This white paper draws on interdisciplinary academic knowledge and real-world examples to think through the parameters of debate about deception and empathy-based human-artificial intelligence (AI) partnering. While a common human…
An innovative approach to conventional portable and emergency gensets involves the use of mobile energy storage systems (MESS) and transportable energy storage systems (TESS), offering clean and noise-free alternative solutions.…
An overview is given of attacks on hardware security by introducing the four attack classes: logical attacks, physical observative attacks, physical fault injection attacks, and physical manipulative attacks. Descriptions and…
In recognition of the complexities facing organizational leaders in navigating responsibility across the social, economic, and environmental (physical and digital) domains, corporate digital responsibility (CDR) is a method to assist…
Giving consumers a deeper sense for how garments will fit their individual body and personal sense of style through realistic and interactive visual representations
The historical development of information and communication network identity, as well as insights into network identity technologies, applications, and industry trends are reviewed in this report. Current approaches to implementing…
The scope of this report is the exploration of ethics-related issues to support the development, design, and deployment of XR applications in the war, conflict, and defense domain and the…
This white paper is to inform users and IEEE 802 working groups on the applications and requirements for low latency communications. Low latency is challenging to implement in wired or…
The framework set out in this document is intended to help inform a range of stakeholders involved in various types of decision-making related to autonomous and intelligent systems (AIS), especially…