


default search action
IEEE Computer, Volume 58
Volume 58, Number 1, January 2025
- Hironori Washizaki
:
Leadership and Engagement: IEEE Computer Society 2025 Key Strategies. 4-8 - Erich J. Neuhold
:
50 & 25 Years Ago. 12-15 - Ergun Akleman
:
Computing Through Time: Augmented AI. 14 - Jeffrey M. Voas
, Keith W. Miller
:
Social Unrest, Political Violence, and War. 16-19 - Jeffrey M. Voas
:
Outlook 2025. 20-22 - Saurabh Sinha
, Johannes Wynand Lambrechts
, Abadahigwa Bimana
, Aili Ashipala
:
Augmented Artificial Intelligence in 5G, 6G, and Beyond: A Quantum Leap. 24-32 - Keith M. Davis III
, Tuukka Ruotsalo
:
Physiological Data: Challenges for Privacy and Ethics. 33-44 - Youyang Qu
, Ming Ding
, Nan Sun
, Kanchana Thilakarathna
, Tianqing Zhu
, Dusit Niyato
:
The Frontier of Data Erasure: A Survey on Machine Unlearning for Large Language Models. 45-57 - Lu Wang
, K. L. Eddie Law
:
Model to Learn Like Humans. 58-65 - Sonsoles López-Pernas
, Mohammed Saqr
, Miguel Á. Conde
, Mikko Apiola
, Matti Tedre
:
Mapping Computer Engineering Education Research: A Topic Analysis. 66-75 - Vignesh Adhinarayanan
, Wu-chun Feng:
Looking Back to Look Forward: 15 Years of the Green500. 76-86 - Dejan S. Milojicic
:
Technology Predictions 2025. 88-90 - H. B. Duran
:
Plug (In) and Play: The State of BCI Gaming in 2025: Why This 25-Year-Old Technology Is Finally Getting the Attention it Deserves. 91-96 - Alberto Blanco-Justicia
, Josep Domingo-Ferrer
, Najeeb Moharram Jebreel
, Benet Manzanares-Salor
, David Sánchez
:
Unlearning in Large Language Models: We Are Not There Yet. 97-100 - Dylan Porter, Joanna F. DeFranco
, Phil Laplante
:
Requirements Specification Automated Quality Analysis: Past, Present, and Future. 101-104 - Srinivas Devadas
, Daniel Sánchez
:
Toward a Universal Cryptographic Accelerator. 105-108 - Khizer Khaderi
, Michael Zyda
:
How to Hire a Gen Z Through Gaming. 109-116 - Domenico Talia
:
Are Robots and Intelligent Systems Changing Our Mind? 117-120 - Brian A. Weiss
, Donald H. Costello
, Matt Scassero
:
Test and Evaluation of Autonomous Systems: Developing the Educational Landscape. 121-125 - Abram H. Clark
, Ishan Srivastava
:
Modeling Flow-Arrest Transitions in Granular Media. 126-133 - Nir Kshetri
:
Economics of Open Source Software and AI Models. 134-141 - Mikko T. Siponen
:
Evidence-Based Cybersecurity Management: How to Use Sanctions Effectively and Avoid Pitfalls. 142-145 - Hal Berghel
:
A Story Arc From TRON to Sora: An Interview With Judson Rosebush - Part 1. 146-150 - Cullen E. Bash
, John McDonald
, Dejan S. Milojicic
, Juliane Mueller, Tom Wilson, Ying Zhang
:
Convergence of Energy and IT Sectors. 151-158
Volume 58, Number 2, February 2025
- Erich J. Neuhold
:
50 & 25 Years Ago. 7-11 - Ergun Akleman
:
Computing Through Time: Intelligence Assistance. 8 - Joanna F. DeFranco
, Jeffrey M. Voas
:
Global E-Waste Exposed. 12-15 - Jeffrey M. Voas
:
In This Issue. 13 - Kjell Jørgen Hole
:
Intelligent Assistants Strengthening Personhood. 16-24 - Basem Al-Madani, Shihab Hasan
, Amer Abualhassan
, Farouq Aliyu
:
Integrating Data Distribution Service (DDS) in Smart Traffic Systems: A Comprehensive Review. 25-34 - JoAnn M. Paul
, Isaac Bettendorf
:
Paradox, Conflict, and Structural Intelligence. 35-41 - Maciej Rys
, Anna Maria Górska:
Breaking Barriers: Increasing Female Participation in Hackathons. 42-51 - Waad Albayyali
, Aymen Belghith
:
Strengthening Active Directory Security: Detecting and Mitigating Kerberoasting Attacks. 52-62 - Nir Kshetri
:
Building Trust in AI: How Blockchain Enhances Data Integrity, Security, and Privacy. 63-70 - Mladan Jovanovic
, Mark Campbell
:
Self-Directing AI: The Road to Fully Autonomous AI Agents. 71-77 - Nancy R. Mead
, Carol Woody
, Scott A. Hissam:
Open Source Software: The Ultimate in Reuse or a Risk Not Worth Taking? 78-83 - Michael Freeman
, Amy R. Pritchett
:
Uncrewed Aerial Systems Integration in Coast Guard Search and Rescue Operations. 84-89 - Jyotika Athavale
:
Standards in Review: Key Developments With IEEE Computer Society Standards in 2024. 90-92 - Yanyi Wu
:
The University as an AI Ombudsman - Part 1. 93-97 - Christopher C. Price
, Ichiro Takeuchi, James M. Rondinelli
, Wei Chen
, Christopher L. Hinkle
:
AI-Accelerated Electronic Materials Discovery and Development. 98-104 - Abdul Majeed
, Seong Oun Hwang
:
Synthetic Data: A New Frontier for Democratizing Artificial Intelligence and Data Access. 106-114 - Vijay Janapa Reddi
, Amir Yazdanbakhsh
:
Architecture 2.0: Foundations of Artificial Intelligence Agents for Modern Computer System Design. 116-124
Volume 58, Number 3, March 2025
- Erich J. Neuhold
:
50 & 25 Years Ago. 7-11 - Ergun Akleman
:
Computing Through Time: Metaverse. 8 - Ergun Akleman
:
Computing Through Time: Low Code/No Code. 10 - Keith W. Miller
, Jeffrey M. Voas
:
Data Feudalism and e-Personhood - Are We Becoming Digital Serfs? 12-15 - Jeffrey M. Voas
:
Pros and Cons. 16-21 - George F. Hurlburt
, George K. Thiruvathukal
, Nir Kshetri
, Norita B. Ahmad
:
Low Code/No Code Meets the Metaverse. 22-28 - Bilal Naqvi
, Damian Kedziora
, Lanqi Zhang, Shola Oyedeji
:
Quality of Low-Code/No-Code Development Platforms Through the Lens of ISO 25010:2023. 30-40 - Perla M. Viera-González, Osvaldo Habib González-González, Guillermo Ezequiel Sánchez-Guerrero
:
Low-Code Automation for Resolving Incidents During Class Schedule Registration. 41-48 - Chen Zhong
, John Oruongo
, J. B. (Joo Baek) Kim
:
LLM-Powered Low-Code/No-Code Data Analytics in Education and Workforce Development. 49-59 - Yosra Magdi Mekki, Leslie V. Simon, William D. Freeman
, Junaid Qadir
:
Medical Education Metaverses (MedEd Metaverses): Opportunities, Use Case, and Guidelines. 60-70 - Zhe Wei
, Sen Wang, Fang Wang, Lingqiao Shui:
Metaverse for Sustainable Smart Civil Aviation: Technologies, Applications, and Challenges. 71-81 - Hal Berghel
:
A Story Arc From Tron to Sora: An Interview With Judson Rosebush - Part II. 82-86 - Phil Laplante
:
Reasoning About Disinformation. 87-91 - Michael Zyda
:
Do You Think You Own Stock in the Power Company??? 92-95 - Javier Conde
, Gonzalo Martínez, Pedro Reviriego
, Zhen Gao
, Shanshan Liu
, Fabrizio Lombardi
:
Can ChatGPT Learn to Count Letters? 96-99 - Mohamad Kassab
, João Paulo Fernandes:
The Forgotten Potential: Why Aspect-Oriented Programming Faded Away. 100-104 - Mauro Tortonesi
:
The Compute Continuum: Trends and Challenges. 105-108 - Yanyi Wu
:
The University as an AI Ombudsman - Part II. 109-114 - Jonmichael Hands
, Tom Coughlin
:
Advancing Data Security and Sustainability: Establishing a Circular Economy for Storage. 115-118 - Andreas Grünert, James Bret Michael
, Rolf Oppliger
, Ruedi Rytz:
On the Measurability and Testability of IT Security. 120-126

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.