Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
November 16, 2018
Search
Highlight

Formalization of the resolution calculus for first-order logic
Are you interested in proof assistants in which human experts guide automatic theorem provers to verify subgoals? The paper focuses on research dedicated to a theoretical aim: applying a special proof assistant to produce human-readable rigorous proofs for... more
Quote
The real problem is simple enough: the systems are not simple enough. They are too complex, have far too many features, give the user far too many options. Almost... more
- Thomas K. Landauer (1995)
Articles
A ternary unification framework for optimizing TCAM-based packet classification systems: IEEE/ACM Transactions on Networking

Today, many network devices include a packet classification function to provide various services based on packet headers such as packet filtering, load... more

Network Architecture & Design (C.2.1) | Nov 14 18

CAEMO: Microprocessors & Microsystems

The authors present a novel cogurable accelerator engine for matrix operations (CAEMO) for improving computational performance on matrix- or block-based algorithms. Because many applications are based on the relationships between data neighbors, adjacency... more

Microprocessor/Microcomp. Apps (C.3...) | Nov 13 18

Scheduling analysis of imprecise mixed-criticality real-time tasks: IEEE Transactions on Computers

Many systems have several criticality levels: the safety-critical level, which is a higher criticality level, including all the tasks in which a deadline failure would provoke catastrophic effects on the system or even on... more

Scheduling (I.2.8...) | Nov 12 18

Computing the expected value and variance of geometric measures: Journal of Experimental Algorithmics

Do species that inhabit a certain area form an ecosystem or are they a random collection? To answer this question, ecologists select appropriate numerical characteristics: average... more

Biology & Genetics (J.3...) | Nov 9 18

Economic growth and automation risks in developing countries due to the transition toward digital modernity: ICEGOV 18

When I read this paper, I recalled a news report from several months ago that describes a robot that can cut and sew fabric into garments. It is so sophisticated that it can handle patterned fabrics so that seams... more

Economics (J.4...) | Nov 9 18

A novel malware analysis for malware detection and classification using machine learning algorithms: ICDCN 2018

The authors describe a system that identifies malware. The system works both at the macro level, which distinguishes malware from clean software, and at the micro level, which distinguishes between... more

Invasive Software (K.6.5...) | Nov 8 18

Prediction of HIV drug resistance by combining sequence and structural properties: IEEE/ACM Trans. on Computational Biology and Bioinformatics

Human immunodeficiency virus infection and acquired immune deficiency syndrome (HIV/AIDS) has... more

Classifier Design & Evaluation (I.5.2...) | Nov 7 18

Learning multiple factors-aware diffusion models in social networks: IEEE Transactions on Knowledge and Data Engineering

Predicting information diffusion in social networks is a theoretical and practical concern, especially in the context of identifying and... more

Social Networking (H.3.4...) | Nov 6 18

MirageOS Unikernel with network acceleration for IoT cloud environments: ICCBDC 18

Companies started conducting large-scale analysis with Internet of Things (IoT) data on cloud computing platforms to increase operating efficiency and revenue. IoT platforms based on fog computing and edge... more

Security & Protection (C.2.0...) | Nov 6 18

Choosing component origins for software intensive systems: IEEE Transactions on Software Engineering

Software-intensive systems are among the most common systems that run our everyday lives. International Organization for Standardization (ISO) 42010 introduces them as systems “in... more

General (D.2.0) | Nov 5 18

Books
Linux hardening in hostile networks

The book’s preface notes that many of the available hardening guides were written some years ago. Its chapters are therefore intended to replace the outdated information found in those guides with recommendations that provide maximum impact with minimum effort... more
Linux (D.4.0...) | Nov 15 18

Computational phylogenetics

Evolutionary biology broadly covers phylogeny or the phylogenetic tree, representing the relationships among individuals or groups of organisms. Specifically, computational phylogenetics deals with the implementation of computational methods... more
Biology & Genetics (J.3...) | Nov 14 18

Flash memory integration: performance and energy issues

With the explosion of data in recent years, storage technologies continue to be a critical infrastructure in the world. It is predicted that 44 zettabytes (44 billion terabytes) will be generated in 2020. While most... more
Performance of Systems (C.4) | Nov 13 18

Move fast and break things

Since the turn of the 21st century, traditional newspaper and music industry revenues have fallen dramatically, with similar drops in film, television, and general print media companies. Traditional media’s spectacular falls in revenue are in stark contrast to the meteoric... more
Government (J.1...) | Nov 12 18

Matrix algebra (2nd ed.)

Business and industry leaders are often faced with discussions about the future of artificial intelligence (AI), machine learning, and data science. Similarly, they often engage in complex problem solving, for example, computer vision in robotics or semantic... more
Mathematics & Statistics (J.2...) | Nov 9 18

Linear programming using MATLAB

Linear programming (LP) is an operational research method for finding the optimal values of a linear objective function under linear constraints. LP is recognized as one of the top ten algorithms of our time. LP problems extend not only to scientific fields, but also have direct... more
MATLAB (G.4...) | Nov 7 18

Network science

The study of networks has recently achieved some prominence due to the simple fact that networks of many different kinds surround us, from social and information networks to communication and transportation networks, not to mention the... more
Network Problems (G.2.2...) | Nov 5 18

Internet of Things and smart environments

I approached this book with very high hopes: the Internet of Things (IoT) is a major emerging technology; dealing with aging populations is a growing concern; and Springer typically publishes excellent books. Sadly, I was disappointed. Starting... more
Assistive Technologies (K.4.2...) | Nov 5 18

First-order methods in optimization

The author of First-order methods in optimization defines the book’s subject matter as optimization methods that rely on function “values and gradients/subgradients (but not Hessians).” The most familiar example of a first-order method is... more
Constrained Optimization (G.1.6...) | Oct 31 18

Guide to competitive programming

Competitive programming is not new, but is now widely available through different online competitions. As Laaksonen notes, competitive programming provides opportunities for practice and helps to bridge the gap between theory and practice by forcing... more
General (D.1.0) | Oct 30 18


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy