ComputerPub Date : 2024-06-27DOI: 10.1109/mc.2024.3367590
Arijit Karati, Sajal K. Das
{"title":"Effective Data Sharing in an Edge–Cloud Model: Security Challenges and Solutions","authors":"Arijit Karati, Sajal K. Das","doi":"10.1109/mc.2024.3367590","DOIUrl":"https://doi.org/10.1109/mc.2024.3367590","url":null,"abstract":"The proposed protocol offers privacy-preserving authentication across several cloud platforms, flexible key management for consumer data protection, and effective user revocation. Performance evaluation demonstrates that the proposed framework supports low latency, safe unified remote access, and data privacy in the contemporary edge-enabled environment.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"27 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141527996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ComputerPub Date : 2024-06-27DOI: 10.1109/mc.2024.3408592
{"title":"IEEE Career Center","authors":"","doi":"10.1109/mc.2024.3408592","DOIUrl":"https://doi.org/10.1109/mc.2024.3408592","url":null,"abstract":"","PeriodicalId":10623,"journal":{"name":"Computer","volume":"25 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141527998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ComputerPub Date : 2024-06-27DOI: 10.1109/mc.2024.3408549
{"title":"IEEE IT Professionals Call for Articles","authors":"","doi":"10.1109/mc.2024.3408549","DOIUrl":"https://doi.org/10.1109/mc.2024.3408549","url":null,"abstract":"","PeriodicalId":10623,"journal":{"name":"Computer","volume":"60 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141527999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ComputerPub Date : 2024-06-27DOI: 10.1109/mc.2024.3356820
Moshe Sipper, Raz Lapid
{"title":"What’s in an AI’s Mind’s Eye? We Must Know","authors":"Moshe Sipper, Raz Lapid","doi":"10.1109/mc.2024.3356820","DOIUrl":"https://doi.org/10.1109/mc.2024.3356820","url":null,"abstract":"We discuss explainability and understandability in artificial intelligence (AI) and offer an experiment and a discussion of responses, challenges, and obstacles. The pursuit of AI explainability and understandability is crucial and ignored at our peril.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"144 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141528003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ComputerPub Date : 2024-06-27DOI: 10.1109/mc.2024.3390759
Zheng Zheng, Daixu Ren, Huai Liu, Tsong Yueh Chen
{"title":"Metamorphic Fault Tolerance: Addressing the Oracle Problem of Reliability Assurance for Contemporary Software Systems","authors":"Zheng Zheng, Daixu Ren, Huai Liu, Tsong Yueh Chen","doi":"10.1109/mc.2024.3390759","DOIUrl":"https://doi.org/10.1109/mc.2024.3390759","url":null,"abstract":"We present the first comprehensive framework for implementing metamorphic fault tolerance. A key innovation in this framework is the application of risk formulas to evaluate the likelihood of inputs producing trustworthy outputs. Experiments demonstrate its effectiveness, especially without the need of test oracles.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"45 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141527992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ComputerPub Date : 2024-06-27DOI: 10.1109/mc.2024.3408522
{"title":"IEEE Computer Society Call for Papers","authors":"","doi":"10.1109/mc.2024.3408522","DOIUrl":"https://doi.org/10.1109/mc.2024.3408522","url":null,"abstract":"","PeriodicalId":10623,"journal":{"name":"Computer","volume":"60 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141528008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ComputerPub Date : 2024-06-27DOI: 10.1109/mc.2024.3395110
Hal Berghe
{"title":"A Collapsing Academy V: Internal and External Threat Vectors Facing Higher Education","authors":"Hal Berghe","doi":"10.1109/mc.2024.3395110","DOIUrl":"https://doi.org/10.1109/mc.2024.3395110","url":null,"abstract":"We discuss a few of today’s most pressing internal and external threats to higher education.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"46 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141528014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}