ieeeComputerSociety

Wise Computing: Cache Coherence Protocol

Views: 7 19 hours ago
This video extends the discussion of the authors' novel "wise computing" approach and present a case study. To accompany Computer's February 2018 feat...

Wise Computing: Prize Dispenser

Views: 5 19 hours ago
This video presents the authors' novel "wise computing" approach and demonstrates one possible application. To accompany Computer's February 2018 feat...

Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded Microprocessors (0318)

Views: 10 2 days ago
The risk of code reverse-engineering is particularly acute for embedded processors which often have limited available resources to protect program inf...

Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded Microprocessors Spanish (0318)

Views: 11 2 days ago
The risk of code reverse-engineering is particularly acute for embedded processors which often have limited available resources to protect program inf...

Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded Microprocessors (0318) Chinese

Views: 9 2 days ago
The risk of code reverse-engineering is particularly acute for embedded processors which often have limited available resources to protect program inf...

Wise Computing: Cache Coherence Protocol

Views: 13 2 days ago
This video extends the discussion of the authors' novel "wise computing" approach and present a case study. To accompany Computer's February 2018 feat...

Wise Computing: Prize Dispenser

Views: 4 2 days ago
This video presents the authors' novel "wise computing" approach and demonstrates one possible application. To accompany Computer's February 2018 feat...

Bubble Budgeting: Throughput Optimization for Dynamic Workloads by Exploiting Dark Cores...Spanish

Views: 13 2 months ago
All the cores of a many-core chip cannot be active at the same time, due to reasons like low CPU utilization in server systems and limited power budge...

Bubble Budgeting: Throughput Optimization for Dynamic Workloads by Exploiting Dark Cores...

Views: 29 2 months ago
All the cores of a many-core chip cannot be active at the same time, due to reasons like low CPU utilization in server systems and limited power budge...

Bubble Budgeting: Throughput Optimization for Dynamic Workloads by Exploiting Dark Cores...(Chinese)

Views: 14 2 months ago
All the cores of a many-core chip cannot be active at the same time, due to reasons like low CPU utilization in server systems and limited power budge...

IEEE CS Jobs Board for the New Year

Views: 58 2 months ago
We'll be waiting for you...

Efficient Detection for Malicious and Random Errors in Additive Encrypted Computation (0118)

Views: 25 2 months ago
Although data confidentiality is the primary security objective in additive encrypted computation applications, such as the aggregation of encrypted v...

Efficient Detection for Malicious and Random Errors in Additive Encrypted Computation Spanish (0118)

Views: 35 2 months ago
Although data confidentiality is the primary security objective in additive encrypted computation applications, such as the aggregation of encrypted v...

Efficient Detection for Malicious and Random Errors in Additive Encrypted Computation Chinese (0118)

Views: 14 2 months ago
Although data confidentiality is the primary security objective in additive encrypted computation applications, such as the aggregation of encrypted v...

Top Technology Trends 2018 forecast

Views: 554 2 months ago
We're betting big: Here's our 2018 Top Tech Trends forecast As the world's premier organization of computing professionals, IEEE Computer Society anno...

Conference & Event Services: What Organizers Say

Views: 54 2 months ago
Quotes from organizers who worked with Computer Society meeting planners.

ComputingNow

Views: 81 3 months ago
Find out what's happening in computing today.

Software Magazine wins 2017 Folio Award

Views: 62 3 months ago
The IEEE Computer Society's Software Magazine received the 2017 Folio Award for Standalone Digital Magazine (B2B).

TechLeader Training Program

Views: 51 3 months ago
Contact Us for a Free 14-Day Trial. Use the TechLeader Training Partner Program to help your organization meet its training initiatives for technical ...

IEEE Computer Society's year-end Report Card on 2017 Tech Trends

Views: 97 4 months ago
The IEEE CS looks back upon the year and grades 2017 Tech Trends Predictions. Stay tuned here for a link coming soon for the full report.
About Channel

ieeeComputerSociety

Subscribers 8,896
Videos: 881,908