Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
October 26, 2016

Safeguarding users’ sensitive data in the cloud and the browser
In this 54-minute video presentation, Brad Karp of University College London talks about “safeguarding users’ sensitive data in the cloud and the browser.” The title is very inviting to those who want to know how to protect sensitive data. Today, the use of cloud services... more
Dear reader, this notice will serve to inform you that I submit to the public a small machine of my invention, by means of which you alone may, without... more
- Blaise Pascal (1649)
Quantitative analysis of the mission impact for host-level cyber defensive mitigations: ANSS 16

Discussion and qualitative analysis on mitigation issues of cyber security from the host’s perspective are provided in this paper. The contribution... more

Security & Protection (C.2.0...) | Oct 26 16

Intercrossed access controls for secure financial services on multimedia big data in cloud systems: ACM Trans. on Multimedia Computing, Communications & Applications

Supposedly this paper is about financial and cloud security, but I could not find much about these aspects in the authors’ model. Their security... more

Security & Protection (D.4.6) | Oct 26 16

Querying graphs with data: Journal of the ACM

Various approaches to querying so-called graphs with data are described very comprehensively in this paper. In principle, this category of graphs is called (labeled) property graphs in the graph database... more

Data Models (H.2.1...) | Oct 25 16

On BLAS level-3 implementations of common solvers for (quasi-) triangular generalized Lyapunov equations: ACM Transactions on Mathematical Software

Each of the generalized Lyapunov matrix equations can be seen simply as a system of linear equations in the elements of the unknown matrix X. For... more

Numerical Linear Algebra (G.1.3) | Oct 20 16

A high performance QDWH-SVD solver using hardware accelerators: ACM Transactions on Mathematical Software

To make effective use of modern computer hardware, algorithms have to be carefully designed with concurrency in mind: in particular... more

Mathematical Software (G.4) | Oct 20 16

A vision for heart rate health through wearables: UbiComp 16

Mobile health (mHealth) is an increasingly important area of biomedical informatics that is focused on the use of wearable sensors, such as those found in smartphones, to monitor health. This is an... more

Miscellaneous (H.5.m) | Oct 19 16

Rethinking technology on the boundaries of life and work: Personal and Ubiquitous Computing

How can technology better control the boundaries between work and life? The transition between work and life has become seamless because of ubiquitous computing, since... more

Miscellaneous (K.4.m) | Oct 18 16

Developing a comprehensive engagement framework of gamification for reflective learning: DIS 16

Gamification is still one of the great hypes of recent years. Unfortunately, studies that really show positive effects are rare, especially in the area of teaching. The authors propose a new framework... more

Miscellaneous (H.5.m) | Oct 18 16

Algorithms for interactive learning: YouTube

In this 45-minute talk at the University of Southern California, Dasgupta looks at the progress of supervised learning over the years and poses a question about how supervised learning algorithms and... more

Learning (I.2.6) | Oct 14 16

Survey: Live migration and disaster recovery over long-distance networks: ACM Computing Surveys

Live migration (LM) is dealt with in this paper as a one-time task or function, performed by moving a virtual machine from one physical machine to another, located in the same or a different... more

Distributed Systems (C.2.4) | Oct 12 16

Hermeneutica: computer-assisted interpretation in the humanities

For decades, scholars in the humanities have danced around the computer like moths drawn to a flame--fascinated by a brightness that they do not fully understand, yet sometimes seduced into abandoning excellence... more
Arts & Humanities (J.5) | Oct 26 16

Living matter: algebra of molecules

There is a famous quote from J. B. S. Haldane: “An ounce of algebra is worth a ton of verbal argument.” This is indeed true. Algebra is a powerful tool for understanding many unknowns... more
Chemistry (J.2...) | Oct 26 16

Introduction to probability with statistical applications

This is an excellently written text, the second edition of the book by Geza Schay, emphasizing the principles of probability but housed in major topics of statistics. The reader is cautioned that the book is calculus... more
Mathematics & Statistics (J.2...) | Oct 26 16

Change competence: implementing effective change

A quick Google search on “change failure” returns “about 435,000,000 results,” many of which repeat the widely accepted, some say mythical, belief that 70 percent of change initiatives fail [1]. From my own experience... more
Business (J.1...) | Oct 26 16

Creativity and universality in language

This volume originates in a 2014 conference held in Paris and includes 12 contributions by authors who for the most part are based in departments of mathematics, physics, cognitive science, artificial... more
Linguistics (J.5...) | Oct 26 16

Design science research methods and patterns (2nd ed.)

The content of this volume, in its second edition, is suitable for multidisciplinary information and communications technology (ICT) research studies in which research questions, which often do not... more
General (H.0) | Oct 25 16

OSS reliability measurement and assessment

Free and open-source software (FOSS) projects are often a source of great expectation and acceptance amongst their users. An attempt is made here to explore whether reliability aspects of open... more
Metrics (D.2.8) | Oct 24 16

Debugging game history

Game history has not, according to the editors of this book, emerged from the era of chronicles. This is not necessarily a bad thing. The editors go on to say: “Chronicles have many good qualities. They... more
Games (K.8.0...) | Oct 21 16

Graph and model transformation: general framework and applications

In recent years, graph applications have attracted much attention in computer science and several other research fields. The book Graph and model transformation is written from a mathematical... more
Spec., Verif. & Reas. about Prog. (F.3.1) | Oct 20 16

Computer science: an interdisciplinary approach

Sedgewick and Wayne’s book is a systematic treatise on the fundamentals of computer science. At a high level, the book covers the basics, object-oriented programming, algorithms, and plenty of theory. It is geared... more
Object-Oriented Programming (D.1.5) | Oct 20 16

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2016 ThinkLoud, Inc.
Terms of Use
| Privacy Policy