Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
Misc

View:



Automatic software repair: a bibliography : ACM Computing Surveys

The author successfully provides a big picture view of automatic software repair. The survey covers an impressive list of papers, giving an excellent overview of automatic software repair. Those papers are...
Testing & Debugging (D.2.5) | Oct 11 18

Systematically understanding the cyber attack business: a survey : ACM Computing Surveys

Cybercrime is a lucrative business with a very positive return on investment. To combat the cybercrime business, it helps to understand how it operates. The authors use the value chain analysis method...
Security & Protection (K.6.5) | Oct 19 18

Data-driven concurrency for high performance computing : ACM Transactions on Architecture and Code Optimization

While in procedural parallel programming with multithreading lemmas, the synchronization of the sequences of parallel execution of tasks is...
Distributed Architectures (C.1.4...) | Oct 8 18

Data-driven concurrency for high performance computing : ACM Transactions on Architecture and Code Optimization

Fine-grained dataflow computing creates circumstances that technologies, particularly hardware technologies, have difficulty handling. However, techniques...
Distributed Architectures (C.1.4...) | Aug 30 18

Digital behaviour change interventions to break and form habits : ACM Transactions on Computer-Human Interaction

Whenever research on behavior is in progress, a special category is also under review in terms of habit. In the context of behavior change, it is of interest to...
Interaction Styles (H.5.2...) | Sep 27 18

Maintaining architecture-implementation conformance to support architecture centrality : ACM Transactions on Software Engineering and Methodology

Software architecture plays a vital role in the life cycle of a software product, whether you follow agile principles or not. Software architectures allow one to...
Software Architectures (D.2.11) | Sep 4 18

When simpler data does not imply less information : ACM Transactions on the Web

This well-written paper reports on a study revealing the power of limited datasets to characterize mobile device users. This excellent work deserves attention both for the results and for the general explanations of...
General (H.2.0) | Aug 29 18

3D metal printing technology: the need to re-invent design practice : AI & Society

Additive manufacturing (AM) (also know as 3D printing) is the process of manufacturing objects directly from 3D model data, typically using a layer-by-layer...
Manufacturing (J.1...) | Oct 4 18

Mitigating risks of digitalization through managed industrial security services : AI & Society

This paper discusses the risks of industrial security services. Moreover, the authors consider future automation scenarios as well as the major concepts involved in industrial security...
Security & Protection (K.6.5) | Oct 19 18

An in-vehicle software defined network architecture for connected and automated vehicles : CarSys 17

The expansion of communication networks has made the efficient configuration and management of these networks challenging. Software-defined...
Autonomous Vehicles (I.2.9...) | Sep 4 18



A formal theory of commonsense psychology

In introducing commonsense psychology, this book motivates readers to consider computational psychology. It describes the foundational building blocks of such computations. It provides not only purely...
Psychology (J.4...) | Oct 5 18

A journey through discrete mathematics: a tribute to Jiří Matoušek

Professor Jiří Matoušek was a distinguished scientist with significant achievements in the areas of discrete and “computational geometry, topology, and some aspects of metric space theory.” His work in discrete and computational geometry provides solutions for...
General (G.2.0) | Oct 11 18

A systematic approach to learning robot programming with ROS

Robots are based on very complex systems that require expertise in many areas. In recent years, robot operating system (ROS) has become the standard for controlling robots. ROS offers a complete set of tools and a...
Robotics (I.2.9) | Sep 28 18

Advanced object-oriented programming in R

Computer science (CS) research has changed dramatically in recent years. It now often involves analyzing large datasets and testing hypotheses through a set of statistical tests. Along this line, R is one of the most widely used...
Object-Oriented Programming (D.1.5) | Aug 9 18

Advances in multirate systems

Multirate systems are systems in which multiple sampling rates are used for filtering data/signals. This book describes some advances in multirate systems. The main focus is on digital signal processing (DSP)-related applications. The descriptions in the...
Signal Analysis, Synthesis & Proc. (H.5.5...) | Aug 7 18

An introduction to partial differential equations

Partial differential equations (PDEs) are used in several branches of engineering and science. For example, physical laws (like conservation of mass, momentum, and energy) model many physical, chemical...
Partial Differential Equations (G.1.8) | Jul 27 18

Attribute-based access control

In many applications, it becomes a necessity to define who (which user) is allowed to access what (which resource). This is achieved via access control. Several models for access control exist. Attribute-based access control (ABAC) is one of them, and forms the...
Access Controls (D.4.6...) | Sep 5 18

Autonomy and artificial intelligence

The volume collects works from two symposia, held at Stanford University, in 2015 and 2016. The central question is the relationship between autonomous systems and artificial intelligence (AI), as well as research opportunities for integrating autonomous...
Applications & Expert Systems (I.2.1) | Oct 3 18

Big data factories

In the technology world, ABCD is a buzzword. “A” stands for artificial intelligence (AI), “B” for blockchain, “C” for cloud, and “D” for big data. “D” especially is the origin of the others: you need the cloud because you have to store big data; blockchains can be used to...
Content Analysis & Indexing (H.3.1) | Oct 16 18

Codes, cryptology and curves with computer algebra

This volume offers a terse, highly formal exposition of the relation between the four subjects named in the title: codes (transformations of a stream of information), cryptology (transformations that seek to hide...
Data Encryption (E.3) | Sep 13 18


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy