







Safeguarding usersâ€™ sensitive data in the cloud and the browser In this 54minute video presentation, Brad Karp of University College London talks about “safeguarding users’ sensitive data in the cloud and the browser.” The title is very inviting to those who want to know how to protect sensitive data. Today, the use of cloud services... more









Dear reader, this notice will serve to inform you that I submit to the public a small machine of my invention, by means of which you alone may, without... more 

 Blaise Pascal (1649) 









Quantitative analysis of the mission impact for hostlevel cyber defensive mitigations: ANSS 16
Discussion and qualitative analysis on mitigation issues of cyber security from the host’s perspective are provided in this paper. The contribution... more
Security & Protection (C.2.0...)  Oct 26 16
Intercrossed access controls for secure financial services on multimedia big data in cloud systems: ACM Trans. on Multimedia Computing, Communications & Applications
Supposedly this paper is about financial and cloud security, but I could not find much about these aspects in the authors’ model. Their security... more
Security & Protection (D.4.6)  Oct 26 16
Querying graphs with data: Journal of the ACM
Various approaches to querying socalled graphs with data are described very comprehensively in this paper. In principle, this category of graphs is called (labeled) property graphs in the graph database... more
Data Models (H.2.1...)  Oct 25 16
On BLAS level3 implementations of common solvers for (quasi) triangular generalized Lyapunov equations: ACM Transactions on Mathematical Software
Each of the generalized Lyapunov matrix equations can be seen simply as a system of linear equations in the elements of the unknown matrix X. For... more
Numerical Linear Algebra (G.1.3)  Oct 20 16
A high performance QDWHSVD solver using hardware accelerators: ACM Transactions on Mathematical Software
To make effective use of modern computer hardware, algorithms have to be carefully designed with concurrency in mind: in particular... more
Mathematical Software (G.4)  Oct 20 16
A vision for heart rate health through wearables: UbiComp 16
Mobile health (mHealth) is an increasingly important area of biomedical informatics that is focused on the use of wearable sensors, such as those found in smartphones, to monitor health. This is an... more
Miscellaneous (H.5.m)  Oct 19 16
Rethinking technology on the boundaries of life and work: Personal and Ubiquitous Computing
How can technology better control the boundaries between work and life? The transition between work and life has become seamless because of ubiquitous computing, since... more
Miscellaneous (K.4.m)  Oct 18 16
Developing a comprehensive engagement framework of gamification for reflective learning: DIS 16
Gamification is still one of the great hypes of recent years. Unfortunately, studies that really show positive effects are rare, especially in the area of teaching. The authors propose a new framework... more
Miscellaneous (H.5.m)  Oct 18 16
Algorithms for interactive learning: YouTube
In this 45minute talk at the University of Southern California, Dasgupta looks at the progress of supervised learning over the years and poses a question about how supervised learning algorithms and... more
Learning (I.2.6)  Oct 14 16
Survey: Live migration and disaster recovery over longdistance networks: ACM Computing Surveys
Live migration (LM) is dealt with in this paper as a onetime task or function, performed by moving a virtual machine from one physical machine to another, located in the same or a different... more
Distributed Systems (C.2.4)  Oct 12 16









Hermeneutica: computerassisted interpretation in the humanities
For decades, scholars in the humanities have danced around the computer like moths drawn to a flamefascinated by a brightness that they do not fully understand, yet sometimes seduced into abandoning excellence... more
Arts & Humanities (J.5)  Oct 26 16
Living matter: algebra of molecules
There is a famous quote from J. B. S. Haldane: “An ounce of algebra is worth a ton of verbal argument.” This is indeed true. Algebra is a powerful tool for understanding many unknowns... more
Chemistry (J.2...)  Oct 26 16
Introduction to probability with statistical applications
This is an excellently written text, the second edition of the book by Geza Schay, emphasizing the principles of probability but housed in major topics of statistics. The reader is cautioned that the book is calculus... more
Mathematics & Statistics (J.2...)  Oct 26 16
Change competence: implementing effective change
A quick Google search on “change failure” returns “about 435,000,000 results,” many of which repeat the widely accepted, some say mythical, belief that 70 percent of change initiatives fail [1]. From my own experience... more
Business (J.1...)  Oct 26 16
Creativity and universality in language
This volume originates in a 2014 conference held in Paris and includes 12 contributions by authors who for the most part are based in departments of mathematics, physics, cognitive science, artificial... more
Linguistics (J.5...)  Oct 26 16
Design science research methods and patterns (2nd ed.)
The content of this volume, in its second edition, is suitable for multidisciplinary information and communications technology (ICT) research studies in which research questions, which often do not... more
General (H.0)  Oct 25 16
OSS reliability measurement and assessment
Free and opensource software (FOSS) projects are often a source of great expectation and acceptance amongst their users. An attempt is made here to explore whether reliability aspects of open... more
Metrics (D.2.8)  Oct 24 16
Debugging game history
Game history has not, according to the editors of this book, emerged from the era of chronicles. This is not necessarily a bad thing. The editors go on to say: “Chronicles have many good qualities. They... more
Games (K.8.0...)  Oct 21 16
Graph and model transformation: general framework and applications
In recent years, graph applications have attracted much attention in computer science and several other research fields. The book Graph and model transformation is written from a mathematical... more
Spec., Verif. & Reas. about Prog. (F.3.1)  Oct 20 16
Computer science: an interdisciplinary approach
Sedgewick and Wayne’s book is a systematic treatise on the fundamentals of computer science. At a high level, the book covers the basics, objectoriented programming, algorithms, and plenty of theory. It is geared... more
ObjectOriented Programming (D.1.5)  Oct 20 16





