Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
February 18, 2020
Search
Highlight

Ray tracing gems
The era of real-time ray tracing has finally arrived. This book’s 32 well-written chapters, organized into seven parts, explain the shared techniques and tricks that make real-time ray tracing possible on current technologies. These technologies include accessible application programming interfaces (APIs)... more
Quote
It was twenty foot square, placed in the middle of the room. The superficies was composed of several bits of wood, about the bigness of a die, but some larger than others. They were all... more
- Jonathan Swift (1726)
Articles
Known and unknown facts of LoRa: ACM Transactions on Sensor Networks

Proposal and critique are two steps in the evolution of scientific theories and ideas: an idea is founded in a proposal and advanced via critiques. In the Internet of Things (IOT), equilibrium among power... more

General (C.2.0) | Feb 18 20

Deep neural networks classification over encrypted data: CODASPY 19

When we speak about a convolutional neural network (CNN) as a more complex deep learning algorithm, there are privacy-preserving issues that could be addressed in any study on the topic. In deep learning, CNNs are used to... more

Neural Nets (C.1.3...) | Feb 13 20

Blockchains for business process management - challenges and opportunities: ACM Transactions on Management Information Systems

Blockchain is a technology that allows for the trusted exchange of digital currency. In its initial incarnation, it focused on the trusted exchange of Bitcoins. Its emerging applications will support the trusted... more

Electronic Commerce (K.4.4) | Feb 7 20

Industry-scale knowledge graphs: Communications of the ACM

Many companies provide users with access to disparate services, from search to complex interactions, all of which need a large body of general and specific knowledge represented in... more

General (I.0) | Feb 7 20

Static identification of injection attacks in Java: ACM Transactions on Programming Languages and Systems

A programming language’s security principles guarantee robustness and sustainability by detecting and neutralizing any tainted object in the programming code, which can potentially be the source... more

Security & Protection (C.2.0...) | Feb 6 20

Risks of cryptocurrencies: Communications of the ACM

Professor Weaver does not like cryptocurrencies. I don’t either. In this all-too-brief paper, he discusses Bitcoin, Litecoin, Dogecoin, Ethereum, and several others, although not the newer attempts by Apple... more

Electronic Commerce (K.4.4) | Feb 5 20

The growth and evolution of India’s software industry: Communications of the ACM

When the development of computer science and engineering started in the middle of the 20th century, no one expected that it would be so great a challenge and that it would influence our future so much... more

The Computer Industry (K.1) | Feb 4 20

AODV routing protocol for cognitive radio access based Internet of Things (IoT): Future Generation Computer Systems

There has been tangible growth in the investigation of cognitive radio (CR) communication and networking over the past few years. Sharing and digital switchover (DSO)... more

Network Protocols (C.2.2) | Feb 4 20

Challenges of privacy-preserving machine learning in IoT: AIChallengeIoT 19

The widespread adoption of Internet of Things (IoT) devices has made available a huge amount of data, thus enabling the development of applications that use machine learning (ML) to gather and dig up... more

Sensor Networks (C.2.1...) | Feb 3 20

Semantic 3D gaze mapping for estimating focused objects: MobileHCI 19

Knowing where users focus their gaze in real, virtual, augmented, or mixed environments is essential for creating immersive applications in areas like gaming, product design, psychology, and advertising... more

Artificial & Virtual Realities (H.5.1...) | Jan 31 20

Books
The software arts

Is the current approach to computing education wrong? The author of this book claims it should focus more strongly on its roots in the liberal arts. The book traces these roots and examines several central tenets of computing in this light. The introductory chapter... more
Computer Science Education (K.3.2...) | Feb 18 20

VoIP technology: applications and challenges

Many of us are familiar with voice over Internet protocol (VoIP) technology, having replaced our traditional landline telephones with VoIP phones connected through a data network. Modern routers are often equipped with analog sockets so users can plug their existing... more
Network Protocols (C.2.2) | Feb 18 20

Introduction to hybrid intelligent networks: modeling, communication, and control

Human brains are the most advanced intelligent systems to ever exist, yet also the most mysterious systems to be explored. A hybrid intelligent network is a term coined for the brain-inspired artificial... more
Hybrid Systems (C.1.m...) | Feb 14 20

Grokking deep learning

Deep learning is a hot topic in artificial intelligence (AI). It is exciting to see a book that can help readers understand the ideas of deep learning without advanced knowledge of mathematics. The book is divided into 16 chapters. Chapter 1 presents the basic ideas of... more
Neural Nets (C.1.3...) | Feb 14 20

Handbook of software engineering

Over 50 years after the “identification of software engineering as a discipline,” the emergence of new types of systems, new application areas, and new techniques and frameworks for software development... more
General (D.2.0) | Feb 14 20

Tools and weapons: the promise and the peril of the digital age

Digital technology is both a sword and a plowshare. It is disruptive both in positive and negative ways, often at the same time. This book is a superbly written assembly of stories describing how Microsoft, often in... more
General (K.4.0) | Feb 13 20

Software project estimation: intelligent forecasting, project control, and client relationship management

More like a professional handbook than a scientific study, Dimitrov is a practitioner who works on projects as a scrum master and has experience in how to communicate with business people, software designers, and technical and software engineering staff... more
Project & People Management (K.6.1) | Feb 12 20

PDE dynamics: an introduction

Interactions between partial differential equations (PDEs) and dynamical systems are explored in this book. PDEs involving time intervals are used to explain many problems. The study of dynamics can help readers understand PDEs via time-based equations. The... more
Partial Differential Equations (G.1.8) | Feb 12 20

Integration of information flow for greening supply chain management

Actually a monograph, this book presents primary research and original scholarship focused on a single subject, namely the “integration of information flow for greening supply chain management [SCM]... more
Manufacturing (J.1...) | Feb 11 20

Coders

As someone who obtained a computer science (CS) degree after finishing a doctorate in political science in the 1980s, I took a walk down memory lane with this book. It was fun to reminisce using the author’s four waves of coders, following the four stages that... more
General (K.7.0) | Feb 11 20


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2020 ThinkLoud, Inc.
Terms of Use
| Privacy Policy