Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
August 9, 2020

Toward automatic verification of quantum programs
Even if a world of quantum computing for everyone is years (if not decades) away, research on designing proper ways to program such systems has been ongoing for quite some time. History shows that programming is hard; making correct programs, that is, ones that conform to specifications, requires rigor and formal reasoning... more
Computing Reviews announces the retirement of Lee Revens as Executive Editor. Lee has decided to retire after 13 years of... more
- Peter Zilahy Ingerman Editor-in-Chief (1976)
The effects of mixing machine learning and human judgment: Communications of the ACM

Automated risk assessment systems are often used in situations that require human judgment. One motivation for doing this is to remove human bias. Even when the automated system has been shown to be more... more

General (I.0) | Aug 7 20

A domain theory for statistical probabilistic programming: Proc. of the ACM on Programming Languages

On the one hand, a statistical programming language is similar to a traditional programming language, but with libraries providing statistical functions. Examples are Mathematica, MATLAB, and the omnipresent... more

Statistical Computing (G.3...) | Aug 6 20

AndroZoo: collecting millions of Android apps for the research community: MSR 16

This is basically a data collection paper. How did the authors collect more than three million free Android apps (more than 20 terabytes)? The answer: it’s somewhat more delicate than one might... more

Mobile Processors (C.1.4...) | Aug 5 20

Performance analysis of linear receivers for uplink massive MIMO FBMC-OQAM systems: IEEE Transactions on Signal Processing

Progressive improvements have been made to the FBMC-OQAM signaling, for example, many theoretical discussions and achievements... more

Signal Processing Systems (C.3...) | Aug 4 20

The rise of serverless computing: Communications of the ACM

In spite of a somewhat confusing introduction--“the server is dead, long live the server”--this informative article gives an overview of the relatively new phenomenon of serverless computing. It... more

General (C.0) | Aug 3 20

Should researchers use data from security breaches?: Communications of the ACM

The use of data derived from publicly exposed and security loophole databases will continue to be a controversial subject of debate for legal scholars and IT computing ethics specialists. Should computing... more

Ethics (K.4.1...) | Jul 30 20

Toward automatic verification of quantum programs: Formal Aspects of Computing

Even if a world of quantum computing for everyone is years (if not decades) away, research on designing proper ways to program such systems has been ongoing for quite some time... more

Information Theory (H.1.1...) | Jul 28 20

Management system for secure mobile application development: ACM TURC 19

Our increasing reliance on mobile apps elevates their insecurities and shines a spotlight on their vulnerabilities. The author introduces a secure mobile app development approach that is proactive... more

General (K.6.0) | Jul 22 20

What makes a great manager of software engineers?: IEEE Transactions on Software Engineering

The non-physical nature of software is unique among products developed in the field of engineering; this fact places extreme importance on the qualities that the members of the software engineering team... more

Software Management (K.6.3) | Jul 21 20

Hospitality of chatbot building platforms: SQUADE 19

Chatbots provide for natural language computer conversations, popularized with personal voice assistants like Siri and Alexa. Suitable architecture frameworks for building chatbots are reframed... more

General (D.2.0) | Jul 9 20

Data architecture (2nd ed.)

Showing a perceptible pattern as a line-edited transcript consolidated from one or more slide-based seminars, this book provides many illustrations that would otherwise have been the focus of a presenter’s lecture and interactive session. However, the printed... more
Data Warehouse & Repository (H.2.7...) | Jul 31 20

Future automation

Timothy Carone provides a visionary outlook on what will probably be called our digitized future. The book is split into 11 chapters. First, the author introduces autonomous systems (ASs). ASs are (in addition to the Internet of Things, IoT) the core element of the... more
Automation (K.4.3...) | Jul 29 20

Practical Flutter

One of the reasons a business may develop an application for mobile devices is for its branding and digital presence. In today’s market, that requires making the application available for both Android and iOS. The traditional way to accomplish this is to develop two separate... more
Object-Oriented Design Methods (D.2.2...) | Jul 27 20

Explainable AI

Deep learning has become so dominant in machine learning, and artificial intelligence (AI) as a whole, that its intrinsic lack of interpretability is paradigmatic for the whole field of explainable AI (XAI). This is why progress in interpreting, explaining, and visualizing deep... more
Learning (I.2.6) | Jul 24 20

Transmedia knowledge for liberal arts and community engagement

McKenzie made his legacy teaching and working on projects related to the liberal arts, providing students with the skills and knowledge to formulate effective arguments, communicate well, and solve problems. He... more
Arts & Humanities (J.5) | Jul 23 20

Social practices and dynamic non-humans

In the contemporary world, there is perhaps an implicit, or even explicit, presumption that human experience matters above all--human society and actions seek to quash, or at least subjugate to the extreme, all nonhuman actors and their effects. Humans... more
Robotics (I.2.9) | Jul 20 20

Applied machine learning

Machine learning methods find application in almost any domain that makes use of some form of computation. These algorithms build appropriate models that help in making predictions; thus, they are of interest in industry as well as in business scenarios. This book is... more
Learning (I.2.6) | Jul 17 20

Information technology for peace and security

A book with this title might seem to be only marginally relevant for corporate security personnel who are not fighting wars or keeping peace. However, in a typical contextual security analysis, you will find terms... more
Military (J.1...) | Jul 16 20

Network economics

Network engineers frequently need to interact with business-oriented departments in their company. To do so effectively, it is necessary to be equipped with at least basic knowledge of economic problems related to the technological field. For instance, being... more
Economics (J.4...) | Jul 15 20

DevOps for SharePoint

The existence of, and respect for, software engineering principles in the lives of software engineers, developers, and project managers is quite rich. Moving beyond systems development life cycle (SDLC)-driven models such as waterfall and agile has shown the... more
Automation (K.4.3...) | Jul 14 20

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2020 ThinkLoud, Inc.
Terms of Use
| Privacy Policy