Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
March 23, 2018

Python for scientists (2nd ed.)
Consider the following tease lines that one might choose to begin a book review with: “When I first scanned the contents of this book, I was completely overwhelmed”; “The title of this book is somewhat deceptive”; “This book may well become a classic”; or, “If this book fully explained all the topics it addresses, it would be 5,000 pages... more
It is of course important that some efforts be made to verify the correctness of the assertions that are made about a routine. There are essentially two... more
- A. M. Turing (1951)
A generalized attack on RSA type cryptosystems: Theoretical Computer Science

The safety of the well-known RSA cryptosystem is based on the fact that, in general, it is computationally very hard to factorize large integers. Given two large... more

Public Key Cryptosystems (E.3...) | Mar 23 18

Differential hybrid games: ACM Transactions on Computational Logic

As software becomes ever more pervasive in safety-critical devices--from pacemakers to cars, from robots to airplanes--it is important that we have means of insuring their safety. For... more

Semantics of Programming Lang. (F.3.2) | Mar 22 18

Reproducible circularly secure bit encryption: applications and realizations: Journal of Cryptology

Homomorphic encryption permits processing information without actually decrypting it and is found useful in cloud-based applications. Circularly secure bit encryptions ensure the homomorphic property... more

Data Encryption (E.3) | Mar 22 18

Wi-Fi based city users behaviour analysis for smart city: Journal of Visual Languages and Computing

The vision of a smart city capable of real-time adaptation to its citizens’ behaviors relies on the gathering of a huge amount of dynamic data. One possible venue for feeding the underlying... more

Wireless Communication (C.2.1...) | Mar 20 18

Towards privacy protection and malicious behavior traceability in smart health: Personal and Ubiquitous Computing

In this paper, the authors address privacy and malicious behavior for e-health, since they argue that it is particularly ideal for use in smart cities. The authors’ concern for users is... more

Health (J.3...) | Mar 20 18

Toward optimal self-adjusting heaps: ACM Transactions on Algorithms

A self-adjusting heap is a heap data structure “that does not [need to] explicitly maintain structural information”; instead, during each access or update operation, the heap is adjusted in a uniform way. Why is a... more

Data Structures (E.1) | Mar 19 18

Human-computer interaction, foundations and new paradigms: Journal of Visual Languages and Computing

In this paper, Dix studies the roots of human-computer interaction (HCI) and the directions of its development. It is a discipline that is based on three foundations: people, who inspire the field; practice, which... more

User/Machine Systems (H.1.2) | Mar 15 18

Algorithm 980: sparse QR factorization on the GPU: ACM Transactions on Mathematical Software

Many large-scale scientific and engineering computational problems lead, after some kind of discretization, to the solution of huge systems of linear algebraic equations and/or linear least... more

Parallel Processors (C.1.2...) | Mar 14 18

End-user composition of interactive applications through actionable UI components: Journal of Visual Languages and Computing

This research is related to the development of end-user-designed applications using the mashup platform called EFESTO. This type of... more

User Interfaces (H.5.2) | Mar 14 18

Answer set programming for non-stationary Markov decision processes: Applied Intelligence

Problem solving with computers often involves the exploration of paths from an initial state to a goal state. In addition to the size of this search space... more

Markov Processes (G.3...) | Mar 13 18

Beginning data science in R: data analysis, visualization, and modelling for the data scientist

Data science has existed for 40 years, but is increasingly receiving more attention since large amounts of structured and unstructured data (big data) are collected every day... more
Database Management (H.2) | Mar 23 18

Computer music instruments: foundations, design and development

If you are looking for a useful reference book on computer music for instrument development, Lazzarini’s book will surely serve the purpose. The book comes at a time when significant progress... more
Sound & Music Computing (H.5.5) | Mar 23 18

The web at graduation and beyond: business impacts and developments

This work aims to serve the manager or executive who needs a solid grounding in the variety of information technology available today. Throughout the... more
Business (J.1...) | Mar 23 18

Beginning functional JavaScript: functional programming with JavaScript using ECMAScript 6

Functional programming is a programming paradigm centered on the evaluation of mathematical functions and is a declarative language of expressions. Side effects are unacceptable. Whenever a function... more
Applicative (Functional) Prog. (D.1.1) | Mar 22 18

The art of Linux kernel design: illustrating the operating system design principle and implementation

This book goes into a lot of detail--I mean a lot of detail. Linux kernel 0.11 is dissected and explained in a very detailed way. The reason I am hesitant to give it a high rating is not because it focuses on the... more
Linux (D.4.0...) | Mar 21 18

Agile UX storytelling: crafting stories for better software development

If you are familiar with agile methodology in the software development life cycle (SDLC), then you will know that user stories are used to create a shared understanding between the project team and stakeholders about... more
Dist., Maint. & Enhancement (D.2.7) | Mar 21 18

Electronics explained: fundamentals for engineers, technicians, and makers (2nd ed.)

This is a very helpful book designed for a broad audience, including intermediate-level electrical engineering or physics students. Louis Frenzel, Jr. is a technology editor for Electronic Design... more
Electronics (J.2...) | Mar 21 18

Smart cities

Technologies that improve an urban community are the subject of this collection of papers. Most of the technologies are information/computing centered. Many are based in Austin, Texas. The book’s fundamental assertion is that a successful smart city project... more
Engineering (J.2...) | Mar 20 18

Graph theory (5th ed.)

Graph theory provides a very comprehensive description of different topics in graph theory. This book can definitely be counted as one of the classics in this subject. The highlight is its wide coverage of... more
Graph Theory (G.2.2) | Mar 16 18

Advances in smart cities: smarter people, governance, and solutions

With the growth of information technology (IT), cities are growing through enhanced technologies, giving rise to the concept of the smart city. This book explains the concept of a smart city, its requirements... more
Organizational Impacts (K.4.3) | Mar 16 18

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy