IEEE Computer Society Press
216 resources related to IEEE Computer Society Press
- Topics related to IEEE Computer Society Press
- IEEE Organizations related to IEEE Computer Society Press
- Conferences related to IEEE Computer Society Press
- Periodicals related to IEEE Computer Society Press
- Most published Xplore authors for IEEE Computer Society Press
2020 IEEE International Symposium on Antennas and Propagation and North American Radio Science Meeting
The joint meeting is intended to provide an international forum for the exchange of information on state of the art research in the area of antennas and propagation, electromagnetic engineering and radio science
The conference program will consist of plenary lectures, symposia, workshops and invitedsessions of the latest significant findings and developments in all the major fields of biomedical engineering.Submitted papers will be peer reviewed. Accepted high quality papers will be presented in oral and postersessions, will appear in the Conference Proceedings and will be indexed in PubMed/MEDLINE
Held since 1992, the IEEE Haptics Symposium (HAPTICS) is a vibrant interdisciplinary forum where psychophysicists, engineers, and designers come together to share advances, spark new collaborations, and envision a future that benefits from rich physical interactions between humans and computers, generated through haptic (force and tactile) devices.
IECON is focusing on industrial and manufacturing theory and applications of electronics, controls, communications, instrumentation and computational intelligence.
ICGSE is the premier forum for researchers to present and discuss the most recent innovations, trends, outcomes, experiences, and challenges in the field of software engineering. The scope is broad and includes all original and unpublished results of empirical, conceptual, experimental, and theoretical software engineering research.
Experimental and theoretical advances in antennas including design and development, and in the propagation of electromagnetic waves including scattering, diffraction and interaction with continuous media; and applications pertinent to antennas and propagation, such as remote sensing, applied optics, and millimeter and submillimeter wave techniques.
IEEE Antennas and Wireless Propagation Letters (AWP Letters) will be devoted to the rapid electronic publication of short manuscripts in the technical areas of Antennas and Wireless Propagation.
The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...
The IEEE Transactions on Automation Sciences and Engineering (T-ASE) publishes fundamental papers on Automation, emphasizing scientific results that advance efficiency, quality, productivity, and reliability. T-ASE encourages interdisciplinary approaches from computer science, control systems, electrical engineering, mathematics, mechanical engineering, operations research, and other fields. We welcome results relevant to industries such as agriculture, biotechnology, healthcare, home automation, maintenance, manufacturing, pharmaceuticals, retail, ...
Broad coverage of concepts and methods of the physical and engineering sciences applied in biology and medicine, ranging from formalized mathematical theory through experimental science and technological development to practical clinical applications.
IEEE Transactions on Computers, 1991
The performance of different implementations of the ISO transport protocol class 4 on top of a connectionless link-layer protocol in the presence of transmission errors is studied by means of simulation. A main goal of the study is to find robust protocol versions yielding good performance for all possible combinations of implementations. The performance measure investigated is the throughput that ...
Proceedings of the 2000 International Conference on Software Engineering. ICSE 2000 the New Millennium, 2000
2011 International Conference on Mechatronic Science, Electric Engineering and Computer (MEC), 2011
Digital Watermarking may be used to protect databases copyright. A new method for proving the ownership of relational databases is presented. Such approach is applied for protecting both textual and numerical data. This is done by embedding special mark and watermark bits into textual attributes and numerical attributes respectively. Carriage return character and linefeed character, representing 1 and 0 of ...
Proceedings The First Conference on Computers, Freedom & Privacy, 1991
The Sixth International Symposium on Autonomous Decentralized Systems, 2003. ISADS 2003., 2003
Autonomous decentralized systems (ADS) applications usually have the equality, locality, and self-containment properties. These properties can be equated with the properties of applications in ubiquitous computing environments where devices are mostly autonomous, self-contained, and engage in peer-to-peer communications. The promise of ubiquitous computing as a significant part of future computing technology requires a new way of approaching ADS applications. Our ...
Chuck Walrad on the value of software standards
Ronald Fagin: 2012 IEEE Computer Society W. Wallace McDowell Award Winner
A Conversation About Ethics Education: IEEE TechEthics Interview
Influencing the Next Generation of Engineers via Ethics Education: IEEE TechEthics Panel
Computer-Assisted Audiovisual Language Learning
Qing-Chang Zhong, Distinguished Lecturer - PELS
IEEE CS Membership Video
Helping Your Members Building Writing and Presentation Skills - Ryan Boettger - Sections Congress 2017
Niklaus Wirth on Teaching Computer Science
IEEE Computer Society Pioneer Award winner "Cleve Moler"
Mark Guzdial: 2012 IEEE Computer Society Undergraduate Teaching Award Winner
Find Your Tribe
Computing Conversations: Van Jacobson on Content-Centric Networking
Computing Conversations: Bertrand Meyer: Eiffel Programming Language
Computing Conversations: Rasmus Lerdorf Interview on Creating PHP
Virtual World Symposium - IEEE Islands
The History of Supercomputing Research
Computing Conversations: Mitchell Baker on the Mozilla Foundation
The Future of Computing And Computer Science
The performance of different implementations of the ISO transport protocol class 4 on top of a connectionless link-layer protocol in the presence of transmission errors is studied by means of simulation. A main goal of the study is to find robust protocol versions yielding good performance for all possible combinations of implementations. The performance measure investigated is the throughput that can be achieved in transferring files between two stations over a local area or long-distance network. The results are compared to those obtained for the ISO transport protocol class 2 on top of a connection-oriented link-layer protocol. It is assumed that data and acknowledgement frames could be lost or corrupted by transmission errors. The results show that, at the sender side, retransmit all always yields higher performance than retransmit first, and, at the receiver side, store results in higher performance than discard.<<ETX>>
Digital Watermarking may be used to protect databases copyright. A new method for proving the ownership of relational databases is presented. Such approach is applied for protecting both textual and numerical data. This is done by embedding special mark and watermark bits into textual attributes and numerical attributes respectively. Carriage return character and linefeed character, representing 1 and 0 of watermarking bits respectively, are inserted into textual data, which does not change original appearance and meaning of textual data in relational databases. For numerical data, Watermarks are embedded into one of least significant bits (LSB) of the optional attributes. Our method is suitable for watermarking some numerical data, and all textual data with arbitrary number of words. Watermark extraction does not require original data. Experiments show that even the database suffers from approximately 70% of addition, alteration and deletion attacks, our method can achieve above 95% extraction rate of watermark.
Autonomous decentralized systems (ADS) applications usually have the equality, locality, and self-containment properties. These properties can be equated with the properties of applications in ubiquitous computing environments where devices are mostly autonomous, self-contained, and engage in peer-to-peer communications. The promise of ubiquitous computing as a significant part of future computing technology requires a new way of approaching ADS applications. Our position is that significant advances for distributed applications can be achieved by combining the respective strengths of ADS and ubiquitous computing.
Numerous studies have shown that a software projectpsilas cost, schedule and defect density escalate as the rate of requirements change increases. Yet none of these studies have explored the effects of not making requirements changes in response to changes in user needs. This paper explains why a project incurs just as much, if not more, risk when requirements changes are suppressed.
We analyze typical Web portals supporting communication, data sharing and activities of former classmates. The inflexibility and restrictions imposed on users of such portals are demonstrated to support the thesis that introduction of community-driven ontology management is crucial for full-fledged satisfaction of the user needs on the semantic Web.
This paper presents a formal framework to perform passive testing of service- oriented systems. Our approach uses the historical interaction files between web services to check the absence of faults. It uses a set of properties, that we call invariants, to represent the most relevant expected behaviour of the web services under test. Intuitively, an invariant expresses the fact that each time the system under test performs a given sequence of actions, it must exhibit a behavior reflected in the invariant. Invariants can be defined from a local point of view, that is, to check properties of isolated web services, and from a global point of view, that is, to check web service interaction properties. In order to increase applicability and adaption to a real environment, we assume that we do not have a global log. We show how to use local logs (recorded in each web service) in order to check local properties and how to combine them in order to check global properties.
No standards are currently tagged "IEEE Computer Society Press"