These reviews are the most popular with readers.
All Media Types
For the last:
On the impact of programming languages on code quality: a reproduction study
Berger E., Hollenbeck C., Maj P., Vitek O., Vitek J. ACM Transactions on Programming Languages and Systems 41(4): 1-24, 2019. Type: Article
E. W. Dijkstra’s classic
A discipline of programming
 has rightly achieved the sort of permanent validity that mathematician G. H. Hardy spoke of in his famous
A mathematician’s apology
. Dijkstra’s preface ex...
Potential ‘dark sides’ of leisure technology use in youth
Turel O. Communications of the ACM 62(3): 24-27, 2019. Type: Article
New computing technologies may sometimes adversely affect young users. What is the undesirable result of too much unrestrained computing on adolescents? Turel presents some investigative results of technology’s impact on teenagers....
Schedulability analysis of tasks with corunner-dependent execution times
Andersson B., Kim H., de Niz D., Klein M., Rajkumar R., Lehoczky J. ACM Transactions on Embedded Computing Systems 17(3): 1-29, 2018. Type: Article
Scarce computer memory and processor core resources create crucial challenges to the real-time execution of concurrent software. How should a multicore processor be efficiently programmed to process concurrent software with different execution spe...
Bits and bugs: a scientific and historical review of software failures in computational science
Huckle T., Neckel T., Society for Industrial and Applied Mathematics, Philadelphia, PA, 2019. 251 pp. Type: Book (978-1-611975-55-0)
Niels Bohr, in confronting the subtleties and paradoxes of quantum theory, said to one of his many famous students and acolytes, “These issues are so serious that one can only joke about them” . The vernacular main title of this exc...
The physics of quantum information: quantum cryptography, quantum teleportation, quantum computation
Bouwmeester D., Ekert A., Zeilinger A. Springer-Verlag, London, UK, 2000. Type: Divisible Book
A century ago, the discovery of quantum mechanics initiated a revolution in physics that challenged many deeply-held intuitions. Within the last 20 years, the application of quantum mechanics to computation has opened the door to a similar revolu...
The theory of quantum information
Watrous J., Cambridge University Press, New York, NY, 2018. 598 pp. Type: Book (978-1-107180-56-7)
Information theory has its modern origins in the 1948 work  of Claude Shannon, who gave results that addressed two key problems: the extent to which information can be compressed without loss, and the rate at which information can be transmitte...
Cryptographic and information security approaches for images and videos
Ramakrishnan S., CRC Press, Inc., Boca Raton, FL, 2019. 986 pp. Type: Book (978-1-138563-84-1)
Cryptography is the art of securing communications transmitted through insecure channels. It consists of mechanisms to keep the data confidential by preventing access to unapproved individuals, maintaining the integrity of the data through an abil...
Data exploration using example-based methods
Lissandrini M., Mottin D., Palpanas T., Velegrakis Y., Morgan&Claypool Publishers, San Rafael, CA, 2019. 164 pp. Type: Book (978-1-681734-55-2)
This book provides a comprehensive overview and description of a broad range of search algorithms. Because the authors are experts at example-based searching methods, the book discusses the application of example-based approaches to several applic...
Discrete mathematics and its applications
Rosen K., McGraw-Hill Higher Education, Columbus, OH, 2002. 928 pp. Type: Book (9780072424348)
This thoughtful and well-written introductory text is designed for students at the sophomore level in a variety of majors, including mathematics, computer science, and engineering. The book, now in its fifth edition, is billed by its publisher as ...
Borland D., Wang W., Gotz D. IEEE Computer Graphics and Applications 38(6): 17-23, 2018. Type: Article
If users cannot see the breakdown of data hidden behind summaries visualized as charts or pies, they will go to another website to find the information. Unseen information can lead to biased findings presented by summaries. The complexity of data ...
Reproduction in whole or in part without permission is prohibited. Copyright © 2000-2019 ThinkLoud, Inc.