Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help


A survey on compiler autotuning using machine learning : ACM Computing Surveys

Most modern compilers contain an optimization phase that tries to optimize the emitted machine code with respect to different objectives. Often this phase is heuristic, and the heuristics can usually be...
Compilers (D.3.4...) | Dec 31 19

Automatic software repair: a bibliography : ACM Computing Surveys

There is a well-known saying in Silicon Valley about the omnipresence of programmable computers in our everyday life: software is eating the world, but unfortunately each bite comes with bugs. Such...
Testing & Debugging (D.2.5) | Nov 13 19

Reproducibility in scientific computing : ACM Computing Surveys

The authors discuss reproducible research, that is, research where the same task produces the same result as the original research. Researchers in the computing community are encouraged to make their...
Computer & Info. Science Edu. (K.3.2) | Nov 19 19

A multi-level-optimization framework for FPGA-based cellular neural network implementation : ACM Journal on Emerging Technologies in Computing Systems

Multi-level optimizations for cellular neural network design with Zybo and ZedBoard field-programmable gate arrays (FPGAs),...
General (B.0) | Dec 3 19

A first look at Certification Authority Authorization (CAA) : ACM SIGCOMM Computer Communication Review

The cornerstone of information and communications technology (ICT), security provides and maintains robustness, sustainability, and reliability. Using web services by referring to different web pages...
Security & Protection (C.2.0...) | Nov 21 19

A survey on artifacts from CoNEXT, ICN, IMC, and SIGCOMM conferences in 2017 : ACM SIGCOMM Computer Communication Review

This paper does precisely what the title says. It is an attempt to survey the current state of reproducibility in computer networking research. This is one of...
Data Communications (C.2.0...) | Nov 18 19

Assessing neural network scene classification from degraded images : ACM Trans. on Applied Perception

Image processing and understanding human vision have shared interests and methods since the beginning of computer vision research. In recent years, deep learning and in particular convolutional neural networks...
General (I.4.0) | Nov 27 19

Dual-page checkpointing : ACM Trans. on Architecture and Code Optimization

In-memory computing is one of the most important paradigm shifts in today’s processing models. This interesting and innovative approach is possible because not only do we have new ideas on how to perform data...
Network Architecture & Design (C.2.1) | Nov 1 19

Machine learning education for artists, musicians, and other creative practitioners : ACM Trans. on Computing Education

Together with colleagues from computer science, agriculture, food science, biology, and related fields, I am currently working on a framework for...
Computer Science Education (K.3.2...) | Nov 15 19

Schedulability analysis of tasks with corunner-dependent execution times : ACM Trans. on Embedded Computing Systems

Scarce computer memory and processor core resources create crucial challenges to the real-time execution of concurrent software. How should a multicore...
Real-Time & Embedded Systems (D.4.7...) | Nov 22 19

A people’s history of computing in the United States

From 1965 to 1975, if you were to ask someone in the field what was going on in computing, you would likely get one of two answers. People in business data processing would point to the dominance of IBM...
History of Computing (K.2) | Jan 24 20

Algorithmic aspects of machine learning

This book aims to provide readers with an algorithmic toolkit for machine learning (ML) problems. Chapter 1 explains why analyzing ML algorithms is so challenging. The remaining seven chapters present algorithms to solve some specific ML problems is so...
General (I.2.0) | Jan 31 20

An introduction to data

Are you an early practitioner, researcher, business/experience executive, or entrepreneur who uses artificial intelligence (AI), big data, and data sciences in financial services, private investment, or related sectors? This book will help you develop a broader perspective...
Authentication (D.4.6...) | Feb 5 20

Artificial psychology: psychological modeling and testing of AI systems

According to the authors, Dan Curtis proposed artificial psychology as a theoretical discipline in 1963 (p. 164). During the 56 years since, it can be expected to have broadly expanded in both complexity and...
Psychology (J.4...) | Jan 17 20

Big data and innovation in tourism, travel, and hospitality

While collecting data has always been an important aspect of the tourism, travel, and hospitality industry, big data has changed the landscape and brought metrics-based strategies to the spotlight. In this book, the...
General (K.6.0) | Jan 8 20

Big data and innovation in tourism, travel, and hospitality: managerial approaches, techniques, and applications

While collecting data has always been an important aspect of the tourism, travel, and hospitality industry, big data has changed the landscape and brought metrics-based strategies to the spotlight....
General (K.6.0) | Jan 8 20

Building design systems: unify user experiences through a shared design language

One rarely comes across books dedicated to a niche topic like design systems. User experience is of the utmost importance in this digital era, so a book on building design systems is a precious resource...
User/Machine Systems (H.1.2) | Feb 3 20

Clean Python: elegant coding in Python

Every beginning programmer needs a friend to look over their shoulder at their screen and give advice on how to code better. This book attempts to be such a friend. The book is full of advice of the kind, “do this, don’t do that.” This could be infuriating when a smart-...
Multiparadigm Languages (D.3.2...) | Jan 2 20

Cloud security auditing

Information technology (IT) systems auditing is important for good corporate governance, and essential where there is a need to formally demonstrate compliance with legislation and regulatory requirements. Information security management standards...
Security & Protection (D.4.6) | Jan 28 20


As someone who obtained a computer science (CS) degree after finishing a doctorate in political science in the 1980s, I took a walk down memory lane with this book. It was fun to reminisce using the author’s four waves of coders, following the four stages that...
General (K.7.0) | Feb 11 20

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2020 ThinkLoud, Inc.
Terms of Use
| Privacy Policy