Science topics: Computer ScienceComputer and Society
Science topic
Computer and Society - Science topic
Explore the latest publications in Computer and Society, and find Computer and Society experts.
Publications related to Computer and Society (2,593)
Sorted by most recent
various modeling languages of the time, thus becoming the universal language for systems modeling, currently the UML is in the current version 2.5 .1 as informed by the Object Management Group (OMG), the objective of this work is to present software modeling using the UML, presenting some important concepts of the diagrams such as: Use Case Diagram...
The work All to Sand Returns (2022) is an audiovisual installation created by the duo open.circuit (Assunta Alegiani and Pedro Ferreira) that follows an abstract sci-fi narrative to speculate on the consequences of the rise of the sea level and global warming in a near future influenced by the growth of the computational networked world. As a thoug...
In the present era, data plays a crucial role across various disciplines, serving as the foundation for exploration and advancements. However, in the domain of eHealth, a readily available dataset for training AI models to predict cardiac arrest using the internet of medical things (IoMT) is lacking. To bridge this gap, this research article addres...
With the rapid growth of cloud computing services, the high energy consumption of cloud data centers has become a critical concern of the cloud computing society. While virtual machine (VM) consolidation is often used to reduce energy consumption, excessive VM consolidation may lead to local hot spots and increase the risk of equipment failure. One...
Social media are developing into the most important collaborative bottom-up interaction and multi-way communication tools among individuals for discussion, knowledge sharing, comments and ratings, content and information creation and exchange. Social media tools are rapidly changing the landscape of collaboration, communication, knowledge creation,...
Unlabelled:
It has been shown that unsupervised outlier detection methods can be adapted to the one-class classification problem (Janssens and Postma, in: Proceedings of the 18th annual Belgian-Dutch on machine learning, pp 56-64, 2009; Janssens et al. in: Proceedings of the 2009 ICMLA international conference on machine learning and applications,...
Aspects of software quality (SQ), such as process and product metrics, and assessment techniques, can be taught to computing students during their undergraduate courses, however, there is no consensus on how. In Brazil, computing courses are structured as the Brazilian Computer Society suggests, still, researchers point out that there are few SQ su...
The computer society uses a variety of automated methods for file security and data storage. Several organisations are concerned about the information exchange via an unsecured network for a distributed architecture, such as the time-sharing and real-time system. Probably the most crucial element that contributes to effective security is cryptograp...
Preface This volume contains the papers presented at ITED 2022: Information Technology for Education and Development held on 1-3 rd Novermber 2022 in ABUJA, Nigeria. On behalf of the organizing committee, it is my honor to welcome you to ITED22. After previous editions with the IEEE consultants' network and Computer society, we are finally able to...
Video conferencing has enabled synchronous communication in a classroom and created multi-sensory content to stimulate learners. Artificial intelligence involves complex equations that are better taught using a constructive pedagogy where students experiment with alternative ways of solving the same problem. Multiple-choice questions have high reli...
The demand for cloud storage services continuously increases putting at risk the privacy of the outsourced data. Data encryption is the obvious solution, a well-studied and mature technology. However, it does not support search queries on encrypted data and the server cannot process the outsourced data in their protected form. To counteract this pr...
I am delighted to introduce the inaugural volume of the IEEE Transactions on Machine Learning in Communications and Networking (TMLCN), which is an interdisciplinary journal supported by the IEEE Communications Society, the IEEE Signal Processing Society, the IEEE Vehicular Technology Society, and the IEEE Computer Society. The relationship between...
CONTEXT
Professional skills have become increasingly important in software engineering education; however, this is not always reflected in today’s teaching curricula (Petkovic et al., 2017). The Australian Computer Society report states software engineering and ICT students are lacking essential lifelong non-technical skills necessary to create suc...
In 1996, the famous scholar Ajtai proposed the reduction principle from the worst case to the average case at the 28th Summer Symposium of the American Computer Society (ACM), named the Ajtai reduction principle [see Ajtai (1996), Ajtai (1999) and Ajtai and Dwork (1997)]. Subsequently, Ajtai and Dwork presented the first lattice-based cryptosystem,...
Ethics and Information and Computer Systems Security go hand in hand. Security is related to freedom from risk or the threat of change for the worse and is directly associated with moral values and evaluation. In Brazil, the largest and most important event related to this topic is the Brazilian Symposium on Information and Computational Systems Se...
This text was written as part of the mini-course presented at the Information Technology Update Journey at the 1996 Brazilian Computer Society Congress.
The objective of this mini-course is to provide a comprehensive view of the area of Artificial Neural Networks, presenting from the philosophical issues involved in the approach, through the theore...
The usage of IoT and robots is more and more present in smart farming, and in particular in agro-ecology since robots are able to provide smart practices and avoid repetitive human tasks. However, these new technologies rise several research issues, which are strongly inter-related, about Farm Management Information System, such as robots’ programm...
Adopting the perspective of Peircean semiotics, the work proposes to analyze the concept of disin-formation based on the phenomenon of fake news and the “post-truth” neologism associated with it. We review some contemporary informational theories, which start from the relationship between communication, computing, society and technologies, to demon...
How do individual human minds create languages, legal systems, scientific theories, and technologies? From a cognitive science viewpoint, such collective phenomena may be considered a type of distributed computation in which human minds together solve computational problems beyond any individual. This viewpoint may also shift our perspective on ind...
Background: A systematic literature review (SLR) is a research methodology that examines data and findings of other authors relative to specified research questions (RQ), collects multiple research studies, and summarises them to answer a research question using rigorous methods. Many SLRs have been published on uterine fibroids (UFs) in the last t...
Cramer and Shoup introduced at Eurocrypt’02 the concept of hash proof system, also designated as smooth projective hash functions. Since then, they have found several applications, from building CCA-2 encryption as they were initially created for, to being at the core of several authenticated key exchange or even allowing witness encryption. In the...
"This is an important book. Ethics is not an easy topic, and arguably the ethics of IT is less so—not least due to its potential for developing and evolving in ways that are either unforeseen or unimaginable . . . . Use this book as a practical resource, an informative and educational source of material in developing expertise, but also as an inval...
In this paper, we present the Multi-Forgery Detection Challenge held concurrently with the IEEE Computer Society Workshop on Biometrics at CVPR 2022. Our Multi-Forgery Detection Challenge aims to detect automatic image manipulations including but not limited to image editing, image synthesis, image generation, image photoshop, etc. Our challenge ha...
This article examines artistic practices that engage with digital technologies through a critical making methodology. Critical making is described as a hands- on practice that aims to merge critical thinking with making. This is a practice that focuses on the process of making and combines material experimentation with critical thinking about the e...
Authors are invited to submit papers for “2022 International Symposium on Quantum Computing: Circuits Systems Automation and Applications (QC-CSAA)” July 18-19, 2022. The 2022 symposium will occur in virtual/online mode. The previous two successful editions (2020 and 2021) of QC-CSAA have occurred as workshops at the IEEE Computer Society Annual Sy...
Objectives
The aim of this study was to identify and characterise the health and social care membership of the British Computer Society (BCS), an international informatics professional organisation, and to determine their ongoing development needs.
Methods
A prepiloted online survey included items on professional regulatory body, job role, work se...
Use the Phases of Team Development (Based on Bruce W. Tuckman's Model of Forming, Storming, Norming, Performing, and Adjourning) to Help Teams Grow and Advance: 2022 Update * * * * * Want happier and more productive teams? Among other things, it takes great leadership. And proven strategies can provide a real edge! That’s where the groundbreaking w...
I will be speaking at this event alongside The Nigeria honorable Ministers of Education (Mallam Adamu Adamu) and that of Communication and Digital Economy (Prof. Isah Ibrahim Pantami ) on Jan 19, 2022.The event is organized by the National Secretariat of Nigeria Computer Society.
Datox explores the imperceptible electromagnetic radiation generated by elec- tronics and digital technologies as sonic material. The work is a music album and a live performance that creates an audiovisual environment that explores sonic possibilities through the amplification of imperceptible sounds. This aims to highlight a material layer that c...
Customized product requirements are driving the need for variety oriented assemblies even in collaborative environments between humans and robots. This calls for the need for robots and humans to be intelligent in order to be aware of and adapt to different product needs. To address this, this study presents a novel approach and architecture to rea...
Disproportionality of gender in Information Technology field is well known. Women are a minority in the academic world, even in a scenario where there are efforts to value female models of success in computing. Reflecting on the historical bias, it can be seen that this fact causes impact on the scientific research development in this field. Scient...
The British Computer Society has invited this presentation on Matrices of Sets, in its Interest Group on Formal Aspects of Computing Science (BCS/FACS).
Outline:
* short reminder of the parallel timeline of development of matrices and set theory, by leading mathematicians as Cayley, Sylvester, Jordan, Hilbert for matrices, and mainly Cantor for se...
Several security solutions have been proposed to detect network abnormal behavior. However, successful attacks is still a big concern in computer society. Lots of security breaches, like Distributed Denial of Service (DDoS), botnets, spam, phishing, and so on, are reported every day, while the number of attacks are still increasing. In this paper,...
Using some nearly forgotten facts, this article reviews the origins of the IEEE Computer Society and the first Technical Committee on Electronic Computers, established about 10 years after the revolutionary invention of electronic digital computing.
The Power of processor increases every time it receives positive inputs that can change the influence of viruses into positive running or their life is decreased by culling. The remains of the viruses need storage where we can review the characteristics, which may evolve again due to genetic reasons over evolution of time. The mutant can be either...
With parallel and distributed computing (PDC) now wide-spread, modern computing programs must incorporate PDC within the curriculum. ACM and IEEE Computer Society's Computer Science curricular guidelines have recommended exposure to PDC concepts since 2013. More recently, a variety of initiatives have made PDC curricular content, lectures, and labs...
Our recent work (Ayral et al. in Proceedings of IEEE computer society annual symposium on VLSI, ISVLSI, pp 138–140, 2020. https://doi.org/10.1109/ISVLSI49217.2020.00034) showed the first implementation of the Quantum Divide and Compute (QDC) method, which allows to break quantum circuits into smaller fragments with fewer qubits and shallower depth....
The necessity of introducing the fundamental concepts of Computingin Brazilian elementary, middle and high school has beenincreasingly discussed by the Brazilian Computer Society (SBC).Nevertheless, to the best of our knowledge, there is no literaturethat explains how these concepts should be applied. This articledescribes how those specific Comput...
Welcome Messages from IEEE BigDataSE 2020 Program Chairs
On behalf of the Program Committee of the 14th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE 2020), we would like to welcome you to join the conference in Guangzhou, China, December 29, 2020 - January 1, 2021.
The IEEE BigDataSE 2020 Conference is a forum f...
In [Tense operators on De Morgan algebras, Log. J. IGPL 22(2) (2014) 255–267], Figallo and Pelaitay introduced the notion of tense operators on De Morgan algebras. Also, other notions of tense operators on De Morgan algebras were given by Chajda and Paseka in [De Morgan algebras with tense operators, J. Mult.-Valued Logic Soft Comput. 1 (2017) 29–4...
Our recent work (Ayral et al., 2020 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)) showed the first implementation of the Quantum Divide and Compute (QDC) method, which allows to break quantum circuits into smaller fragments with fewer qubits and shallower depth. QDC can thus deal with the limited number of qubits and short coherence time...
2nd International Workshop on Quantum Computing: Circuits Systems Automation and Applications (QC-CSAA)
in conjuction with the ISVLSI 2021
Website: https://lnkd.in/e29YRVc
Authors are invited to submit papers for "2nd International Workshop on Quantum Computing: Circuits Systems Automation and Applications (QC-CSAA)" in conjunction with the IEEE...
We provide a simple and novel algorithmic design technique, for which we call iterative partial rounding, that gives a tight rounding-based approximation for vertex cover with hard capacities (VC-HC). In particular, we obtain an f-approximation for VC-HC on hypergraphs, improving over a previous results of Cheung et al. (In: SODA’14, 2014) to the t...
This book presents new knowledge and recent developments in all aspects of computational techniques, mathematical modeling, energy systems, applications of fuzzy sets and intelligent computing. The book is a collection of best selected research papers presented at the International Conference on “Mathematical Modeling, Computational Intelligence Te...
It is indeed a great honor to be the inaugural Editor-in-Chief of the IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY (OJCS). OJCS is a rigorously peer-reviewed forum for rapid publication of open access (OA) articles describing high-impact results on the latest emerging topics and trends in all areas of interest to the IEEE Computer Society, encompassin...
The purpose of this paper is to explore the Code of Ethics practices in relation to cybersecurity in the Cloud context relating to small and medium-sized enterprises (SMEs). The study was based on primary data collected via a questionnaire focusing on the Australian Computer Society (ACS) Code of Ethics and its relationship to Cloud computing. The...
Douglas Allswell Kelechi, Cosmas Ifeanyi Nwakanma, Augustine Ikenna Udunwa and Ikenna Uzoma Ajere, "A Survey of Challenges and Opportunities on COVID-19 and Emerging Technologies in Nigeria".
African Journal of Computing & ICT (Afr. J. Comp. & ICT)
IEEE Nigeria Computer Society partner.
volume 13, no 4, December 2020; P-ISSN 2006-1781
This study reported the conference papers presented conducted by the two computing societies in the Philippines. Toward this goal, all published conference proceedings from the National Conference of IT Education and Philippine Computing Society Conference were gathered and analyzed using social network analysis. The findings of the study disclosed...
The paper presents the development of educational activities in the field of computing. Professional associations, primarily the ACM (Association for Computing Machinery) and the CS IEEE (Computer Society Institute of Electrical and Electronics Engineers) have recognized the need to define an educational framework at the level of computing. Over th...
Link: http://www.ivpai.org/pages/ivpai2020.html#
IVPAI2020 has been held successfully on August 22-23, 2020 at Sheraton Grand Shanghai Pudong Hotel in Shanghai. IVPAI2020 achieved its great success.
The scientific program for the event was filled with presentations delivered by researchers and scholars from the international community, including...
The problem of defining the concept “business analysis in IT project”
and scope of business analysis activities are considered. The comparative analysis of three bodies of knowledge on business analysis from leading international
institutions International Institute of Business Analysis, Project Management
Institute and British Computer Society is...
Information and communication technology (ICT) have evolved in today's
computing society whose waste causes environmental impacts and compromises
sustainability. The objective of this research was to investigate the evolution of
communication and information technology about it, and the environmental impacts
this has caused on environmental sustain...
The 10th IEEE International Workshop on Software Certification
Co-located with the ISSRE 2020 full-virtual conference 12-15 October 2020.
Accepted peer-reviewed papers will be still included in a supplemental volume of the ISSRE conference proceedings, published by the IEEE Computer Society on IEEE Xplore.
Sponsored by : Baba Farid College, India-IEEE Computer Society Canada- MSEST-NIELIT-SIRG
O movimento de pesquisadores de Educação em Computação no Brasil vem promovendo vários espaços de diálogo dentro da Sociedade Brasileira de Computação com diversas áreas da Computação. Uma destas áreas é a Informática na Educação, com a qual estabelece convergências de pesquisa promissoras. Este artigo busca tecer considerações iniciais sobre as co...
Professional computer ethics has widened its scope over the last 20 years as a direct result of the massive growth in computer mediated services by government and industry, and concerns over how data and interaction processes are recorded. These shifts are explored in conjunction with the parallel decline in community trust of government. The growi...
Professional computer ethics has widened its scope over the last 20 years as a direct result of the massive growth in computer mediated services by government and industry, and concerns over how data and interaction processes are recorded. These shifts are explored in conjunction with the parallel decline in community trust of government. The growi...
The aim of this work is to develop a new design concept for museum space using modern exhibition technologies. The new design concept of the museum space will increase the interest of visitors to museums. For the development of criteria were compiled, a classification of modern museum spaces. The expositional premises of the museum are modeled, a c...
This note is concerned with an extension, at second order, of an inequality on the discrete cube \(C_n=\{-\,1,1\}^n\) (equipped with the uniform measure) due to Talagrand (Ann Probab 22:1576–1587, 1994). As an application, the main result of this note is a theorem in the spirit of a famous result from Kahn et al. (cf. Proceedings of 29th Annual Sym...
Visual short-term tracking in a long sequence of images with a lot of pose variations, target deformations and different types of occlusion is one of the harshest tasks in image processing. Overcoming such challenges can be performed in a superior way by combining different trackers. In this paper, we propose a method that combines different algori...
***** Call For Papers *****
2020 International Conference on Blockchain and Trustworthy Systems (BlockSys'2020)
---------------------------------------------------------
Aug. 6 - 7, 2020, Dali City, China
http://blocksys.info/
---------------------------------------------------------
---------------------------------------------------------
Not...
Since Papert generated the term, Computational Thinking (CT), many scholars devoted their effort in finding its nature. After Jeannette Wing's influential argument, it had been catching more researchers, educators, and policymakers' attention and been recognized as one of the important skills in this increasingly computing society. However, because...
Smart transportation systems have been providing more data over time (such as bus routes, users, smartphones, etc.). Such data provides a number of opportunities to identify various facets of user behavior and traffic trends. In this paper we address some of the urban mobility challenges (already discussed by the Brazilian Computer Society), from a...
Information and communication technology (ICT) have evolved in today's computing society whose waste causes environmental impacts and compromises sustainability. The objective of this research was to investigate the evolution of communication and information technology about it, and the environmental impacts this has caused on environmental sustain...
This Festschrift, Unimagined Futures – ICT Opportunities and Challenges, examines key challenges facing the ICT community today. While addressing the contemporary challenges, the book provides the opportunity to look back to help understand the contemporary scene and identify appropriate future responses to them. Experts in different areas of the I...
Pada penelitian ini, dilakukan klasifikasi dokumen Tugas Akhir di Teknik Informatika UMM. Permasalahan yang dihadapi adalah sulitnya untuk mencari informasi yang relevan dan sulitnya melakukan pengkategorian dokumen TA sesuai bidang minat jika harus dilakukan secara manual. Tujuan penelitian ini adalah mendapatkan informasi berdasarkan abstrak TA s...
The Presentation was done at the National Regional Convention 2019 organized by the Computer Society of India, Lucknow Chapter.
Here are the predictions for the Top 12 Tech Trends in 2020.
The IEEE Computer Society has been predicting technology trends since 2015, and its annual forecast garners widespread attention for its authoritativeness.
At the end of each year, the society also grades itself on its annual predictions with a scorecard, or report card, and they attract...
Interactive image segmentation has been an active research topic in image processing and computer graphics. One of its appealing advantage is the optimization of human feedback and interactions to generate user-desired results. Segmentation results of most previous methods usually depend on the quality and quantity of the user input. In this paper,...
DAMSS-2019 is the 11th international workshop on data analysis methods for software systems, organized in Druskininkai, Lithuania, at the end of the year. The same place and the same time every year. History of the workshop starts from 2009 with 16 presentations. The idea of such workshop came up at the Institute of Mathematics and Informatics that...
Blockchain is gradually becoming the mainstream technology for next-generation smart applications. It has the potential to ensure inclusive participation of various stakeholders to develop innovative solutions for collective and larger benefits for social good. In addition, the execution of unique decentralized business models on blockchain will en...
ICT and the increasing availability of digital data are dramatically changing the processes of research and knowledge production in the social sciences and humanities (SSH). Whereas the methodological momentum in digital humanities and computational social sciences is already immense, theory development in the SSH is much less dynamic and consists...
Cloud computing is amongst the leading and most promising set of IT services in the current era. There is no doubt that it has taken the computer society by a storm in recent years. What is so apparent with this system is the tremendous efforts made to ensure the computing resources come as a service. Cloud computing as a platform has an enormous p...
Western Canon is a set of books, movies, music
and art which holds the essence of western culture, it contains
the common sense of western people. The western canon of
software engineering is a set of artworks (books, papers, blogs,
projects) which holds the essence of software engineering. The
canon is not fixed, it changes time to time because sc...
Balancing theory and practice is a recurring challenge in Software Engineering (SE) education. However, the curriculum guidelines of the ACM/IEEE and Brazilian Computer Society emphasize the need of providing students with sufficient practical experiences for the development of competences expected for SE professional. Student-centered and learn-by...
Abstract
Context: Mapping and analyzing the diversity of experiences and studies that address CT&P in K-12 education can bring valuable data to researchers. This work delimits such study to the Brazilian scenario to allow a more in-depth view. Previous surveys and systematic mapping studies present recent publications in major Brazilian computing j...
Analysis of image contents became one of the important subjects in modern life. In order to recognize the images with efficient way, several techniques appeared and periodically enhanced by the developers. Image retrieval becomes one of the main problems that face the computer society inside the revolution of technology. To increase the effectivene...
Analysis of image contents has become one of the important subjects in modern life. In order to recognize the images with efficient way, several techniques have appeared and periodically enhanced by the developers. Image retrieval becomes one of the main problems that face the computer society inside the revolution of technology. To increase the ef...
Place/transition Petri nets are a standard model for a class of distributed systems whose reachability spaces might be infinite. One of well-studied topics is verification of safety and liveness properties in this model; despite an extensive research effort, some basic problems remain open, which is exemplified by the complexity status of the reach...
The purpose of this study was to identify the common emerging ICT technologies and issues and challenges facing the smooth implementation of those technologies. The study addressed the following objectives; Identify Possible Solutions that Can Ease the Implementation of Emerging Technologies in Kenya. The study was self-administered and the populat...
Welcome to London and to London Metropolitan University, a public research university with roots going back to 1848, it is one of the London’s oldest educational institutions.
We have the pleasure to introduce the proceedings of the second International Conference on Computing, Electronics and Communications Engineering 2019 (iCCECE ’19), held fro...
Big Data Analytics: principles, trends and tasks (a survey)
Olexandr S. Balabanov
Abstract
We review current directions (avenues) in Big Data analysis, practical meaning of Big Data analysis and problems and tasks in this field. Big Data Analytics now appears a dominant trend of developments of modern information technologies for management in...
This document is an extended abstract of an IEEE Software paper, "Metamorphic Testing: Testing the Untestable," presented as a J1C2 (Journal publication first, Conference presentation following) at the IEEE Computer Society signature conference on Computers, Software and Applications (COMPSAC 2019), hosted by Marquette University, Milwaukee, Wiscon...
For standard algorithms verifying positive definiteness of a matrix $A\in\mathbb{M}_n(\mathbb{R})$ based on Sylvester's criterion, the computationally pessimistic case is this when $A$ is positive definite. We present two algorithms realizing the same task for $A\in\mathbb{M}_n(\mathbb{Z})$, for which the case when $A$ is positive definite is the o...