Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
My Subscriptions
Browse Content
Resources
All
Your New Research Discovery Platform
My Subscriptions
Browse Content
Resources
All
Advanced Search
Browse more than 981k articles on advanced computing topics
Magazines
Journals
Video Library
Conference Proceedings
Remote Access
Contextual Integrity, Explained: A More Usable Privacy Definition
Nathan Malkin
IEEE Security & Privacy, Jan.-Feb. 2023
Popular
Understanding the Impact of AI-Generated Deepfakes on Public Opinion, Political Discourse, and Personal Security in Social Media
Prakash L. Kharvi
IEEE Security & Privacy, July-Aug. 2024
Popular
Embench IOT 2.0 and DSP 1.0: Modern Embedded Computing Benchmarks
David Patterson
, +12 more
Computer, May 2025
Popular
Latest Articles
In-Memory Computing Accelerator for Iterative Linear Algebra Solvers
Full-text access may be available. Sign in or learn about subscription options.
by
Rui Liu
,
Zerun Li
,
Xiaoyu Zhang
,
Xiaoming Chen
,
Yinhe Han
,
Minghua Tang
TreeKEM: A Modular Machine-Checked Symbolic Security Analysis of Group Key Agreement in Messaging Layer Security
Freely available from IEEE.
by
Théophile Wallez
,
Jonathan Protzenko
,
Karthikeyan Bhargavan
Towards ML-KEM & ML-DSA on OpenTitan
Freely available from IEEE.
by
Amin Abdulrahman
,
Felix Oberhansl
,
Hoang Nguyen Hien Pham
,
Jade Philipoom
,
Peter Schwabe
,
Tobias Stelzer
,
Andreas Zankl
Differentially Private Weighted Graphs Publication Under Continuous Monitoring
Full-text access may be available. Sign in or learn about subscription options.
by
Wen Xu
,
Zhetao Li
,
Haolin Liu
,
Yunjun Gao
,
Xiaofei Liao
,
Kenli Li
Lunar Lake an Intel mobile processor: SoC Architecture Overview (2024)
Full-text access may be available. Sign in or learn about subscription options.
by
Nadav Bonen
,
Arik Gihon
,
Leon Polishuk
,
Yoni Aizik
,
Yulia Okunev
,
Tsvika Kurts
,
Nithiyanandan Bashyam
Comprehensive Fine-Tuning Large Language Models of Code for Automated Program Repair
Full-text access may be available. Sign in or learn about subscription options.
by
Kai Huang
,
Jian Zhang
,
Xinlei Bao
,
Xu Wang
,
Yang Liu
QB4AIRA: A Question Bank for Responsible AI Risk Assessment
Full-text access may be available. Sign in or learn about subscription options.
by
Sung Une Lee
,
Harsha Perera
,
Boming Xia
,
Yue Liu
,
Qinghua Lu
,
Liming Zhu
,
Olivier Salvado
,
Jon Whittle
How Do Developers Structure Unit Test Cases? An Empirical Analysis of the AAA Pattern in Open Source Projects
Full-text access may be available. Sign in or learn about subscription options.
by
Chenhao Wei
,
Lu Xiao
,
Tingting Yu
,
Sunny Wong
,
Abigail Clune
DeViTC: Deep-Vision Transformer to Recognize Originality of Currency
Full-text access may be available. Sign in or learn about subscription options.
by
Dulari B. Gajjar
,
Prisha Faldu
,
Deep Rameshbhai Kothadiya
,
Aayushi Pushpakant Chaudhari
,
Nikita M. Bhatt
MCRVT: Multi-Hierarchical Cross-Reconstruction Networks With Versatile Transformer for Speech Emotion Recognition
Full-text access may be available. Sign in or learn about subscription options.
by
Xin-Heng Li
,
Zhen-Tao Liu
,
Yu-Jie Zou
,
Jinhua She
,
Kaoru Hirota
Trending
Contextual Integrity, Explained: A More Usable Privacy Definition
Nathan Malkin
Understanding the Impact of AI-Generated Deepfakes on Public Opinion, Political Discourse, and Personal Security in Social Media
Prakash L. Kharvi
Embench IOT 2.0 and DSP 1.0: Modern Embedded Computing Benchmarks
David Patterson
, +12 more
Predicting Failures in Complex Systems
João R. Campos
, +2 more
Robust Threshold ECDSA with Online-Friendly Design in Three Rounds
Guofeng Tang
, +1 more
Search By Popular Terms
accessibility
ai
autonomous vehicles
big data
blockchain
cyberthreats
cyber-physical systems
hpc / high performance computing / supercomputing
iot
language processing
Libraries and Institutions
Bring top computing research to your institution.
Learn More
Authors
Write academic, technical, and industry research papers in computing.
Learn More
Researchers
Browse our academic journals for the latest in computing research.
Learn More
×
×