scispace - formally typeset
Search or ask a question

Showing papers in "IEEE Computer in 2011"


Journal ArticleDOI
TL;DR: In this paper, the authors present security of Internet of things, where every physical object has a virtual component that can produce and consume services such extreme interconnection will bring unprecedented convenience and economy, but it will also require novel approaches to ensure its safe and ethical use.
Abstract: This paper presents security of Internet of things. In the Internet of Things vision, every physical object has a virtual component that can produce and consume services Such extreme interconnection will bring unprecedented convenience and economy, but it will also require novel approaches to ensure its safe and ethical use. The Internet and its users are already under continual attack, and a growing economy-replete with business models that undermine the Internet's ethical use-is fully focused on exploiting the current version's foundational weaknesses.

732 citations


Journal ArticleDOI
TL;DR: The transformation to smarter cities will require innovation in planning, management, and operations, and technical obstacles will center on achieving system interoperability, ensuring security and privacy, accommodating a proliferation of sensors and devices, and adopting a new closed-loop human-computer interaction paradigm.
Abstract: The transformation to smarter cities will require innovation in planning, management, and operations. Several ongoing projects around the world illustrate the opportunities and challenges of this transformation. Cities must get smarter to address an array of emerging urbanization challenges, and as the projects highlighted in this article show, several distinct paths are available. The number of cities worldwide pursuing smarter transformation is growing rapidly. However, these efforts face many political, socioeconomic, and technical hurdles. Changing the status quo is always difficult for city administrators, and smarter city initiatives often require extensive coordination, sponsorship, and support across multiple functional silos. The need to visibly demonstrate a continuous return on investment also presents a challenge. The technical obstacles will center on achieving system interoperability, ensuring security and privacy, accommodating a proliferation of sensors and devices, and adopting a new closed-loop human-computer interaction paradigm.

501 citations


Journal ArticleDOI
TL;DR: The article mentions that the malware such as Stuxnet can affect critical physical infrastructures that are controlled by software, which implies that threats might extend to real lives.
Abstract: The article mentions that the malware such as Stuxnet can affect critical physical infrastructures that are controlled by software, which implies that threats might extend to real lives. Stuxnet differs from past malware in several ways. First, most malware tries to infect as many computers as possible, whereas Stuxnet appears to target industrial control systems and delivers its pay load under very specific conditions. Second, Stuxnet is larger and more complex than other malware. It cotains exploits for four vulnerabilities.

352 citations


Journal ArticleDOI
TL;DR: The problem of scalability has become critical for cloud computing providers and the cloud paradigm is attractive because it offers a dramatic reduction in capital and operation expenses for consumers.
Abstract: As cloud computing becomes more predominant, the problem of scalability has become critical for cloud computing providers. The cloud paradigm is attractive because it offers a dramatic reduction in capital and operation expenses for consumers.

236 citations


Journal ArticleDOI
TL;DR: This research presents a meta-modelling system that automates the very labor-intensive and therefore time-heavy and therefore expensive and expensive process of manually cataloging and cataloging individual tweets.
Abstract: Behavioral finance researchers can apply computational methods to large-scale social media data to better understand and predict markets.

205 citations


Journal ArticleDOI
TL;DR: The culmination of 10 years' research converges on-demand applications with the infrastructure-servers, storage, networks, and client devices-to support cloud computing.
Abstract: The mobility/cloud ecosystem aims to deliver infrastructure, platforms, and software as a service, enabling more people to benefit from ubiquitous information access. The culmination of 10 years' research converges on-demand applications with the infrastructure-servers, storage, networks, and client devices-to support cloud computing.

197 citations


Journal ArticleDOI
TL;DR: Social and community intelligence research aims to reveal individual and group behaviors, social interactions, and community dynamics by mining the digital traces that people leave while interacting with Web applications, static infrastructure, and mobile and wearable devices.
Abstract: Social and community intelligence research aims to reveal individual and group behaviors, social interactions, and community dynamics by mining the digital traces that people leave while interacting with Web applications, static infrastructure, and mobile and wearable devices.

184 citations


Journal ArticleDOI
TL;DR: The era of sequential computing must give way to an era in which parallelism holds the forefront, and this is an opportune time for innovation in programming systems and computing architectures.
Abstract: The end of dramatic exponential growth in single-processor performance marks the end of the dominance of the single microproessor in computing. The era of sequential computing must give way to an era in which parallelism holds the forefront. Although important scientific and engineering challenges lie ahead, this is an opportune time for innovation in programming systems and computing architectures.

177 citations


Journal ArticleDOI
TL;DR: The EnCoRe project has developed a technical solution for privacy management that is suitable for use in a broad range of domains, enabling users to improve control over their personal information.
Abstract: Machine-readable policies can stick to data to define allowed usage and obligations as it travels across multiple parties, enabling users to improve control over their personal information. The EnCoRe project has developed such a technical solution for privacy management that is suitable for use in a broad range of domains.

162 citations


Journal ArticleDOI
Tommer Leyvand1, Meekhof Casey Leon1, Yichen Wei1, Jian Sun1, Baining Guo1 
TL;DR: Kinect Identity, a key component of Microsoft's Kinect for the Xbox 360, combines multiple technologies and careful user interaction design to achieve the goal of recognizing and tracking player identity.
Abstract: Kinect Identity, a key component of Microsoft's Kinect for the Xbox 360, combines multiple technologies and careful user interaction design to achieve the goal of recognizing and tracking player identity.

161 citations


Journal ArticleDOI
TL;DR: In electronic financial markets, algorithmic trading refers to the use of computer programs to automate one or more stages of the trading process: pretrade analysis, trading signal generation, and trade execution.
Abstract: In electronic financial markets, algorithmic trading refers to the use of computer programs to automate one or more stages of the trading process: pretrade analysis (data analysis), trading signal generation (buy and sell recommendations), and trade execution. Trade execution is further divided into agency/broker execution (when a system optimizes the execution of a trade on behalf of a client) and principal/proprietary trading (where an institution trades on its own account). Each stage of this trading process can be conducted by humans, by humans and algorithms, or fully by algorithms.

Journal ArticleDOI
TL;DR: Digital technologies are transforming the way cultural heritage researchers, archaeologists, and curators work by providing new ways to collaborate, record excavations, and restore artifacts as mentioned in this paper, and they can be used for collaborative, collaborative, and restoration of artifacts.
Abstract: Digital technologies are transforming the way cultural heritage researchers, archaeologists, and curators work by providing new ways to collaborate, record excavations, and restore artifacts

Journal ArticleDOI
TL;DR: The confluence of emerging technologies and new data-centric workloads offers a unique opportunity to rethink traditional system architectures and memory hierarchies in future designs.
Abstract: The confluence of emerging technologies and new data-centric workloads offers a unique opportunity to rethink traditional system architectures and memory hierarchies in future designs.

Journal ArticleDOI
TL;DR: Digital technology has profound social implications that bring with them ethical responsibilities for computing professionals that need to be considered in the context of their work.
Abstract: Digital technology has profound social implications that bring with them ethical responsibilities for computing professionals.

Journal ArticleDOI
TL;DR: In a synchronous digital platform for building large cognitive models, memristive nanodevices form dense, resistive memories that can be placed close to conventional processing circuitry and through adaptive transformations, the devices can interact with the world in real time.
Abstract: In a synchronous digital platform for building large cognitive models, memristive nanodevices form dense, resistive memories that can be placed close to conventional processing circuitry Through adaptive transformations, the devices can interact with the world in real time

Journal ArticleDOI
TL;DR: Globalization of the semiconductor industry and associated supply chains have made integrated circuits increasingly vulnerable to Trojans and researchers must expand efforts to verify trust in intellectual property cores and ICs.
Abstract: Globalization of the semiconductor industry and associated supply chains have made integrated circuits increasingly vulnerable to Trojans. Researchers must expand efforts to verify trust in intellectual property cores and ICs.

Journal ArticleDOI
TL;DR: Software-defined-network technologies like OpenFlow could change how datacenters, cloud systems, and perhaps even the Internet handle tomorrow's heavy network loads.
Abstract: Software-defined-network technologies like OpenFlow could change how datacenters, cloud systems, and perhaps even the Internet handle tomorrow's heavy network loads

Journal ArticleDOI
TL;DR: A proposed new SOA maturity model addresses this gap by accounting for the different motivations for SOA adoption by IT administrators, business managers, and enterprise leaders.
Abstract: While some have touted service-oriented architecture as "the next big thing," many SOA efforts have failed to achieve organizational objectives. A proposed new SOA maturity model addresses this gap by accounting for the different motivations for SOA adoption by IT administrators, business managers, and enterprise leaders.

Journal ArticleDOI
TL;DR: The EnergyLife mobile interface incorporates lessons from environmental psychology and feedback intervention to relay information from appliance sensors, offering a gaming environment that rewards users for decreased electricity consumption.
Abstract: The EnergyLife mobile interface incorporates lessons from environmental psychology and feedback intervention to relay information from appliance sensors, offering a gaming environment that rewards users for decreased electricity consumption.

Journal ArticleDOI
TL;DR: A recent survey of organizations with experience using cloud applications and platforms reveals that they are more bullish on the technology and more aggressive in their adoption plans than the overall market.
Abstract: A recent survey of organizations with experience using cloud applications and platforms reveals that they are more bullish on the technology and more aggressive in their adoption plans than the overall market.

Journal ArticleDOI
TL;DR: The UrBan Interactions research program has created a middleware layer on top of the panOULU wireless network and opened it up to ubiquitous-computing researchers, offering opportunities to enhance and facilitate communication between citizens and the government.
Abstract: The UrBan Interactions (UBI) research program, coordinated by the University of Oulu, has created a middleware layer on top of the panOULU wireless network and opened it up to ubiquitous-computing researchers, offering opportunities to enhance and facilitate communication between citizens and the government.

Journal ArticleDOI
TL;DR: To achieve the optimal performance per utility, the slowest node's response time should be no more than three times that of the fastest node.
Abstract: Cloud computing has emerged as a highly cost-effective computation paradigm for IT enterprise applications, scientific computing, and personal data management. Because cloud services are provided by machines of various capabilities, performance, power, and thermal characteristics, it is challenging for providers to understand their cost effectiveness when deploying their systems. This article analyzes a parallelizable task in a heterogeneous cloud infrastructure with mathematical models to evaluate the energy and performance trade-off. As the authors show, to achieve the optimal performance per utility, the slowest node's response time should be no more than three times that of the fastest node. The theoretical analysis presented can be used to guide allocation, deployment, and upgrades of computing nodes for optimizing utility effectiveness in cloud computing services.

Journal ArticleDOI
TL;DR: Proposed optimization techniques address the major challenges that varying wireless channel conditions, short battery lifetime, and interaction latency pose for the remote display of cloud applications on mobile devices.
Abstract: Proposed optimization techniques address the major challenges that varying wireless channel conditions, short battery lifetime, and interaction latency pose for the remote display of cloud applications on mobile devices.

Journal ArticleDOI
TL;DR: Cloud-computing standards haven't yet gained traction, and industry observers say this could limit future adoption of the technology.
Abstract: Cloud-computing standards haven't yet gained traction, and industry observers say this could limit future adoption of the technology.

Journal ArticleDOI
TL;DR: The concept of evolutionary computation has affected virtually every area of software design, not merely as a metaphor, but as a realistic algorithm for exploration, insight, and improvement.
Abstract: The concept of evolutionary computation has affected virtually every area of software design, not merely as a metaphor, but as a realistic algorithm for exploration, insight, and improvement.

Journal ArticleDOI
TL;DR: The growing popularity of wireless technology may have finally attracted enough hackers to make the potential for serious security threats a reality, providing a ready way for hackers to attack the device.
Abstract: The growing popularity of wireless technology may have finally attracted enough hackers to make the potential for serious security threats a reality. The world of computers and communications, the more widely a technology is used, the more likely it is to become the target of hackers. Such is the case with mobile technology, particularly smartphones, which have exploded in popularity in recent years. Many users download mobile applications with little regard to whether they're secure, providing a ready way for hackers to attack the device.

Journal ArticleDOI
TL;DR: Despite the widespread use of antivirus software, malware remains pervasive and a new study compares the effectiveness of six commercial AV products.
Abstract: Despite the widespread use of antivirus software, malware remains pervasive. A new study compares the effectiveness of six commercial AV products.

Journal ArticleDOI
TL;DR: The attacker tried to break into at least three certificate authorities' systems and succeeded with two of the CAs.
Abstract: Several attacks this year against organizations issuing digital certificates are creating doubts about the system. For almost 20 years, digital certificates have been a key aspect of Internet security. The certificates-detailed in the "The Digital Certificate" side-bar-are designed to establish the credentials of people doing business or otherwise communicating on the Web and to verify that they are who they say they are. However, several attacks this year by a hacker against organizations issuing certificates are creating doubts about Internet communications' safety in general and the digital-certificate model's integrity in particular. The attacker tried to break into at least three certificate authorities' systems and succeeded with two of the CAs.

Journal ArticleDOI
TL;DR: A stage serves as an apt metaphor to explore the ways in which these ubiquitous screens can transform passive viewing into an involved performance.
Abstract: Framed digital displays will soon give way to walls and facades that creatively motivate individual and group interaction. A stage serves as an apt metaphor to explore the ways in which these ubiquitous screens can transform passive viewing into an involved performance.

Journal ArticleDOI
TL;DR: The boundary between the trusted inside and the untrusted outside blurs when a company adopts cloud computing, fundamentally changing the definition of a malicious insider.
Abstract: The boundary between the trusted inside and the untrusted outside blurs when a company adopts cloud computing. The organization's applications-and data-are no longer onsite, fundamentally changing the definition of a malicious insider.