Ce Jan20 Final
Ce Jan20 Final
Ce Jan20 Final
> Cryptocurrency
> Digital Transformation
> Internet of Things
www.computer.org/jobs
IEEE COMPUTER SOCIETY computer.org • +1 714 821 8380
STAFF
Editor Publications Portfolio Managers
Cathy Martin Carrie Clark, Kimberly Sperka
Circulation: ComputingEdge (ISSN 2469-7087) is published monthly by the IEEE Computer Society. IEEE Headquarters, Three Park Avenue, 17th Floor, New
York, NY 10016-5997; IEEE Computer Society Publications Office, 10662 Los Vaqueros Circle, Los Alamitos, CA 90720; voice +1 714 821 8380; fax +1 714 821 4010;
IEEE Computer Society Headquarters, 2001 L Street NW, Suite 700, Washington, DC 20036.
Postmaster: Send address changes to ComputingEdge-IEEE Membership Processing Dept., 445 Hoes Lane, Piscataway, NJ 08855. Periodicals Postage Paid at
New York, New York, and at additional mailing offices. Printed in USA.
Editorial: Unless otherwise stated, bylined articles, as well as product and service descriptions, reflect the author’s or firm’s opinion. Inclusion in ComputingEdge
does not necessarily constitute endorsement by the IEEE or the Computer Society. All submissions are subject to editing for style, clarity, and space.
Reuse Rights and Reprint Permissions: Educational or personal use of this material is permitted without fee, provided such use: 1) is not made for profit;
2) includes this notice and a full citation to the original work on the first page of the copy; and 3) does not imply IEEE endorsement of any third-party products
or services. Authors and their companies are permitted to post the accepted version of IEEE-copyrighted material on their own Web servers without permission,
provided that the IEEE copyright notice and a full citation to the original work appear on the first screen of the posted copy. An accepted manuscript is a version
which has been revised by the author to incorporate review suggestions, but not the published version with copy-editing, proofreading, and formatting added by
IEEE. For more information, please go to: http://www.ieee.org/publications_standards/publications/rights/paperversionpolicy.html. Permission to reprint/republish
this material for commercial, advertising, or promotional purposes or for creating new collective works for resale or redistribution must be obtained from IEEE by
writing to the IEEE Intellectual Property Rights Office, 445 Hoes Lane, Piscataway, NJ 08854-4141 or pubs-permissions@ieee.org. Copyright © 2020 IEEE.
All rights reserved.
Abstracting and Library Use: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy for private use of patrons, provided the per-
copy fee indicated in the code at the bottom of the first page is paid through the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923.
Unsubscribe: If you no longer wish to receive this ComputingEdge mailing, please email IEEE Computer Society Customer Service at help@computer.org and
type “unsubscribe ComputingEdge” in your subject line.
IEEE prohibits discrimination, harassment, and bullying. For more information, visit www.ieee.org/web/aboutus/whatis/policies/p9-26.html.
www.computer.org/computingedge 1
JANUARY 2020 • VOLUME 6, NUMBER 1
From Geographic
From Dealing With One Collocation
Domain at a Time
To Worldwide
Distribution
THEME HERE
RE
To Dealing With
Everywhere
Multiple Domains
From Wishing for
Experienced End
Cross- RE With Users
Domain RE Everyone To Empowering
Newbies
27 36 41
Ubiquitous
RE
From Focusing on
From Wishing for Software
Well-Understood
To Holistically Taking
Processes RE for
Open RE Into Consideration
Everything
To Accepting People, Things, and
Openness Services
Automated
Cryptocurrencies:
Legend:
Gray Rectangles: Barriers
Ubiquitous
RE From Direct Interaction With
Representative End Users
The IoT
Transparency Requirements
Colored Boxes: Required Transformations
Circles: Dimensions of Ubiquity
To Indirect Interaction With a
Crowd and Digital
versus Privacy Engineering: A Transformation:
Paradigm Shift that Toward the Data-
Affects Everyone Driven Enterprise
Blockchain
8 On the Origins and Variations of Blockchain
Technologies
ALAN T. SHERMAN, FARID JAVANI, HAIBIN ZHANG, AND ENIS
GOLASZEWSKI
15 BLOCKCHAIN
GEORGE STRAWN
Cryptocurrency
18 A Service-Oriented Perspective on Blockchain
Smart Contracts
FLORIAN DANIEL AND LUCA GUIDA
Digital Transformation
31 Skills and Competencies for Digital Transformation
STEPHEN J. ANDRIOLE
Internet of Things
41 The IoT and Digital Transformation: Toward the
Data-Driven Enterprise
ALEXANDER A. PFLAUM AND PHILIPP GOLZER
46
Departments
4 Magazine Roundup
7 Editor’s Note: Blockchain to the Rescue
72 Conference Calendar
Extending
Patient-Chatbot
Experience with
Internet of Things
and Background Subscribe to ComputingEdge for free at
Knowledge www.computer.org/computingedge.
CS FOCUS
Magazine
Roundup
T
drastically improves energy con-
he IEEE Computer furry friends. The authors of this servation while substantially
Society’s lineup of 12 article from the September 2019 reducing time-to-solution. Fur-
peer-reviewed tech- issue of Computer report on an thermore, the authors introduce
nical magazines covers cut- empirical study investigating a new polarizable charge equili-
ting-edge topics ranging from the user perceptions of a popu- bration (PQEq) model to accu-
software design and computer lar dog activity tracker. Results rately predict atomic charges and
graphics to Internet comput- show that these trackers have a polarization.
ing and security, from scien- positive impact on owners’ moti-
tific applications and machine vation to increase their physical IEEE Annals of the
intelligence to visualization activities with their dogs. History of Computing
and microchip design. Here are
highlights from recent issues. Computing in Science & Founding and Growing
Engineering Adobe Systems, Inc.
Computer Founded in 1982, Adobe Sys-
Scalable Reactive tems heralded several of the
Log My Dog: Perceived Molecular Dynamics technological innovations nec-
Impact of Dog Activity Simulations for essary to precipitate the emer-
Tracking Computational Synthesis gence of desktop publishing as
The pet industry is catching up Reactive molecular dynamics well as many features of modern
in the wearables market, and (MD) simulation is a power- office computing, digital media,
pet activity and location track- ful research tool for describing and graphic arts. In this article
ers are increasingly worn by our chemical reactions. The authors from the July–September 2019
4 January 2020 Published by the IEEE Computer Society 2469-7087/20 © 2020 IEEE
issue of IEEE Annals of the His- to tune two algorithms for char- posing significant complications
tory of Computing, Adobe found- acterizing satellite detections of for system and algorithm design.
ers Charles Geschke and John wildfires. In this article from the May/June
Warnock cover their professional 2019 issue of IEEE Internet Com-
history, the conception of Adobe IEEE Intelligent Systems puting, the authors present a
Systems, and its growth. They also dynamic global manager selection
explain the technology behind the Using Social Media to Detect algorithm to minimize energy con-
advances in computer printing, Socio-Economic Disaster sumption cost by fully exploiting
electronic file transfer, and digital Recovery the system diversities in geogra-
art and photography. Adobe, its There has been growing interest phy and variation over time. The
products, and its engineers played in harnessing artificial intelligence algorithm makes real-time deci-
a key role in these developments, (AI) to improve situational aware- sions based on measurable system
which enabled desktop publishing ness for disaster management. parameters through stochastic opti-
and the publishing revolution. As a first step toward investigat- mization methods, while achiev-
ing the possibility of developing ing performance balance between
IEEE Computer Graphics an AI-based method for detecting energy cost and latency. Extensive
and Applications socio-economic recovery, this arti- trace-driven simulations verify the
cle from the May/June 2019 issue effectiveness and efficiency of the
Uncertainty-Aware of IEEE Intelligent Systems stud- proposed algorithm. The authors
Visualization for Analyzing ies the correlations between pub- also highlight several potential
Heterogeneous Wildfire lic sentiment on social media and research directions that remain
Detections socio-economic recovery activi- open and require future elabora-
There is growing interest in using ties as reflected in market data. tions in analyzing geo-distributed
data science techniques to charac- The result shows multiple correla- big data.
terize and predict natural disasters tions between sentiment on social
and extreme weather events. Such media and the socio-economic IEEE Micro
techniques merge noisy data gath- recovery activities involved in
ered in the real world, from sources restarting daily routines. Conven- Accelerating Image-Sensor-
such as satellite detections, with tional socio-economic recovery Based Deep-Learning
algorithms that strongly depend indicators, such as governmental Applications
on the noise, resolution, and uncer- statistical data, have a significant In this article from the September/
tainty in these data. In this article time lag before publishing. Using October 2019 issue of IEEE Micro,
from the September/October 2019 public sentiment on social media the authors review two inference
issue of IEEE Computer Graph- instead can improve situational accelerators that exploit value
ics and Applications, the authors awareness in recovery operations. properties in deep neural networks
present a visualization approach (DNNs): Diffy and Tactical. Diffy
for interpolating multiresolution, IEEE Internet Computing targets spatially correlated acti-
uncertain satellite detections of vations in computational imag-
wildfires into intuitive visual rep- Energy-Efficient Analytics for ing DNNs. Tactical targets sparse
resentations. They use extrinsic, Geographically Distributed neural networks using a low-over-
intrinsic, coincident, and adja- Big Data head hardware/software weight-
cent uncertainty representations Big data analytics on geographi- skipping front-end. The authors
as appropriate for understand- cally distributed datasets (across combine these accelerators into Di-
ing the information at each stage. data centers or clusters) has been Tactical to boost benefits for both
To demonstrate their approach, attracting increased interest in scene understanding workloads
the authors use their framework both academia and industry, and computational imaging tasks.
www.computer.org/computingedge 5
MAGAZINE ROUNDUP
IEEE MultiMedia authors of this article from the attacks show the risks associated
April–June 2019 issue of IEEE Per- with these new technologies and
A 3D Scene Management vasive Computing describe Eva, a can help us articulate the need for
Method Based on the conversational robot developed to better security practices.
Triangular Mesh for Large- conduct therapeutic interventions
Scale Web3D Scenes for PwD. A previously reported IEEE Software
Real-time rendering of large-scale study conducted with Eva using a
Web3D scenes was difficult to Wizard-of-Oz approach proved that Perceptions of Gender
implement in virtual-reality sys- it successfully engaged PwD with Diversity’s Impact on Mood in
tems and geographic information the sessions. This article reports Software Development Teams
systems (GIS) in the past because improvements to Eva that allow the Gender inequality persists in IT
of the technical constraints in CPU, robot to guide the therapy sessions teams. The authors of this article
memory, and network bandwidth. without human intervention and from the September/October 2019
In this article from the July–Septem- findings from its deployment in a issue of IEEE Software examine
ber 2019 issue of IEEE MultiMedia, a geriatric residence. These improve- how gender composition affects
model management strategy is pro- ments include the automatic gen- the workplace atmosphere. They
posed based on triangular meshes, eration of a therapy script tailored discuss the problem of gender dis-
in which neighborhood buildings to the profile and preferences of the crimination and consider methods
are considered as nodes and con- participants, expectations about to reduce inequality.
nected. Each node in the mesh has the type and length of responses
a set of level-of-detail (LOD) models, by participants to certain queries, IT Professional
including high-, medium-, and low- and strategies to recover from com-
precision models. Besides a model munication breakdowns. A user Toward a Blockchain-Enabled
file, the high-precision LOD of the study with five PwD shows that Crowdsourcing Platform
node can be a subtriangular mesh. when acting in fully autonomous Crowdsourcing has been pursued
The 3D models in a complex scene mode, Eva is as effective in engag- as a way to leverage the power
can be flexibly managed with some ing participants in the therapy as of the crowd for many purposes
nested triangular meshes. Accord- with the Wizard-of-Oz condition, in diverse sectors, including col-
ing to the experimental results, and that communication break- lecting information, aggregating
the proposed method effectively downs are adequately resolved. funds, and gathering employees.
achieves the progressive download- Data integrity and nonrepudiation
ing, dynamic loading, and real-time IEEE Security & Privacy are of utmost importance in these
display for a large-scale 3D scene. systems and are currently not guar-
Its performance is better than the Stealing, Spying, and Abusing: anteed. Blockchain technology has
traditional methods. Consequences of Attacks on been proven to improve on these
Internet of Things Devices aspects. In this article from the
IEEE Pervasive Computing The authors of this article from the September/October 2019 issue of
September/October 2019 issue of IT Professional, the authors investi-
A Conversational Robot IEEE Security & Privacy studied the gate the benefits that the adoption
to Conduct Therapeutic security practices of a diverse set of blockchain technology can bring
Interventions for Dementia of Internet of Things (IoT) devices in crowdsourcing systems. To this
Verbal communication is an essen- with different architectures. They end, they provide examples of real-
tial component of effective non- found vulnerabilities that can be life crowdsourcing use cases and
pharmacological interventions for exploited to launch novel attacks. explore the benefits of using block-
people with dementia (PwD). The The real-world implications of IoT chain, mainly as a database.
2469-7087/20 © 2020 IEEE Published by the IEEE Computer Society January 2020 7
REAL-WORLD CRYPTO
Editors: Peter Gutmann, pgut001@cs.auckland.ac.nz | David Naccache, david.naccache@ens.fr | Charles C. Palmer, ccpalmer@us.ibm.com
signed messages entering and leav- Chaum assumes, essentially, a unique pseudonym which appears
ing vaults. best-effort broadcast model, and he in a roster of acceptable clients.”9
Chaum created his vaults system does not provide mechanisms for To enable private transactions for
before the emergence of the terms achieving consensus with unreli- blockchains, engineers are explor-
permissioned and permissionless able communications—technolo- ing the application of trusted
blockchains, and his system does gies that subsequently have been execution environments, continu-
not neatly fall into either of these developed and applied in modern ing an approach fundamental in
discrete categories. In Chaum’s permissioned systems. Chaum’s Chaum’s vaults.
system, each node identifies itself dissertation does not include the In 1994, Szabo 10 coined the
uniquely by posting a public key, ideas of PoW, dynamic throttling of term smart contract, but the idea of
authenticated by level 2 trustees. work difficulty, and explicit smart systematically applying rules to exe-
For this reason, some people may contracts (though Chaum’s vaults cute the terms of an agreement has
consider Chaum’s system a permis- support arbitrary distributed pri- a long history in trading systems.
sioned blockchain. vate computation). For example, in 1949, with a system
This narrow view, however, dimin- Unlike in most blockchain sys- involving ticker tapes and humans
ishes the fact that each node can be tems, nodes in Chaum’s system hold applying rules, Future, Inc. gener-
authorized in a public ceremony secret values, which necessitates a ated buy and sell orders for com-
independently from any trustee. more complex mechanism for restart- modities. Recently, so-called hybrid
During this ceremony, vaults are ing after failures. Using what Chaum blockchains have emerged, which
assembled from bins of parts, which calls partial keys, any vault can back combine Byzantine fault-tolerant
the public (not necessarily nodes) up its state securely by encrypting state machine replication with
can inspect and test—a procedure it with a key and then escrowing defenses against Sybil attacks—for
that inspired Chaum to coin the this key using what we now call example, PeerCensus, ByzCoin,
more limited phrase cut and choose. threshold secret sharing. After reading Solidus, Hybrid Consensus, Elas-
Regardless of whether one views Chaum’s February 1979 technical tico, OmniLedger, and RapidChain.
some configurations of Chaum’s report8 that describes partial keys, Also, Hyperledger (an umbrella
vaults as permissionless systems, Adi Shamir published an elegant project involving Fabric, a system
the trust bestowed through the alternate method for secret sharing for permissioned blockchains) and
public ceremony creates a system in November 1979. Ethereum (a platform for public
whose trust model is the antithesis Chaum also notes that pseudonyms blockchains) have joined forces.
of that of a private (permissioned) can play an important role in effect- Recently, researchers have applied
blockchain. For these reasons, we ing anonymity: “Another use allows game theory to model and analyze
consider Chaum’s system pub- an individual to correspond with a the behaviors of players and mining
licly permissioned. record keeping organization under a pools in blockchain-based digital
currencies (see Dhamal and Lewen-
berg). Table 1 chronicles some
of the important cryptographic
Table 1. A timeline of selected discoveries in cryptography and blockchain technology. discoveries underlying blockchain
1970 James Ellis, public-key cryptography discovered at Government Communications technologies. For example, in
Headquarters (GCHQ) in secret 2018, the European Patent Office
issued the first patent on block-
1973 Clifford Cocks, RSA cryptosystem discovered at GCHQ in secret
chain—a method for enforcing
1974 Ralph Merkle, cryptographic puzzles (paper published in 1978) smart contracts.
1976 Diffie and Hellman, public-key cryptography discovered at Stanford
1977 Rivest, Shamir, and Adleman, RSA cryptosystem invented at the Massachusetts Comparison of Selected
Institute of Technology Blockchain Systems
To illustrate how the elements come
1979 David Chaum, vaults and secret sharing (dissertation in 1982)
together in actual blockchain systems,
1982 Lamport, Shostak, and Pease, Byzantine Generals Problem we compare a few selected systems,
1992 Dwork and Naor, combating junk mail including Chaum’s vaults, Bitcoin,
2002 Adam Bach, Hashcash Dash, Corda, and Hyperledger Fab-
ric, chosen for diversity. Table 2
2008 Satoshi Nakamoto, Bitcoin
describes how each of these sys-
2017 Wright and Savanah, nChain European patent application (issued in 2018) tems carries out the four crucial
10 ComputingEdge January 2020
74 IEEE Security & Privacy January/February 2019
participant roles of any blockchain that implements policy. Despite ledgers, they will likely be around
defined ahead. For more context, these significant powers, the control in various forms for a long time.
Table 3 characterizes a few important structure is still more distributed There are, however, some trou-
properties of these systems and of (anyone can potentially become a bling fundamental conflicts that
one additional system—Ethereum. core developer) than for a permis- have not been solved. These con-
In his vault system, Chaum 9 sioned system controlled entirely flicts include tensions between
identifies four crucial participant by a prespecified entity. In Bitcoin, the fol low ing pairs of poten-
roles of any blockchain, which in each round, the winning miner (a tially dissonant concerns: privacy
we call watchers, doers, executives, doer) becomes an executive for that and indelibility, anonymity and
and czars. The watchers passively round. It is instructive to understand accountability, stability and alter-
observe and check the state of the how each blockchain system allo- native future continuations, and
ledger. The doers (level 1 trustees) cates the four participant roles. current engineering choices and
carry out actions, including serving Table 3 illustrates some of the long-term security. For example,
state. The executives (level 2 trust- possible variations of blockchains, recent European privacy laws grant
ees) sign (or otherwise attest to) the including varying control and con- individuals the right to demand
blocks. The czars (level 3 trustees) sensus policies as well as different that their personal data be erased
change the executives and their pol- types of smart contracts. Whereas from most repositories (the right
icies. Chaum refers to these partici- most blockchain systems maintain to be forgotten). Satisfying this
pants as bodies,9 leaving it unclear a single chain, Corda supports mul- erasure requirement is highly prob-
whether they could be algorithms. tiple independent chains, per node lematic for indelible blockchains,
Although most systems do not or among subsets of nodes. Similarly, especially for ones whose nodes
explicitly specify these roles, all Chaum’s system also supports mul- lack physical security.
systems embody them, though tiple chains. While most blockchains An attraction of blockchains is
with varying nuances. For example, require each node to maintain the their promise of stability enforced
many people naively think of Bit- same state, Corda’s and Chaum’s sys- through consensus, yet sometimes
coin as a fully distributed system tems do not. the nodes cannot agree, resulting in
free of any centralized control, but, a fork and associated possible splits
in fact, Bitcoin’s core developers— Conflicts and Challenges in the continuations of the chain. In
as is true for all distributed sys- Because blockchain technologies a hard fork, level 3 trustees issue a
tems—carry out the role of czars, address enduring needs for per - significant change in the rules that is
changing the underlying software manent, indelible, and trusted incompatible with the old rules. In a
Chaum, 1982 Bitcoin, 2008 Dash, 2014 Corda, 2016 Hyperledger Fabric,
A flexible A permissionless A system that speeds up A permissioned 2016
system based system using Bitcoin with a masternode system with A permissioned system
Role on vaults PoW network smart contracts with smart contracts
Watchers Any computer Nodes (distinct Any computer online Nodes Peers
Passively check state online9 from full nodes)
Doers Level 1 trustee Full nodes Miners Nodes Peers
Carry out actions,
including serving state
Executives Level 2 trustee Winning miner Winning masternode Nodes (each Endorsing peers
Sign blocks (or (promoted (promoted (promoted by an algorithm node is an
otherwise attest to from level 1 by from doers from the masternode executive for its
them) czars)9 each round) network, which anyone Corda blocks,
may join for 1,000 Dash) called states)
Czars Level 3 Core developers Quorum of masternodes Permissioning Endorsement policies
Change executives and trustee9 service
their policies
www.computer.org/computingedge 11
www.computer.org/security 75
REAL-WORLD CRYPTO
Table 3. Three properties of several distributed ledger systems. T o understand blockchain sys-
tems, it is helpful to view them
in terms of how the watchers, doers,
System Permissioned? Basis of Consensus Smart Contracts executives, and czars carry out their
functions under the guidance of the
Chaum, Permissioned, Weak consensus; Private arbitrary
1982 with option does not handle distributed access, control, and consensus poli-
for publicly concurrent client computation cies. This systematic abstract view
permissioned requests helps focus attention on crucial ele-
ments and facilitates a balanced
Bitcoin, Permissionless PoW Conditional comparison of systems. Blockchains
2008 payment and address many longstanding inherent
limited smart needs for indelible ledgers, from finan-
contracts through cial transactions to property records
scripts
and supply chains. With powerful
Dash, Combination Proof of stake No existing cryptographic techniques, a
2014 wide set of available variations, and a
Ethereum, Permissionless PoW Yes, nonprivate large amount of resources allocated to
2014 Turing complete these technologies, blockchains hold
objects significant potential.
Hyperledger Permissioned Based on Yes, off-chain
Fabric, state machine Acknowledgments
2015 replication We thank Dan Lee, Linda Oliva, and
Corda, Permissioned Based on Yes (set of Konstantinos Patsourakos for their
2016 state machine functions), helpful comments. Alan T. Sherman
replication including explicit was supported in part by the National
links to human Science Foundation under Scholarship
language for Service grant 1241576.
References
soft fork, there is a less severe change time (Bitcoin’s ledger is currently 1. A. Sherman, F. Javani, H. Zhang,
in the rules for which the old system more than 184 GB). and E. Golaszewski, On the ori-
recognizes valid blocks created by As of September 2018, the hash gins and variations of blockchain
the new system (but not necessar- rate for Bitcoin exceeded 50 mil- technologies. 2018. [Online].
ily vice versa). lion TH/s, consuming more than Available: http://arxiv.org/abs
Security engineers must commit 73 TWh of power per day, more /1810.06130
to particular security parameters, than the amount consumed by Swit- 2. C. Cachin and M Vukolic, “Block-
hash functions, and digital signa- zerland. These hashes were attempts chain consensus protocols in the
tures methods. to solve cryptographic puzzles of wild,” in Proc. 31st Int. Symp. Distrib-
No such choice can remain com- no intrinsic value (finding an input uted Computing, 2017, vol. 1, pp. 1–16.
putationally secure forever in the that, when hashed, produces a cer- 3. L. Lamport, R. Shostak, and M.
face of evolving computer technol- tain number of leading zeroes), and Pease, “The Byzantine generals
ogy, including quantum comput- almost all of these computations went problem,” ACM Trans. Program-
ers and other technologies not yet unused. Attempts, such as Primecoin ming Languages Syst., vol. 4, no. 3,
invented. The hopeful permanence and others, to replace cryptographic pp. 382–401, 1982. [Online]. Avail-
of blockchains is dissonant with hash puzzles with useful work (e.g., able: https://dl.acm.org/citation
the limited-time security of today’s finding certain types of prime inte- .cfm?doid=357172.357176
engineering choices. gers) are challenging because it is very 4. S. Nakamoto, “Bitcoin: A peer-to-
Additional challenges faci n g hard to find useful problems that have peer electronic cash system,” Bitcoin,
block chains include the huge assured difficulty and whose level of 2008. [Online]. Available: https://
amounts of energy spent on block- difficulty can be dynamically throt- bitcoin.org/bitcoin.pdf
chain computations (especially tled. Some researchers are exploring 5. A. Back, “Hashcash: A denial of service
PoW), the high rates at which ledgers alternatives to PoW, such as proof counter-measure,” Hashcash, 2002.
grow, and the associated increases of space, proof of stake, and proof of [Online]. Available: http://www
in transaction latency and processing elapsed time. .hashcash.org/papers/hashcash.pdf
6. R. C. Merkle, “Secure communi- 10. N. Szabo, “Smart contracts,” 1994. [On- Farid Javani is a Ph.D. student at
cations over insecure channels,” line]. Available: http://www.fon.hum the University of Maryland, Bal-
Commun. ACM, vol. 21, no. 4, .uva.nl/rob/Courses/Information timore County. Contact him at
pp. 294–299, 1978. [Online]. Avail- InSpeech/CDROM/Literature javani1@umbc.edu.
able: https://dl.acm.org/citation /LOTwinterschool2006/szabo.best
.cfm?doid=359460.359473 .vwh.net/smart.contracts.html Haibin Zhang is an assistant professor
7. L. Lamport, “The part-time parlia- 11. E. Wong, “Retrieving dispersed in the Department of Compu-
ment,” ACM Trans. Comput. Syst., vol. data from SDD-1: A system for ter Science and Electrical Engi-
16, no. 2, pp. 133–169, 1998. [Online]. distributed databases,” in Proc. 2nd neering at the Univer s i t y of
Available: https://dl.acm.org Berkeley Workshop Distributed Data Maryland, Baltimore County.
/citation.cfm?doid=279227.279229 Management and Comput. Networks, Haibin received a Ph.D. from the
8. D. L. Chaum, “Computer systems May 1977, pp. 217–235. University of Califor nia, Davis,
established, maintained, and trusted in 2001. His re search interests
by mutually suspicious groups,” Alan T. Sherman is a professor of include di str ibuted comput-
Elect. Eng. Res. Lab., Univ. Cali- computer science at the University i n g a n d secure blockchains.
fornia, Berkeley, Tech. Memo. of Maryland, Baltimore County. Co ntac t h i m at hbzhang@
UCB/ERL/M79/10, 1979. His research interests include umbc.edu.
9. D. L. Chaum, “Computer systems secure voting, applied cryptog-
established, maintained and trusted by raphy, and cybersecurity educa- Enis Golaszewski is a Ph.D. student
mutually suspicious groups,” Ph.D. tion. He is a Senior Member of the at the University of Maryland,
dissertation, Dept. Comput. Sci., IEEE. Contact him at sherman@ Baltimore County. Contact him
Univ. California, Berkeley, 1982. umbc.edu. at golaszewski@umbc.edu.
Call rticles
f o r A
ing
e C o mput
iv
EE Pervas n th e
latest
IE , u s ef
ul p a p
e r s o
e,
a c ce s s
ible er vasiv
seek s men ts in p
d de velop s
viewe . Topic
e uting
peer-r sc o m p
uitou
e , a n d ubiq , s of t w
a re
mobil e c h n ology
t
ware an d
e hard nsing
includ - w o rld se
l ion,
re , re a terac t
truc tu ter in
s: infras - co m p u
e li n e u man
guid ion, h ding
Au t hor c/ int e ra c t
io n s, inclu
rg /m ider a t y.
uter.o privac
.comp s cons y, and
w w w
.htm n d s y s te m e c u r it
u th o r a y, s
sive /a labilit
p e r va
a ils: y m e nt , s c a
e r det deplo
Furth uter.o
rg
ive
sive@
co m p
rg/p ervas
p e r va
o m puter.o
w w w.c
Digital Object Identifier 10.1109/MSEC.2019.2900896
www.computer.org/computingedge 13
PURPOSE: The IEEE Computer Society is the world’s largest EXECUTIVE COMMITTEE
association of computing professionals and is the leading provider President: Leila De Floriani
of technical information in the field.
President-Elect: Forrest Shull
MEMBERSHIP: Members receive the monthly magazine Past President: Cecilia Metra
Computer, discounts, and opportunities to serve (all activities First VP: Riccardo Mariani; Second VP: Sy‐Yen Kuo
are led by volunteer members). Membership is open to all IEEE Secretary: Dimitrios Serpanos; Treasurer: David Lomet
members, affiliate society members, and others interested in the VP, Membership & Geographic Activities: Yervant Zorian
computer field. VP, Professional & Educational Activities: Sy-Yen Kuo
VP, Publications: Fabrizio Lombardi
COMPUTER SOCIETY WEBSITE: www.computer.org
VP, Standards Activities: Riccardo Mariani
OMBUDSMAN: Direct unresolved complaints to VP, Technical & Conference Activities: William D. Gropp
ombudsman@computer.org.
2019–2020 IEEE Division VIII Director: Elizabeth L. Burd
CHAPTERS: Regular and student chapters worldwide provide the 2020-2021 IEEE Division V Director: Thomas M. Conte
opportunity to interact with colleagues, hear technical experts, 2020 IEEE Division VIII Director-Elect: Christina M. Schober
and serve the local professional community.
AVAILABLE INFORMATION: To check membership status, report BOARD OF GOVERNORS
an address change, or obtain more information on any of the Term Expiring 2020: Andy T. Chen, John D. Johnson,
following, email Customer Service at help@computer.org or call Sy-Yen Kuo, David Lomet, Dimitrios Serpanos,
+1 714 821 8380 (international) or our toll-free number, Hayato Yamana
+1 800 272 6657 (US): Term Expiring 2021: M. Brian Blake, Fred Douglis,
• Membership applications Carlos E. Jimenez-Gomez, Ramalatha Marimuthu,
• Publications catalog Erik Jan Marinissen, Kunio Uchiyama
• Draft standards and order forms Term Expiring 2022: Nils Aschenbruck,
• Technical committee list Ernesto Cuadros‐Vargas, David S. Ebert, William Gropp,
• Technical committee application Grace Lewis, Stefano Zanero
• Chapter start-up procedures
• Student scholarship information
• Volunteer leaders/staff directory
EXECUTIVE STAFF
• IEEE senior member grade application (requires 10 years Executive Director: Melissa A. Russell
practice and significant performance in five of those 10) Director, Governance & Associate Executive Director:
Anne Marie Kelly
PUBLICATIONS AND ACTIVITIES Director, Finance & Accounting: Sunny Hwang
Director, Information Technology & Services: Sumit Kacker
Computer: The flagship publication of the IEEE Computer Society,
Director, Marketing & Sales: Michelle Tubb
Computer publishes peer-reviewed technical content that covers
Director, Membership Development: Eric Berkowitz
all aspects of computer science, computer engineering,
technology, and applications. COMPUTER SOCIETY OFFICES
Periodicals: The society publishes 12 magazines and 18 journals. Washington, D.C.: 2001 L St., Ste. 700, Washington, D.C.
Refer to membership application or request information as noted 20036-4928; Phone: +1 202 371 0101; Fax: +1 202 728 9614;
above. Email: help@computer.org
Conference Proceedings & Books: Conference Publishing Los Alamitos: 10662 Los Vaqueros Cir., Los Alamitos, CA 90720;
Services publishes more than 275 titles every year. Phone: +1 714 821 8380; Email: help@computer.org
BLOCKCHAIN
George Strawn
National Academies of Sciences, Engineering,
This article originally appeared in
and Medicine
IT Professional, vol. 21, no. 1, 2019.
& “YABB,” YET ANOTHER book on blockchain (to become disconnected from the network. (Cold War
modify the acronym YACC—yet another complier worries about a nuclear arrack made this a major
compiler), Life After Google, was published in July concern.) By switching packets instead of circuits
of 2018 by the prolific author George Gilder. (Ama- and by distributing the switching function to every
zon currently lists 75 books on the topic.) As Internet router, that goal was achieved.
Gilder lays out in the book, he believes that the cli- On the other hand, very little thought was
ent–server model of current internet usage will be given to other dimensions of network security,
succeeded by a peer-to-peer (P2P) model emp- and so, we have been playing Internet security
loying blockchain: the technology that enabled catch-up ever since. (One might say that it is an ill
the cryptocurrency bitcoin a decade ago. Another wind that blows no good, since Internet security
YABB is IBM’s short Blockchain for Dummies jobs are in plentiful supply.) But as increasingly
(https://public.dhe.ibm.com/common/ssi/ecm/xi/ more functions of society are transferred to the
en/xim12354usen/ibm-blockchain_second- Internet, its lack of security has become a major
edition_final_XIM12354USEN.pdf), which is avail- societal problem. Gilder and others believe that
able for free download and has the more modest this lack of security is the Achilles heel of today’s
goal of showing how blockchain for business ledg- Internet, and the reason that P2P architecture and
ers is available now for practical use. In this paper, secure blockchain technology will supersede it.
I will review some related characteristics of the The original Internet architecture was in fact
Internet, of P2P, and of blockchain. Then, I will P2P. This simply means that any internet node
describe how blockchain is “ready for business could both provide services to other nodes and/or
use,” and finally, I will comment on its potential ask them to provide services. (For more depth, see
impact on 21st century employment and business. https://en.m.wikipedia.org/wiki/Peer-to-peer.) For
example, the file transfer protocol was/is bidirec-
tional: Any node can send and/or receive files. As
THE INTERNET, P2P, AND the Internet matured in the 1990s and 2000s, impor-
BLOCKCHAIN tant services arose that were unidirectional, for
One of the goals of the Internet architecture was
example, Google searches, Amazon purchases, and
to minimize points of failure. The switching centers
Facebook friends. These services were provided
that characterized the telephone network were
by nodes that came to be called servers, and nodes
such points of failure. If a switching center were to
that utilized those services were called clients.
be destroyed, the telephones in that area would The client–server model is subject to various
security breaches (of course, so is P2P). For exam-
Digital Object Identifier 10.1109/MITP.2018.2879244 ple, distributed denial-of-service attacks flood a
Date of current version 26 February 2019. server with so many requests for service that it
January/February 2019
2469-7087/20 © 2020 IEEE
Published by the IEEE Computer Society
Published by the IEEE Computer Society
1520-9202 2018 IEEE
January 2020
91 15
IT and Twenty-First Century Employment
shuts down. Also, most servers require usernames management, government, supply chain manage-
and passwords from clients (and perhaps credit ment, and health care. Since these use cases
card numbers). So, many users (me included) have replace (or at least reduce) the need for trusted
hundreds of usernames and passwords, which I third party oversight, that reduction in employ-
am supposed to remember and never write down. ment is obvious. Less obvious is the fact that many
(This situation seems to me to provide more liabil- of these use cases can contain “smart contracts”
ity protection for the server than security for the that automate various follow-on functions once a
client.) And security breaches of servers are legion, transaction has been completed (e.g., automatic
yielding crooks millions of usernames, passwords, payment once a shipment has been received).
and credit card numbers. Such hacks are of incre- Thus, the need for fewer manual steps may extend
well beyond transaction management.
asing importance as online banking and other
Perhaps even more important is that these use
significant transactions are conducted online.
cases typically take a significant amount of time to
Blockchain technology is simply a distribu-
complete. The use of blockchain could cut days
ted ledger on a P2P network whose transactions
and weeks to hours and minutes, and since time is
cannot be erased or altered (see https://en.m.
money, use of this technology could be doubly
wikipedia.org/wiki/Blockchain for implementation
cost-saving. Of course, in addition to increasing effi-
details). As new transactions occur and are verified, ciency, effectiveness could be improved as well. As
they are copied onto all copies of the ledger. It has Chapter Three of Dummies explains, blockchain
been said that blockchain/P2P might to for tran- can reduce business network (information, interac-
sactions what the Internet/Web did for Information. tion, and innovation) frictions in a number of ways.
Share ledgers, P2P transactions, and smart con-
BLOCKCHAIN FOR BUSINESS tracts are at the center of this business innovation.
TRANSACTIONS In a recent blockchain report (https://public.dhe.
Speaking of transactions, they are the busi- ibm.com/common/ssi/ecm/gb/en/gbe03835usen/
ness activity that blockchain is ready to facilitate, gbe03835usen-00_GBE03835USEN.pdf) drawing on
according to IBM and others. Companies record 2965 conversations with C-suite executives, IBM
transactions in ledgers, and traditionally, each reported the following industry statistics: Over
company keeps its own ledger. Blockchain tech- one third of organizations across all industries
nology enables a single, shared ledger for all the and regions are already considering or are
companies engaging in related transactions. actively engaged with blockchain, and 66% of
Moreover, this shared ledger has several pleasing early adopters—or explorers—intend to adopt a
security characteristics. First, it is copied onto new platform business model that breaks the
the computers of all participating companies, boundaries of traditional market exchanges. It
making loss of data extremely unlikely. Second, would seem this train is moving.
once a transaction has been “agreed to,” it cannot
be changed or deleted. This provides a new level WHAT IS NEXT?
of “technological trust” that has traditionally Blockchain burst on the scene as the bitcoin
technology only ten years ago. It was the result
been provided by trusted third parties. Regard-
of innovative software, and hardware innova-
ing how a transaction is agreed to, the business
tions followed as the computationally expensive
use just described requires only a simple vote by
mining confirmation of transactions was opti-
the companies involved rather than an expensive
mized. On the other hand, 3-D printing (a.k.a.
“mining” activity as in the bitcoin application.
additive engineering) resulted from hardware
innovations over 30 years ago and is now also
USE CASES, EMPLOYMENT, AND moving (Amazon lists 100 books and gadgets on
OTHER IMPLICATIONS the subject). As Moore’s and related laws con-
Chapter four of Blockchain for Dummies tinue to lower the cost and raise the perfor-
describes a plethora of transaction/ledger use mance of IT systems, predicting what is next
cases the fall within the sphere of blockchain. requires matching new price points, innovative
These use cases occur in a wide range of thinking, and society’s needs and desires. It is an
areas: financial services, multinational policy exciting ride with far to go!
16
92 ComputingEdge
IT Professional
January 2020
Top Technology
12.19
Computer
Featured in Computer
Technology IEEE Computer Society tech experts unveil
their annual predictions for the future of
Predictions tech. Six of the top 12 technology predictions
have been developed into peer-reviewed
articles published in Computer magazine’s
December 2019 issue, covering topics
such as cognitive robotics, practical drone
TECHNOLOGY PREDICTIONS
A Service-Oriented
Perspective on Blockchain
Smart Contracts
Florian Daniel Luca Guida
Politecnico di Milano Politecnico di Milano
& A BLOCKCHAIN IS a shared, distributed ledger, Next to logging transactions, blockchain plat-
that is, a log of transactions that provides for forms support the execution of pieces of code,
persistency and verifiability of transactions.1 A so-called smart contracts,4,5 able to perform com-
transaction is a cryptographically signed instruc- putations inside the blockchain. For example, a
tion constructed by a user of the blockchain,2 smart contract may be used to automatically
for example, the transfer of cryptocurrency fr- release a given amount of cryptocurrency upon
om one account to another. Transactions are the satisfaction of a condition agreed on by two
grouped into blocks, linked and secured using partners. If we put multiple smart contracts (and
cryptographic hashes. A consensus protocol ena- partners) into communication, we turn the
bles the nodes of the blockchain network to cre- blockchain into a proper distributed computing
ate trust in the state of the log and makes platform.6 This makes the technology appealing
blockchains inherently resistant to tampering.3 to application scenarios that ask for code execu-
Thanks to these properties, blockchain technol- tion that is reliable, verifiable, and transactional.
ogy is able to eliminate the need for a middleman For example, Xu et al.7 propose the use of
from the management of transactions, such as a smart contracts as software connectors for reli-
bank in the transfer of money. able, decentralized data sharing, while Weber
et al.8 propose the integration of multiple smart
contracts for distributed business process execu-
tion. The first example aims to support data
Digital Object Identifier 10.1109/MIC.2018.2890624 providers in publishing data sets and data con-
Date of current version 6 March 2019. sumers in finding and selecting data sets; using
1089-7801 2019 IEEE Published by the IEEE Computer Society IEEE Internet Computing
18
46 January 2020 Published by the IEEE Computer Society 2469-7087/20 © 2020 IEEE
cryptocurrency, data providers are automatic- helps to lower complexity but also increases cor-
ally paid according to the value of the provided rectness by design.
data, establishing an open, blockchain-based mar-
ketplace for data. The second example generates
smart contracts starting from a BPMN choreogra- BLOCKCHAIN AND SMART
phy diagram and puts them into direct communi- CONTRACTS
cation; the idea is to enable the execution of Next to Bitcoin, several alternative platforms
business processes even among potentially have emerged over the last few years. Besides
untrusted partners. The common ingredients of the type of cryptocurrency adopted as incentive
both examples are smart contracts and verifiable mechanism, these platforms distinguish them-
transactions. selves by few key properties.
Developing applications that integrate multi- The access policy tells who can participate in
ple smart contracts is however not easy, and the blockchain network. Public blockchains
today’s predominant ad-hoc development prac- allow anyone to join and to access the informa-
tice will not be able to scale and be sustainable in tion stored in the blockchain via the Internet; pri-
the long term. In fact, Atzei et al.9 show that vate blockchains are restricted to private
already today even simple smart contracts are networks and selected nodes only.
often affected by a variety of security vulnerabil- The validation policy tells who among the
et al.10 show that several of the smart
ities. Nikolic nodes can participate in consensus creation and
contracts deployed on Ethereum either “lock deploy smart contracts. Permissionless block-
funds indefinitely, leak them carelessly to arbi- chains allow every node to perform both; permis-
trary users, or can be killed by anyone.” Singh and sioned blockchains limit these capabilities to
Chopra11 go beyond implementation aspects and special nodes only, e.g., qualified through direct
discuss existing sociotechnical limitations of invitation.
smart contracts, such as lack of control, lack of The consensus protocol specifies how trust is
understanding, and lack of social meaning. created among participants: Proof of work (e.g.,
We argue that future blockchain applications adopted by Bitcoin) requires nodes, so-called
ask for abstractions, methods, and instruments miners, to invest significant hashing power to cre-
that help developers to cope with complexity, ate trust. Proof of stake (Cardano) requires nodes
such as those proposed by service-oriented to prove ownership of sufficient cryptocurrency
computing (SOC). In fact, the characteristics of to establish trust. Byzantine Fault Tolerance uses
the described data sharing scenario directly replication to establish trust in the state of the
map to those of SOC (service provider, service network, even if faced with failing network nodes.
consumer, service broker), yet smart contracts Variants are redundant BFT (Hyperledger Indy)
still lack equivalent support for description, dis- and practical BFT (Quorum), which aim at
covery, and the specification of nonfunctional increased redundancy and speed, respectively.
properties. Similarly, the business process sce- Other notable consensus protocols are proof of
nario resembles very much that of service-based elapsed time (Hyperledger Sawtooth), proof of
business processes, yet the smart contracts gen- importance (NEM), proof of state (Universa Block-
erated in the scenario are tailored to specific chain Protocol), Raft-based consensus (Quorum),
tasks and partner interactions and are not stream-processing ordering services (Hyperledger
directly applicable in processes with different Fabric), and Tempo (Radix DLT).
partners and/or choreography needs. That is, The choice of the consensus protocol affects
while they present significant opportunities for the transaction processing time (time till a trans-
reuse, they do not yet explore them. action is added to a block) and the transaction
In the following, we thus look at smart con- rate (number of transactions processed per sec-
tracts from an SOC perspective and study their ond). These properties and the access and
suitability as elementary pieces for a blockchain- validation policies determine a blockchain’s abil-
based, distributed computing paradigm. The ity to support different distributed computing
assumption is that principled reuse not only scenarios.
January/February 2019
www.computer.org/computingedge
47 19
Smart Contracts
Hyperledger
Bitcoin Ethereum Corda
Fabric
No built-in No built-in
Cryptocurrency Bitcoin (BTC) Ethereum (ETH)
currency currency
Transaction
Almost Almost
processing time � 10 minutes � 15 seconds
instantaneous instantaneous
(average)
Max transaction
� 7 TPS � 20 TPS 3,500 þ TPS � 170 TPS
rate
Bitcoin Script,
high-level
Solidity, Serpent,
languages JVM program-
Smart contract lowlevel Lisp-like
(BALZaC, BitML) Go ming languages
language language (LLL),
compilable to like Kotlin, Java
Mutan
Bitcoin native
transactions
Turing
No Yes Yes Yes
completeness
As for the implementation of smart contracts, knowledge and the goal of communicating some
each platform typically supports one or more of the diversity that characterizes current block-
programming languages. Some support general- chain technology.
purpose languages, such as C, Cþþ, C#, F#, Go,
Java, JavaScript, Kotlin, Objective-C, PHP, SERVICE ORIENTATION
Python, Rust, and Visual Basic .Net. Others pro- Service orientation is commonly associated
pose platform-specific languages, such as Bit- with the binomial SOAP/WSDL or the REST archi-
coin Script or Ethereum Solidity. The former are tectural style. Smart contracts use neither of
Turing complete, the latter not necessarily (e.g., these, so we fall back to the generic definition by
Bitcoin Script is not). Alonso et al.12 who define services as “com-
In Table 1, we summarize these characteris- ponents that can be integrated into more com-
tics for four platforms: Bitcoin (bitcoin.org), the plex distributed applications.” In order to
first blockchain platform; Ethereum (ethereum. compare different web service technologies,
org), the platform that first introduced Turing- Lagares Lemos et al.13 distinguish services by
complete smart contracts; Hyperledger Fabric their type, interaction style, interaction proto-
(hyperledger.org/projects/fabric), a private, per- col, data format, and descriptor. We discuss
missioned platform hosted by the Linux Founda- these characteristics next for smart contracts, in
tion and supported by more than 200 industry order to enable identifying analogies and differ-
leaders; and Corda (corda.net), a private, per- ences between the proposed service-oriented
missioned platform by a consortium of more interpretation of smart contracts and traditio-
than 200 financial institutions and technology nal web service technologies. We specifically
firms with a focus on interoperability. These focus on Ethereum as such is currently the most
platforms represent an opportunistic selection used blockchain platform for smart contract
(far from exhaustive) based on our own development.
20
48 ComputingEdge
IEEE Internet Computing
January 2020
Contract Type obtain a list of accounts to send cryptocur-
Components encapsulate data to be fetched rency to.
and visualized or integrated and/or application Business-protocol-based interactions support
logic to be interacted with. What the component patterns that may involve multiple interac-
delivers is a function of the type of the compo- tions and multiple clients or contracts; the
nent. For smart contracts we can distinguish the protocol specifies the order of interactions
following contract types: and the roles of the involved parties.
As running smart contracts costs money,
Generic contracts implement application
contracts are activated only in response to
logic, e.g., for deposit management, that can
explicit invocations. A contract or a group of
be invoked by blockchain clients or by other
interacting contracts is thus always triggered by
contracts; in general, this type of contract is
a client transaction, and independent, active
stateful in that it maintains application state
behaviors are typically not supported.
across interactions.
Libraries implement one or more functions, Interaction Protocol
e.g., a math library, that are meant for reuse This tells how a component implements its
by other contracts; libraries do not store interactions. Conventional web services use
internal variables and are stateless. message-oriented protocols such as SOAP or
Data contracts provide data storage services HTTP, while all major programming languages
inside the blockchain, e.g., a client references also support RPC-like interactions (Remote Pro-
manager, that are meant for use by other cedure Calls). Ethereum uses a message-based
contracts; by design, they are stateful. protocol supporting the following interaction
features:
Oracles deliver data services from the out- Transactions are used by blockchain cli-
side of the blockchain to the inside of the
ents (the users of the blockchain) to cre-
blockchain, e.g., currency conversation
ate new contracts or to invoke existing
rates. Contracts cannot make calls outside
contracts; once validated, which consumes
the blockchain, as outside dependencies
cryptocurrency, transactions are added
may prevent verifiability (conversion rates
to the blockchain and remain publicly
change over time). If data from the outside is
accessible.
needed, it can be pushed by clients to Events enable a contract to push infor-
oracles using transactions; these then allow
mation to the outside world in response
other contracts to query for the data.
to a transaction invoking the contract;
when the transaction is added to the
Interaction Style blockchain, also the event becomes pub-
Integrating a component into a composite licly accessible.
application usually does not only involve a one- Calls (so-called message calls) are used by
shot query or call. It may be necessary to inter- contracts to interact with each other in a
act with the component multiple times and to fashion that uses different state spaces for
establish some form of conversation with it. For each contract for isolation; calls are exe-
smart contracts we have: cuted locally to each blockchain node and
Pull interactions enable a client or contract do not consume cryptocurrency.
to initiate an interaction and to invoke a con- Delegate calls are used by contracts to invoke
tract that otherwise would be passive; for libraries in a fashion where functions are exe-
instance, a client may invoke a contract to cuted in one, the caller’s, state space; dele-
withdraw a deposit. gate calls too are node-local and do not
Push interactions enable the contract to consume cryptocurrency.
become active and to initiate an interaction If an interaction originates from a blockchain
with clients or other contracts; for instance, client, it uses JSON-RPC or is enacted using the
a contract may invoke a data contract to command line; if it originates from a smart
January/February 2019
www.computer.org/computingedge
49 21
Smart Contracts
contract, the message is exchanged via RPC. languages such as OWL-S, WSDL-S, and WSMO
Transactions contain a set of predefined param- are used to describe service endpoints, opera-
eters: the number of transactions sent by the tions, and data formats.
sender, the amount of cryptocurrency the The construct that gets closest to a
sender is willing to pay for consumed resources description of Ethereum smart contracts is
(so-called gas), the maximum consumable the so-called “ABI in JSON” interface descrip-
amount of gas, the address of the recipient, the tion produced by the Solidity compiler during
amount of cryptocurrency to be transferred, compilation, as exemplified by the following
possible signatures of the sender, and either lines of code:
the code of the contract to be created or input [{
data to be processed. Events contain, among “type”: “function”,
others, one or more topics that allow clients to “inputs”: [{“name”: “username”, “type”: “string”},
search for and subscribe to events and a data {“name”: “password”, “type”: “string”}],
field. Calls contain the sender and receiver “name”: “create_user”,
“outputs”: [{“name”: “success”, “type”: “bool”}]
addresses, a possible value and data; calls may
}, {
return a value. “type”: “event”,
“inputs”: [{“name”: “username”, “type”: “string”,
Data Format “indexed”: true},
The data format determines how exchanged {“name”: “count”, “type”: “uint256”,
“indexed”: false}],
data is formatted. Message-oriented interaction
“name”: “user_created”
protocols typically support self-describing docu- }]
ment formats like XML and JSON; RPC-oriented
protocols enable the exchange of native data The description specifies one function
structures, such as Java or JavaScript objects, (create_user) and one event (user_created),
using an internal, binary format hidden to along with their inputs and outputs. The inputs
developers. of the event are their publicly accessible argu-
Data in Ethereum transactions and events is ments stored in the blockchain; indexed argu-
encoded using the Application Binary Interface ments are searchable. What this description
(ABI), which specifies how functions are called does not include is the name of the contract, its
and data are formatted. Clients either serialize address, the network/chain ID if the contract is
data in a binary format on their own, e.g., when deployed on a test network, and non-functional
using the command line or by using a suitable properties (e.g., the cost of invoking the func-
library function, e.g., the function toPayload of tion). These are essential for search and discov-
the library web3.js. Values are encoded in ery. Also, Ethereum does not come with a
sequential order and according to their data registry for smart contracts, although contract
types and are not self-describing. In order to metadata (containing the ABI in JSON descrip-
allow the receiver to identify which function is tion) can be stored in Swarm, a redundant
called, the sequence of values is preceded by 4 B and decentralized store of Ethereum’s public
of a Keccak-256 hash of the respective function record.
signature. This allows everybody to parse the
binary formatted data.
Data in message/delegate calls between con- STATE OF TECHNOLOGY
tracts is exchanged by passing variables, mask- In Table 2, we summarize how these SOA
ing the underlying ABI formatting. characteristics are manifest (or not) in the four
platforms we introduced earlier.
Description As expected, Bitcoin is the most limited plat-
The final aspect of components is component form in terms of features supported when it
description, which enables discovery and selec- comes to smart contracts. In fact, it was born as
tion. For web services, description languages support for its homonymous cryptocurrency
such as WSDL and WADL and semantics-oriented and less to support generic computations.
22
50 ComputingEdge
IEEE Internet Computing
January 2020
Table 2. SOC perspective on selected smart contract technologies.
Hyperledger
Bitcoin Ethereum Corda
Fabric
Contracts,
Contracts
Contracts, libraries, data Contracts,
Contract type (chaincode), data
oracles contracts, libraries, oracles
contracts
oracles
Pull and push Pull and push
Pull interactions, Pull and push interactions,
Interaction style
interactions business interactions business
protocols protocols
Transactions,
Transactions,
calls (limited to
inter-node
Transactions, contracts on
messages
Interaction events, message same node and
Transactions (so-called flows),
protocol calls, delegate channel),
scheduled
calls events—exposes
invocations of
REST APIs toward
contracts
these
Binary payloads Any type of the
in transactions contract
Binary or JSON
Binary payloads and events, language, zip
Data format formatted
in transactions Solidity data attachments
key-value pairs
types in message/ referenced using
delegate calls hashes
Contract Chaincode
metadata (JSON) metadata with
No contract to be published interfaces, No contract
Description
description on a public endpoints, and description
storage platform interaction
(e.g., Swarm) schemas
Ethereum, on the other hand, is the most com- Ethereum message/delegate calls pass native
plete platform, with Hyperledger Fabric and Solidity data structures. Hyperledger Fabric
Corda providing comparable features. structures data as key-value pairs in binary and/
In terms of contract types, all platforms sup- or JSON format. Corda, in addition to generic
port oracles, except Hyperledger Fabric for Kotlin/Java data objects, also supports transac-
which so-called “gateway services” are still tions with generic attachments; attachments are
under discussion (as of June 2018). Reusable zipped and hash referenced.
code libraries are supported only by Ethereum As for the description of smart contracts for
and Corda. It is important to note that contracts search and reuse, support is very limited. Only
generally encapsulate application logic; data Ethereum and Hyperledger Fabric provide basic
contracts are typically very limited in their stor- metadata describing a contract’s interface (oper-
age capacity, as storing data on the blockchain ations and arguments), but we are far from a
may incur significant costs. common description format let alone a registry
All platforms except Bitcoin support pull and for the discovery of contracts.
push interactions; Bitcoin features only client-
originated pull transactions. Looking at the DISCUSSION AND OUTLOOK
interaction protocols, Ethereum, Hyperledger By now, there is a general consensus that the
Fabric, and Corda support transactions, calls impact of blockchain will go far beyond crypto-
between contracts, and events; Bitcoin has only currencies, possibly with disruptive effects on
transactions. distributed application development.14 The key
Payload data is binary formatted in Bitcoin enabler for this impact is smart contracts able to
and Ethereum transactions and events, while support a new kind of distributed computing.6
January/February 2019
www.computer.org/computingedge
51 23
Smart Contracts
While the number and types of platforms for shared interaction styles and protocols
smart contracts are constantly growing—this as well as data formats and, of course,
paper studies four of them, dozens of others authentication and certification mechanisms.
have emerged—the resulting technological land- A particular challenge is cross-blockchain
scape is getting increasingly intricate and integration.
heterogeneous. Composition: Finally, in order to be able to
Yet, this paper shows that from an exploit the full power of smart contracts
application point of view the conceptual under- (and to collectively save resources and
pinnings of this new landscape are more inte- money) it is necessary to conceive and imple-
grated than one would expect and that smart ment composition solutions able to abstract
contracts, to some extent, may indeed be inter- away from technicalities and to provide
preted as elementary pieces, that is, services, developers with instruments and infrastruc-
of a blockchain-based, SOC paradigm. The tures that enhance productivity effectively.
paper, however, also shows that we are still far
from a smart contract model that sees interop- In short, what we envision is an evolution from
erability and reusability as beneficial features, today’s technology silos to an abstract, reuse-
as instead we are used to in the context of SOC. oriented contract ecosystem able to preserve the
In order to enable service orientation in guarantees proper of blockchain technology.
blockchain and to unleash the full power of
smart contracts, several challenges need to be & REFERENCES
faced, among which we mention: 1. S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash
Search, discovery and reuse: It is striking that system,” 2008, [Online]. Available: https://bitcoin.org/
so little attention has been paid so far to en/bitcoin-paper
enable developers to reuse already deployed 2. G. Wood, “Ethereum: A secure decentralised
contracts, especially if we consider that generalised transaction ledger,” Ethereum Project
deploying a new contract is typically more Yellow Paper, vol. 151, pp. 1–32, 2014.
cost-intensive then just invoking an already 3. D. Mingxiao, M. Xiaofeng, Z. Zhe, W. Xiangwei, and
deployed one. Suitable abstract descriptors C. Qijun, “A review on consensus algorithm of
and searchable registries are badly needed. blockchain,” in Proc. IEEE Int. Conf. Syst., Man,
Cost awareness: Smart contracts natively Cybern., 2017, pp. 2567–2572.
incorporate the concept of resource con- 4. N. Szabo, “Smart contracts: Building blocks for digital
sumption and cost of invocations. It is crucial markets,” EXTROPY: J. Transhumanist Thought, 1996,
that smart contracts be able to properly Art. no. 16.
communicate and negotiate these kinds of 5. R. M. Parizi and A. Dehghantanha, “Smart contract
service levels, enabling a natural pay-per- programming languages on blockchains: An empirical
invocation model. evaluation of usability and security,” in Proc. Int. Conf.
Performance: Libraries and data contracts Blockchain, 2018, pp. 75–91.
are executed locally inside each node and 6. B. Dickson, “How blockchain can create the world’s
have thus negligible response times; oracles biggest supercomputer,” TechCrunch, Dec. 2016.
and generic contracts, which may require 7. X. Xu et al., “The blockchain as a software connector,”
transaction processing, may lead to higher, in Proc. 13th Work. IEEE/IFIP Conf. Softw. Archit.,
unpredictable response times. The challenge 2016, pp. 182–191.
is improving performance in terms of trans- 8. I. Weber, X. Xu, R. Riveret, G. Governatori, A. Ponomarev,
action rates and processing times. and J. Mendling, “Untrusted business process
Interoperability and standardization: Today, monitoring and execution using blockchain,” In Proc. Int.
platforms concentrate on own technologies Conf. Bus. Process Manage., 2016, pp. 329–347.
as distinguishing feature, which is under- 9. N. Atzei, M. Bartoletti, and T. Cimoli, “A survey of
standable. This, however, slows down inte- attacks on Ethereum smart contracts (sok),” in
gration, which eventually will nevertheless Principles of Security and Trust. Berlin, Germany:
be needed. The challenge is agreeing on Springer, 2017, pp. 164–186.
24
52 ComputingEdge
IEEE Internet Computing
January 2020
, A. Kolluri, I. Sergey, P. Saxena, and
10. I. Nikolic Florian Daniel is an Associate Professor with Poli-
tecnico di Milano, Milan, Italy. His research interests
A. Hobor, “Finding the greedy, prodigal, and suicidal
include service-oriented computing, blockchain,
contracts at scale,” arXiv:1802.06038, 2018.
business process management, and data science.
11. M. P. Singh and A. K. Chopra, “Violable contracts and
He received the Ph.D. degree in information technol-
governance for blockchain applications,”
ogy from Politecnico di Milano. Contact him at florian.
arXiv:1801.02672, 2018. daniel@polimi.it.
12. G. Alonso, F. Casati, H. Kuno, and V. Machiraju, Web
Services. Berlin, Germany: Springer, 2004. Luca Guida is a graduate of Politecnico di Milano,
13. A. Lagares Lemos, F. Daniel, and B. Benatallah, “Web Milan, Italy. His research interests include block-
service composition: A survey of techniques and tools,” chain, service-oriented computing, and spatial data
ACM Comput. Surveys, vol. 48, no. 3, Feb. 2016, Art. no. 33. analysis. He received the master’s degree (cum
14. L. Mearian, “What is blockchain? The most disruptive laude) in computer science and engineering from
tech in decades.” IDG Commun., Inc., Framingham,
Politecnico di Milano and Alta Scuola Politecnica,
Milan, Italy. Contact him at luca.guida@mail.polimi.it.
MA, USA, May 2018.
ADVERTISER INFORMATION
Midwest US:
Advertising Sales Contacts Dave Jones
Email: djones@computer.org
Mid-Atlantic US: Phone: +1 708-442-5633 Fax: +1 888-886-8599
Dawn Scoda Cell: +1 708-624-9901
Email: dscoda@computer.org
Phone: +1 732-772-0160
Cell: +1 732-685-6068 | Fax: +1 732-772-0164 Jobs Board (West Coast and Asia), Classified Line Ads
Northeast, Europe, the Middle East and Africa: Jobs Board (East Coast and Europe), SE Radio Podcast
David Schissler
Email: d.schissler@computer.org Marie Thompson
Phone: +1 508-394-4026 Email: marie.thompson@computer.org
Phone: +1 714-813-5094
January/February 2019
www.computer.org/computingedge
53 25
COMPSAC 2020
Madrid, Spain
July 13-17, 2020
COMPSAC is the IEEE Computer Society Signature Conference on Computers, Software and Applications. It is a major
international forum for academia, industry, and government to discuss research results and advancements, emerging challenges,
and future trends in computer and software technologies and applications. The theme of COMPSAC 2020 is “Driving Intelligent
Transformation of the Digital World”.
Staying relevant in a constantly evolving digital landscape is a challenge faced by researchers, developers, and producers in
virtually every industry and area of study. Once limited to software-enabled devices, the ubiquity of digitally-enabled systems
makes this challenge a universal issue. Furthermore, as relevance fuels change, many influencers will offer solutions that benefit
their own priorities. Fortunately, history has shown that the building blocks of digital change are forged by those conducting
foundational research and development of digital systems and human interactions. Artificial Intelligence is not new, but is
much more utilized in everyday computing now that data and processing resources are more economically viable, hence widely
available. The opportunity to drive the use of this powerful tool in transforming the digital world is yours. Will your results
help define the path ahead, or will you relegate those decisions to those with different priorities for utilizing intelligence in
digital systems? COMPSAC has been and continues to be a highly respected venue for the dissemination of key research on
computer and software systems and applications, and has influenced fundamental developments in these fields for over 40
years. COMPSAC 2020 is your opportunity to add your mark to this ongoing journey, and we highly encourage your submission!
COMPSAC 2020, organized as a tightly integrated union of symposia, will focus on technical aspects of issues relevant to
intelligent transformation of the digital world. The technical program will include keynote addresses, research papers,
industrial case studies, fast abstracts, a doctoral symposium, poster sessions, and workshops and tutorials on emerging and
important topics related to the conference theme. Highlights of the conference will include plenary and specialized panels that
will address the technical challenges facing researchers and practitioners who are driving fundamental changes in intelligent
systems and applications. Panels will also address cultural and societal challenges for a society whose members must continue
to learn to live, work, and play in the environments the technologies produce.
Authors are invited to submit original, unpublished research work, as well as industrial practice reports. Simultaneous
submission to other publication venues is not permitted except as highlighted in the COMPSAC 2020 J1C2 & C1J2 program. All
submissions must adhere to IEEE Publishing Policies, and will be vetted through the IEEE CrossCheck portal. Further info is
available at www.compsac.org.
Organizers
Standing Committee Chair: Sorel Reisman (California State University, USA)
Steering Committee Chair: Sheikh Iqbal Ahamed (Marquette University, USA)
General Chairs: Mohammad Zulkernine (Queen’s University, Canada), Edmundo Tovar (Universidad Politécnica de Madrid,
Spain), Hironori Kasahara (Waseda University, Japan)
Program Chairs in Chief: W. K. Chan (City University, Hong Kong), Bill Claycomb (Carnegie Mellon University, USA), Hiroki
Takakura (National Institute of Informatics, Japan)
Workshop Chairs: Ji-Jiang Yang (Tsinghua University, USA), Yuuichi Teranishi (National Institute of Information and
Communications Technology, Japan), Dave Towey (University of Nottingham Ningbo China, China), Sergio Segura (University
of Seville, Spain)
Local Chairs: Sergio Martin (UNED, Spain), Manuel Castro (UNED, Spain)
Important Dates
Workshops proposals due: 15 November 2019
Workshops acceptance notification: 15 December 2019
Main conference papers due: 20 January 2020
Paper notification: 3 April 2020
Workshop papers due: 9 April 2020
Workshop paper notifications: 1 May 2020 Photo: King Felipe III in Major Square, Madrid
Camera-ready and registration due: 15 May 2020 Photo credit: Iria Castro - Photographer (Instagram @iriacastrophoto)
EDITOR JEFFREY VOAS
CYBERTRUST NIST; j.voas@ieee.org
Cryptocurrencies:
Transparency Versus
Privacy
Nir Kshetri, University of North Carolina at Greensboro
that provide reasonable levels of
privacy to users. To make the costs of
Cryptocurrencies can have significant privacy transparency less severe to privacy,
Bitcoin and other cryptocurrencies
costs. A motivated adversary has available employ pseudonymity. Users can
a range of actions to identify the actual user conduct transactions with one an-
other without disclosing any infor-
associated with a cryptocurrency account. By mation related to their identity.
Concealing the Internet Protocol (IP)
taking appropriate measures, cryptocurrency addresses of users is another mech-
anism that provides protection to
users can minimize privacy violations and cryptocurrency user privacy. For ex-
reduce the risk of privacy breaches. ample, in the Bitcoin network, cor-
T
respondence cannot be established
between transactions and IP addresses.
ransparency is a major factor that is driving Bitcoin users are connected to a peer-to-peer (P2P) network.
the use of blockchain-based applications such Data continue to flow among the devices connected to the
as cryptocurrencies. A major question becomes P2P network until everyone has the information related to
whether transparency provides reasonable pri- a transaction. No one, except for the originator, knows who
vacy protection. For instance, many fi rms in the fi nancial initiated the transaction.1
sector do not like the fact that blockchain’s transparent
nature gives other users access to the details of conducted CONSEQUENCES OF PRIVACY VIOLATIONS
transactions. IN THE CRYPTO-WORLD
Let’s begin with cryptocurrencies. It is important to Individuals and organizations are likely to suffer more se-
note that cryptocurrencies possess built-in mechanisms vere consequences from cases of privacy violation if they en-
gage in illegal behaviors using cryptocurrencies (compared
Digital Object Identifier 10.1109/MC.2018.2876182
with other transaction models). For example, if someone is
Date of publication: 15 January 2019 caught in a crime, the cryptocurrency account can be linked
2469-7087/20 © 2020 IEEE Published by the IEEE Computer Society January 2020 27
CO M PUTE R 0018-9162/18©2018IEEE NOVEMBER 2018 99
CYBERTRUST
to any crime committed by that person Blockchain ledgers are searchable CRYPTOCURRENCIES
in the past. Privacy breaches are likely and, hence, can be used to track transac- HAVE DIFFERENT
to lead to more severe criminal conse- tions.5 If a leak involves the amount and LEVELS OF PRIVACY
quences, referred as an amplified techni- time of the purchase, a motivated adver- Well-known cryptocurrencies such as
cal impact.2 sary can convert the purchase amount Bitcoin have not been able to meet all
privacy needs of users. As mentioned,
financial firms are concerned that
blockchain’s ledger allows other users
to access the details of transactions al-
Zcash transactions have two types of addresses: ready conducted. In response to these
transparent and shielded. demands, some cryptocurrencies pro-
vide users with higher levels of pri-
vacy protection.
Privacy is important for citizens and into Bitcoins using the exchange rate Blockchain is still in early-stage
businesses. If an individual uses Bitcoin at that time. Then, a blockchain can development, and various alternative
to pay for certain goods or services, the be searched for a transaction of that models and forms of cryptocurren-
party with whom the transaction is be- amount and at that time. This gives away cies are evolving along with it. For
ing made can know exactly how much the user’s Bitcoin address. Any other instance, to make blockchain more ap-
money the individual has. This may purchases made using that address are pealing to financial institutions, the cryp-
increase the threat to personal safety. now easier to trace.4 tocurrency Zcash, which was launched
A supplier that has received a payment Sometimes, an act of carelessness in October 2016, has promised transac-
from a business would know how much on the part of the user may decrease tional privacy.6 It employs cryptogra-
money the business has. Knowing fund privacy. This happened to Ross Ul- phy to enhance user privacy.
availability and customer price sensi- bricht, who created the online black Zcash transactions can be made
tivity could affect future negotiations. market Silk Road, best known as a plat- transparent, like those of Bitcoin, or
Finally, if online businesses have infor- form for selling illegal drugs. When shielded through a zero-knowledge
mation about a consumer’s spending Ulbricht looked for help to expand the proof. Zcash transactions have two
patterns, they could predict the high- Silk Road business, he used the same types of addresses: transparent and
est price that the consumer could pay. pseudonym that he had adopted pre- shielded. In transparent addresses, as
The business could then use price tam- viously to post announcements on ille- is the case for Bitcoin, the monetary
pering to increase profits.3 gal drug discussion forums. This made amount of the transaction as well as
him an FBI suspect. The FBI tracked information about the receiver and the
UNWANTED PERSONAL his IP address to an Internet café in sender appears in the blockchain. On
INFORMATION LEAKS San Francisco and caught Ulbricht as the other hand, if a shielded address is
There are various sources of unwanted he was logging in to Silk Road as an used, the address is “obscured” on the
personal information leaks in transac- administrator.1 public ledger. Also, if both the sender
tions involving cryptocurrencies. For A not he r pr iv a c y pr oble m o c- and the receiver use shielded addresses,
instance, while Bitcoin transactions curs when users of cryptocurrencies the transaction amount is encrypted.
are difficult to track, they are not com- such as Bitcoin reuse addresses. By Users of shielded addresses con-
pletely anonymous. All transactions are doing so, they publicly disclose infor- stitute a small proportion of Zcash
recorded in a permanent public ledger. mation about past financial transac- adopters. In early 2017, shielded ad-
After the Bitcoins are moved from that tions, and this can compromise their dresses accounted for about 0.8% of
address, financial movements can be privacy. The transparency and im- Zcash transactions.7 That propor-
traced. Users can be traced through IP mutabi l it y feat ures of cr y ptoc ur- tion is predicted to increase to 4% by
addresses and money flows. A team of rencies like Bitcoin make it possible mid-2018.8
researchers studied 130 major merchants to track every transaction involving A relatively low adoption rate of
that allow Bitcoin transactions. They a given address. Even if a person has shielded addresses might be due to the
found that at least 53 of the merchants engaged in careful processes to hide additional time and computational re-
leaked payment information to at least 40 his or her identity, once a link has sources required. Shielded addresses
third parties. While most of the informa- been established between a person’s require a more computationally in-
tion leaked was intentional and used for identity and a Bitcoin address, all past tensive process. To use Zcash’s pri-
advertising and analytics, some merchant transactions made by the owner of the vacy features, users may need 4 GB or
websites also leaked precise blockchain Bitcoin address will be associated to more of RAM (tinyurl.com/y9dtj3dh).
transaction information to trackers.4 the owner’s identity. With 4 GB of RAM, operations were
C
ties associated with cryptocurrencies. Carroll. (2018, Feb. 1). Can
Law enforcement agencies are con- ryptocurrencies’ transparency cryptocurrencies and blockchain
cerned with the anonymity features of a n d im mutabi lit y features help fight corruption? Brookings.
cryptocurrencies. At a congressional come with a privacy cost. Ad- [Online]. Available: https://
hearing, former assistant US attorney versaries can use a range of actions to www.brookings.edu/blog/future-
Kathryn Haun noted that, when regu- identify the actual user associated with development/2018/02/01
lators issue subpoenas requesting doc- a specific cryptocurrency account. /can-cryptocurrencies-an
uments relating individual identities It is important for cryptocurrency d-blockchain-help-fight-corruption/
to illicit activities at cryptocurrency users to be aware that their privacy can 6. L. Clozel. (2016). How Zcash tries to
exchanges, subpoenas may return in- be compromised. Users need to take balance privacy, transparency in
formation such as “Mickey Mouse” liv- precautions to minimize privacy vio- Blockchain. American Banker. [On-
ing at “123 Main Street” (tinyurl.com/ lations and mitigate the risk of privacy line]. Available: http://www
y8g2x23c). breaches. Users should refrain from re- .americanbanker.com/news
Academic researchers and block- using identities in both their noncryp- /law-regulation/how-zcash-tries-
chain intelligence companies are us- tocurrency and cryptocurrency worlds. to-balance-privacy-transparency-
ing advances in computer science, Likewise, by reusing cryptocurrency in-blockchain-1092198-1.html
economics, and forensics to help law addresses, users are more likely to pub- 7. A. Hertig. (2017, Jan. 13). Hardly
enforcement. Law enforcement agen- licly disclose personal information. anyone seems to be using Zcash’s
cies now have access to advanced tech- Higher levels of privacy require generat- anonymity features. Coin Desk.
niques to track illegal activities that ing a new address for each transaction. [Online]. Available: https://www
employ cryptocurrencies. Elliptic, .coindesk.com/hardly-anyone-is-
a blockchain intelligence company, ACKNOWLEDGMENTS using-zcashs-anonymity-features-
uses artificial intelligence to scan I thank Jeff Voas for numerous edits but-we-couldnt-tell-if-they-were/
and analyze the Bitcoin network to and suggestions on previous versions 8. B. Penny. (2018, May 3). What is ZEC?
identify suspicious transactions. It of this article. Introduction to Zcash: Blockchains
www.computer.org/computingedge 29
NOVEMBER 2018 101
can cause zzzzz, but pure currency able: https://blog.z.cash
cryptos can really push boundaries. /software-usability-and-hardware- N I R K S H E T R I i s a p rofe s s o r of
management in the Bryan School of
Crypto Briefing. [Online]. Available: requirements/
Business and Economics at the Uni-
https://cryptobriefing.com 10. A. Greenberg. (2018, Mar. 27). versity of North Carolina at Greensboro.
/what-is-zec-introduction-to-zcash/ The dark web’s favorite currency Contact him at nbkshetr@uncg.edu.
9. P. Peterson. (2016, Oct. 19). User is less untraceable than it seems.
expectations at Sprout Pt. 2: Wired. [Online]. Available:
Software usability and hardware https://www.wired.com/story
requirements. Zcash. [Online]. Avail- /monero-privacy/
This article originally appeared in
Computer, vol. 51, no. 11, 2018.
CIOs, CTOs, CMOs, COOs, CFOs, and CEOs need teams with
the right skills and competencies, especially ones that enable
digital transformation. At the very least, teams need skills and
competencies in the following areas.
CLOUD COMPUTING
The requirement here includes knowledge of all flavors of cloud delivery, including all of the service
models that cloud computing provides, such as infrastructure (IaaS), software (SaaS), platform (PaaS),
security (SaaS), mobility (MaaS), analytics (AaaS), blockchain (BaaS), and even learning (LaaS). It is
also about knowledge of, and experience with, alternative cloud delivery architectures, cloud service
level agreements (SLAs), cloud performance metrics, and cloud virtualization (especially container)
technologies.
PERFORMANCE METRICS
The requirement here is on operational, delivery, organization, and financial metrics, including metrics
around online cloud application performance, cloud application availability, delivery incidents, SLA
adherence, project performance (especially satisfaction), personnel performance reviews, budgeting,
and resource costs. Knowledge and experience here also refer to the tools available to track, measure,
and report technology performance metrics.
32 ComputingEdge
November/December 2018 79 January 2020
www.computer.org/itpro
IT PROFESSIONAL
www.computer.org/computingedge
November/December 2018 80 33
www.computer.org/itpro
LIFE IN THE C-SUITE
REFERENCE
1. “Augmented analytics is the future of data and analytics,” Gartner, Jul. 2017. Available at:
https://www.gartner.com/doc/3773164/augmented-analytics-future-data-analytics
IEEE Symposium on
Security and Privacy
34 ComputingEdge
November/December 2018 81 January 2020
www.computer.org/itpro
IEEE Internet Computing delivers novel content
from academic and industry experts on the
latest developments and key trends in Internet
technologies and applications.
www.computer.org/internet
Volume 22
www.computer.org/internet
Number 4
www.computer.org/internet
Number 3
www.computer.org/internet
www.computer.org/product/magazines/internet-computing
Editor: Sarah Gregory
REQUIREMENTS Intel Corporation
sarah.c.gregory@ ieee.org
Ubiquitous
Requirements
Engineering
A Paradigm Shift That Affects Everyone
Karina Villela, Eduard C. Groen, and Joerg Doerr
IN RECENT YEARS, we have wit- thereby become ubiquitous.1 Our In this department, we discuss
nessed profound changes in busi- view, as shown in Figure 1, consists four of the six transformations to-
ness and society. The use of digital of six dimensions of ubiquity in ward ubiquitous R E , combining
technologies has brought about dis- RE. For each dimension, we have “open RE” and “cross-domain RE”
ruptive changes in every domain, identified the transformation (col- due to their strong synergy. These
changes that are widely known as the ored rectangle) required to overcome transformations have a great impact
“digital transformation.” Systems are the critical barrier posed by the sta- in industry and may have imminent
growing increasingly interconnected tus quo (gray rectangle) for the way implications for your work prac-
and complex with cyberphysical sys- RE is performed in the digital trans- tice. We will begin each section by
tems even sensing and actuating in formation era. describing what has changed in the
the physical world. Typical computer, You have probably noticed a shift world and how RE needs to adapt.
tablet, and smartphone users include in how your company is doing busi- Then we will paint a picture of how
anyone from children to the elderly. ness. Some companies experience RE could function from the perspec-
A single software product can now stronger dependency on other com- tive of a requirements engineer be-
easily reach audiences of millions panies or have the actual need to fore we discuss the hurdles that still
with unprecedented opportunities to cocreate an ecosystem with other need to be overcome.
obtain feedback. companies. You may also have found
The techniques that have so far that your product’s end users have Cross-Domain and Open RE to
proven crucial for eliciting require- changed or that they have changed Shape Software Ecosystems
ments do not hold up to the para- the way in which they communicate In all domains, we see a rapidly
digm shifts that have taken place. with you or others about your prod- growing demand by companies to
Consequently, we argue that require- uct. Perhaps you have worked on form partnerships with other com-
ments engineering (RE) will have projects in which you needed to elicit panies in software ecosystems to
to evolve in several dimensions and requirements from stakeholders in offer innovative digital solutions
unusual ways. Any of these observa- and thereby expand their business. 2
Digital Object Identifi er 10.1109/MS.2018.2883876
tions may be an indication that your Through orchestrated cooperation,
Date of publication: 22 February 2019 business is in need of ubiquitous RE. partners from different business
36
8 I E E E S O January
F T W A R2020
E | P U B L I S H E D B Y T H E I E E E CPublished
OMPUTE byRthe
SO IEEE
C I E Computer
TY Society 0 7 4 0 - 72469-7087/20
4 5 9 / 1 9 © 2 0 1©
9 I E2020
E E IEEE
REQUIREMENTS
From Geographic
From Dealing With One Collocation
Domain at a Time
To Worldwide
RE Distribution
To Dealing With
Everywhere
Multiple Domains
From Wishing for
Experienced End
Cross- RE With Users
Domain RE Everyone To Empowering
Newbies
Ubiquitous
RE
From Focusing on
From Wishing for Software
Well-Understood
To Holistically Taking
Processes RE for
Open RE Into Consideration
Everything
To Accepting People, Things, and
Openness Services
Automated
RE From Direct Interaction With
Legend:
Representative End Users
Gray Rectangles: Barriers
Colored Boxes: Required Transformations To Indirect Interaction With a
Circles: Dimensions of Ubiquity Crowd
sectors and different domains can or at least their contributions to the the inherent openness of software
provide high-level services that go ecosystem may still be unclear. ecosystems. Requirement engineers
far beyond their current and in- Requirements engineers have used must be capable of fostering the si-
dividual offerings. New business glossaries, domain concepts, and multaneous shaping of business and
models and processes arise in sce- domain-relevant processes to famil- software and be able to deal with un-
narios where business and techni- iarize themselves with new business certainty. The skills of requirements
cal solutions influence each other domains and facilitate a shared un- engineers need to shift from being
and therefore must be shaped at the derstanding among project stake- able to elicit and represent knowledge
same time. A good example is the holders. Some have been switching and requirements obtained from do-
agricultural domain, which is being among domains rather than special- main experts to being able to connect
influenced by technologies based on izing in one domain or subdomain. businesses and propose requirements
the Internet of Things and big data These practices can help with the to domain experts. In this sense, a re-
and where the interplay of farming shaping of cross-domain ecosystems, quirement engineer acts instead as a
equipment manufacturers, chemical but they do not suffice; requirements business transformer.3
industry, insurance companies, and engineers must be capable of fostering Cross-domain and open RE starts
farm management providers creates connections among several business with the identification of key eco-
new cross-domain software ecosys- domains. In a similar way, adopting system partners, which are concrete
tems. For planned and even for ex- an incremental life cycle or an agile organizations interested in being
isting software ecosystems, several development approach can help but part of the software ecosystem. A
partners might still be unknown, does not suffice when dealing with requirements engineer is part of an
www.computer.org/computingedge M A R C H /A P R I L 2 0 1 9 | I E E E S O F T WA R E 37
9
REQUIREMENTS
ecosystem leadership team, which partners, 2) models and visualiza- of motivational techniques to boost
also includes an integration archi- tions to provide different ecosystem the generation of user feedback. 5
tect, an experience designer, and views on different levels and from Together, these approaches address
others. This team seeks to make the different perspectives, and 3) means typical problems experienced in RE,
design of the software ecosystem as to support a continuous change pro- including engaging a high number
tangible as possible. As a business cess based on runtime monitoring of of stakeholders, prioritizing require-
transformer, the requirements en- emergent behavior. ments reliably, and refining coarse-
gineer plans workshops where the grained requirements.
key partners play with alternative Automated RE When automation is employed in
physical representations of the eco- to Exploit User Feedback RE, the role of the requirements engi-
system to find out how business Software is a commodity for virtually neer resembles that of a data analyst.
flows can take better advantage of everyone. There is hardly any business No direct interaction with end us-
the assets of the ecosystem partners area that is devoid of any software ers takes place to elicit requirements.
and ensure benefits to the overall support whatsoever. On the flip side Rather, the requirements engineer gets
ecosystem. Based on their knowl- of software having become this wide- to see the results of automated analyses
edge of all involved domains, the spread in both business-to-consumer conducted over user feedback, which
requirements engineers also make and business-to-business settings, it should produce information about
assumptions and invent require- has become hard to involve the enor- requirements, and can then make de-
ments, as the domain experts do not mous pool of stakeholders, let alone cisions accordingly. A company can
know yet how to transform their elicit requirements from a represen- obtain such data from all their com-
business models into an innovative tative subset to build software that munication channels (e.g., social me-
software ecosystem. Due to the in- meets all users’ expectations and dia, review sites, bug trackers, and
herent complexity, requirements en- needs. This is especially true for a customer relationship management
gineers always select a small subset heterogeneous user base, whose re- systems) and from the software prod-
of the ecosystem as the scope and quirements are likely to be even more uct itself (e.g., log data, built-in feed-
test their assumptions and proposed divergent. Moreover, companies have back mechanisms). Because such user
requirements in short feedback cy- to deal with increasingly diverse, feedback has been shown to be a fruit-
cles, either at the conceptual level or complex, and large software systems, ful source of opinions and require-
by using simulation or prototypes. while the demand for fast innovation ments, text mining and usage mining
During the whole process, they align calls for short feedback loops. approaches automatically extract re-
the key ecosystem partners in several Traditional requirements elicita- quirements and relevant information
dimensions: social, business, techni- tion techniques, such as interviews from such data. To improve the inter-
cal, and legal. or focus groups, have scalability pretability and validity of the results,
Currently, only a few methods problems. They stretch the limitation requirements engineers could employ
and tools suppor t the shaping of of resources when performed with crowdsourcing techniques to manu-
a software ecosystem (see Villela more than a few dozen people and ally assess user feedback (e.g., rating
et al.,1 Section VI.B, for a review). if they need to be performed con- or annotating sentences or validating
To provide some guidance to re- tinuously to keep up with the com- analysis results).
quirements engineers, we are design- petition. Besides, they are typically CrowdRE is gaining traction;
ing a framework of decisions that best suited for collocated settings. practitioners are interested in the
needs to be made to shape a planned Approaches for dealing with large topic, and the body of research on
ecosystem together with a workflow crowds of users typically make RE automated user feedback is growing.
of activities that indicate the time scalable by using new communica- However, mining techniques and
for making those decisions.4 How- tion mechanisms and (big data) ana- classification algorithms have only
ever, we additionally see the need lytics. We introduced the paradigm been adapted to RE recently and
for 1) techniques that support the of crowd-based requirements engi- need to be further refined to pro-
ideation of the ecosystem business neering (CrowdRE), which involves vide reliable results without requir-
and the performance of quick vali- automated gathering and analysis ing much additional manual work.
dation rounds with key ecosystem of user feedback, as well as the use What makes automatic analyses
38
10 I E E E S O F ComputingEdge
T W A R E | W W W. C O M P U T E R . O R G / S O F T W A R E | @ I E E E S O F T WA R E January 2020
REQUIREMENTS
www.computer.org/computingedge M A R C H /A P R I L 2 0 1 9 | I E E E S O F T WA R E 39
11
REQUIREMENTS
to be characterized according to as- need to be shared so others can Int. Requirements Engineering Conf.
pects that are relevant for actively learn about which method is suit- (RE 18), pp. 205–216.
engaging end users in RE activities, able for a particular stakeholder 2. S. Jansen, S. Brinkkemper, and M.
such as duration, frequency, location, group. Overall, requirements engi- A. Cusumano, Software Ecosystems:
and degree of interactivity. Require- neers need to make an effort to see Analyzing and Managing Business
ments engineers can then characterize eye to eye with the stakeholders on Networks in the Software Industry,
end users according to aspects, such a social level, whether by talking to Cheltenham, U.K.: Edward Elgar
as their domain knowledge, attitude villagers at the market or engaging Publishing, 2013.
toward IT, overall motivation, and in one-on-one sessions with a men- 3. S. Hess, J. Knodel, M. Naab, and
temporal availability and select RE tally impaired person under thera- M. Trapp, “Engineering roles for
methods that fit the characteristics of peutic guidance. constructing ecosystems,” in Proc.
10th European Conference on Soft-
ware Architecture Workshops, 2016,
pp. 24–28.
4. K. Villela, S. Kedlaya, and J. Dörr,
Overall, requirements engineers need “An approach to requirements en-
gineering for software ecosystems,”
to make an effort to see eye to eye in Proc. Requirements Engineering:
with the stakeholders on a social level. Foundation for Software Quality
(Essen 2019), to be published.
5. E. C. Groen et al., “The crowd in
requirements engineering: The land-
scape and challenges,” IEEE Softw.,
a specific group of end users. Their Working Together vol. 34, no. 2, pp. 44–52.
choices may lead to new methods be- To respond to the challenging de- 6. C. Ncube and S.-L. Lim, “On
ing introduced, or to existing ones mands of digital transformation, RE systems of systems engineering: A
being employed or adapted. will have to become ubiquitous in Requirements engineering perspective
Involving end users as “cocre- several dimensions, with the role of and research agenda,” in Proc. 26th
ators” of a digital solution can help the requirements engineer remain- IEEE Int. Requirements Engineer-
increase participation and accep- ing central to the success of software ing. Conf. (RE 18), pp. 112–123.
tance by specific groups. However, products. To achieve this goal, fur- 7. J. Salminen, S. Konsti-Laakso,
it is necessary to offer informal set- ther applied research will be needed M. Pallot, B. Trousse, and B. Senach,
tings in which they can feel comfort- to address the practical implications “Evaluating user involvement within
able collaborating. The so-called and actual needs of industry and living labs through the use of a
Living Lab approach7 might provide society. Practitioners are invited to domain landscape,” in Proc. 17th
solutions to this challenge, but the embrace the need for change and Int. Conf. Concurrent Enterprising,
motivation to actively participate in to provide insights into what they 2011, pp. 1–10.
RE or to even show up still remains can contribute as well as what their
a challenge. The incorporation of needs are. Only through close col-
gamification principles and factors laboration among research, society, This article originally appeared in
that enhance motivation, such as and industry can the hurdles that IEEE Software, vol. 36, no. 2, 2019.
external stimuli or incentives, so- currently still prevent true RE ubiq-
cial interaction, and the assignment uity be overcome.
of tasks and responsibilities, needs
to be investigated. There are only a References
Access all your IEEE Computer
few studies that report on how they 1. K. Villela et al., “Towards ubiqui- Society subscriptions at
applied cocreation and approaches tous RE: A perspective on require- computer.org
such as Living Labs in settings with ments engineering in the era of digital /mysubscriptions
high social impact. Such experiences transformation,” in Proc. 26th IEEE
40
12 I E E E S O F ComputingEdge
T W A R E | W W W. C O M P U T E R . O R G / S O F T W A R E | @ I E E E S O F T WA R E January 2020
DEPARTMENT: IOT NEWS
Internet of Things (IoT) technologies have been with us for a while. During the last two decades,
many researchers have made successful advances in smart products, communication protocols
and systems, middleware and integration platforms, architectures, and applications. Scientific
journals as well as management magazines profile cutting-edge IoT developments. However,
less attention has been given to the IoT’s economic impact.1 This article aims to reduce this gap
and give some recommendations.
make their own decisions, and communicate and cooperate with the environment directly or via
an “Internet of Services.”2
There is a large variety of IoT applications. Smart toothbrushes help keep your teeth and gums
healthy. Smart shipping containers monitor transportation processes and protect valuable items
from theft and damage. Smart machines constantly monitor their status and request maintenance
before a costly breakdown. Smart vehicles such as automated guided vehicles (AGVs)—robots
that autonomously move materials in a warehouse—communicate and coordinate production
supplies efficiently. Although “smart” products are at the heart of IoT applications, in most cases
the full applications require complementary innovations: smart products and CPSs are combined
with other technologies such as cloud and mobile computing, digital social networks, and data
analytics. The key insight from a management perspective is that the source of innovation does
not lie within a single technology; it is the fusion of different technologies that drives innovative
IoT solutions. Apps are orchestrated by combining micro services on digital platforms in the
cloud and downloaded onto smartphones and other smart products. These, in turn, create data
and deliver it to the web and, vice versa, use data provided by the web for their own purposes.
The integration of different technologies leads to a new system enabling innovative and formerly
unthinkable data-driven services.
42
January–March 2018 ComputingEdge 88 January 2020
www.computer.org/pervasive
IOT NEWS
available in a company, and the competition for such talent is fierce—hence, quickly finding
qualified staff is difficult. Finally, the maturity of digitization technologies is often either over-
or understated.
Digital transformation affects a firm’s strategy, its offerings, the IT infrastructure, the way to col-
laborate with partners, its organizational structure, overall process organization, and core compe-
tences, as well as the overall company culture at the time.3 The potential for things going wrong
is therefore high. Consequently, the bottom-up approach alone is insufficient to successfully
transform a company.
Equally important is a strategy-driven or “top-down” approach that helps to avoid the difficulties
mentioned above, as well as to speed up the process. Here, the company first develops a strategic
vision of the data-driven version of the enterprise to identify potential barriers and to initiate
countermeasures. For this, instruments are needed to identify, structure, and handle upcoming
barriers that might arise during the transformation process. For example, maturity models meas-
uring the degree of digital transformation3 are commonly used as a tool to determine the firm’s
position in the transformation process and to indicate potential problems and corresponding
countermeasures.
Ultimately, the top-down and the bottom-up approaches must be combined to solve the digital
transformation problem. To accomplish this, we propose the four-step iterative process shown in
Figure 1.
The process starts with a Business Strategy step—the creation of a strategic business vision for
the data-driven enterprise. This vision must then be broken down into business initiatives and a
set of data-driven use cases that support business strategies and goals. Setting the correct frame-
work conditions of the IT infrastructure, partnering network, organization, human resources, in-
novation culture, and so on require a digital maturity assessment to avoid friction losses during
implementation itself. Potential use cases must then be evaluated and prioritized as to business
value, data accessibility, and implementation feasibility. The most promising use case can then
be implemented (“application”).
www.computer.org/computingedge
January–March 2018 89 43
www.computer.org/pervasive
IEEE PERVASIVE COMPUTING
In the next step of the digital transformation process, Knowledge Creation, a data model is first
developed that includes all information necessary to solve the core problem behind the use case
(“model”). This model is then populated with data coming from different sources inside and out-
side the company.
Next, in the Knowledge Application step, companies use AI techniques to get new insights and
knowledge from this data and to derive use case–specific solutions (“forecasting, optimization”).
Methods and algorithms used in this context usually come from statistics, mathematics, and ma-
chine learning and must be integrated into a technical solution corresponding to the given use
case. Implementation of models in applications such as a standard procurement system (SPS), a
manufacturing execution system (MES), and enterprise resource planning (ERP) can create new
business value for the firm.
In the last step, Decision-Making Process, company management must decide how to integrate
the data-driven solution into the organizational decision processes (“specification”). The vision,
as well as the roadmap, can then be revised and the framework conditions adapted before the
next use case is selected. Each implementation gets one step closer to the vision of the data-
driven enterprise.
CONCLUSION
Smart products, which are at the heart of the IoT, will drive the future digital transformation of
companies and radically change their business model. The implementation of smart products and
corresponding data-driven services must be carefully managed due to its game-changing charac-
ter. Based on our own experience with consultancy projects as well as discussions with digitiza-
tion experts, we developed an iterative reference process for digital transformation that is
currently being used and evaluated in various industry and research projects carried out by the
44
January–March 2018 ComputingEdge 90 January 2020
www.computer.org/pervasive
IOT NEWS
Fraunhofer Center for Applied Research on Supply Chain Services SCS in Nuremberg, Ger-
many. Of course, depending on a given company’s situation, not all of our recommendations and
process steps might be necessary.
Beyond developing the process itself, we have also gained three important insights. First, it is
essential that companies first create a vision for their own data-driven enterprise and then align
their goals with the process’s various activities. Second, digital transformation is a race against
time; it is necessary to establish a digitization department as well as a supporting business eco-
system in order to move fast, avoid mistakes, and be efficient. Third, we believe that fundamen-
tal change within individual enterprises as well as the industry at large can only occur with an
open innovation culture, requiring new types of skills in both data science and service system
engineering.
REFERENCES
1. M.E. Porter and J.E. Heppelmann, “How Smart, Connected Products are Transforming
Competition,” Harvard Business Rev., vol. 92, no. 11, 2014, pp. 64–88.
2. C. Klötzer and A. Pflaum, “Cyber-Physical Systems as the Technical Foundation for
Problem Solutions in Manufacturing, Logistics and Supply Chain Management,” Proc.
5th Int'l Conf. Internet of Things (IoT 15), 2015; doi.org/10.1109/IOT.2015.7356543.
3. C. Klötzer and A. Pflaum, “Toward the Development of a Maturity Model for
Digitalization within the Manufacturing Industry’s Supply Chain,” Proc. 50th Hawaii
Int'l Conf. System Sciences (HICSS 17), 2017, pp. 4210–4219.
4. A. Osterwalder and Y. Pigneur, Business Model Generation: A Handbook for
Visionaries, Game Changers, and Challengers, Wiley, 2010.
5. H. Kagermann, “Change through Digitization—Value Creation in the Age of Industry
4.0,” Management of Permanent Change, Springer, 2017.
6. V. Eloranta and T. Turunen, “Seeking Competitive Advantage with Service Infusion:
A Systematic Literature Review,” J. Service Management, vol. 26, no. 3, 2015, pp.
394–425.
7. H. Gebauer, E. Fleisch, and T. Friedli, “Overcoming the Service Paradox in
Manufacturing Companies,” European Management J., vol. 23, no. 1, 2005, pp. 14–
26.
8. M.W. Van Alstyne, G.G. Parker, and S.P. Choundary, “Pipelines, Platforms, and the
New Rules of Strategy,” Harvard Business Rev., vol. 94, no. 4, 2016, pp. 54–60.
9. M. Papert and A. Pflaum, “Development of an Ecosystem Model for the Realization of
Internet of Things (IoT) Services in Supply Chain Management—A Grounded Theory
Study,” Electronic Markets, vol. 27, no. 2, 2017, pp. 175–189.
10. C. Frankenberger, T. Weiblen, and O. Gassmann, “Network Configuration, Customer
Centricity, and Performance of Open Business Models: A Solution Provider
Perspective,” Industrial Marketing Management, vol. 42, no. 5, 2013, pp. 671–682.
www.computer.org/computingedge
January–March 2018 91 45
www.computer.org/pervasive
Department: Internet-of-Things
Editor: Amit Sheth, amit@knoesis.org
Extending Patient-Chatbot
Experience with Internet-of-
Things and Background
Knowledge: Case Studies
with Healthcare Applications
Amit Sheth Saeedeh Shekarpour
Kno.e.sis-Wright State University University of Dayton
Hong Yung Yip
Kno.e.sis-Wright State University
& THE TRANSITION TOWARDSpersonalized health health conditions such as sleep apnea and heart
management requires public awareness about rhythm disorder. However, to make more sense
management strategies of self-monitoring, self- of IoT data, it is imperative that we develop cogni-
appraisal, and self-management, eventually pav- tive approaches where they mine, interlink,
ing a way to more timely interventions and higher and abstract diverse IoT data. These cognitive
quality patient–clinician interactions.1 A key approaches often needs to keep the user closely
enabler is patient generated health data, fueled in engaged to acquire more information, to obtain
good part by the growth in wearable devices feedback, to collect verbal health conditions, and
including smart watches and other Internet-of- to provide intervention and management actions.
Things (IoT) for health-tracking (http://bit.ly/ The chatbot technology was initially intro-
smart-wearables). These tracking devices pro- duced as an artificial conversational agent
vide “low-level” monitoring signals indicating to simulate conversations with a user using
voice or text interactions (http://bit.ly/chatbot-
communication).2 Its market is projected to
Digital Object Identifier 10.1109/MIS.2019.2905748 reach $1.23 billion by 2025 (http://bit.ly/chatbot-
Date of current version 19 September 2019. market). If this technology is equipped with
1541-1672 2019 IEEE Published by the IEEE Computer Society IEEE Intelligent Systems
46
24 January 2020 Published by the IEEE Computer Society 2469-7087/20 © 2020 IEEE
Figure 1. A healthcare assistant bot interacts with the patient via various conversational interfaces (voice,
text, and visual) to disseminate information and provide recommendation (validated by physician). The core
functionalities of the chatbot (Component C in the blue box) are extended with a background HKG
(Component A in the green box) and an evolving PHKG (Component B in the orange box).
July/August 2019
www.computer.org/computingedge
25 47
Internet-of-Things
data, (ii) an evolving Patient Health Knowledge of such data in better health management is
Graph (PHKG) (see Figure 1B) that incorporates likely to become more important, and chatbots
Patient Generated Health Data (PGHD) from sen- can further make it easier to collect some of the
sors and IoT devices and structured knowledge patient data such as symptoms or how a
extracted from a patient’s Electronic Medical patient feels.
Record (EMR) as well as environmental data (e.g., Contemporary implementations of chatbot
pollen, air quality) from public web services. The technologies do not understand conversation
PHKG continues to grow by expanding informative narrative and demonstrate very limited cogni-
pieces of knowledge from continuous patient tive capabilities and commonsense reasoning.
interactions with the chatbot and (iii) is refined by Handling these limitations for a broad domain
healthcare provider’s feedback (see Figure 1C) on might take years, but in a specific domain such
predictions and analytics. as health care, and even narrower applications,
such as a specific disease, these limitations can
be alleviated by extending the chatbot technol-
CURRENT HEALTHCARE ogy with domain and disease-specific health
CHALLENGES AND PROPOSED background knowledge (i.e., contextual and per-
SOLUTIONS sonalized knowledge). There are publicly avail-
Contextualization and Personalization of able generic knowledge graphs (e.g., DBpedia
Patient’s Data. The first challenge for developing and Freebase) as well as healthcare-specific
personal health agent is the need to contextual- knowledge source, e.g., unified medical lan-
ize and personalize healthcare treatments and guage system, PubMed, systematized nomencla-
decisions. Current healthcare system lacks con- ture of medicine-clinical term, and International
textual and personalized knowledge about its classification of diseases. Chatbot technology
patients3 due to the limited patient–physician can acquire a context-aware (i.e., patient’s con-
time spent during clinical visits, the patient’s text), domain-specific (i.e., health domain)
ability to recall prior events, and clinic-centric knowledge graph (extracted and integrated
system that captures only a part of relevant from external sources such as Web of Data)
patient data. Contextual factors in this instance termed HKG. The HKG can be updated and syn-
refer to a more in-depth health management chronized by the evolution of Web of Data or
and clinical protocol knowledge that a physician
relevant knowledge sources. HKG provides
may utilize, whereas personalized factors
essential facts (background knowledge) that are
include a patient’s health history, data capturing
necessary for response generation, reasoning,
patients health condition (e.g., a lab or BMI),
and inference components of chatbot engine.
ongoing activities, and lifestyle choices. A survey
The other obstacle to have a holistic overview
presented in the article by Linder et al.5 reports
of a patient’s circumstance is the lack of a uni-
several notable barriers to the effective use of
clinical decision support systems during patient fied and semantic-based approach for publishing
visits, including physician losing direct eye con- and integrating an individual patient’s data. This
tact with patients, falling behind schedule, gap hinders the health care system to provide a
inability to type quickly enough, and feeling that comprehensive history and insight about
using the computer in front of the patient is patients. To tackle this deficiency, we propose
rude. It concludes that EMRs have mixed effec- to publish a knowledge graph out of anony-
tiveness for supporting decision-making of mized patient data that is collected from vari-
physicians since exploring them is not reason- ous sources (knowledge collected from EMR,
ably agile to derive effective knowledge.4 These IoTs devices, and external web services). PHKG
factors can potentially lead to missing patients’ further integrates knowledge extracted from
data and likely to affect other healthcare profes- previous conversations of patients with chatbot.
sionals who utilize these data. On the bright To sum up, having two background knowledge
side, patients are increasingly using technology graphs (see Figure 1) to feed the core chatbot
(e.g., wearables) and using mobile applications engine will enhance reasoning and prediction in
to generate what is termed PGHD. Incorporation support of improving health decision making.
48
26 ComputingEdge
IEEE Intelligent Systems
January 2020
LIMITED PATIENT HEALTH DATA DUE humidity, and temperature) using Foobot, an
TO EPISODIC VISITS AND TIME indoor air quality monitor; (c) outdoor allergens
CONSTRAINTS and air quality recorded using web services
The American Academy of Family Physicians (ozone, pollen, and air quality); and (d) selected
(AAFP) defines primary care as promoting effective data semi-automatically (human validation with
communication and encouraging the role of the strict anonymization) extracted from patient’s clin-
patients as partner in healthcare. During clinical ical notes (from EMRs). A total of 110 evaluations
visit, the primary care physician assumes the pri- in this 150þ planned completed pediatric asthma
mary contact of patients for diagnosing a wide patient cohort study have been completed, each
range of illnesses and injuries, counselling, and lasting one or three months of participation. A
education as well as initiating preventative care. compliance rate of 89% (defined as over 75% of
They are also responsible for making referrals to data requiring active patient participation) shows
specialists according to the patient’s condition. the user acceptance of such a technology. The
This is a task of significant responsibility since a total number of data points collected per patient
patient may endure prolonged suffering in case of per day is up to 1852 over 29 types of parameters.
a wrong referral. However, with increasing societal All data are anonymized and securely backup on
demand to healthcare resources, a significant per- the Kno.e.sis cloud. These data are integrated
centage of physicians reported that they ran out together using a visualization and analysis plat-
of consultation time to converse and accurately form, kHealthDash (http://bit.ly/kHealthDash).
diagnose the root cause of patients’ conditions
(http://bit.ly/clinical-challenges). Consequently,
ARCHITECTURE OVERVIEW OF A
some patients are being deprived of education
HEALTH CHATBOT
about their health conditions, causes, available
Content, user interface, and user feedback are
treatments, and education (such as on lifestyle
three major components that go hand-in-hand in
changes). This indicates a worrisome gap in col-
creating a positive user experience which is a criti-
lecting, managing and analyzing patient’s health
cal for defining the relationship a user has with a
data as well as a proper mechanism for educating,
chatbot. Having the chatbot’s core functionalities
advising, and referring patients. extended with HKG and PHKG help contextualize
Mobile devices and IoTs are increasingly preva-
and personalize conversations. However, without
lent with overall improved technology literacy
an equally strong frontend communication system
among populations. They can hence be leveraged
to (a) receive user input and (b) articulate smart
for continuous real-time tracking of patient health
responses by (c) making intelligent inferences and
signals. These signals can help in bridging the
prediction, user interest and experience may
information gap between each hospital visit and
decline and diminish over time (http://bit.ly/why-
providing just-in-time adaptive interventions.6 For
chatbots-fail). The six core components of the
example, a joint project between Kno.e.sis and
chatbot (see Figure 1C) each represents a
Dayton Children’s Hospital has developed knowl-
research problem: conversation management, nat-
edge-enabled semantic multi-sensory approach
ural language (narrative) understanding, response
for personalized pediatric asthma management
generation, knowledge extraction and discovery,
(kHealth, http://bit.ly/kHealth-Asthma).7 The
reasoning and inference engine, and prediction
kHealth-Asthma kit represented in Figure 2 con-
module. The following are the proposed exten-
sists of an Android application that asks contex-
sions to the current state-of-the-art approaches to
tual questionnaire (tailored to specific conditions
improve patient experience in using a chatbot.
of the user) to capture symptoms and medication
usage. It also uses IoT and Web Services to collect (a) Receive and understand user input: A chatbot
patient’s and patient relevant relevant data includ- should be sufficiently dynamic to communi-
ing (a) physiological data captured via Fitbit (activ- cate with patients via multiple input and out-
ity and sleep) and Peak Flow meter (PEF/FEV1 put modalities including voice, text, and
values); (b) indoor environmental data (particu- smart display. The chatbot should pro-
late matter, volatile organic compound, CO2, vide feedback to the user and affirm its
July/August 2019
www.computer.org/computingedge
27 49
Internet-of-Things
Figure 2. The kHealth framework with kHealth-Asthma kit, kHealth cloud (D), and kHealth Dashboard (E), showing the
frequency of data collection, the number of parameters collected, and the total number of data points collected per day per
patient (shown in dark blue). The kHealth kit components that are given to patients which collects PGHD are shown in light
blue and the outdoor environmental parameters with their sources are shown in green. All data are anonymized and
associated with respective randomly assigned patient IDs.
understanding to avoid conflict and knowl- (iii) Dynamicity and evolution. The more the
edge mis-representation. patient interacts with the chatbot, the more
(b) Generating smart responses: The responses knowledge it discovers about the patient. In
articulated by the chatbot are reasoned addition, knowledge evolves over time and
from the underlying HKG and PHKG to guar- they should be reflected on the knowledge
antee domain-specificity and contextualiza- bases (HKG and PHKG).
tion as well as personalization aspects. (iv) Balancing response granularity and volume.
The “smart” is attributed by the following The complexity of traversing the graphs
components: followed by reasoning and formulating a
(i) Comprehensible and concise. Conciseness response, either by visualization or verbal-
and comprehensibility of answers pro- ization, increases dramatically with the
foundly matter as a slight flaw could com- volume of data. Retrieving and balancing
promise reliability. an optimum amount of data, yet sufficient
(ii) Context-awareness and coherence. The for a reasonable response is critical to
chatbot should consider the patient’s con- communicate timely and effectively.
text in terms of space and time in addition (c) Inference, reasoning, and prediction. As knowl-
to the input provided. For example, if an edge evolves, both HKG and PHKG should be
asthmatic patient asks for the weather con- continuously updated to infer new insights
dition, a generic answer would be “Today (http://bit.ly/PHKG-evolution). The prediction
is fairly sunny” versus a personalized module relies on both new and historical
answer with respect to the patient’s dis- knowledge about the patient in order to infer,
ease “Today is fairly sunny. However, the reason, and make a reasonable recommenda-
ragweed pollen is a little high which does tion to assist the patient for self-management
not look too good for your health. Do and self-appraisal. The predictions are also
remain indoor as much as possible.” The continuously presented to the corresponding
latter illustrates context awareness. physicians to create situational awareness,
50
28 ComputingEdge
IEEE Intelligent Systems
January 2020
and in case of an emergency condition, the leveraged and transformed into practical and
physician can be notified immediately to actionable information for both patient and
intervene. health care provider. Specifically, the patient
can access information with regards to his/her
asthma control level based on symptoms, sever-
CASE STUDIES WITH HEALTHCARE ity, and triggers for self-monitoring, all at the
APPLICATIONS convenience by conversing with the chatbot.
The first use case is major depressive disor- The third prominent use case is elderly care.
der. Depression is highly prevalent in the U.S. With improved healthcare services and ameni-
with estimated prevalence rates of 10.5% affecting ties, elder residents are becoming one of the
millions of U.S. adults (http://bit.ly/major- fastest growing cohort.9 These older adults how-
depression). Successful early identification and ever are at the highest risk for developing
intervention, albeit challenging, can lead to posi- chronic diseases such as heart failure and
tive health and behavioral improvements. A rou- chronic obstructive pulmonary disease. As the
tine screening for depression by a clinician technology matures, a chatbot with consented
involves administering a Patient Health Question- access to patient–doctor profile and social infor-
naire (PHQ-9, http://bit.ly/PHQ-9) which relies mation can be delegated to match patient–doc-
heavily on patient’s ability to recall events that tor preferences, organize telehealth sessions,
occurred over the span of last two weeks. Instead, and schedule appointments by looking up the
a chatbot can directly converse with patient to doctor’s calendar. Extending with IoTs such as
collect relevant data on a continuous basis in pill’s bottle sensor, the chatbot can be made
real-time, or as an added option, a patient can smarter to remind and nudge patient of timely
consent the chatbot to use his social media con- medication intake as well as adherence to clini-
versations to indirectly assess some of the com- cian prescribed management plan. By incorpo-
ponents of PHQ-9 assessment and directly rating background geospatial and gazetteers
converse with a patient for the remaining informa- knowledge sources, it is also feasible to coordi-
tion needed for an assessment. The patient’s nate and arrange transportation service for
PHKG can represent patient’s past encounters elderly with physical disabilities and transporta-
and behavioral manifestations (optionally on tion barriers, especially in congested cities.
social media) over a substantial period of time for In conclusion, while the chatbot technology
a more accurate prognosis. In addition, a contex- is not new, we discussed how its potential can
tualized chatbot with domain knowledge can be extended with IoTs and knowledge graphs.
understand slang terms that are commonly used We further illustrated the possible health serv-
in social media such as “bupe” which refers to its ices a chatbot can intervene using three disease-
medical term “buprenorphine.” This allows a via- specific use cases. To sum up, the chatbot tech-
ble entry for a chatbot to deliver tailored psycho- nology can (i) be empowered with multisensory
therapy based on Cognitive-behavioral therapy8 capabilities through IoTs and sensors, (ii) pro-
and initiate the need for treatment intervention vide contextualized and personalized reasoning
conforming to medical protocols. capabilities grounding with domain-specific
The second use case is asthma. More than knowledge, and (iii) assist situations requiring
20.4 million people in the U.S. are diagnosed high cognitive load. These diverse potentials
with asthma in 2016 and asthma-related health- hold prodigious promising for a close future of
care costs alone are around $50 billion a year promoted healthcare approach.
(http://bit.ly/asthma-facts). In an attempt to
bridge the informational gap between episodic
patient–doctor visits, a chatbot can combine
& REFERENCES
active and passive sensing using a variety of 1. A. Sheth, U. Jaimini, and H. Y. Yip, “How will the
low-cost sensors and IoTs for continuous moni- internet of things enable augmented personalized
toring and collection of multimodal data. These health?,” IEEE Intell. Syst., vol. 33, no. 1, pp. 89–97,
longitudinal measurements can then be Jan./Feb. 2018.
July/August 2019
www.computer.org/computingedge
29 51
Internet-of-Things
2. L. Pichponreay, J. H. Kim, C. H. Choi, K. H. Lee, and symptoms of depression and anxiety using a fully
W. S. Cho, “Smart answering chatbot based on OCR automated conversational agent (Woebot): A
and overgenerating transformations and ranking,” in randomized controlled trial,” JMIR Mental Health,
Proc. 8th Int. Conf. Ubiquitous Future Netw., pp. 1002– vol. 4, no. 2, 2017.
1005, Jul. 2016. 9. A. E. Schneider, N. Ralph, C. Olson, A. M. Flatley, and
3. A. Holzinger, C. Biemann, C. S. Pattichis, and D. B. Kell, L. Thorpe, “Predictors of senior center use among
“What do we need to build explainable AI systems for older adults in New York City public housing,” J. Urban
the medical domain?,” arXiv:1712.09923, 2017. Health, vol. 91, no. 6, pp. 1033–1047, 2014.
€ ller, “Explainable
4. W. Samek, T. Wiegand, and K. R. Mu
artificial intelligence: Understanding, visualizing and
Amit Sheth works on semantic-cognitive-perceptual
interpreting deep learning models,” arXiv:1708.08296,
computing and knowledge-enhanced learning with
2017.
application in healthcare and social good. He is a fellow
5. J. A. Linder, J. L. Schnipper, R. Tsurikova, A. J. Melnikas,
of IEEE, AAAI, and AAAS. He is the corresponding
L. A. Volk, and B. Middleton, “Barriers to electronic
author of this article and can be reached at amit.
health record use during patient visits,” in Proc. AMIA shet@wright.edu and http://knoeiss.org/amit.
Annu. Symp., 2006, vol. 2006, pp. 499–503.
6. I. Nahum-Shani et al., “Just-in-time adaptive
interventions (JITAIs) in mobile health: Key
components and design principles for ongoing health
behavior support,” Ann. Behav. Med., vol. 52, no. 6, Hong Yung (Joey) Yip is currently working
pp. 446–462, 2017. toward the Ph.D. degree on topics in knowledge
7. U. Jaimini, K. Thirunarayan, M. Kalra, R. Venkataraman,
graph, deep learning, and conversational AI. Contact
him at joey@knoesis.org.
D. Kadariya, and A. Sheth, “How is my child’s asthma?”
Digital phenotype and actionable insights for pediatric
Saeedeh Shekarpour is an Assistant Professor of
asthma, JMIR Pediatrics and Parenting, vol. 1, no. 2, computer science with the University of Dayton, Dayton,
2018, Art. no. e11988. OH, USA. She works on knowledge graphs and cogni-
8. K. K. Fitzpatrick, A. Darcy, and M. Vierhile, “Delivering tive computing in question answering and chatbot tech-
cognitive behavior therapy to young adults with nologies. Contact her at sshekarpour1@udayton.edu.
52
30 ComputingEdge
IEEE Intelligent Systems
January 2020
CAREER OPPORTUNITIES
IEEE TRANSACTIONS ON
BIG DATA
SUBMIT
TODAY
TBD is financially cosponsored by IEEE Computer Society, IEEE Communications Society, IEEE Computational Intelligence
Society, IEEE Sensors Council, IEEE Consumer Electronics Society, IEEE Signal Processing Society, IEEE Systems, Man &
Cybernetics Society, IEEE Systems Council, and IEEE Vehicular Technology Society
TBD is technically cosponsored by IEEE Control Systems Society, IEEE Photonics Society, IEEE Engineering in Medicine &
Biology Society, IEEE Power & Energy Society, and IEEE Biometrics Council
www.computer.org/computingedge 53
IEEE Security & Privacy is a bimonthly magazine
communicating advances in security, privacy,
and dependability in a way that is useful to a
broad section of the professional community.
www.computer.org/security
Software and Cybersecurity ■ Big Data: Privacy Versus Accessibility ■ Resiliency in Cloud Computing
AI ETHICS
Blockchain Technologies ■ The Fuzzing Revival ■ Cybersecurity for the Public Interest
IEEE SECURITY & PRIVACY
VOLUME 16
NUMBER 1
JANUARY/FEBRUARY 2019
NUMBER 3
VOLUME 17
November/December 2018
Vol. 16, No. 6
NUMBER 2
MAY/JUNE 2018
MARCH/APRIL 2019
Keep up with the latest IEEE Computer Society publications and activities wherever you are.
Follow us:
| @ComputerSociety
| facebook.com/IEEEComputerSociety
| youtube.com/ieeecomputersociety
| instagram.com/ieee_computer_society
IEEE Computer Architecture Letters is a forum for fast
publication of new, high-quality ideas in the form of
short, critically refereed technical papers. Submissions
are accepted on a continuing basis and letters will be
published shortly after acceptance in IEEE Xplore and in
the Computer Society Digital Library.
www.computer.org/cal
www.computer.org/annals
WWW.COMPUTER.ORG/ITPRO
Get Published in the New IEEE Open
Journal of the Computer Society
U P L O A D D ATA S E T S AT I E E E - D ATA P O R T. O R G
IEEE COMPUTER GRAPHICS AND APPLICATIONS
IEEE COMPUTER GRAPHICS AND APPLICATIONS
IEEE COMPUTER GRAPHICS AND APPLICATIONS
Quality
November/December 2016
September/October 2016
January/February 2017
Assessment
July/August 2016
Defense
C G &A
and
Perception Applications
Quality Assessment and Perception in Computer Graphics
in Computer Graphics
Defense Applications
VOLUME 37 NUMBER 1
VOLUME 36 NUMBER 5
VOLUME 36 NUMBER 4
VOLUME 36 NUMBER 6
c1.indd 1 12/14/16 12:21 PM
www.computer.org/cga
IEEE Computer Graphics and Applications bridges the theory
and practice of computer graphics. Subscribe to CG&A and
• stay current on the latest tools and applications and gain
invaluable practical and research knowledge,
• discover cutting-edge applications and learn more about
the latest techniques, and
• benefit from CG&A’s active and connected editorial board.
Cutting Edge
stay
on the
of Artificial Intelligence
J a n ua ry/ f E b r ua ry 2 016
peer-reviewed, cutting-edge
from flu Trends to Cybersecurity 84
P U T T I N G A I I N T O P R A C T I C E
act intelligently.
nuMBEr 1
www.computer.org/intelligent
The #1 AI Magazine
www.computer.org/intelligent
IEEE
IEEE TRANSACTIONS ON
SUBMIT
TODAY 6867$,1$%/(&20387,1*
SCOPE
The IEEE Transactions on Sustainable Computing (T-SUSC) is a peer-reviewed journal devoted to
SXEOLVKLQJ KLJKTXDOLW\ SDSHUV WKDW H[SORUH WKH GLƬHUHQW DVSHFWV RI VXVWDLQDEOH FRPSXWLQJ 7KH
notion of sustainability is one of the core areas in computing today and can cover a wide range
of problem domains and technologies ranging from software to hardware designs to application
GRPDLQV6XVWDLQDELOLW\ HJHQHUJ\HƱFLHQF\QDWXUDOUHVRXUFHVSUHVHUYDWLRQXVLQJPXOWLSOHHQHUJ\
sources) is needed in computing devices and infrastructure and has grown to be a major limitation
to usability and performance.
Contributions to T-SUSCPXVWDGGUHVVVXVWDLQDELOLW\SUREOHPVLQGLƬHUHQWFRPSXWLQJDQGLQIRUPDWLRQ
SURFHVVLQJ HQYLURQPHQWV DQG WHFKQRORJLHV DQG DW GLƬHUHQW OHYHOV RI WKH FRPSXWDWLRQDO SURFHVV
These problems can be related to information processing, integration, utilization, aggregation, and
generation. Solutions for these problems can call upon a wide range of algorithmic and computational
frameworks, such as optimization, machine learning, dynamical systems, prediction and control,
decision support systems, meta-heuristics, and game-theory to name a few.
T-SUSC covers pure research and applications within novel scope related to sustainable computing,
such as computational devices, storage organization, data transfer, software and information
SURFHVVLQJ DQG HƱFLHQW DOJRULWKPLF LQIRUPDWLRQ GLVWULEXWLRQSURFHVVLQJ $UWLFOHV GHDOLQJ ZLWK
hardware/software implementations, new architectures, modeling and simulation, mathematical
models and designs that target sustainable computing problems are encouraged.
www.computer.org/tsusc
Conference Calendar
Questions? Contact conferences@computer.org
I EEE Computer Society conferences are valuable forums for learning on broad and dynamically
shifting topics from within the computing profession. With over 200 conferences featuring leading
experts and thought leaders, we have an event that is right for you.
February Interfaces) ◗
3 February 23 March
• ICSC (IEEE 14th Int’l Conf. on Semantic Com- • ICST (13th IEEE Conf. on Software Testing,
puting) ◗ Validation and Verification) ●
18 February • PerCom (IEEE Int’l Conf. on Pervasive Com-
• SANER (IEEE 27th Int’l Conf. on Software Anal- puting and Communications) ◗
ysis, Evolution and Reengineering) ◗
19 February April
• BigComp (IEEE Int’l Conf. on Big Data and 5 April
Smart Computing) ▲ • ISPASS (Int’l Symposium on Performance
22 February Analysis of Systems and Software) ◗
• CGO (IEEE/ACM Int’l Symposium on Code 14 April
Generation and Optimization) ◗ • PacificVis (IEEE Pacific Visualization Sympo-
sium) ▲
March 20 April
2 March • ICDE (IEEE 36th Int’l Conf. on Data Eng.) ◗
• WACV (IEEE Winter Conf. on Applications of
Computer Vision) ◗ May
9 March 3 May
• DATE (Design, Automation & Test in Europe • FCCM (IEEE 28th Annual Int’l Symposium
Conf. & Exhibition) ● on Field-Programmable Custom Computing
• IRC (4th IEEE Int’l Conf. on Robotic Comput- Machines) ◗
ing) ▲ 4 May
16 March • HOST (IEEE Int’l Symposium on Hardware
• ICSA (IEEE Int’l Conf. on Software Architec- Oriented Security and Trust) ◗
ture) ★ 18 May
22 March • SP (IEEE Symposium on Security and Pri-
• VR (IEEE Conf. on Virtual Reality and 3D User vacy) ◗
72 January 2020 Published by the IEEE Computer Society 2469-7087/20 © 2020 IEEE
• FG (IEEE Int’l Conf. on Automatic Face and September
Gesture Recognition) ★ 21 September
• IPDPS (IEEE Int’l Parallel and Distributed Pro- • ASE (35th IEEE/ACM Int’l Conf. on Automated
cessing Symposium) ◗ Software Eng.) ◆
23 May 28 September
• ICSE (IEEE/ACM 42nd Int’l Conf. on Software • ICSME (IEEE Int’l Conf. on Software Mainte-
Eng.) ▲ nance and Evolution) ◆
30 May • SecDev (IEEE Secure Development) ◗
• ISCA (ACM/IEEE 47th Annual Int’l Sympo-
sium on Computer Architecture) ● October
18 October
June • MODELS (ACM/IEEE 23rd Int’l Conf. on Model
14 June Driven Eng. Languages and Systems) ◗
• CVPR (IEEE Conf. on Computer Vision and 21 October
Pattern Analysis) ◗ • FIE (IEEE Frontiers in Education Conf.) ●
16 June 25 October
• EuroS&P (IEEE European Symposium on • VIS (IEEE Visualization Conf.) ◗
Security & Privacy) ●
19 June November
• JCDL (ACM/IEEE Joint Conf. on Digital Librar- 9 November
ies) ▲ • FOCS (IEEE 61st Annual Symposium on Foun-
29 June dations of Computer Science) ◗
• DSN (50th Annual IEEE/IFIP Int’l Conf. on 15 November
Dependable Systems and Networks) ● • SC ◗
30 June 16 November
• MDM (21st IEEE Int’l Conf. on Mobile Data • LCN (2020 IEEE 45th Conf. on Local Computer
Management) ● Networks) ◆
July December
6 July 10 December
• ICME (IEEE Int’l Conf. on Multimedia and • AIKE (IEEE Third Int’l Conf. on Artificial Intel-
Expo) ● ligence and Knowledge Eng.) ◗
8 July
• ICDCS (IEEE 40th Int’l Conf. on Distributed
Computing Systems) ▲
13 July
• COMPSAC (IEEE Annual Computer Software
and Applications Conference) ●
Learn more about
August
31 August
IEEE Computer
• RE (IEEE 28th Int’l Requirements Eng. Conf.) Society Conferences
●
www.computer.org/conferences