{"title":"IEEE Computer Society Call for Special Issue Proposal","authors":"","doi":"10.1109/mc.2024.3437462","DOIUrl":"https://doi.org/10.1109/mc.2024.3437462","url":null,"abstract":"","PeriodicalId":10623,"journal":{"name":"Computer","volume":"39 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
AI and ML have been applied ubiquitously to our everyday lives. The impact has also become overwhelming. How to certify and regulate these applications to avoid unintentional or on-purpose harm is an essential topic that must be addressed.
人工智能和 ML 已广泛应用于我们的日常生活。其影响也已势不可挡。如何对这些应用进行认证和监管,以避免无意或有目的的伤害,是一个必须解决的重要课题。
{"title":"Certifying and Regulating AI/ML-Centric Applications","authors":"W. Eric Wong","doi":"10.1109/mc.2024.3427213","DOIUrl":"https://doi.org/10.1109/mc.2024.3427213","url":null,"abstract":"AI and ML have been applied ubiquitously to our everyday lives. The impact has also become overwhelming. How to certify and regulate these applications to avoid unintentional or on-purpose harm is an essential topic that must be addressed.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"2012 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kíng-Pîng Tēnn, Yu-Wei Chang, Hong-Yen Chen, Teng-Kai Fan, Tsungnan Lin
We present the Strategic Artificial Intelligence (AI) Threats Navigation matrix, an integrated approach to navigating AI threats and trustworthiness throughout the AI lifecycle. It aims to assist developers, data scientists, regulators, and users in addressing threats and bolstering AI’s reliability, encouraging an improvement of trustworthiness.
{"title":"Toward Trustworthy Artificial Intelligence: An Integrated Framework Approach Mitigating Threats","authors":"Kíng-Pîng Tēnn, Yu-Wei Chang, Hong-Yen Chen, Teng-Kai Fan, Tsungnan Lin","doi":"10.1109/mc.2024.3400532","DOIUrl":"https://doi.org/10.1109/mc.2024.3400532","url":null,"abstract":"We present the Strategic Artificial Intelligence (AI) Threats Navigation matrix, an integrated approach to navigating AI threats and trustworthiness throughout the AI lifecycle. It aims to assist developers, data scientists, regulators, and users in addressing threats and bolstering AI’s reliability, encouraging an improvement of trustworthiness.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"27 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Elsa López Pérez, Göran Selander, John Preuß Mattsson, Thomas Watteyne, Mališa Vučinić
We wrap up the call for formal analysis of the new security handshake protocol EDHOC by providing an overview of the protocol, a summary of the formal security analyses, and a discussion on open venues for future work.
{"title":"EDHOC Is a New Security Handshake Standard: An Overview of Security Analysis","authors":"Elsa López Pérez, Göran Selander, John Preuß Mattsson, Thomas Watteyne, Mališa Vučinić","doi":"10.1109/mc.2024.3415908","DOIUrl":"https://doi.org/10.1109/mc.2024.3415908","url":null,"abstract":"We wrap up the call for formal analysis of the new security handshake protocol EDHOC by providing an overview of the protocol, a summary of the formal security analyses, and a discussion on open venues for future work.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"82 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The new IEEE International Roadmap for Devices and Systems Mass Data Storage report outlines the current technology and expected advances and applications in digital storage and nonvolatile memory technology for the future.
{"title":"IEEE Roadmap Outlines Development of Mass Digital Storage Technology","authors":"Tom Coughlin, Roger Hoyt","doi":"10.1109/mc.2024.3416230","DOIUrl":"https://doi.org/10.1109/mc.2024.3416230","url":null,"abstract":"The new IEEE International Roadmap for Devices and Systems Mass Data Storage report outlines the current technology and expected advances and applications in digital storage and nonvolatile memory technology for the future.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"12 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Frank Hsu, Bruce S. Kristal, Christina Schweikert
Combinatorial fusion analysis is a paradigm that seeks to provide methods and workflows for combining multiple scoring systems in computational learning and modeling, informatics, and intelligent systems.
{"title":"Combinatorial Fusion Analysis","authors":"D. Frank Hsu, Bruce S. Kristal, Christina Schweikert","doi":"10.1109/mc.2024.3406058","DOIUrl":"https://doi.org/10.1109/mc.2024.3406058","url":null,"abstract":"Combinatorial fusion analysis is a paradigm that seeks to provide methods and workflows for combining multiple scoring systems in computational learning and modeling, informatics, and intelligent systems.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"12 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}