Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
My Subscriptions
Browse Content
Resources
All
Your New Research Discovery Platform
My Subscriptions
Browse Content
Resources
All
Advanced Search
Browse more than 981k articles on advanced computing topics
Magazines
Journals
Video Library
Conference Proceedings
Remote Access
Contextual Integrity, Explained: A More Usable Privacy Definition
Nathan Malkin
IEEE Security & Privacy, Jan.-Feb. 2023
Popular
Understanding the Impact of AI-Generated Deepfakes on Public Opinion, Political Discourse, and Personal Security in Social Media
Prakash L. Kharvi
IEEE Security & Privacy, July-Aug. 2024
Popular
The Origins of Software Errors: Where Do They Come From? Where Do They Go?
John McHugh
Computer, April 2025
Popular
Latest Articles
Quantum Implementation and Analysis of SHA-2 and SHA-3
Full-text access may be available. Sign in or learn about subscription options.
by
Kyungbae Jang
,
Sejin Lim
,
Yujin Oh
,
Hyunjun Kim
,
Anubhab Baksi
,
Sumanta Chakraborty
,
Hwajeong Seo
Integrated Circuit Image Synthesis for Unsupervised Circuit Annotation via Shape Consistent Image Translation
Full-text access may be available. Sign in or learn about subscription options.
by
Yee-Yang Tee
,
Xuenong Hong
,
Deruo Cheng
,
Tong Lin
,
Yiqiong Shi
,
Bah-Hwee Gwee
A Continuous Authentication Framework for Securing Metaverse Identities
Full-text access may be available. Sign in or learn about subscription options.
by
Sangsoo Han
,
Eunbi Hwang
,
YoonSik Kim
,
Taekyoung Kwon
A Bio-Inspired Model for Bee Simulations
Full-text access may be available. Sign in or learn about subscription options.
by
Qiang Chen
,
Wenxiu Guo
,
Yuming Fang
,
Yang Tong
,
Tingsong Lu
,
Xiaogang Jin
,
Zhigang Deng
LLMs Meet Library Evolution: Evaluating Deprecated API Usage in LLM-based Code Completion
Full-text access may be available. Sign in or learn about subscription options.
by
Chong Wang
,
Kaifeng Huang
,
Jian Zhang
,
Yebo Feng
,
Lyuye Zhang
,
Yang Liu
,
Xin Peng
Deadline-aware Online Job Scheduling for Distributed Training in Heterogeneous Clusters
Full-text access may be available. Sign in or learn about subscription options.
by
Yuchen Zhang
,
Long Luo
,
Gang Sun
,
Hongfang Yu
,
Bo Li
Infrared and Visible Image Fusion: From Data Compatibility to Task Adaption
Full-text access may be available. Sign in or learn about subscription options.
by
Jinyuan Liu
,
Guanyao Wu
,
Zhu Liu
,
Di Wang
,
Zhiying Jiang
,
Long Ma
,
Wei Zhong
,
Xin Fan
,
Risheng Liu
Designing Programmable Accelerators for Sparse Tensor Algebra
Full-text access may be available. Sign in or learn about subscription options.
by
Kalhan Koul
,
Zhouhua Xie
,
Maxwell Strange
,
Sai Gautham Ravipati
,
Bo Wun Cheng
,
Olivia Hsu
,
Po-Han Chen
,
Mark Horowitz
,
Fredrik Kjolstad
,
Priyanka Raina
AMD Instinct™ MI300X: A Generative AI Accelerator and Platform Architecture
Full-text access may be available. Sign in or learn about subscription options.
by
Alan Smith
,
Vamsi Krishna Alla
Inner Speech and Damasio's Theory for Modelling Robot's Emotions
Full-text access may be available. Sign in or learn about subscription options.
by
Sophia Corvaia
,
Arianna Pipitone
,
Antonio Chella
Trending
Contextual Integrity, Explained: A More Usable Privacy Definition
Nathan Malkin
Understanding the Impact of AI-Generated Deepfakes on Public Opinion, Political Discourse, and Personal Security in Social Media
Prakash L. Kharvi
The Origins of Software Errors: Where Do They Come From? Where Do They Go?
John McHugh
Measuring and Visualizing Dataset Coverage for Machine Learning
D. Richard Kuhn
, +2 more
Unveiling IoT Threats: A Case Study on Darknet and Honeypot Analysis
Koji Nakao
, +2 more
Search By Popular Terms
accessibility
ai
autonomous vehicles
big data
blockchain
cyberthreats
cyber-physical systems
hpc / high performance computing / supercomputing
iot
language processing
Libraries and Institutions
Bring top computing research to your institution.
Learn More
Authors
Write academic, technical, and industry research papers in computing.
Learn More
Researchers
Browse our academic journals for the latest in computing research.
Learn More