Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help


Automatic software repair: a bibliography : ACM Computing Surveys

There is a well-known saying in Silicon Valley about the omnipresence of programmable computers in our everyday life: software is eating the world, but unfortunately each bite comes with bugs. Such...
Testing & Debugging (D.2.5) | Nov 13 19

Reproducibility in scientific computing : ACM Computing Surveys

The authors discuss reproducible research, that is, research where the same task produces the same result as the original research. Researchers in the computing community are encouraged to make their...
Computer & Info. Science Edu. (K.3.2) | Nov 19 19

A multi-level-optimization framework for FPGA-based cellular neural network implementation : ACM Journal on Emerging Technologies in Computing Systems

Multi-level optimizations for cellular neural network design with Zybo and ZedBoard field-programmable gate arrays (FPGAs), including the system...
General (B.0) | Dec 3 19

Neuromemrisitive architecture of HTM with on-device learning and neurogenesis : ACM Journal on Emerging Technologies in Computing Systems

This very comprehensive technical account presents a thoroughly worked out “architecture for the spatial pooler (SP)” of the hierarchical temporal...
General (I.0) | Oct 11 19

A first look at Certification Authority Authorization (CAA) : ACM SIGCOMM Computer Communication Review

The cornerstone of information and communications technology (ICT), security provides and maintains robustness, sustainability, and reliability. Using web services by referring to different web pages...
Security & Protection (C.2.0...) | Nov 21 19

A survey on artifacts from CoNEXT, ICN, IMC, and SIGCOMM conferences in 2017 : ACM SIGCOMM Computer Communication Review

This paper does precisely what the title says. It is an attempt to survey the current state of reproducibility in computer networking research. This is one of...
Data Communications (C.2.0...) | Nov 18 19

Assessing neural network scene classification from degraded images : ACM Trans. on Applied Perception

Image processing and understanding human vision have shared interests and methods since the beginning of computer vision research. In recent years, deep learning and in particular...
General (I.4.0) | Nov 27 19

Coordinated CTA combination and bandwidth partitioning for GPU concurrent kernel execution : ACM Trans. on Architecture and Code Optimization

The high throughput of processors (or, more broadly, computers) has always been a key issue in computer systems architecture. For...
General (C.0) | Oct 25 19

Dual-page checkpointing : ACM Trans. on Architecture and Code Optimization

In-memory computing is one of the most important paradigm shifts in today’s processing models. This interesting and innovative approach is possible because not only do we have new ideas on how to perform data...
Network Architecture & Design (C.2.1) | Nov 1 19

A framework for teaching security design analysis using case studies and the hybrid flipped classroom : ACM Trans. on Computing Education

In the field of cybersecurity education, security design analysis is a complex and technically demanding subject. Thus, new learning methods are...
Computer Science Education (K.3.2...) | Oct 14 19

A new bio-inspired optimization algorithm based on the self-defense mechanism of plants in nature

The length of a long review article, this short book describes the details of a recently developed soft computing (that is, a bio-inspired metaheuristic) algorithm, tested for numerical optimization...
Optimization (G.1.6) | Nov 14 19

Advanced computing and systems for security: volume nine

The 2019 Applied Computation and Security Systems (ACSS) symposium discussed using fuzzy logic, geo maps, and other approaches to analyze, forecast, scale, and secure wireless sensor networks (WSNs). This volume includes eight of the 18 papers...
Security & Protection (D.4.6) | Nov 19 19

All data are local

Two important points of general interest can be drawn from this book, although both points require more effort than most readers are willing to make. The first point, as the title suggests, is that all data is local. This can be taken to mean that data is (or “are,” which we...
Social & Behavioral Sciences (J.4) | Nov 25 19

Analysis for computer scientists: foundations, methods, and algorithms (2nd ed.)

In the title, “analysis” means “mathematical analysis” in the sense of Cauchy and Weierstrass, for example, ε-δ analysis. Chapters 1 through 4 are basically calculus (including trigonometry and complex numbers) and would probably be better as a refresher than an...
General (G.0) | Oct 14 19

Analytic methods in systems and software testing

I admit that this book perhaps gives me an inordinate amount of pleasure. I have a completely ridiculous number of books on software and systems testing on my shelves, beginning with Glenford Myers’ brilliant classic...
Testing & Debugging (D.2.5) | Oct 31 19

Artificial intelligence engines

I teach several classes on machine learning (ML), at both the undergraduate and graduate levels. I am always looking for books that may provide new examples or ideas on how to teach ML to my students. The diversity in their knowledge of mathematics and statistics...
Learning (I.2.6) | Oct 16 19

Big data of complex networks

As mentioned in the preface, big data affects every scientist and every domain. This edited book aims at filling gaps in the area of big data of complex networks, from a computer scientist, statistician, and mathematician perspective. The book is research oriented and comprised...
Database Applications (H.2.8) | Nov 8 19

Bits and bugs

Niels Bohr, in confronting the subtleties and paradoxes of quantum theory, said to one of his many famous students and acolytes, “These issues are so serious that one can only joke about them” [1]. The vernacular main title of this excellent and very important book brought...
Testing & Debugging (D.2.5) | Nov 20 19

Computing with data

This book is envisioned as a companion volume on modern cloud computing. However, it is too broad, and in my opinion provides only superficial coverage of many subjects. It is certainly a deliberate (and courageous) decision by the authors. Clearly, breadth versus...
Data Sharing (H.3.5...) | Oct 11 19

Core Java, volume I—fundamentals (11th ed.)

Core Java is a longstanding series by computer science professor Cay Horstmann, who has written several books on programming languages. This edition is a classic textbook for high school seniors and...
Java (D.3.2...) | Nov 12 19

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy