Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
Misc

View:



Local distance restricted bribery in voting : AAMAS 19

The bribery problem asks whether there exists an appropriate-“cost” collection of voters in an election such that, if one strategically changes their votes, one’s favored candidate will win. In that model, each...
Multiagent Systems (I.2.11...) | Jul 6 20

Dynamic malware analysis in the modern era—a state of the art survey : ACM Computing Surveys

Malware is a problem. Its spreading within industrial networks and critical infrastructures shows that there is an always increasing need for cybersecurity expertise to detect, protect, and react to infections...
Security & Protection (D.4.6) | May 14 20

Metamorphic testing: a review of challenges and opportunities : ACM Computing Surveys

Testing software remains a complex business, so finding different means for doing so is important. Metamorphic testing belongs in one’s toolkit, along with unit tests and property-based testing. Thus, overviews are...
Validation (D.2.4...) | Jun 2 20

Security and privacy on blockchain : ACM Computing Surveys

While still controversial in terms of mainstream use, the study, research, and development of all things blockchain has been moving ahead full steam. Interestingly, while distributed ledger technology (DLT) is...
Security & Protection (D.4.6) | May 27 20

Management system for secure mobile application development : ACM TURC 19

Our increasing reliance on mobile apps elevates their insecurities and shines a spotlight on their vulnerabilities. The author introduces a secure mobile app development approach that is proactive...
General (K.6.0) | Jul 22 20

Building consistent transactions with inconsistent replication : ACM Transactions on Computer Systems

Large-scale transaction processing systems must balance the need for minimal response times with maintaining the integrity of the data being processed. In theory, transactions are processed sequentially...
Distributed Architectures (C.1.4...) | Aug 18 20

Identifying pathways to computer science : ACM Transactions on Computing Education (TOCE)

There is a consensus in computer science (CS) education that student numbers are not growing; furthermore, the number of female students is still very low. This situation attracts considerable...
Computer Science Education (K.3.2...) | Aug 31 20

A real-time framework for task assignment in hyperlocal spatial crowdsourcing : ACM Transactions on Intelligent Systems and Technology

Hyperspatial crowdsourcing is a low-cost methodology that uses capable individuals, located in the vicinity of task location, to acquire fine-grain data for...
Spatial Databases And GIS (H.2.8...) | Sep 9 20

A unified framework with multi-source data for predicting passenger demands of ride services : ACM Transactions on Knowledge Discovery from Data

Ride-sharing service customers look for and deserve fair fares. However, with the use of the Internet to access competing fares when booking shared rides...
Decision Support (H.4.2...) | Sep 15 20

SparseX: a library for high-performance sparse matrix-vector multiplication on multicore platforms : ACM Transactions on Mathematical Software

The treatment of many scientific and engineering problems leads nearly always to huge computational tasks, which can cause...
Software Libraries (D.2.2...) | Sep 14 20



Abstract algebra with applications

Any experienced teacher of a classical field of mathematics who wishes to publish a new textbook in such an area has to figure out how to present a topic with a long tradition to a new generation of readers. One approach is to present examples that show how the topic of...
Mathematics & Statistics (J.2...) | Sep 18 20

Adversarial machine learning

Machine learning is behind many of the systems we typically use, both online and offline, and behind even more of the systems we might use in the future. Given their economic importance, they attract attackers who might be interested in interfering with their correct...
Learning (I.2.6) | Sep 8 20

Applied machine learning

Machine learning methods find application in almost any domain that makes use of some form of computation. These algorithms build appropriate models that help in making predictions; thus, they are of interest in industry as well as in business scenarios. This book is...
Learning (I.2.6) | Jul 17 20

Applied reinforcement learning with Python

This is a small book on the broader topic of reinforcement learning (RL), written by a practitioner for practitioners. It is very practically oriented, but with limited theoretical background. The book narrative is...
Learning (I.2.6) | May 22 20

Artificial intelligence and conservation

This edited volume is the second book in the publisher’s “Artificial Intelligence for Social Good” series. It is a collection of papers on “research advances in AI that benefit the conservation of wildlife, forests, coral reefs, rivers, and other natural resources.” The...
General (I.2.0...) | Jun 25 20

Artificial intelligence and inclusive education

The recent foray of artificial intelligence (AI) applications into the domain of education has generated both excitement and concern among experts. Artificial intelligence and inclusive education, edited by...
Education (J.1...) | Aug 28 20

Business model innovation in the era of the Internet of Things

Being myself responsible for innovation at a large software firm in the Internet of Things (IoT) domain, this book sounded like a perfect match for me and my role. It certainly provides a selected set of good...
Business (J.1...) | May 18 20

Computer and communication networks (2nd ed.)

In every technological field characterized by very fast changes, it is necessary to update the related textbooks with the progress of research and practice. Obviously, this statement refers also to networking, where rapid reactions to book contents are also necessary...
Data Communications (C.2.0...) | Jul 7 20

Cybercryptography: applicable cryptography for cyberspace security

Cybersecurity is a major challenge today, as computing systems and networks play an increasingly important role in modern society. Cryptography addresses this problem based on mathematical theory, trying...
Cryptographic Controls (D.4.6...) | Aug 24 20

Data analysis in bi-partial perspective

Owsinski’s book provides an interesting “bi-partial” strategy for analyzing data; it is not only uniquely general, but also successful in building several useful methods to tackle issues related to data analysis, including algorithms and models. It focuses essentially on the...
Clustering (H.3.3...) | Jun 24 20


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2020 ThinkLoud, Inc.
Terms of Use
| Privacy Policy