Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help


The privacy implications of cyber security systems : ACM Computing Surveys

This paper provides an accessible overview of the issues that spring up when looking into the privacy of cybersecurity systems. The paper starts by classifying cybersecurity technologies using four different...
Privacy (K.4.1...) | Jun 15 18

Compiler-assisted loop hardening against fault attacks : ACM Transactions on Architecture and Code Optimization

The problem to solve is the following: the uncontrolled development of the Internet of Things (IoT) results in personal data being handled by a huge variety of devices, which do not satisfy the...
Compilers (D.3.4...) | Jun 1 18

On ordering multi-robot task executions within a cyber physical system : ACM Transactions on Autonomous and Adaptive Systems

The paper addresses the important problem of task execution by a multi-robot system. Many papers cover task allocation, but do not explicitly address...
Robotics (I.2.9) | Jun 12 18

Detecting decidable classes of finitely ground logic programs with function symbols : ACM Transactions on Computational Logic

The termination problem of programs is in general an undecidable problem. However, in the context of some programming paradigms, there has been a lot...
Logic Programming (D.1.6) | May 22 18

Decomposing images into layers via RGB-space geometry : ACM Transactions on Graphics

The notion of representing a color image as a set of translucent layers, each of a single (non-primary) color, is useful in the field of digital image painting. Although the layering is not present...
General (I.4.0) | Jun 22 18

Architectural principles for cloud software : ACM Transactions on Internet Technology

What comes to mind first with cloud system architectures is the ubiquitous use of microservices, supported by total virtualization from hardware to middleware to applications: virtual machines...
Cloud Computing (C.2.4...) | Jun 14 18

A viewable indexing structure for the interactive exploration of dynamic and large image collections : ACM Transactions on Knowledge Discovery from Data

The authors are interested in developing a method for building and indexing a large collection of images and providing a means for studying these images...
Clustering (H.3.3...) | May 31 18

Profit maximization with sufficient customer satisfactions : ACM Transactions on Knowledge Discovery from Data

This paper focuses on the prospects of “profit maximization with sufficient customer satisfaction.” The authors present 11 lemmas, nine examples, six...
Electronic Commerce (K.4.4) | Jun 15 18

Conditioning in probabilistic programming : ACM Transactions on Programming Languages and Systems

Machine learning, possibly contrary to popular belief, is not just about endless variations of neural networks. There is also a thriving subculture of probabilistic programming based on Bayesian principles...
Probabilistic Computation (F.1.2...) | Jun 13 18

Lightweight, obfuscation-resilient detection and family identification of Android malware : ACM Transactions on Software Engineering and Methodology

Malware is undoubtedly one of the most real and potent threats in the smartphone industry. Android’s open ecosystem in terms of code as well as...
Security and Protection (C.2.0...) | Jun 22 18

An introduction to distance geometry applied to molecular geometry

The most common way of determining the structures of molecules in a solution is nuclear magnetic resonance (NMR). The signals measured are caused by the flipping of the spins of paramagnetic nuclei in a...
Geometrical Problems & Comp. (F.2.2...) | Jun 7 18

Analytical methods for network congestion control

This is one of the most comprehensive books I have read recently, and it is a must-read for a serious network designer. This book uses a step-by-step approach to build a mathematical model to understand, design, and fix network congestion. This book...
Network Architecture & Design (C.2.1) | May 3 18

Anomaly detection as a service

Written by a team of well-known academic researchers and authors of landmark papers in the area of system and network security, this book is a distilled and concise overview of academic and industrial approaches for anomaly detection in the context of information...
Security & Protection (K.6.5) | Apr 25 18

Aviation security, privacy, data protection and other human rights

Enerstvedt, having an interesting background in both formal education and industry experience, has artfully combined a discussion of aviation security technology with privacy and human rights in a 453-page...
Security & Protection (K.6.5) | May 30 18

Beginning Ubuntu for Windows and Mac users (2nd ed.)

The Ubuntu Linux operating system is one of the most popular Linux distributions, if not the most popular. When this book was listed among the books available to be reviewed, I selected it because I had installed Ubuntu on a...
Linux (D.4.0...) | Apr 27 18

Beginning artificial intelligence with the Raspberry Pi

For anybody looking for a fast and basic introduction to the field of artificial intelligence (AI) or machine learning (ML) supported by many practical examples for one’s own implementation, the book by Norris...
General (I.2.0) | May 11 18

Bioinformatics for evolutionary biologists: a problems approach

This book was specifically designed to keep all elements needed for understanding the fundamental research approaches used in bioinformatics in a single text. It aims to help future evolutionary biologists...
Biology & Genetics (J.3...) | Jun 21 18

Building the network of the future

Software-defined networking (SDN) and network function virtualization (NFV) have been at the forefront of the R&D networking world since the last decade [1]. However, these new paradigms may not be well understood by many IT professionals. The book is easy to...
Network Architecture & Design (C.2.1) | Apr 26 18

Building web applications with Visual Studio 2017

In recent times, the .NET ecosystem has witnessed a rapid transformation in many services it offers. It includes a completely rewritten Entity Framework Core that is designed not only to support multiple platforms, but also to offer features such as nonrelational...
Systems & Software (H.3.4) | May 4 18

Cloud computing (2nd ed.)

In recent years, the applications and architectural specifications of cloud computing have been major streams of investigation. Besides the cloud’s technical significance at performing practical projects, it has opened a new horizon within the computing...
Distributed Systems (C.2.4) | May 8 18

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy