IT Professional最新文献

筛选
英文 中文
Over the Rainbow: 21st Century Security & Privacy Podcast 彩虹之上:21世纪的安全隐私的播客
4区 计算机科学
IT Professional Pub Date : 2023-09-01 DOI: 10.1109/mitp.2023.3323608
{"title":"Over the Rainbow: 21st Century Security & Privacy Podcast","authors":"","doi":"10.1109/mitp.2023.3323608","DOIUrl":"https://doi.org/10.1109/mitp.2023.3323608","url":null,"abstract":"","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135738277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Biometrics for Hardware Security and Trust: Discussion and Analysis 生物识别技术在硬件安全与信任中的应用:讨论与分析
IF 2.6 4区 计算机科学
IT Professional Pub Date : 2023-07-01 DOI: 10.1109/MITP.2023.3277594
A. Sengupta, Mahendra Rathor, Rahul Chaurasia
{"title":"Biometrics for Hardware Security and Trust: Discussion and Analysis","authors":"A. Sengupta, Mahendra Rathor, Rahul Chaurasia","doi":"10.1109/MITP.2023.3277594","DOIUrl":"https://doi.org/10.1109/MITP.2023.3277594","url":null,"abstract":"Ensuring hardware security and trust is not only important for securing the designer’s/owner’s revenue but also for his/her reputation and trust in the electronics market. Biometrics-based authentication is an emerging approach to ensure security and trust in hardware, as it offers a unique identification of the true hardware designer/owner. This article provides a novel discussion and analysis of recently employed biometric techniques—intellectual property (IP) fingerprint, facial, and palmprint—for hardware IP security. More explicitly, this article discusses the potential hardware security threats, followed by a discussion of existing techniques for security. Furthermore, the article also provides a design flow for the IP core fingerprint biometrics, IP facial biometrics, and IP palmprint biometrics along with their corresponding detection flows. Finally, the article provides an analysis of the hardware security strength achieved through different biometric techniques in terms of probability of coincidence.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"5 1","pages":"36-44"},"PeriodicalIF":2.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90509905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Drive Diversity & Inclusion in Computing 推动计算机行业的多样性和包容性
IF 2.6 4区 计算机科学
IT Professional Pub Date : 2023-07-01 DOI: 10.1109/mitp.2023.3301266
{"title":"Drive Diversity & Inclusion in Computing","authors":"","doi":"10.1109/mitp.2023.3301266","DOIUrl":"https://doi.org/10.1109/mitp.2023.3301266","url":null,"abstract":"","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"35 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84486004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Blockchain-Based e-Government Service for Quantity Surveyors 基于区块链的工料测量师电子政务服务
IF 2.6 4区 计算机科学
IT Professional Pub Date : 2023-07-01 DOI: 10.1109/MITP.2023.3268567
Ángel F. Alcaide, Carlos Núñez-Gómez, F. Delicado, C. Carrión, María Blanca Caminero
{"title":"A Blockchain-Based e-Government Service for Quantity Surveyors","authors":"Ángel F. Alcaide, Carlos Núñez-Gómez, F. Delicado, C. Carrión, María Blanca Caminero","doi":"10.1109/MITP.2023.3268567","DOIUrl":"https://doi.org/10.1109/MITP.2023.3268567","url":null,"abstract":"In Spain, quantity surveyors are entitled to carry out official cadastral surveys, attestations, and certificate issuing according to a well-defined professional code. The Official Associations of Quantity Surveyors and Technical Architects (COAATs) are responsible for endorsing the documentation related to actions performed on buildings. An e-platform that enables immutability, traceability, and a unique property record among all the Spanish COAATs, with an affordable cost, is essential to streamline the involved processes.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"26 1","pages":"61-66"},"PeriodicalIF":2.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74776280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Can China Catch Up to the United States in Generative Artificial Intelligence? 中国能否在生成式人工智能领域赶上美国?
IF 2.6 4区 计算机科学
IT Professional Pub Date : 2023-07-01 DOI: 10.1109/MITP.2023.3297384
N. Kshetri, M. Schordan
{"title":"Can China Catch Up to the United States in Generative Artificial Intelligence?","authors":"N. Kshetri, M. Schordan","doi":"10.1109/MITP.2023.3297384","DOIUrl":"https://doi.org/10.1109/MITP.2023.3297384","url":null,"abstract":"Although Chinese technology firms are globally competitive in some artificial intelligence (AI) subfields, their performance has been disappointing in the generative AI (GAI) domain. This article offers an analysis of key barriers facing Chinese technology firms in the development of GAI services.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"38 1","pages":"94-97"},"PeriodicalIF":2.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88432425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Open Journal of the Computer Society 计算机学会开放杂志
4区 计算机科学
IT Professional Pub Date : 2023-07-01 DOI: 10.1109/mitp.2023.3301261
{"title":"IEEE Open Journal of the Computer Society","authors":"","doi":"10.1109/mitp.2023.3301261","DOIUrl":"https://doi.org/10.1109/mitp.2023.3301261","url":null,"abstract":"","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135762115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Energy-Aware Path Enumeration Solution Based on the Path Algebra Framework 基于路径代数框架的能量感知路径枚举解
IF 2.6 4区 计算机科学
IT Professional Pub Date : 2023-07-01 DOI: 10.1109/MITP.2023.3296060
Stelios Prekas, P. Karkazis, P. Trakadas
{"title":"An Energy-Aware Path Enumeration Solution Based on the Path Algebra Framework","authors":"Stelios Prekas, P. Karkazis, P. Trakadas","doi":"10.1109/MITP.2023.3296060","DOIUrl":"https://doi.org/10.1109/MITP.2023.3296060","url":null,"abstract":"Energy-centric network resource management is becoming increasingly crucial regarding the operational support of next-generation networking ecosystems. To realize consistent power-saving provisions on the physical underlay, we propose a network path enumeration and ordering mechanism by means of path algebra’s formulations. This novel path evaluation solution introduces new primary network metrics, and by utilizing their algebraic composition it achieves a power-saving path-ranking performance of 90.1% regarding the first path choice, in contrast to its examined counterpart.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"48 1","pages":"29-35"},"PeriodicalIF":2.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76358886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Approximate Fault-Tolerance Design for a Convolutional Neural Network Accelerator 卷积神经网络加速器的近似容错设计
IF 2.6 4区 计算机科学
IT Professional Pub Date : 2023-07-01 DOI: 10.1109/MITP.2023.3264849
Wenda Wei, Chenyang Wang, Xinyang Zheng, Hengshan Yue
{"title":"An Approximate Fault-Tolerance Design for a Convolutional Neural Network Accelerator","authors":"Wenda Wei, Chenyang Wang, Xinyang Zheng, Hengshan Yue","doi":"10.1109/MITP.2023.3264849","DOIUrl":"https://doi.org/10.1109/MITP.2023.3264849","url":null,"abstract":"Today, various domain-specific convolutional neural network (CNN) accelerators are deployed in large-scale systems to satisfy the massive computational demands of current deep CNNs. Although bringing significant performance improvements, the highly integrated CNN accelerators are more susceptible to faults caused by radiation, aging, and process variation. CNNs have been increasingly deployed in security-critical areas, requiring more attention to reliable execution. Although the classical fault-tolerant approaches are error-effective, the performance/energy overheads introduced are nonnegligible, which is the opposite of CNN accelerator design philosophy. In this article, we leverage CNN’s intrinsic tolerance for minor errors to explore approximate fault-tolerance (ApFT) opportunities for CNN accelerator fault-tolerance overhead reduction. Specifically, we discuss two branches of ApFT designs: selective duplicating-based approximate fault tolerance (S-ApFT) and imprecise checking-based approximate fault tolerance (I-ApFT). The results show that S-ApFT and I-ApFT can achieve comparable error-detection ability and dual-modular redundancy while achieving significant performance improvements.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"52 1","pages":"85-90"},"PeriodicalIF":2.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79596937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Quantum Week IEEE量子周
4区 计算机科学
IT Professional Pub Date : 2023-07-01 DOI: 10.1109/mitp.2023.3298502
{"title":"IEEE Quantum Week","authors":"","doi":"10.1109/mitp.2023.3298502","DOIUrl":"https://doi.org/10.1109/mitp.2023.3298502","url":null,"abstract":"","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135762111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security and Trust Issues in BYOD Networks BYOD网络中的安全与信任问题
IF 2.6 4区 计算机科学
IT Professional Pub Date : 2023-07-01 DOI: 10.1109/MITP.2023.3293714
G. A. Safdar, Ali Mansour
{"title":"Security and Trust Issues in BYOD Networks","authors":"G. A. Safdar, Ali Mansour","doi":"10.1109/MITP.2023.3293714","DOIUrl":"https://doi.org/10.1109/MITP.2023.3293714","url":null,"abstract":"Companies are striving for increased productivity as well as reduced costs in today's corporate environment. Both capital and operational expenditure can impact cost significantly, accordingly there is a drive to bring your own device (BYOD) networks as a solution. However, security and trust issues in BYOD networks are increasingly becoming a risk from small to large businesses. This introduces challenges for IT Professionals when it comes to the security of the network, as well as while trying to achieve compliance with data security standards set out by the governing bodies of the particular industry. This article aims to discuss “how organizations can introduce trust into BYOD networks” both by using existing and developing technologies. The overall outcome will be a clear understanding of common technologies that are either currently used or being developed, which can help organizations create trust between the corporate network and the BYOD.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"616 1","pages":"45-51"},"PeriodicalIF":2.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77376932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信