Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help


The privacy implications of cyber security systems : ACM Computing Surveys

This paper provides an accessible overview of the issues that spring up when looking into the privacy of cybersecurity systems. The paper starts by classifying cybersecurity technologies using four different...
Privacy (K.4.1...) | Jun 15 18

Maximizing polynomials subject to assignment constraints : ACM Transactions on Algorithms

This paper considers “the q-adic assignment problem.” Fix a number q (originally q=2), and suppose we are given, for some number n, a 2q-dimensional array of costs cu,v where u and v are q-tuples of indices...
Algorithm Design & Analysis (G.4...) | Jul 13 18

On ordering multi-robot task executions within a cyber physical system : ACM Transactions on Autonomous and Adaptive Systems

The paper addresses the important problem of task execution by a multi-robot system. Many papers cover task allocation, but do not explicitly address...
Robotics (I.2.9) | Jun 12 18

An effective characterization of the alternation hierarchy in two-variable logic : ACM Transactions on Computational Logic

Many interesting properties of words can be described in a first-order language with variables (x, y, ...) for positions and two basic properties: x < y (meaning that x is to the left of y) and Qax (meaning that letter...
Formal Languages (F.4.3) | Jul 6 18

Decomposing images into layers via RGB-space geometry : ACM Transactions on Graphics

The notion of representing a color image as a set of translucent layers, each of a single (non-primary) color, is useful in the field of digital image painting. Although the layering is not present...
General (I.4.0) | Jun 22 18

Architectural principles for cloud software : ACM Transactions on Internet Technology

What comes to mind first with cloud system architectures is the ubiquitous use of microservices, supported by total virtualization from hardware to middleware to applications: virtual machines...
Cloud Computing (C.2.4...) | Jun 14 18

Seamless virtual network for international business continuity in presence of intentional blocks : ACM Transactions on Internet Technology

It is an accepted fact that international borders are vulnerable and permeable when it comes to information technology. This is why international businesses...
Network Management (C.2.3...) | Jul 10 18

Profit maximization with sufficient customer satisfactions : ACM Transactions on Knowledge Discovery from Data

This paper focuses on the prospects of “profit maximization with sufficient customer satisfaction.” The authors present 11 lemmas, nine examples, six...
Electronic Commerce (K.4.4) | Jun 15 18

Conditioning in probabilistic programming : ACM Transactions on Programming Languages and Systems

Machine learning, possibly contrary to popular belief, is not just about endless variations of neural networks. There is also a thriving subculture of probabilistic programming based on Bayesian principles...
Probabilistic Computation (F.1.2...) | Jun 13 18

Lightweight, obfuscation-resilient detection and family identification of Android malware : ACM Transactions on Software Engineering and Methodology

Malware is undoubtedly one of the most real and potent threats in the smartphone industry. Android’s open ecosystem in terms of code as well as...
Security and Protection (C.2.0...) | Jun 22 18

Advances in soft computing and machine learning in image processing

Both soft computing techniques and machine learning algorithms have very important tasks in image processing applications. With the artificial intelligence (AI)-based applications emerging in the market today, image processing techniques have gained more...
General (I.4.0) | Jul 19 18

An introduction to distance geometry applied to molecular geometry

The most common way of determining the structures of molecules in a solution is nuclear magnetic resonance (NMR). The signals measured are caused by the flipping of the spins of paramagnetic nuclei in a...
Geometrical Problems & Comp. (F.2.2...) | Jun 7 18

Artificial intelligence and economic theory

Artificial intelligence (AI) is increasingly used in many areas, including language translation, medical diagnosis, and so on. Of interest here are AI applications in stock market activities. Most investors are aware of...
Economics (J.4...) | Jul 19 18

Attribute-based access control

Due to the increasing distribution and complexity of current applications, attribute-based access control (ABAC) is slowly becoming the only way to control access. This monograph summarizes the accumulated knowledge on this important subject and has a...
Access Controls (D.4.6...) | Jul 20 18

Aviation security, privacy, data protection and other human rights

Enerstvedt, having an interesting background in both formal education and industry experience, has artfully combined a discussion of aviation security technology with privacy and human rights in a 453-page...
Security & Protection (K.6.5) | May 30 18

Bioinformatics for evolutionary biologists: a problems approach

This book was specifically designed to keep all elements needed for understanding the fundamental research approaches used in bioinformatics in a single text. It aims to help future evolutionary biologists...
Biology & Genetics (J.3...) | Jun 21 18

Business process management cases: digital innovation and business transformation in practice

As the title promises, this book contains case descriptions and case studies. The introductory chapter tries to provide a framework and editorial guidelines for describing cases from business process...
Business (J.1...) | Jul 12 18

Coding literacy: how computer programming is changing writing

Like reading and writing, programming has become an essential fundamental tool to organize information. A few centuries ago, being able to write and read, whether in Spanish, English, or French, was a way to be...
General (D.1.0) | Jul 9 18

Compact representations for the design of quantum logic

This book is in the area of quantum computer design. It proposes a new approach for such designs. It provides the background information required to understand the new approach. It also describes experimental results of the approach. Part 1 has two chapters. The first...
Computer-Aided Design (CAD) (J.6...) | Jun 21 18

Computer networking problems and solutions

Many computer networking books have been adopted in universities and are very popular [1,2,3], so it is hard for a new book to make an impact unless it differentiates in a significant way. This book tries to achieve this...
General (C.2.0) | Jun 28 18

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy