The Community for Technology Leaders
Green Image
Issue No. 08 - Aug. (vol. 49)
ISSN: 0018-9162

Front Cover (PDF)

pp. c1

Table of Contents (PDF)

pp. 1-2

Masthead (PDF)

pp. 3
70th Anniversary Milestones
32 & 16 Years Ago

32 & 16 Years Ago (HTML)

pp. 6-7
Elsewhere in the CS
Spotlight on Transactions

Evolving MPI+X Toward Exascale (HTML)

David A. Bader , Georgia Tech
pp. 10
Guest Editors' Introduction

Supply-Chain Security for Cyberinfrastructure [Guest editors' introduction] (HTML)

Domenic Forte , University of Florida
Ron Perez , Visa Inc.
Yongdae Kim , Korea Advanced Institute of Science and Technology
Swarup Bhunia , University of Florida
pp. 12-16
Supply-Chain Security for Cyberinfrastructure

Defeating counterfeiters with microscopic dielets embedded in electronic components (Abstract)

Parrish Ralston , Northrop Grumman Mission Systems
David Fry , Northrop Grumman Mission Systems
Scott Suko , Northrop Grumman Mission Systems
Bryce Winters , Northrop Grumman Mission Systems
Matthew King , Northrop Grumman Mission Systems
Robert Kober , Northrop Grumman Mission Systems
pp. 18-26
Supply-Chain Security for Cyberinfrastructure
Supply-Chain Security For Cyberinfrastructure

Supply-Chain Security of Digital Microfluidic Biochips (Abstract)

Sk Subidh Ali , New York University, Abu Dhabi
Mohamed Ibrahim , Duke University
Jeyavijayan Rajendran , University of Texas at Dallas
Ozgur Sinanoglu , New York University, Abu Dhabi
Krishnendu Chakrabarty , Duke University
pp. 36-43
Supply-Chain Security for Cyberinfrastructure

Detecting Hardware Trojans with Gate-Level Information-Flow Tracking (Abstract)

Wei Hu , University of California, San Diego
Baolei Mao , Northwestern Polytechnical University
Jason Oberg , Tortuga Logic
Ryan Kastner , University of California, San Diego
pp. 44-52
Supply-Chain Security for Cyberinfrastructure

Security Rule Checking in IC Design (Abstract)

Kan Xiao , Intel
Adib Nahiyan , University of Florida
Mark Tehranipoor , University of Florida
pp. 54-61

Vendor Malware: Detection Limits and Mitigation (Abstract)

Olav Lysne , Simula Research Laboratory
Kjell J. Hole , University of Bergen
Christian Otterstad , University of Bergen
Oyvind Ytrehus , University of Bergen
Raymond Aarseth , University of Bergen
Jorgen Tellnes , University of Bergen
pp. 62-69
Virtual Roundtable

What Happened to Formal Methods for Security? (HTML)

Kim Schaffer , National Institute of Standards and Technology
Jeffrey Voas , National Institute of Standards and Technology
pp. 70-79
The IoT Connection

Toward a New Approach to IoT Fault Tolerance (Abstract)

Doug Terry , Samsung Research America
pp. 80-83
Rebooting Computing

The Search for Computing's Secretariat (Abstract)

Erik P. DeBenedictis , Sandia National Laboratories
pp. 88-91
Out of Band

The Pollyanna Delusion (HTML)

Hal Berghel , University of Nevada, Las Vegas
pp. 98-102
Indistinguishable from Magic

Rethinking the Relationship between Humans and Computers (Abstract)

Xiangshi Ren , Kochi University of Technology
pp. 104-108
Science Fiction Prototyping
Cloud Cover

Fog Computing: Helping the Internet of Things Realize Its Potential (Abstract)

Amir Vahid Dastjerdi , University of Melbourne
Rajkumar Buyya , University of Melbourne
pp. 112-116
IEEE Computer Society Election

IEEE Computer Society Election (HTML)

pp. 118-128
IEEE Division v Candidates
IEEE Constitutional Amendment
IEEE President-Elect Candidates
The Errant Hashtag

Changing Trust (HTML)

David Alan Grier , George Washington University
pp. 156
85 ms
(Ver 3.3 (11022016))