IEEE Computer Society

Videos: 182 Likes: 394 Views: 17,397

Videos by: IEEE Computer Society

IEEE Computer Society Transactions

3 days ago
The IEEE Computer Society publishes a wide range of peer-reviewed transactions on a variety of topics related to computer science and engineering.

Computer Magazine promo

3 days ago
Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. The aim is to provide more technical substance than trade magazines and more practical ideas […]

February 2018 Computing Now Industry Perspective

1 week ago
This video features a discussion on the wide adoption of visualization and visual analytics in a large corporation. Dr. Liu Ren, the director and chief scientist of human-machine interaction at Bosch Research and Technology Center in Sunnyvale, California, describes the company’s recent R&D innovations in visual analytics.

What People Say About SERadio

2 weeks ago
The Computer Society’s SERadio podcast is one of the most listened-to podcasts on computer science and technology.

Bubble Budgeting: Throughput Optimization for Dynamic Workloads by Exploiting Dark Cores…Spanish

2 weeks ago
All the cores of a many-core chip cannot be active at the same time, due to reasons like low CPU utilization in server systems and limited power budget in dark silicon era. These free cores (referred to as bubbles) can be placed near active cores for heat dissipation so that the active cores can run […]

Bubble Budgeting: Throughput Optimization for Dynamic Workloads by Exploiting Dark Cores…

2 weeks ago
All the cores of a many-core chip cannot be active at the same time, due to reasons like low CPU utilization in server systems and limited power budget in dark silicon era. These free cores (referred to as bubbles) can be placed near active cores for heat dissipation so that the active cores can run […]

Bubble Budgeting: Throughput Optimization for Dynamic Workloads by Exploiting Dark Cores…(Chinese)

2 weeks ago
All the cores of a many-core chip cannot be active at the same time, due to reasons like low CPU utilization in server systems and limited power budget in dark silicon era. These free cores (referred to as bubbles) can be placed near active cores for heat dissipation so that the active cores can run […]

Annals Promo 1

2 weeks ago
IEEE Annals of the History of Computing is the only magazine dedicated to the study and explanation of the roots of today’s leading-edge technology. Learn more and subscribe at www.computer.org/annals

IEEE CS Jobs Board for the New Year

1 month ago
We’ll be waiting for you…

Efficient Detection for Malicious and Random Errors in Additive Encrypted Computation (0118)

1 month ago
Although data confidentiality is the primary security objective in additive encrypted computation applications, such as the aggregation of encrypted votes in electronic elections, ensuring the trustworthiness of data is equally important. And yet, integrity protections are generally orthogonal to additive homomorphic encryption, which enables efficient encrypted computation, due to the inherent malleability of homomorphic ciphertexts. […]

Efficient Detection for Malicious and Random Errors in Additive Encrypted Computation Spanish (0118)

1 month ago
Although data confidentiality is the primary security objective in additive encrypted computation applications, such as the aggregation of encrypted votes in electronic elections, ensuring the trustworthiness of data is equally important. And yet, integrity protections are generally orthogonal to additive homomorphic encryption, which enables efficient encrypted computation, due to the inherent malleability of homomorphic ciphertexts. […]

Efficient Detection for Malicious and Random Errors in Additive Encrypted Computation Chinese (0118)

1 month ago
Although data confidentiality is the primary security objective in additive encrypted computation applications, such as the aggregation of encrypted votes in electronic elections, ensuring the trustworthiness of data is equally important. And yet, integrity protections are generally orthogonal to additive homomorphic encryption, which enables efficient encrypted computation, due to the inherent malleability of homomorphic ciphertexts. […]