IEEE Transactions on Emerging Topics in Computing

Title Publication Date Language Citations
A Cross-Layer Secure Communication Model Based on Discrete Fractional Fourier Fransform (DFRFT)2015/03/01
Toward Consistency of State in MMOGs Through Semantically Aware Contention Management2015/06/01
Shielding Heterogeneous MPSoCs From Untrustworthy 3PIPs Through Security- Driven Task Scheduling2014/12/01
Evolutionary Scheduling of Dynamic Multitasking Workloads for Big-Data Analytics in Elastic Cloud2014/09/01
IEEE Transactions on Emerging Topics in Computing publication information2014/06/01
Special Issue on Computational Sustainability2014/06/01
Table of contents2014/06/01
Front Cover2014/06/01
Cloud Computing for VLSI Floorplanning Considering Peak Temperature Reduction2015/12/01
Powering Up Dark Silicon: Mitigating the Limitation of Power Delivery via Dynamic Pin Switching2015/12/01
IEEE Transactions on Emerging Topics in Computing publication information2015/12/01
Guest Editorial: Special Section on Circuit and System Design Methodologies for Emerging Technologies2015/12/01
Table of contents2015/12/01
Digital Manipulatives as Scaffolds for Preschoolers’ Language Development2016/07/01
A Novel Hardware Accelerator for Embedded Object Detection Applications2017/10/01
Front Cover2015/12/01
Morphus: Supporting Online Reconfigurations in Sharded NoSQL Systems2017/10/01
An IP Core Remote Anonymous Activation Protocol2018/04/01
Scan-Chain Intra-Cell Aware Testing2018/04/01
A Rule Verification System for Smart Buildings2017/07/01
Bayesian Cooperative Coalition Game as a Service for RFID-Based Secure QoS Management in Mobile Cloud2018/01/01
Fairness-Aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks2013/06/01
Cooperative QoS Control Scheme Based on Scheduling Information in FiWi Access Network2013/12/01
Special Issue on Cyber-Physical Systems (CPS)—Part I2013/06/01
Table of contents2013/06/01
Enhanced Network Coding to Maintain Privacy in Smart Grid Communication2013/12/01
Context-Aware Defenses to RFID Unauthorized Reading and Relay Attacks2013/12/01
Fabrication Attacks: Zero-Overhead Malicious Modifications Enabling Modern Microprocessor Privilege Escalation2014/03/01
A Low-Power Frequency Multiplier for Multi-GHz Applications2018/04/01
Software-Defined Network Virtualization Platform for Enterprise Network Resource Management2016/04/01