Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
October 23, 2019

Testing and tuning market trading systems: algorithms in C++
Financial markets have become increasingly dominated by automated systems. A computer program can be used to decide when to buy and sell things such as shares or currencies, with the aim of making a profit. The automated use of this means no human involvement, so the... more
Writing about computer development some 30 years ago at the Institute for Advanced Study [Princeton University] is a bit like returning to the scene... more
- Julian Bigelow (1980)
Automata processing in reconfigurable architectures: ACM Trans. on Reconfigurable Technology and Systems

In this new world of heterogeneous computing, automata processing has seen renewed interest with the advent of new workloads like machine learning, gene sequence matching, and other established... more

General (C.0) | Oct 18 19

Performance prediction of explicit ODE methods on multi-core cluster systems: ICPE 19

Computers are becoming more and more powerful, and the structure of modern parallel computers is simultaneously becoming more and more complicated. Therefore, it is not a very... more

Ordinary Differential Equations (G.1.7) | Oct 15 19

A framework for teaching security design analysis using case studies and the hybrid flipped classroom: ACM Trans. on Computing Education

In the field of cybersecurity education, security design analysis is a complex and technically demanding subject. Thus, new learning methods are needed to improve the teaching process for this subject... more

Computer Science Education (K.3.2...) | Oct 14 19

Software defined wireless networks: a survey of issues and solutions: Wireless Personal Communications

The communication network paradigm has undergone tremendous transformation, leading to changes in traffic patterns over the network. Traditional network architecture and protocols... more

Wireless Communication (C.2.1...) | Oct 14 19

Neuromemrisitive architecture of HTM with on-device learning and neurogenesis: ACM Journal on Emerging Technologies in Computing Systems

This very comprehensive technical account presents a thoroughly worked out “architecture for the spatial pooler (SP)” of the hierarchical temporal... more

General (I.0) | Oct 11 19

ContractFuzzer: fuzzing smart contracts for vulnerability detection: ASE 18

Many fields exploit blockchain technology, including those related to human and life sciences, supply chains, and clinical research. However, especially in the past couple years (namely 2017), almost all... more

Testing & Debugging (D.2.5) | Oct 11 19

Modularisation of sequent calculi for normal and non-normal modalities: ACM Transactions on Computational Logic

Mathematician and logician Gerhard Gentzen introduced sequent calculus, a logical framework, in the first half of the 20th century. It can be used to establish... more

Modal Logic (I.2.4...) | Oct 10 19

Patiency is not a virtue: Ethics and Information Technology

Do moral issues exist in dealing with artificial intelligence (AI) systems such as robots? The word “patiency” in the title refers to whether an AI system can be treated in a way that is morally “wrong... more

Ethics (K.4.1...) | Oct 10 19

Inquiry learning at scale: pedagogy-informed design of a platform for citizen inquiry: L@S 19

Just imagine a technology-enhanced learning platform that provides all the tools necessary for citizens to engage independently in cooperative learning activities driven by inquiry-based research strategies... more

Requirements/Specifications (D.2.1) | Oct 10 19

Understanding database reconstruction attacks on public data: Queue

I found this article on the US Census Bureau to be a fascinating tale of the history of the census, including attacks on it and methods that can be used to prevent the loss of personally identifying information (PII) stored there. The... more

General (H.2.0) | Oct 7 19

Programming Bitcoin

“I hear and I forget. I see and I remember. I do and I understand.” This saying, probably wrongly attributed to Confucius, might be an interpreted translation of a similar saying by 3rd century BCE philosopher Xun Kuang (in the Xunzi). However, this English adaptation seems to... more
Electronic Commerce (K.4.4) | Oct 22 19

Practical modelling of dynamic decision making

Computational models hold considerable promise for planning and prediction in applied domains such as military operations. But such models face a knowledge acquisition bottleneck when applying them to complex real-world problems. For example, agent-based... more
Modeling & Prediction (D.4.8...) | Oct 21 19

Poset codes

The authors of this book, part of the “SpringerBriefs in Mathematics” series, have extensive backgrounds in the area covered. The book, organized into seven chapters, starts with a comprehensive preface, which includes historical background such as Brualdi et al.’s... more
General (G.0) | Oct 17 19

Large group decision making: creating decision support approaches at scale

Decision making is a daily task with which everyone is familiar. People make decisions all the time, for example, by going to work in the morning, deciding what to eat, and so on. We are constantly... more
Decision Support (H.4.2...) | Oct 16 19

Artificial intelligence engines

I teach several classes on machine learning (ML), at both the undergraduate and graduate levels. I am always looking for books that may provide new examples or ideas on how to teach ML to my students. The diversity in their knowledge of... more
Learning (I.2.6) | Oct 16 19

The essentials of modern software engineering

This introductory software engineering textbook differs from others in that it does not focus on one particular methodology. Instead, the book focuses on identifying the essence of software engineering, a meta-model... more
Software Engineering (D.2) | Oct 14 19

Analysis for computer scientists: foundations, methods, and algorithms (2nd ed.)

In the title, “analysis” means “mathematical analysis” in the sense of Cauchy and Weierstrass, for example, ε-δ analysis. Chapters 1 through 4 are basically calculus (including trigonometry and complex numbers) and would probably be better as a refresher than an... more
General (G.0) | Oct 14 19

Practical Java machine learning

Over the past few years, machine learning techniques have gained popularity among researchers and practitioners. Much of this popularity can be explained by three factors: (i) the growing amount of available data created every day, (ii) the increase in computing power... more
Java (D.3.2...) | Oct 11 19

Computing with data

This book is envisioned as a companion volume on modern cloud computing. However, it is too broad, and in my opinion provides only superficial coverage of many subjects. It is certainly a deliberate (and courageous) decision by the authors. Clearly, breadth versus... more
Data Sharing (H.3.5...) | Oct 11 19

Design, launch, and scale IoT services

Almost everyone knows that IoT stands for the Internet of Things. The term has been around since 1999, the concept earlier. However, implementing IoT systems was hard to come by--you may have heard such puns as “I only talk” or “I only think.” People waited and... more
Commercial Robots & Apps (I.2.9...) | Oct 10 19

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy