Start, Grow, and Advance Your Computing Career
Join 60,000 members who are building their future in computing with the field's most authoritative and trusted association.
Credit: S. Merkel, E. Zifreund / IEEE VR 2018 Conference
Latest News & Articles
Who would have imagined? Just five decades ago, there wasn’t even a school for building software.
“You were on your own. Courses, if any, were concerned only with becoming familiar with a set of available commands to tell the computer what to do,” recalls one pioneer.
Today, software eats the world.
Read about the early days and the challenges ahead, in a special issue of the Society’s award-winning Software magazine, entitled “Software Engineering’s 50th Anniversary.”
What People Are Reading
Our Trending Articles This Week
- Guest editor proposals for IEEE Transactions on Dependable and Secure Computing special issues.
- U.S. Army unit wins Watts S. Humphrey Software Process Achievement Award.
- Want to become a software architect? Top Xerox engineer reveals what college students should know.
- USC’s C.-C. Jay Kuo wins our Technical Achievement Award.
- Margaret Hamilton: Inventor of "software engineering."
From Around The World
Upcoming Conferences
Since 1993, the IEEE Virtual Reality conference has been the premier international venue for the presentation of research results in the broad area of virtual reality (VR). Similarly, the IEEE Symposium on 3D User Interfaces (3DUI), which started as a workshop at IEEE VR in 2004, has become the prem...
23-27
Mar
Mar
AI interaction with DB technology Big Data, Data-Warehousing System Architectures Benchmarking, Performance Modelling, and Tuning Crowdsourcing Cloud Computing and Database-as-a-Service Database Privacy, Security, and Trust Data Science Data Integration, Metadata Management, and Interoperability Dat...
08-11
Apr
Apr
The International Symposium on Hardware-Oriented Security and Trust (HOST) was founded as a venue to create a community for researchers to discuss solutions to the challenge of hardware trust and security. Relevant research topics include techniques, tools, design/test methods, architectures, circui...
05-10
May
May
Trending from the Computer Society Digital Library
Computer
Ron Vetter
University of North Carolina Wilmington
The disruption is not over--the Web's transformation of the world as we know it has only just begun.
47th Hawaii International Conference on System Sciences
Juho Hamari
Sch. of Inf. Sci., Univ. of TampereTampere, Tampere, Finland
This paper reviews peer-reviewed empirical studies on gamification. We create a framework for examining the effects of gamification by drawing from the definitions of gamification and the discussion on motivational affordances. The literature review covers results, independent variables (examined mo...
IEEE Transactions on Knowledge and Data Engineering
Edwardo A. Garcia
Stevens Institute of Technology, Hoboken
With the continuous expansion of data availability in many large-scale, complex, and networked systems, such as surveillance, security, Internet, and finance, it becomes critical to advance the fundamental understanding of knowledge discovery and analysis from raw data to support decision-making pro...


