Computer最新文献

筛选
英文 中文
IEEE Computer Society Call for Special Issue Proposal IEEE 计算机学会征集特刊提案
IF 2.2 4区 计算机科学
Computer Pub Date : 2024-08-30 DOI: 10.1109/mc.2024.3437462
{"title":"IEEE Computer Society Call for Special Issue Proposal","authors":"","doi":"10.1109/mc.2024.3437462","DOIUrl":"https://doi.org/10.1109/mc.2024.3437462","url":null,"abstract":"","PeriodicalId":10623,"journal":{"name":"Computer","volume":"39 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Computer Society Information 电气和电子工程师学会计算机协会信息
IF 2.2 4区 计算机科学
Computer Pub Date : 2024-08-30 DOI: 10.1109/mc.2024.3427221
{"title":"IEEE Computer Society Information","authors":"","doi":"10.1109/mc.2024.3427221","DOIUrl":"https://doi.org/10.1109/mc.2024.3427221","url":null,"abstract":"","PeriodicalId":10623,"journal":{"name":"Computer","volume":"82 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Certifying and Regulating AI/ML-Centric Applications 认证和监管以人工智能/移动语言为中心的应用程序
IF 2.2 4区 计算机科学
Computer Pub Date : 2024-08-30 DOI: 10.1109/mc.2024.3427213
W. Eric Wong
{"title":"Certifying and Regulating AI/ML-Centric Applications","authors":"W. Eric Wong","doi":"10.1109/mc.2024.3427213","DOIUrl":"https://doi.org/10.1109/mc.2024.3427213","url":null,"abstract":"AI and ML have been applied ubiquitously to our everyday lives. The impact has also become overwhelming. How to certify and regulate these applications to avoid unintentional or on-purpose harm is an essential topic that must be addressed.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"2012 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Security and Privacy Subscription IEEE 安全与隐私订阅
IF 2.2 4区 计算机科学
Computer Pub Date : 2024-08-30 DOI: 10.1109/mc.2024.3437090
{"title":"IEEE Security and Privacy Subscription","authors":"","doi":"10.1109/mc.2024.3437090","DOIUrl":"https://doi.org/10.1109/mc.2024.3437090","url":null,"abstract":"","PeriodicalId":10623,"journal":{"name":"Computer","volume":"5 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward Trustworthy Artificial Intelligence: An Integrated Framework Approach Mitigating Threats 实现值得信赖的人工智能:减轻威胁的综合框架方法
IF 2.2 4区 计算机科学
Computer Pub Date : 2024-08-30 DOI: 10.1109/mc.2024.3400532
Kíng-Pîng Tēnn, Yu-Wei Chang, Hong-Yen Chen, Teng-Kai Fan, Tsungnan Lin
{"title":"Toward Trustworthy Artificial Intelligence: An Integrated Framework Approach Mitigating Threats","authors":"Kíng-Pîng Tēnn, Yu-Wei Chang, Hong-Yen Chen, Teng-Kai Fan, Tsungnan Lin","doi":"10.1109/mc.2024.3400532","DOIUrl":"https://doi.org/10.1109/mc.2024.3400532","url":null,"abstract":"We present the Strategic Artificial Intelligence (AI) Threats Navigation matrix, an integrated approach to navigating AI threats and trustworthiness throughout the AI lifecycle. It aims to assist developers, data scientists, regulators, and users in addressing threats and bolstering AI’s reliability, encouraging an improvement of trustworthiness.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"27 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EDHOC Is a New Security Handshake Standard: An Overview of Security Analysis EDHOC 是一种新的安全握手标准:安全分析概述
IF 2.2 4区 计算机科学
Computer Pub Date : 2024-08-30 DOI: 10.1109/mc.2024.3415908
Elsa López Pérez, Göran Selander, John Preuß Mattsson, Thomas Watteyne, Mališa Vučinić
{"title":"EDHOC Is a New Security Handshake Standard: An Overview of Security Analysis","authors":"Elsa López Pérez, Göran Selander, John Preuß Mattsson, Thomas Watteyne, Mališa Vučinić","doi":"10.1109/mc.2024.3415908","DOIUrl":"https://doi.org/10.1109/mc.2024.3415908","url":null,"abstract":"We wrap up the call for formal analysis of the new security handshake protocol EDHOC by providing an overview of the protocol, a summary of the formal security analyses, and a discussion on open venues for future work.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"82 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Transaction on Privacy 电气和电子工程师学会隐私问题论文集
IF 2.2 4区 计算机科学
Computer Pub Date : 2024-08-30 DOI: 10.1109/mc.2024.3437089
{"title":"IEEE Transaction on Privacy","authors":"","doi":"10.1109/mc.2024.3437089","DOIUrl":"https://doi.org/10.1109/mc.2024.3437089","url":null,"abstract":"","PeriodicalId":10623,"journal":{"name":"Computer","volume":"28 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Roadmap Outlines Development of Mass Digital Storage Technology IEEE 路线图概述了大容量数字存储技术的发展情况
IF 2.2 4区 计算机科学
Computer Pub Date : 2024-08-30 DOI: 10.1109/mc.2024.3416230
Tom Coughlin, Roger Hoyt
{"title":"IEEE Roadmap Outlines Development of Mass Digital Storage Technology","authors":"Tom Coughlin, Roger Hoyt","doi":"10.1109/mc.2024.3416230","DOIUrl":"https://doi.org/10.1109/mc.2024.3416230","url":null,"abstract":"The new IEEE International Roadmap for Devices and Systems Mass Data Storage report outlines the current technology and expected advances and applications in digital storage and nonvolatile memory technology for the future.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"12 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Computing Edge IEEE 边缘计算
IF 2.2 4区 计算机科学
Computer Pub Date : 2024-08-30 DOI: 10.1109/mc.2024.3437111
{"title":"IEEE Computing Edge","authors":"","doi":"10.1109/mc.2024.3437111","DOIUrl":"https://doi.org/10.1109/mc.2024.3437111","url":null,"abstract":"","PeriodicalId":10623,"journal":{"name":"Computer","volume":"22 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combinatorial Fusion Analysis 组合融合分析
IF 2.2 4区 计算机科学
Computer Pub Date : 2024-08-30 DOI: 10.1109/mc.2024.3406058
D. Frank Hsu, Bruce S. Kristal, Christina Schweikert
{"title":"Combinatorial Fusion Analysis","authors":"D. Frank Hsu, Bruce S. Kristal, Christina Schweikert","doi":"10.1109/mc.2024.3406058","DOIUrl":"https://doi.org/10.1109/mc.2024.3406058","url":null,"abstract":"Combinatorial fusion analysis is a paradigm that seeks to provide methods and workflows for combining multiple scoring systems in computational learning and modeling, informatics, and intelligent systems.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"12 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信