ComputerPub Date : 2024-08-30DOI: 10.1109/mc.2024.3437462
{"title":"IEEE Computer Society Call for Special Issue Proposal","authors":"","doi":"10.1109/mc.2024.3437462","DOIUrl":"https://doi.org/10.1109/mc.2024.3437462","url":null,"abstract":"","PeriodicalId":10623,"journal":{"name":"Computer","volume":"39 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ComputerPub Date : 2024-08-30DOI: 10.1109/mc.2024.3427213
W. Eric Wong
{"title":"Certifying and Regulating AI/ML-Centric Applications","authors":"W. Eric Wong","doi":"10.1109/mc.2024.3427213","DOIUrl":"https://doi.org/10.1109/mc.2024.3427213","url":null,"abstract":"AI and ML have been applied ubiquitously to our everyday lives. The impact has also become overwhelming. How to certify and regulate these applications to avoid unintentional or on-purpose harm is an essential topic that must be addressed.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"2012 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ComputerPub Date : 2024-08-30DOI: 10.1109/mc.2024.3400532
Kíng-Pîng Tēnn, Yu-Wei Chang, Hong-Yen Chen, Teng-Kai Fan, Tsungnan Lin
{"title":"Toward Trustworthy Artificial Intelligence: An Integrated Framework Approach Mitigating Threats","authors":"Kíng-Pîng Tēnn, Yu-Wei Chang, Hong-Yen Chen, Teng-Kai Fan, Tsungnan Lin","doi":"10.1109/mc.2024.3400532","DOIUrl":"https://doi.org/10.1109/mc.2024.3400532","url":null,"abstract":"We present the Strategic Artificial Intelligence (AI) Threats Navigation matrix, an integrated approach to navigating AI threats and trustworthiness throughout the AI lifecycle. It aims to assist developers, data scientists, regulators, and users in addressing threats and bolstering AI’s reliability, encouraging an improvement of trustworthiness.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"27 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ComputerPub Date : 2024-08-30DOI: 10.1109/mc.2024.3415908
Elsa López Pérez, Göran Selander, John Preuß Mattsson, Thomas Watteyne, Mališa Vučinić
{"title":"EDHOC Is a New Security Handshake Standard: An Overview of Security Analysis","authors":"Elsa López Pérez, Göran Selander, John Preuß Mattsson, Thomas Watteyne, Mališa Vučinić","doi":"10.1109/mc.2024.3415908","DOIUrl":"https://doi.org/10.1109/mc.2024.3415908","url":null,"abstract":"We wrap up the call for formal analysis of the new security handshake protocol EDHOC by providing an overview of the protocol, a summary of the formal security analyses, and a discussion on open venues for future work.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"82 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ComputerPub Date : 2024-08-30DOI: 10.1109/mc.2024.3416230
Tom Coughlin, Roger Hoyt
{"title":"IEEE Roadmap Outlines Development of Mass Digital Storage Technology","authors":"Tom Coughlin, Roger Hoyt","doi":"10.1109/mc.2024.3416230","DOIUrl":"https://doi.org/10.1109/mc.2024.3416230","url":null,"abstract":"The new IEEE International Roadmap for Devices and Systems Mass Data Storage report outlines the current technology and expected advances and applications in digital storage and nonvolatile memory technology for the future.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"12 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ComputerPub Date : 2024-08-30DOI: 10.1109/mc.2024.3406058
D. Frank Hsu, Bruce S. Kristal, Christina Schweikert
{"title":"Combinatorial Fusion Analysis","authors":"D. Frank Hsu, Bruce S. Kristal, Christina Schweikert","doi":"10.1109/mc.2024.3406058","DOIUrl":"https://doi.org/10.1109/mc.2024.3406058","url":null,"abstract":"Combinatorial fusion analysis is a paradigm that seeks to provide methods and workflows for combining multiple scoring systems in computational learning and modeling, informatics, and intelligent systems.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"12 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}