Journal Information
IEEE Computer
Impact Factor:

Call For Papers
Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications.
Last updated by Dou Sun in 2017-12-02
Special Issues
Special Issue on Resiliency in Cyber-physical Systems
Submission Date: 2018-02-01

Modern cyber-physical systems (CPSs) feature a tight integration of physical, computation, and communication processes. In the last decade, there’s been a rapid growth of research into and deployment of CPSs in applications in areas such as automation, energy, security, healthcare, manufacturing, transportation, and infrastructure design. The technology is being used in industrial systems, sensor networks, medical devices, smart buildings, and autonomous and robotic systems. Resilience—defined as a system’s ability to anticipate, resist, recover from, and reconfigure after cyberattacks, failures, and disturbances—is imperative for CFPs. To ensure resiliency, we need multidisciplinary approaches to provide state awareness, intelligence, control, safety, security, effective human-system interaction, robust communications, and reliable computation and operation. This special issue will address the applications; architectures; development methodologies; and safety, security, and reliability approaches necessary to enable CPS resiliency. The guest editors seek article topics that include, but aren’t limited to, the following: - CPS security, privacy, and trust - CPS fault-tolerant techniques - supervisory control and complex-systems performance - cyberarchitecture health indicators and defense optimization - CPS real-time communications, protection, control, resilience, reliability, sustainability, and efficiency - autonomous and semi-autonomous systems: failure/error tolerance and recovery, adaptable and flexible architectures, multilevel agent systems, multisensor fusion, tele-presence, probabilistic behaviors, performance validation and verification, and communications security - threats and failures: jamming, interference, frame and bit errors, data loss, cyberphysical security, human error, malicious attacks, disasters, situational awareness, and diagnosis - recovery: intrusion detection systems, intrusion tolerance, resilience metrics, resilience strategies, policy-based management, real-time remediation, machine learning and recovery strategies, and future network-resilience management architectures and mechanisms. - adaptive/agile/moving defenses: moving-target defense technologies, adaptive approaches, agile responses, evaluation metrics, visualization abilities, and command-and-control capabilities - characterization: diversity, security, risk management, reliability, recovery, interoperability, fault tolerance, trust, latency, survivability, quality of service, disruption tolerance, complexity, and adaptability - human-machine interaction and systems behavior: behavior modeling, attacker co-evolution, and deception - education and workforce development: training for operators and incident responders, building a talent pipeline, simulation environments, and training tools
Last updated by Dou Sun in 2017-10-13
Special Issue on Winners and Losers: Outcomes of IT Projects
Submission Date: 2018-03-01

IT is increasingly embedded into nearly everything, yet remains hard to “get right.” IT success often comes out of nowhere and is a surprise. Developmental and operational failures are common despite years of effort to manage effectively the totality of the “lifecycle.” IT deliverables are frequently late, over budget, hard to maintain, and difficult to replace and retire. For this special issue, guest editors welcome contributions covering any aspect of IT: transaction processing, computer-mediated communication, embedded systems, enterprise systems, artificial intelligence, sensor networks, cloud computing, the Internet of Things, and more. Guest editors will particularly focus on software, broadly considered, as well as societal outcomes. Submissions should make contributions to thought and practice, with emphasis on how realms of IT interact with one another and society, over time, for good and bad. Each article should share successful practices to follow, or painful experiences to avoid. Succinctness and readability will be important selection factors. Some contributions will be solicited. Computer is a peer-reviewed publication and all articles will go through review process. Those who wish to submit must send an initial idea write-up (2,000 words, maximum) to Robert N. Charette ( by 15 October 2017. The guest editors will comment on these, encouraging those that are promising and discouraging others. Submissions must be previously unpublished, original, and state-of-the-art, and they must not currently be under review by another conference or journal. Final articles are subject to a strict 6,000-word limit for publication (figures and tables are equivalent to 300 words each). Articles should be understandable by a broad audience of computer science and engineering professionals, without unnecessary theory, mathematics, jargon, or abstract concept. All articles are subject to peer review on technical merit and relevance. Accepted articles will be professionally edited. For accepted articles, authors must provide electronic files conforming to guidelines. Graphs and charts must be submitted in original, editable source format (PDF, Visio, Excel, Word, PowerPoint, for example). Screenshots or photographs must be submitted as high-resolution JPEG or TIFF files (300 dpi or higher at the largest possible dimensions). Authors of accepted papers are encouraged to submit multimedia (such as a two- to four-minute podcast, or other videos, audio, or audio/video interview of authors by experts in the field). Computer staff can help facilitate, record, and edit such materials.
Last updated by Dou Sun in 2017-12-02
Related Publications
Related Journals
CCFFull NameImpact FactorPublisherISSN
aIEEE Transactions on Computers1.723IEEE0018-9340
Computer Science - Research and Development Springer1865-2034
aInternational Journal of Computer Vision8.222Springer0920-5691
cIET Journal on Computer Vision0.573IET1751-9632
cThe Visual Computer0.583Springer0178-2789
aACM Transactions on Computer SystemsACM0734-2071
bJournal of Computer Science and Technology0.475SCIENCE PRESS1000-9000
Computers & Mathematics with Applications1.398ELSEVIER0898-1221
bJournal of Computer Security IOS Press0926-227X
bComputer Networks2.516ELSEVIER1389-1286
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
baa2SPAAACM Symposium on Parallelism in Algorithms and Architectures2018-02-062018-04-182018-07-16
bcMSSTIEEE Symposium on Massive Storage Systems and Technologies2017-02-102017-03-312017-05-15
cb2CSEE&TInternational Conference on Software Engineering Education and Training2017-06-162017-08-252017-11-07
ICEICE'International Conference on Electronics, Information and Communication Engineering2014-03-252014-03-312014-05-15
CogARTInternational Conference on Cognitive Radio and Advanced Spectrum Management2011-07-312011-09-152011-10-26
GCBGerman Conference on Bioinformatics2015-06-302015-07-312015-09-27
MSCIInternational Conference on Mathematics and Computers in Sciences and Industry2015-05-31 2015-08-17
ab1SSPRInternational Workshop on Structural and Syntactic Pattern Recognition 2012-08-152012-11-07
ICCEBEInternational Conference on Computer, Electronics, and Biomedical Engineering2015-10-032015-10-062015-10-14
baa1DACDesign Automation Conference2017-11-14 2018-06-24