Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help

Select Issue:

Compiler-assisted loop hardening against fault attacks: ACM Transactions on Architecture and Code Optimization
The problem to solve is the following: the uncontrolled development of the Internet of Things (IoT) results in personal data being handled by a huge variety of devices, which do not satisfy the...
| Jun 1 18

Age classification using an optimized CNN architecture:
With the availability of a huge amount of data and powerful computational resources, the scope of machine learning algorithms has widened recently. A convolutional neural network (CNN) is one of the...
| Jun 1 18

Gamification for development: Personal and Ubiquitous Computing
In this paper, the authors explore the gamification of mathematics curriculum in several primary school classrooms in Sri Lanka. They used standard processes to conduct their research; however, several...
| Jun 5 18

Instance-based object recognition in 3D point clouds using discriminative shape primitives: Machine Vision and Applications
The subject matter of this paper is 3D object recognition, particularly the detection of “objects of interest from cluttered 3D scenes” along with 3D poses of the objects. In fact, the authors study...
| Jun 5 18

Understanding requirement prioritization artifacts: Requirements Engineering
Requirement prioritization is important in software development for several reasons. First and foremost, software products are created to fulfill some intended purpose characterized in...
| Jun 6 18

Full-duplex millimeter-wave communication: IEEE Wireless Communications
The intrinsic properties of massive multiple-input multiple-output (massive MIMO) have paved the way for new innovations in exploiting the available spectrum resources. Full-duplex (FD) communication...
| Jun 6 18

Formal verification and quantitative metrics of MPSoC data dynamics: Formal Aspects of Computing
MPSoC stands for “multiprocessor system-on-a-chip.” This paper treats verification via simulation of the design and expected behavior of such multiprocessor...
| Jun 7 18

Key concepts for a data science ethics curriculum:
As an emerging field, data science has been applied to many disciplines. Universities and colleges are quickly developing data science programs. The development of the field of data science has introduced new...
| Jun 7 18

Forward delay-based packet scheduling algorithm for multipath TCP: Mobile Networks and Applications
Multipath TCP (MPTCP) allows packets to be transmitted over multiple paths, “and hence utilizes the network resources more effectively than the traditional single-path [transmission control protocol, TCP]...
| Jun 8 18

Natural language processing systems for capturing and standardizing unstructured clinical information: Journal of Biomedical Informatics
Clinical information could be the poster child for big data and artificial intelligence (AI). It encompasses large amounts of unstructured...
| Jun 11 18

Tutorials on the foundations of cryptography

The foundations of cryptography [1], assembled from the lecture notes of Oded Goldreich, is widely known for its high value in cryptographic research. Just like its name, the book discusses many pivotal problems of cryptology in depth. Therefore, it may be very...
| Jun 1 18

Data science and analytics with Python

Data science and analytics can be key to improving many things: marketing, understanding, systems modeling, and predictions (from race horses to presidents). And you don’t need to be an expert to use good tools and improve your understanding, even if only...
| Jun 1 18

Cracking codes with Python

One of the many things I like about the Python programming language is that, once you learn basic Python programming, a whole host of other interesting ideas are within your grasp. I am one of those...
| Jun 1 18

The human element of big data

Big data, with various connotations of “big” spanning volume, veracity, velocity, and so on, is a “big” word today. Scores of books exist on various aspects of this field, from the business side to the technical side. The related field of machine learning also has a lot...
| Jun 4 18

Guide to simulation-based disciplines

Simulation may be considered “the act of imitating the behavior of some situation or some process by means of something suitably analogous” [1]. This edited book, published in Springer’s “Simulation Foundations...
| Jun 4 18

Distributed computing in big data analytics

Day by day the prominence of big data analytics is increasing. Not only does it impact the way we work, but it is gradually impacting the way we live our lives. Yet it is also an area filled with a myriad of...
| Jun 6 18

Programmed inequality

From 1930 to 1980, the transformation from underpaid labor to equal pay for workers can truly be stated as a radical change for British women opting for computing jobs. In Britain, the position of female workers as computer operators or technicians was mainly...
| Jun 6 18

An introduction to distance geometry applied to molecular geometry

The most common way of determining the structures of molecules in a solution is nuclear magnetic resonance (NMR). The signals measured are caused by the flipping of the spins of paramagnetic nuclei in a...
| Jun 7 18

Teaching online

Advances in technology have created a new type of learner who relies mainly on laptops and mobile devices to access teaching materials. This situation has driven teachers to adopt new strategies that preserve the quality of face-to-face teaching, yet take...
| Jun 8 18

Secondary liability of Internet service providers

Secondary liability occurs when an entity facilitates, makes material contributions to, or is otherwise responsible for violating a law or the right of another party. In the case of Internet service providers (ISPs), determining liability for the actions of users...
| Jun 14 18

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy