Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
My Subscriptions
Browse Content
Resources
All
Your New Research Discovery Platform
My Subscriptions
Browse Content
Resources
All
Advanced Search
Browse more than 981k articles on advanced computing topics
Magazines
Journals
Video Library
Conference Proceedings
Remote Access
Contextual Integrity, Explained: A More Usable Privacy Definition
Nathan Malkin
IEEE Security & Privacy, Jan.-Feb. 2023
Popular
Understanding the Impact of AI-Generated Deepfakes on Public Opinion, Political Discourse, and Personal Security in Social Media
Prakash L. Kharvi
IEEE Security & Privacy, July-Aug. 2024
Popular
Quality of Low-Code/No-Code Development Platforms Through the Lens of ISO 25010:2023
Bilal Naqvi
, +3 more
Computer, March 2025
Popular
Latest Articles
Distributed Economic Dispatch in Power Networks Incorporating Data Center Flexibility
Full-text access may be available. Sign in or learn about subscription options.
by
Athanasios Tsiligkaridis
,
Panagiotis Andrianesis
,
Ayse K. Coskun
,
Michael C. Caramanis
,
Ioannis Ch. Paschalidis
FuzzyPPI: Large-Scale Interaction of Human Proteome at Fuzzy Semantic Space
Full-text access may be available. Sign in or learn about subscription options.
by
Anup Kumar Halder
,
Soumyendu Sekhar Bandyopadhyay
,
Witold Jedrzejewski
,
Subhadip Basu
,
Jacek Sroka
A 0.5pJ/bit 7.2Gbps HBM3 PHY on Intel4 with EMIB Packaging and Unmatched Receiver Architecture on PHY Side with Per Bit Deskew Correction
Full-text access may be available. Sign in or learn about subscription options.
by
Aakash Hasmukhray Mehta
,
Javed S Gaggatur
,
Mohammad M. Rashid
,
Sampath Dakshinamurthy
,
Aruna Kumar Lakya Srinivasamurthy
,
Anil Kumar Goyal
,
Subbarao Manam
,
Harshit Gupta
,
Sandeep Sukumar
,
Vipin K Mishra
,
Koushik N S
,
Santosh Nekkanti
,
Sambaran Mitra
,
Pooja K Jadhav
,
Miryala ChandraShekar
,
Dudekula Humayun
,
Michael C Rifani
,
Jianyong Xie
,
Andrew P Collins
Triple Peak Day: Work Rhythms of Software Developers in Hybrid Work
Full-text access may be available. Sign in or learn about subscription options.
by
Javier Hernandez
,
Vedant Das Swain
,
Jina Suh
,
Daniel McDuff
,
Judith Amores
,
Gonzalo Ramos
,
Kael Rowan
,
Brian Houck
,
Shamsi Iqbal
,
Mary Czerwinski
Practically Unbiased Pairwise Loss for Recommendation With Implicit Feedback
Full-text access may be available. Sign in or learn about subscription options.
by
Tianwei Cao
,
Qianqian Xu
,
Zhiyong Yang
,
Zhanyu Ma
,
Qingming Huang
Refactoring Microservices to Microservices in Support of Evolutionary Design
Full-text access may be available. Sign in or learn about subscription options.
by
Chenxing Zhong
,
Shanshan Li
,
He Zhang
,
Huang Huang
,
Lanxin Yang
,
Yuanfang Cai
The Blockchain for Personalized Medicine
Full-text access may be available. Sign in or learn about subscription options.
by
Jeandri Robertson
,
Alexander Hedlund
,
Jan Kietzmann
,
Christine Pitt
,
Amir Dabirian
CrossPredGO: A Novel Light-Weight Cross-Modal Multi-Attention Framework for Protein Function Prediction
Full-text access may be available. Sign in or learn about subscription options.
by
Vikash Kumar
,
Akshay Deepak
,
Ashish Ranjan
,
Aravind Prakash
SecureFalcon: Are We There Yet in Automated Software Vulnerability Detection with LLMs?
Full-text access may be available. Sign in or learn about subscription options.
by
Mohamed Amine Ferrag
,
Ammar Battah
,
Norbert Tihanyi
,
Ridhi Jain
,
Diana Maimuţ
,
Fatima Alwahedi
,
Thierry Lestable
,
Narinderjit Singh Thandi
,
Abdechakour Mechri
,
Merouane Debbah
,
Lucas C. Cordeiro
From IoT Networks Deployment to Robust Location-based Services using the Digital Twin of a Building
Full-text access may be available. Sign in or learn about subscription options.
by
Aurélien Chambon
,
Abderrezak Rachedi
,
Abderrahim Sahli
,
Ahmed Mebarki
Trending
Contextual Integrity, Explained: A More Usable Privacy Definition
Nathan Malkin
Understanding the Impact of AI-Generated Deepfakes on Public Opinion, Political Discourse, and Personal Security in Social Media
Prakash L. Kharvi
Quality of Low-Code/No-Code Development Platforms Through the Lens of ISO 25010:2023
Bilal Naqvi
, +3 more
Maximizing Influence Query Over Indoor Trajectories
Jian Chen
, +5 more
zk-AuthFeed: Protecting Data Feed to Smart Contracts With Authenticated Zero Knowledge Proof
Zhiguo Wan
, +2 more
Search By Popular Terms
accessibility
ai
autonomous vehicles
big data
blockchain
cyberthreats
cyber-physical systems
hpc / high performance computing / supercomputing
iot
language processing
Libraries and Institutions
Bring top computing research to your institution.
Learn More
Authors
Write academic, technical, and industry research papers in computing.
Learn More
Researchers
Browse our academic journals for the latest in computing research.
Learn More