Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help

Select Issue:

Maintaining architecture-implementation conformance to support architecture centrality: ACM Transactions on Software Engineering and Methodology
Software architecture plays a vital role in the life cycle of a software product, whether you follow agile principles or not. Software architectures allow one to...
| Sep 4 18

An in-vehicle software defined network architecture for connected and automated vehicles:
The expansion of communication networks has made the efficient configuration and management of these networks challenging. Software-defined...
| Sep 4 18

A novel stock recommendation system using Guba sentiment analysis: Personal and Ubiquitous Computing
It’s pretty obvious that if you know what investors are thinking, you can predict what stocks they’ll buy and sell. Stock scams have operated for years on the complement of this thought, that is, attempt to...
| Sep 5 18

Configuration analysis and design of a multidimensional tele-operator based on a 3-P(4S) parallel mechanism: Journal of Intelligent and Robotic Systems
Parallel robots that use closed kinematic chains have interesting mechanical properties, such as stiffness, high precision, and good load capacity, at the cost of an increasing complexity in designing and solving...
| Sep 7 18

Text and non-text separation in offline document images: International Journal on Document Analysis and Recognition
This survey on text and no-text separation in images presents a quite complete review (list of references) of image document analysis...
| Sep 7 18

Complexity and expressive power of weakly well-designed SPARQL: Theory of Computing Systems
The resource description framework (RDF) is a data model standard for the web that represents linked data as subject-predicate-object triples. Such triples can be naturally...
| Sep 10 18

Learning safe multi-label prediction for weakly labeled data: Machine Learning
Many real-world applications involve learning in the presence of multiple labels. For example, in the case of images, a single image may be labeled sky, cloud, or even flower. To make matters more complicated...
| Sep 11 18

Toward the robots of science fiction:
It was a pleasure to watch this presentation about the future of robotics, a hotly debated topic fueled by the controversy between robots defeating humans and robots augmenting and assisting humans, for example, prostheses and exoskeletons. This debate has...
| Sep 12 18

A FPGA based implementation of Sobel edge detection: Microprocessors & Microsystems
This paper examines the problem of optimizing the space requirements and latency for a field-programmable gate array (FPGA) implementation of a Sobel edge detection filter...
| Sep 13 18

Using Bayesian network to estimate the value of decisions within the context of value-based software engineering:
For longevity, a software company should adopt value-based decision making, in which the focus is on overall value creation rather than the required efforts...
| Sep 14 18

Attribute-based access control

In many applications, it becomes a necessity to define who (which user) is allowed to access what (which resource). This is achieved via access control. Several models for access control exist. Attribute-based access control (ABAC) is one of them, and forms the focus of...
| Sep 5 18

Complete guide to open source big data stack

Working with big data requires building up a network of services that allows for its effective use. In the scope of open-source systems, the big data stack is composed of open-source applications for understanding big data. The book’s title reveals its main purpose...
| Sep 6 18

Introduction to inverse problems for differential equations

Several mathematical problems in science, engineering, and technology are inverse problems. For example, inverse problem theory is often used in heat and mass transfer, imaging, hydrology, oceanography, and so on. In general, inverse problems are ill-posed...
| Sep 12 18

Codes, cryptology and curves with computer algebra

This volume offers a terse, highly formal exposition of the relation between the four subjects named in the title: codes (transformations of a stream of information), cryptology (transformations that...
| Sep 13 18

Deception in the digital age

The basis of deception is misdirection: it amounts to making something insignificant seem important, while really relevant things go unnoticed. This strategy is used not only by spammers, crackers, cyber criminals, and cyber terrorists, but also by banks, credit card...
| Sep 14 18

Once upon an algorithm

Martin Erwig emphasizes the general nature of computation and the use of computer science (CS) in this book. He uses well-known stories to explain computing concepts to readers not familiar with the field. The book’s two parts cover several topics...
| Sep 21 18

Software architecture for big data and the cloud

Systems and software architecture has been a significant engineering endeavor for many years, requiring formal languages and models to document and analyze the structure and functionality of...
| Sep 24 18

Nature-inspired algorithms and applied optimization

Optimization problems occur in engineering and other fields. They are often difficult to solve efficiently, as they are mostly computationally hard (in complexity theory parlance). One way of solving these problems is...
| Sep 26 18

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy