IEEE Transactions on Emerging Topics in Computing

Covering aspects of computer science, computing technology, and computing applications not currently covered by other IEEE Computer Society Transactions

From the July-September 2016 issue

Data Protection for Online Social Networks and P-Stability for Graphs

By Vicenc Torra, Termeh Shafie, and Julian Salas

Featured article thumbnail imageGraphs can be used as a model for online social networks. In this framework, vertices represent individuals and edges relationships between individuals. In recent years, different approaches have been considered to offer data privacy to online social networks and for developing graph protection. Perturbative approaches are formally defined in terms of perturbation and modification of graphs. In this paper, we discuss the concept of $P$ -stability on graphs and its relation to data privacy. The concept of $P$ -stability is rooted in the number of graphs given a fixed degree sequence. In this paper, we show that for any graph there exists a class of $P$ -stable graphs. This result implies that there is a fully polynomial randomized approximation for graph masking for the graphs in the class. In order to further refine the classification of a given graph, we introduce the concept of natural class of a graph. It is based on a class of scale-free networks.

download PDF View the PDF of this article      csdl View this issue in the digital library

Editorials and Announcements


  • We are pleased to announce that TETC has been selected for coverage by Thomson Reuters. TETC's 2016 impact factor will be available in the 2017 Journal Citation Report and all articles dating back to the first 2013 issue will be indexed and abstracted in:
    • Science Citation Index Expanded (also known as SciSearch®)
    • Journal Citation Reports/Science Edition
    • Current Contents®/Engineering Computing and Technology

  • TETC Tips and Tricks - FAQ for S1M Submissions (PDF)

  • TETC Special Issue/Section Proposal Information Rules (PDF)


  • Beginning in 2015, IEEE Transactions on Emerging Topics in Computing has moved to our hybrid open access publishing model. Authors can now select between either Traditional manuscript submission or Open Access (author-pays OA) manuscript submission. Learn more.

  • A Welcome Letter from Thomas M. Conte (PDF)

  • We are pleased to announce that Fabrizio Lombardi, a professor at Northeastern University, Boston, has been appointed as the inaugural EIC for the IEEE Transactions on Emerging Technologies in Computing, effective immediately. Dr. Lombardi is an IEEE fellow, a member of the Computer Society Board of Governors, and is a past EIC and Associate EIC of the IEEE Transactions on Computers.


Guest Editorials

Reviewers list

Author Index

Call for Papers

Technical Tracks

View PDF.

IEEE Transactions on Emerging Topics in Computing (TETC) seeks original manuscripts for submission under Technical Tracks. In a track the technical contents of a submitted manuscript must be of an emerging nature and fall within the scope and competencies of the Computer Society. Manuscripts not abiding by these specifications will be administratively rejected. The topics of interest for the Technical Tracks are as follows:

  • Enterprise Computing Systems
  • Computational Networks
  • Hardware and Embedded System Security
  • Educational Computing
  • High Performance Computing
  • Next Generation Wireless Computing Systems
  • Computer System Security
  • Emerging Hardware for Computing

Submitted articles must describe original research which is not published or currently under review by other journals or conferences. Extended conference papers should be identified in the submission process and have considerable novel technical content; all submitted manuscripts will be screened using a similarity checker tool. As an author, you are responsible for understanding and adhering to our submission guidelines. You can access them at the IEEE Computer Society web site, Please thoroughly read these before submitting your manuscript.

Please submit your paper to Manuscript Central at and select the "Technical Track" option in the drop-down menu for "Manuscript Type".

Please address all other correspondence regarding this Call For Papers to Fabrizio Lombardi, EIC of IEEE TETC,

Joint Special Section on VLSI and Nanotechnology Design Trends for Computing Innovations

Extended Submission deadline: October 31, 2016. View PDF.

IEEE Transactions on Nanotechnology and IEEE Transactions on Emerging Topics in Computing seek original manuscripts for a Special Section tentatively scheduled to appear in the September 2017 issues.

Special Issue on Cyber Social Computing and Cyber-Enabled Applications

Submission deadline: December 1, 2016. View PDF.

In the past several years, we have seen dramatic advancement in many application domains enabled by the use of emerging computing technologies and novice computational paradigms, as well as intelligent processing algorithms and methodologies. These emerging technologies are transforming our society, and have enormous economic impact from various aspects beyond people’s expectation. Thus, this special issue on Cyber Social Computing and Cyber-Enabled Applications aims to bring together researchers and engineers from all related areas in computer science and intelligent information processing to disseminate their findings on the computational theories, models, and technological solutions in terms of cyber-enabled applications with the cyber social computing paradigm. Therefore, this special issue will have a great significance and profound impact on the following computing-related topics: 1) Presenting emerging research and developments in the cyber social computing field. 2) Addressing the basic computational models and intelligent processing methodologies related to cyber social computing and cyber-enabled applications. 3) Enabling and facilitating practical computing and intelligence technologies to realize foundational frameworks, new functions, and adaptive services for cyber-enabled applications. 4) Exploring interests to seek potential collaborations, and push forward the development of cyber social computing.

Special Issue on Emerging Technologies for Disaster Management

Submission deadline: December 1, 2016. View PDF.

We live in a world in which natural and man-made disasters (such as earthquakes, hurricanes, terrorist attacks, and industrial accidents) often occur. These disasters are so sudden in nature, so causing loss of human lives and interruption of essential public services (such as health care, electricity, water, transportation and communication). Disaster management aims to reduce or avoid potential losses from hazards, ensure prompt and appropriate assistance to victims and achieve a rapid and effective recovery. In recent years, new computing/communication technologies have emerged to improve the efficiency of disaster management; for example, crowdsourcing has been applied in the Nepal earthquake to collect the latest information from earthquake-affected areas and create a dynamic map that shows the locations in which aid and relief are needed. Although some preliminary attempts have been made to apply emerging technologies for disaster management, there are many open challenges that need to be addressed to fully exploit the potentials of these promising technologies.

Various technologies must be considered in the entire disaster management process and its many phases, including prevention, preparedness, relief and recovery. Although disasters cannot often be prevented, new technologies must be explored to predict and prepare through robust and resilient infrastructures. After a disaster occurs, advanced technologies are needed to assist in searching and rescuing victims. Since power and communication are usually interrupted, it is important to quickly recover communication using energy-efficient technologies, so that processing of information can take place; furthermore, good planning and scheduling can also help to quickly recover from a disaster.

Special Issue on Innovation in Technologies for Educational Computing

Submission deadline: December 1, 2016. View PDF.

IEEE Transactions on Emerging Topics in Computing and IEEE Transactions on Learning Technologies seek original manuscripts for a Special Issue/Section on Innovation in Technologies for Educational Computing tentatively scheduled to appear in the October-December 2017 issues. The goal of this joint special issue is to provide an overview of most recent emerging and "fringe" learning technologies.

Special Issue on Reliability-aware Design and Analysis Methods for Digital Systems: from Gate to System Level

Submission deadline: March 1, 2017. View PDF.

The continuous scaling of CMOS devices as well as the increased interest in the use of emerging technologies make more and more important the topics related to defect and fault tolerance in digital systems. To address the increasing complexity of digital systems and their challenging reliability requirements, it is imperative to employ design and analysis methods to different levels of the abstraction, starting from the system level down to the gate level. The IEEE Transaction on Emerging Topics in Computing (TETC) seeks original manuscripts for a Special Section on Reliability-aware Design and Analysis Methods for Digital Systems: from Gate to System Level scheduled to appear in the March issue of 2018. All aspects of design, manufacturing, test and analysis of systems affected by defects during manufacturing and by faults during system operation are of interest.

Special Issue on Cyber Security Threats and Defense Advances

Submission deadline: June 1, 2017. View PDF.

With the rapid advancements in information and communications technology (ICT) and ‘expansion’ of cyber space, cyber security is of crucial importance to the stability of our Internet-connected society. For example, how do we ensure secure communications between servers, network nodes, terminals and user applications across public and private networks? Defending our cyber space is both a research challenge and an operational challenge. Designing effective security solutions is complicated by the need to carefully balance between security and usability, as well as the amount of efforts and resources required. For example, how do we achieve better security without compromising on communication speed?

This special issue aims to solicit state-of-the-art research advances in cyber-security threat mitigation and defense solutions, including the underlying cryptographic techniques. The issue welcomes both theoretical research, and applied research (e.g. implementations and applications).

Access recently published TETC Articles

RSS Subscribe to the RSS Feed of latest TETC Content Added to the Digital Library.

Mail Sign up for the Transactions Connection Newsletter.