Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
January 28, 2020

Probability and mathematical statistics: theory, applications, and practice in R
Back when I was an undergraduate, I took a course in numerical recipes (in the C programming language). That course introduced me to the approximation of answers to questions that, often times, cannot be solved through analytical means. My sense is that this book will... more
Artificial life’s practical implications are no less sweeping than its scientific implications. It can guide how we use new technologies for extending life and creating... more
- M. Bedau et al (2000)
Adapting financial technology standards to blockchain platforms: ACMSE 19

Financial technology (fintech) has become an important component of the finance, banking, and payment industry. Essential financial technologies include the various approaches for blockchain and smart... more

Electronic Commerce (K.4.4) | Jan 28 20

Practice what you preach - building a capstone management system as undergraduate IT capstone projects: SIGITE 19

Career readiness, including nontechnical or soft skills, is vital to the successful completion of large projects. For IT graduates... more

Computer Science Education (K.3.2...) | Jan 27 20

Self-healing UI: UIST 19

Compared to living things like animals or plants, today’s electronic devices are quite fragile. Even minor “injuries” render them incapacitated, or limit their functionality. Sometimes they can be repaired, although this requires intervention by skilled and motivated humans... more

User Interfaces (D.2.2...) | Jan 23 20

Predicting students’ final degree classification using an extended profile: Education and Information Technologies

Student retention is of great concern to higher education institutions, and a higher dropout rate may be reflected in the university’s reputation. Extensive studies have attempted to... more

General (K.3.0) | Jan 21 20

Research on LRU optimal division method considering comprehensive cost of development and maintenance: CSAE 19

Efforts can be made to reduce life cycle costs and improve equipment availability. This is not only an issue of (company) low-maintenance costs and high availability, but can also be a big challenge... more

Modeling Methodologies (I.6.5...) | Jan 17 20

ELSA: a multilingual document summarization algorithm based on frequent itemsets and latent semantic analysis: ACM Transactions on Information Systems

Multi-document summarization involves the automatic generation of concise summaries of a number of textual documents, with the goal of succinctly... more

Database Applications (H.2.8) | Jan 16 20

Semi-automatic safety analysis and optimization: DAC 18

Model-based development (MBD) has been widely used in software development for a long time, and software models are increasingly used in the field of safety analysis. This paper presents a new approach to... more

Engineering (J.2...) | Jan 15 20

Modular product programs: ACM Transactions on Programming Languages and Systems

Some properties of programs are not about a single run of the program; instead, they relate multiple runs. For example, a program is deterministic if, given the same input, two runs will always produce the same... more

Formal Methods (D.2.4...) | Jan 14 20

Internet of Things: information security challenges and solutions: Cluster Computing

The Internet of Things (IoT) has gained tremendous popularity over the years, allowing objects to be connected without intervention from humans. While this has opened up many opportunities for... more

Security, Integrity & Protection (H.2.0...) | Jan 9 20

An effective and versatile distance measure for spatiotemporal trajectories: Data Mining and Knowledge Discovery

With the increasing accumulation of spatial temporal path data, such as in the truck and cab datasets considered here, the need for effective path comparison algorithms is of current... more

Data Mining (H.2.8...) | Jan 9 20

Designing an Internet

This comprehensive view of the development and growth of the Internet includes the author’s review and critique of the proposed changes and improvements since its inception. It has 15 chapters, an appendix, a list of acknowledgements, a glossary, a list of... more
Internet (C.2.1...) | Jan 28 20

Cloud security auditing

Information technology (IT) systems auditing is important for good corporate governance, and essential where there is a need to formally demonstrate compliance with legislation and regulatory requirements. Information security management standards... more
Security & Protection (D.4.6) | Jan 28 20

Software project estimation

As a young computer science undergraduate, I learned that methodologies were being developed for software projects that would ensure success through the application of rigorous engineering practices. Forty years later, much work has been done on improving... more
Project & People Management (K.6.1) | Jan 27 20


In his book Outliers [1], Malcolm Gladwell repeatedly makes the claim that 10,000 hours of practice is necessary to achieve mastery of a skill, that is, 40 hours per week for five years (the minimal time and effort to complete a master’s degree and PhD). This is... more
Arts & Humanities (J.5) | Jan 27 20

Passive network synthesis: an approach to classification

This interesting and technically oriented book was written for an audience with some advanced knowledge and understanding of passive networks and network synthesis. The authors have tried to convey the... more
Logic Design (B.6) | Jan 24 20

Wandering towards a goal

Since 2008, the Foundational Questions Institute has sponsored an annual essay competition. This volume offers the 17 best submissions to the contest that ran from December 2016 to March 2017. The editors’ introductory chapter summarizes the essays... more
General (G.0) | Jan 24 20

A people’s history of computing in the United States

From 1965 to 1975, if you were to ask someone in the field what was going on in computing, you would likely get one of two answers. People in business data processing would point to the dominance of IBM and its mainframe computers. Specialists might be... more
History of Computing (K.2) | Jan 24 20


Programmers are among the most influential people who are quietly changing the world. Software is an inseparable part of human life in this modern world, and programmers are tinkering with programs, continuously influencing a specific set of people and sometimes all of... more
General (K.7.0) | Jan 23 20

Simplicity is complex: foundations of cyber-physical system design

First of all, I must say that this is a very good book. However, it did not captivate me, as I expected something different based on the subtitle. The book exposes exactly what the subtitle indicates... more
General (D.2.0) | Jan 23 20

From urban legends to political fact-checking: online scrutiny in America, 1990-2015

In this fascinating five-chapter book, the authors discuss the history of online scrutiny in the US from 1990 to 2015. They review some basic frameworks of online communication; examine the role of online... more
History of Computing (K.2) | Jan 21 20

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2020 ThinkLoud, Inc.
Terms of Use
| Privacy Policy