Computer

Papers
(The TQCC of Computer is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
The Carbon Footprint of Machine Learning Training Will Plateau, Then Shrink107
Generative Artificial Intelligence: Trends and Prospects102
The Ten Commandments of Ethical Medical AI69
Toward Human–AI Interfaces to Support Explainability and Causability in Medical AI58
The Edge-to-Cloud Continuum46
Virtual Worlds (Metaverse): From Skepticism, to Fear, to Immersive Opportunities42
Zero Trust: The What, How, Why, and When39
Scams, Frauds, and Crimes in the Nonfungible Token Market36
The Rise of Generative Artificial Intelligence and Its Impact on Education: The Promises and Perils35
Let’s Rename Everything “the Metaverse!”35
To Improve Cyber Resilience, Measure It31
Digital Twins: Universal Interoperability for the Digital Age29
Generative Artificial Intelligence and the Education Sector28
Dynamic Assurance Cases: A Pathway to Trusted Autonomy28
Algorithm Auditing: Managing the Legal, Ethical, and Technological Risks of Artificial Intelligence, Machine Learning, and Associated Algorithms28
National Varieties of Artificial Intelligence Discourses: Myth, Utopianism, and Solutionism in West European Policy Expectations26
Software-Engineering Design Patterns for Machine Learning Applications26
Explainable Machine Learning for Fraud Detection26
Explainable AI for Chiller Fault-Detection Systems: Gaining Human Trust23
The International Roadmap for Devices and Systems: A Beacon for the Electronics Industry21
A Comparison of Native and Cross-Platform Frameworks for Mobile Applications21
AI Ethics: A Long History and a Recent Burst of Attention21
Isomorphic Internet of Things Architectures With Web Technologies20
Transparency for Whom? Assessing Discriminatory Artificial Intelligence20
A Survey on Deep Learning Resilience Assessment Methodologies19
Explainable Recommendations and Calibrated Trust: Two Systematic User Errors19
Autonomous Last-Mile Delivery Vehicles in Complex Traffic Environments18
Federated Learning: The Pioneering Distributed Machine Learning and Privacy-Preserving Data Technology18
Deep Learning and the Oceans17
Trustworthy Artificial Intelligence Requirements in the Autonomous Driving Domain17
Toward Improving Confidence in Autonomous Vehicle Software: A Study on Traffic Sign Recognition Systems16
Token Economics in Real Life: Cryptocurrency and Incentives Design for Insolar's Blockchain Network16
The Cyberwarfare in Ukraine15
Big Data: Present and Future14
Adversarial Machine Learning: Attacks From Laboratories to the Real World14
Autonomous Vehicles Digital Twin: A Practical Paradigm for Autonomous Driving System Development14
Making Open Source Project Health Transparent14
Architectural Design Decisions for the Machine Learning Workflow14
Large-Scale Artificial Intelligence Models14
Multidrone Systems: More Than the Sum of the Parts14
The Economics of Digital Twins14
Cyber Resilience: by Design or by Intervention?13
The Economics Behind Food Supply Blockchains13
Big Data Pipelines on the Computing Continuum: Tapping the Dark Data13
Three Levels of AI Transparency13
Artificial Intelligence and Critical Systems: From Hype to Reality13
The Economics of Central Bank Digital Currency [Computing's Economics]13
2021 State of the Practice in Data Privacy and Security13
A Comparative Study of Design Paradigms for PUF-Based Security Protocols for IoT Devices: Current Progress, Challenges, and Future Expectation12
Explainability as a User Requirement for Artificial Intelligence Systems12
Edge Artificial Intelligence Chips for the Cyberphysical Systems Era12
Open Banking: Definition and Description12
Documenting High-Risk AI: A European Regulatory Perspective12
National Metaverse Strategies11
A Secure and Flexible FPGA-Based Blockchain System for the IIoT11
Pushing the Limits of Autonomy for Enabling the Next Generation of Space Robotics Exploration Missions11
Lightweight Authenticated Key Exchange With EDHOC11
Wasabi: A Conceptual Model for Trustworthy Artificial Intelligence10
The Role of Data and Artificial Intelligence in Driving Diversity, Equity, and Inclusion10
Artificial Intelligence and Software Engineering: Are We Ready?10
Computational Intelligence for Safety Assurance of Cooperative Systems of Systems10
ChatGPT and Chat History: Challenges for the New Wave10
An Approach for Detection of Advanced Persistent Threat Attacks10
A Typology of Metaverses10
Toward Formal Methods for Smart Cities9
Bungie: Improving Fault Tolerance via Extensible Application-Level Protocols9
The Convergence of Hyperscale Data Center and High-Performance Computing Networks9
Data-Centric Artificial Intelligence, Preprocessing, and the Quest for Transformative Artificial Intelligence Systems Development9
Digital Twins: From Conceptual Views to Industrial Applications in the Electrical Domain9
Protocols Over Things: A Decentralized Programming Model for the Internet of Things9
Reliability, Security, and Privacy in Power Grids9
Blockchain’s Carbon and Environmental Footprints9
Defending IEEE Software Standards in Federal Criminal Court9
Digital Humanism: The Time Is Now9
eCloud: A Vision for the Evolution of the Edge-Cloud Continuum9
A Brief History of Free, Open Source Software and Its Communities9
Virtualization Over Multiprocessor Systems-on-Chip: An Enabling Paradigm for the Industrial Internet of Things8
Autonomous Cyberdefense Introduces Risk: Can We Manage the Risk?8
Digital Self: The Next Evolution of the Digital Human8
Cyberphysical Security Through Resiliency: A Systems-Centric Approach8
A Trustworthy View on Explainable Artificial Intelligence Method Evaluation8
Transformers for GUI Testing: A Plausible Solution to Automated Test Case Generation and Flaky Tests8
El Salvador’s Bitcoin Gamble8
Sustainability: Fundamentals-Based Approach to Paying It Forward8
Data Privacy Considerations for Central Bank Digital Currencies in Asia–Pacific Countries8
Worlds Apart: Technology, Remote Work, and Equity8
Π-RT: A Runtime Framework to Enable Energy-Efficient Real-Time Robotic Vision Applications on Heterogeneous Architectures8
Compositional Thinking in Cyberphysical Systems Theory8
Digital Storage and Memory8
Enhancing Cybersecurity via Artificial Intelligence: Risks, Rewards, and Frameworks8
Zero-Trust Artificial Intelligence?7
Artificial Intelligence in Critical Infrastructure Systems7
Algorithms for Artificial Intelligence7
Interpretable Fault Diagnosis for Cyberphysical Systems: A Learning Perspective7
Reshaping the Landscape of the Future: Software-Defined Manufacturing7
The Economics of Generative Artificial Intelligence in the Academic Industry7
Strategy and Tactics Against Ransomware7
AI Accountability: Approaches, Affecting Factors, and Challenges7
Trusting Digital Twins7
A Novel Reputation System for Mobile App Stores Using Blockchain7
Continuous Open Source License Compliance7
Edge Computing: The Computing Infrastructure for the Smart Megacities of the Future7
Green Configuration: Can Artificial Intelligence Help Reduce Energy Consumption of Configurable Software Systems?7
Efficient Computer Vision for Embedded Systems7
Smart City Intersections: Intelligence Nodes for Future Metropolises7
AI Maintenance: A Robustness Perspective7
The Metaverse University7
Indian Sign Language Generation System7
Making Digital Twins Work6
A Trusted Federated System to Share Granular Data Among Disparate Database Resources6
Building a Human-Intelligent Metaverse6
UL 4600: What to Include in an Autonomous Vehicle Safety Case6
Digital Transformation: Lights and Shadows6
Economics of Artificial Intelligence in the Gulf Cooperation Council Countries6
Algorithmic Nudge: An Approach to Designing Human-Centered Generative Artificial Intelligence6
Controller Resynthesis for Multirobot System When Changes Happen6
Supervisor Synthesis: Bridging Theory and Practice6
Data and Disinformation6
Challenging the Digital Divide: Factors Affecting the Availability, Adoption, and Acceptance of Future Technology in Elderly User Communities6
Quantum Computing: Progress and Innovation6
The Path to a Consensus on Artificial Intelligence Assurance6
Crowd-Machine Hybrid Urban Sensing and Computing6
Can We Prevent a Technological Arms Race in University Student Cheating?6
Trustworthy AI That Engages Humans as Partners in Teaching and Learning6
Open Banking: What It Is, Where It’s at, and Where It’s Going6
From Neuron Coverage to Steering Angle: Testing Autonomous Vehicles Effectively6
The Cities Challenge: Driving a Green and Digital Recovery and Social Resilience6
WiF0: All Your Passphrase Are Belong to Us6
Environment Modeling During Model Checking of Cyberphysical Systems6
The Economics of Blockchain-Based Supply Chain Traceability in Developing Countries5
Rise of the Autonomous Machines5
Algorithms: Society’s Invisible Puppeteers5
The Quantum Cybersecurity Threat May Arrive Sooner Than You Think5
Formal Methods in Cyberphysical Systems5
A Human-Machine Collaboration Model for Urban Planning in Smart Cities5
Usability, User Comprehension, and Perceptions of Explanations for Complex Decision Support Systems in Finance: A Robo-Advisory Use Case5
Can You Trust Zero Trust?5
ChatGPT and AIChat Epistemology5
Commercial Participation in OpenStack: Two Sides of a Coin5
Tailoring Requirements Engineering for Responsible AI5
Multiple-Deep Neural Network Accelerators for Next-Generation Artificial Intelligence Systems5
Standardizing Open Source License Compliance With OpenChain5
Collaborative Artificial Intelligence Needs Stronger Assurances Driven by Risks5
Conversational Artificial Intelligence: Changing Tomorrow’s Health Care Today5
Architecting the Future of Software Engineering5
Technology Predictions5
Challenges and Issues in Data Science Education5
When Scientific Software Meets Software Engineering5
Software Supply-Chain Security: Issues and Countermeasures5
Stateful Function as a Service at the Edge5
Discovering Opioid Use Patterns From Social Media for Relapse Prevention5
Democratizing Science Through Advanced Cyberinfrastructure5
Do Data Almost Always Eventually Leak?5
Open Source Hardware5
Not Teaching Software Engineering Standards to Future Software Engineers-Malpractice?5
On the Dependability Lifecycle of Electrical/Electronic Product Development: The Dual-Cone V-Model5
The Interplay of AI and Biometrics: Challenges and Opportunities5
Metaverse’s Rise and Decline5
On the High-Energy Consumption of Bitcoin Mining5
Ethics, Safety, and Autonomous Vehicles5
Understanding and Fixing Complex Faults in Embedded Cyberphysical Systems4
Aging, Fast and Slow4
Engineering Education in the Age of Autonomous Machines4
Changing Landscape of Technical Education Pedagogy From Traditional to Practical e-Learning4
Machine Learning Security Against Data Poisoning: Are We There Yet?4
A Collapsing Academy, Part III: Scientometrics and Metric Mania4
Machine-Learned Verification and Advance Notice Oracles for Autonomous Systems4
“Frameworking” Carbon-Aware Computing Research4
Revisiting the Spaceborne Illuminators of Opportunity for Airborne Object Tracking4
In-Network Computing With Function as a Service at the Edge4
Invisible Supply Chain Attacks Based on Trojan Source4
Multilayered Diagnostics for Smart Cities4
12 Flavors of IoT4
Human-Centered AI: A Framework for Green and Sustainable AI4
Darwin-S: A Reference Software Architecture for Brain-Inspired Computers4
Predicting Technologies That Advance Humanity4
Facial Recognition Technology: Navigating the Ethical Challenges4
Taming Memory With Disaggregation4
Ethics for Digital Medicine: A Path for Ethical Emerging Medical IoT Design4
Decentralized Machine Learning for Intelligent Health-Care Systems on the Computing Continuum4
Connecting AI: Merging Large Language Models and Knowledge Graph4
Technomoral Affordances of Artificial Intelligence in Data-Driven Systems4
Container-Based Data Pipelines on the Computing Continuum for Remote Patient Monitoring4
Deep Conversational Recommender Systems: Challenges and Opportunities4
Formal Verification of Cyberphysical Systems4
Computing Nearer to Data4
Hear, Now, and in the Future: Transforming Hearing Aids Into Multipurpose Devices4
Open Source Community Governance the Apache Way4
Data Center Ethernet and Remote Direct Memory Access: Issues at Hyperscale4
Unconventional Concerns for Human-Centered Artificial Intelligence4
Understanding Smart Medical Devices4
From Big Data Technologies to Big Data Benefits4
Blockchain-Based Continuous Auditing for Dynamic Data Sharing in Autonomous Vehicular Networks4
Soft Error Effects on Arm Microprocessors: Early Estimations Versus Chip Measurements4
Assessing the Potential Energy Savings of a Fluidified Infrastructure4
Measuring the Structural Quality of Software Systems4
Experiencing Hyperloops: The Transit of the Future4
Future of the Workforce4
Artificial General Intelligence: Humanity’s Downturn or Unlimited Prosperity4
Standing on the Shoulders of AI Giants4
Business Model Canvas for Big and Open Linked Data in Smart and Circular Cities: Findings From Europe4
Data’s Impact on Algorithmic Bias4
The Open Source Distributor Business Model4
Collaboration Stability: Quantifying the Success and Failure of Opportunistic Collaboration4
Explaining the Walking Through of a Team of Algorithms4
The QAnon Phenomenon: The Storm Has Always Been Among Us4
Learn to Unlearn: Insights Into Machine Unlearning4
Embedded Artificial Intelligence: The ARTEMIS Vision4
Internet of Telemedicine4
Ransomware: Pay to Play?4
Cloud-Native Application Security: Risks, Opportunities, and Challenges in Securing the Evolving Attack Surface3
Trends in User Identity and Continuous Authentication3
The Importance of Interoperability in Functional Safety Standards3
Defensive AI: The Future Is Yesterday3
Agile–CMMI Alignment: Contributions and To-Dos for Organizations3
An Attack Vector Taxonomy for Mobile Telephony Security Vulnerabilities3
911 Swatting, VoIP, and Doxxing3
A Taxonomy for Distributed Ledger Analytics3
Fuzzing: Cyberphysical System Testing for Security and Dependability3
New Horizons for High-Performance Computing3
Software Development Metrics With a Purpose3
On Neural Networks Redundancy and Diversity for Their Use in Safety-Critical Systems3
The Next Wave in Cloud Systems Architecture3
Beyond Conversational Artificial Intelligence3
Generative Artificial Intelligence and the Future of Software Testing3
TikTok in 2022: Revisiting Data and Privacy3
Information-Operation Technology Integration in Industrial Cyberphysical Systems3
Pandemic Parallels: What Can Cybersecurity Learn From COVID-19?3
Optane’s Dead: Now What?3
Evaluating Trustworthiness and Racial Bias in Face Recognition APIs Using Deepfakes3
Hubris—From the Metaverse to ChatGPT to TikTok’s Time of Tribulation3
Scarcity3
Optical Speech Recovery From Desktop Speakers3
Generative Artificial Intelligence and the Economics of Effective Prompting3
A Collapsing Academy, Part II: How Cancel Culture Works on the Academy3
Explainable artificial intelligence and machine learning [Guest Editors’ introduction]3
Trustworthy AI—Part 13
Project moveSMART: When Physical Education Meets Computational Thinking in Elementary Classrooms3
Control System Cyber Incidents Are Real—and Current Prevention and Mitigation Strategies Are Not Working3
Economics of Nonfungible Tokens3
A Comprehensive Inspection of the Straggler Problem3
Social Media and the Banality of (Online) Crowds3
IEEE Standard 1838 Is on the Move3
Distributed AI in Zero-Touch Provisioning for Edge Networks: Challenges and Research Directions3
Where’s the Silicon?3
A Privacy-Assured Data Lifecycle for Epidemic-Handling Systems3
Architectural Solutions for Self-Adaptive Systems3
A Case Study in the Formal Modeling of Safe and Secure Manufacturing Automation3
Strengthening and Democratizing Artificial Intelligence Research and Development3
20 Years of Software Security3
0.10242009162903