewed the many articles ... Read More »
Mining social media messages—tweets, blogs, and Facebook posts—for health and drug-related information is of significant interest in what is called "pharmacovig... Read More »
Biometrics systems that use facial recognition, iris scans, voice recognition, and fingerprints are used all the time by banks, law enforcement, and employers.
... Read More »
Supervisory Control and Data Acquisition (SCADA) systems allow operators to control critical infrastructure. Vendors are increasingly integrating Internet techn... Read More »
Human traffickers don't play by the rules. They use elaborate encryption and often post sex ads only once—changing phone numbers, names, and locations constantl... Read More »
Here’s a riddle for you: How many robots does it take to patrol an area, covering a certain point every few seconds, on some of the biggest missions possible—su... Read More »
As the elderly population grows, the need to alleviate the workload of an already strained elder care labor force grows too.
In addition to medical care, eld... Read More »
Maintaining a good estimation of the other robots’ positions is crucial in soccer robotics, as in most multirobot systems applications, according to Pablo Cano ... Read More »
In the article “Design and Prototyping a Smart Deep Brain Stimulator: An Autonomous Neuro-Sensing and Stimulating Electrode System,” which appears in the Septem... Read More »
We've all seen them—fake reviews littering the Amazon pages of many popular products. They laud the features of these items, dropping text slang like "OMG!" fol... Read More »