Computer最新文献

筛选
英文 中文
IEEE Computer Society Social Newworking 电气和电子工程师学会计算机协会社交网络工作
IF 2.2 4区 计算机科学
Computer Pub Date : 2024-08-30 DOI: 10.1109/mc.2024.3440038
{"title":"IEEE Computer Society Social Newworking","authors":"","doi":"10.1109/mc.2024.3440038","DOIUrl":"https://doi.org/10.1109/mc.2024.3440038","url":null,"abstract":"","PeriodicalId":10623,"journal":{"name":"Computer","volume":"157 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Certifiability Analysis of Machine Learning Systems for Low-Risk Automotive Applications 低风险汽车应用中机器学习系统的可认证性分析
IF 2.2 4区 计算机科学
Computer Pub Date : 2024-08-30 DOI: 10.1109/mc.2024.3401402
Vinod Vasudevan, Amr Abdullatif, Sohag Kabir, Felician Campean
{"title":"Certifiability Analysis of Machine Learning Systems for Low-Risk Automotive Applications","authors":"Vinod Vasudevan, Amr Abdullatif, Sohag Kabir, Felician Campean","doi":"10.1109/mc.2024.3401402","DOIUrl":"https://doi.org/10.1109/mc.2024.3401402","url":null,"abstract":"We analyze the existing safety standard, ISO 26262, for automotive applications, determining the certifiability of machine learning (ML) approaches used in low-risk automotive applications. This can help assuring the security and safety of ML-based autonomous driving systems, gaining the trust of regulators, certification agencies, and stakeholders.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"89 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generative Artificial Intelligence and Problematic Student E-Mails 生成式人工智能与问题学生电子邮件
IF 2.2 4区 计算机科学
Computer Pub Date : 2024-08-30 DOI: 10.1109/mc.2024.3422548
Sorel Reisman
{"title":"Generative Artificial Intelligence and Problematic Student E-Mails","authors":"Sorel Reisman","doi":"10.1109/mc.2024.3422548","DOIUrl":"https://doi.org/10.1109/mc.2024.3422548","url":null,"abstract":"Students often challenge their instructors via e-mail. This, in turn, requires instructors to respond with tact. Can generative artificial intelligence be harnessed to compose tactful replies to the toughest student criticism?","PeriodicalId":10623,"journal":{"name":"Computer","volume":"37 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Career Center IEEE 职业中心
IF 2.2 4区 计算机科学
Computer Pub Date : 2024-08-30 DOI: 10.1109/mc.2024.3437110
{"title":"IEEE Career Center","authors":"","doi":"10.1109/mc.2024.3437110","DOIUrl":"https://doi.org/10.1109/mc.2024.3437110","url":null,"abstract":"","PeriodicalId":10623,"journal":{"name":"Computer","volume":"12 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Volunteer Service Awards IEEE 志愿者服务奖
IF 2.2 4区 计算机科学
Computer Pub Date : 2024-08-30 DOI: 10.1109/mc.2024.3437091
{"title":"IEEE Volunteer Service Awards","authors":"","doi":"10.1109/mc.2024.3437091","DOIUrl":"https://doi.org/10.1109/mc.2024.3437091","url":null,"abstract":"","PeriodicalId":10623,"journal":{"name":"Computer","volume":"62 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Computer Society Benefits 电气和电子工程师学会计算机协会福利
IF 2.2 4区 计算机科学
Computer Pub Date : 2024-08-30 DOI: 10.1109/mc.2024.3437109
{"title":"IEEE Computer Society Benefits","authors":"","doi":"10.1109/mc.2024.3437109","DOIUrl":"https://doi.org/10.1109/mc.2024.3437109","url":null,"abstract":"","PeriodicalId":10623,"journal":{"name":"Computer","volume":"37 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computing Through Time: Playing Chess 穿越时空的计算下棋
IF 2.2 4区 计算机科学
Computer Pub Date : 2024-08-30 DOI: 10.1109/mc.2024.3423888
Ergun Akleman
{"title":"Computing Through Time: Playing Chess","authors":"Ergun Akleman","doi":"10.1109/mc.2024.3423888","DOIUrl":"https://doi.org/10.1109/mc.2024.3423888","url":null,"abstract":"","PeriodicalId":10623,"journal":{"name":"Computer","volume":"53 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Certifying Generative AI: Retrieval-Augmented Generation Chatbots in High-Stakes Environments 认证生成式人工智能:高风险环境中的检索增强型生成聊天机器人
IF 2.2 4区 计算机科学
Computer Pub Date : 2024-08-30 DOI: 10.1109/mc.2024.3401085
Richard Shan
{"title":"Certifying Generative AI: Retrieval-Augmented Generation Chatbots in High-Stakes Environments","authors":"Richard Shan","doi":"10.1109/mc.2024.3401085","DOIUrl":"https://doi.org/10.1109/mc.2024.3401085","url":null,"abstract":"This article emphasizes the urgent need for certifying RAG GenAI chatbots in mission-critical systems, focused on data integrity and model reliability, with a comprehensive framework of technical, ethical, and operational assessments, which demonstrate its necessity through real-world implementations, advocating for continuous innovation and adaptable regulations.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"25 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adapting to Generative Artificial Intelligence: Approaches in Higher Education Institutions 适应生成式人工智能:高等教育机构的方法
IF 2.2 4区 计算机科学
Computer Pub Date : 2024-08-30 DOI: 10.1109/mc.2024.3422589
Nir Kshetri, Jeffrey Voas
{"title":"Adapting to Generative Artificial Intelligence: Approaches in Higher Education Institutions","authors":"Nir Kshetri, Jeffrey Voas","doi":"10.1109/mc.2024.3422589","DOIUrl":"https://doi.org/10.1109/mc.2024.3422589","url":null,"abstract":"Generative artificial intelligence (GAI) is reshaping higher education institutions (HEIs). HEIs are responding with policies, leveraging GAI to optimize operations, update curricula, and develop multidisciplinary programs, showcasing a proactive approach to transformative educational practices.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"12 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyberconflict: The New Frontier of Global Warfare and Social Influence 网络冲突:全球战争和社会影响的新领域
IF 2.2 4区 计算机科学
Computer Pub Date : 2024-08-30 DOI: 10.1109/mc.2024.3422729
Theodoros Komninos, Dimitrios Serpanos
{"title":"Cyberconflict: The New Frontier of Global Warfare and Social Influence","authors":"Theodoros Komninos, Dimitrios Serpanos","doi":"10.1109/mc.2024.3422729","DOIUrl":"https://doi.org/10.1109/mc.2024.3422729","url":null,"abstract":"Enabled by global connectivity and digitization, cyberwarfare targets critical infrastructures, collects information through espionage, and exploits social media. The cyberincidents of the Israel–Hamas conflict in Gaza demonstrate the changing landscape of cyberoperations.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"27 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信