Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Best of 2016 Recommended by Editor Recommended by Reviewer Recommended by Reader
Search
These reviews are the most popular with readers.
 
Options: For the last:
 
  1-10 of 15481 results Ranking
  A modified exhaustive search on a password system using SHA-1
Kim M., Jung Y., Song J.  International Journal of Information Security 16(3): 263-269, 2017. Type: Article

Nowadays information is more and more of an asset; as such, it is becoming ever more important as evidence in law enforcement cases. Being valuable, information is often encrypted; thus law enforcement bodies must have access to methods and tools ...

1  
   Mathematical analysis and the mathematics of computation
Römisch W., Zeugmann T.,  Springer International Publishing, New York, NY, 2016. 703 pp. Type: Book (978-3-319427-53-9), Reviews: (1 of 2)

Even though there are many deep connections between mathematical analysis and the mathematics of computation, these two fields are usually taught completely separately from each other. This traditional approach has the disadvantage that the concep...

2  
  Recommending personalized tips on new courses for guiding course selection
Park Y.  ACM SE 2017 (Proceedings of the SouthEast Conference, Kennesaw, GA,  Apr 13-15, 2017) 172-174, 2017. Type: Proceedings

A computer program that helps students select courses is described in this paper. Only the overall structure of the program is presented. The program first collects evaluations, using a list of criteria, from many students. Then, when an individua...

3  
  Programmed inequality: how Britain discarded women technologists and lost its edge in computing
Hicks M.,  MIT Press, Cambridge, MA, 2017.Type: Book (9780262035545)

Marie Hicks, the author, has to be congratulated as an American historian of technology for tackling the paradox of the UK’s leadership in the development of computers and computer applications during World War II, through the 1950s and into...

4  
  GPS: theory, algorithms and applications (3rd ed.)
Xu G., Xu Y.,  Springer International Publishing, New York, NY, 2016. 489 pp. Type: Book (978-3-662503-65-2)

The global positioning system (GPS) uses satellites and computers to determine the location of a GPS receiver on or near earth. This is done by computing the time difference for signals (from various satellites) to arrive at the GPS receiver. The ...

5  
  Reactionless visual servoing of a multi-arm space robot combined with other manipulation tasks
Abdul Hafez A., Mithun P., Anurag V., Shah S., Krishna K.  Robotics and Autonomous Systems 911-10, 2017. Type: Article

Visual servoing is an effective control method for autonomous manipulators, allowing them to reach a target using visual feedback. Mobile manipulation addresses the problem of controlling arms mounted on mobile bases, where visual servoing is stil...

6  
  Nonlinear Laplacian for digraphs and its applications to network analysis
Yoshida Y.  WSDM 2016 (Proceedings of the 9th ACM International Conference on Web Search and Data Mining, San Francisco, CA,  Feb 22-25, 2016) 483-492, 2016. Type: Proceedings

This paper relates to spectral graph theory and more specifically concerns the case of digraphs, directed graphs. It proposes an alternative framework to existing digraph approaches, such as Chung’s, or the Diplacian, relying on stationary p...

7  
  Blockchain applications: a hands-on approach
Bahga A., Madisetti V.,  Arshdeep Bahga & Vijay Madisetti, 2017.Type: Book (9780996025560)

Blockchain is known from its first generation implementing cryptocurrency bitcoins. This book casts a much wider net and surveys a mixed sample of applications using the technology. The book covers blockchain conceptually, but also includes a numb...

8  
  Knowledge base semantic integration using crowdsourcing
Meng R., Chen L., Tong Y., Zhang C.  IEEE Transactions on Knowledge and Data Engineering 29(5): 1087-1100, 2017. Type: Article

A major problem with integrating knowledge bases arises from the differing taxonomies underlying individual knowledge bases. Two nodes, one from each of a pair of taxonomies, may be related in one of four ways: they may be equivalent; the first ma...

9  
   3D printers as sociable technologies: taking appropriation infrastructures to the Internet of Things
Ludwig T., Boden A., Pipek V.  ACM Transactions on Computer-Human Interaction 24(2): 1-28, 2017. Type: Article

Three-dimensional (3D) printing is often considered as an instance of disruptive technology that promises to change the way people think about materializing products for consumption. A study has been undertaken to identify existing weaknesses in 3...

10  
 
 
 
Display per page
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy