The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We warned the public more than 20 years ago that cryptoviral extortion would pose a major threat to users, a threat that has been realized with the advent of Bitcoin but largely neglected until recently. We believe that a reactive mindset along with group conformity are partly to blame for this oversight and, moreover, are negatively impacting secure systems research. This presents a recipe for disaster,...
A widely cited 1993 Computer article described failures in a software-controlled radiation machine that massively overdosed six people in the late 1980s, resulting in serious injury and fatalities. How far have safety-critical systems come since then?
Mobile phones remain the most efficient surveillance mechanism, allowing a variety of tracking and monitoring techniques to be concentrated in a single always-on device. Although the risk of unwanted monitoring persists, with protective measures to mitigate vulnerabilities, ubiquitous mobile phones will continue to provide unmatched surveillance capabilities.
A team of New Jersey high school sophomores took part in a well-known international underwater-vehicle competition this year. The team members discuss their arduous journey as they designed and built a vehicle that then had to undertake several challenging tasks.
End-user programming environments for the IoT such as IFTTT rely on a multitude of low-level trigger-action rules that categorize devices and services by technology or brand. EUPont is a Semantic Web ontology that enables users to meet their needs with fewer, higher-level rules that can be adapted to different contextual situations and as-yet-unknown IoT devices and services.
Guaranteeing high levels of availability is a huge challenge for cloud providers. The authors look at the causes of cloud failures and recommend ways to prevent them and to minimize their effects when they occur.
Semantic applications can help commercial applications perform quickly and reliably by improving ecosystem interoperability. Converting and integrating current standards specifications to OWL models could support the adoption of semantic models, as well as machine-processable standards compliance and data interoperability.
This installment of Computer’s series highlighting the work published in IEEE Computer Society journals comes from IEEE Transactions on Learning Technologies.
Computing evolution has brought about multiple paradigm shifts in how we use technologies. In the living laboratory that is modern life, our ability to design and control the computers and computing power of the future will require an ability to program systems and applications in situ and in vivo.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.