Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
Misc

View:



Testing extended finite state machines using NSGA-III : A-TEST 19

The goal of the paper is to describe how the non-dominated sorting genetic algorithm III (NSGA-III) algorithm generates test suites from extended finite-state machines (EFSMs). Each generated test...
General (D.2.0) | Nov 19 20

Credulous acceptability, poison games and modal logic : AAMAS 19

Abstract argumentation theory is based on the notion that argument x attacks argument y. A set of arguments S is “admissible” if no arguments within the set attack each other, and for every argument y that attacks an argument...
Modal Logic (F.4.1...) | Sep 30 20

A survey on deep learning: algorithms, techniques, and applications : ACM Computing Surveys

Deep learning (DL) algorithms, characterized by mapping from input to output (labels or classes) with multiple hidden layers in between, have revived the excitement of artificial intelligence...
Learning (I.2.6) | Oct 16 20

A survey on food computing : ACM Computing Surveys

The authors have written an extensive survey of the published literature related to food computing. The survey is about 26 pages long, with an additional ten pages of (about 300) references. The...
Image Databases (H.2.8...) | Nov 27 20

Hierarchies in inclusion logic with lax semantics : ACM Transactions on Computational Logic

A natural interest of computational logic is to investigate decidable subsets of first-order logic. One such subset is the formalism of inclusion logic (FOI), introduced by Galliani as an evolution of dependence logic [1]...
General (F.0) | Oct 1 20

Building consistent transactions with inconsistent replication : ACM Transactions on Computer Systems

Large-scale transaction processing systems must balance the need for minimal response times with maintaining the integrity of the data being processed. In theory, transactions are processed sequentially...
Distributed Architectures (C.1.4...) | Aug 18 20

Adaptive architecture and personal data : ACM Transactions on Computer-Human Interaction

This paper focuses on the implications of sensors embedded in buildings to make the buildings responsive to people. An important issue is privacy. One reason these privacy issues are important is the...
Architecture (J.5...) | Nov 20 20

Identifying pathways to computer science : ACM Transactions on Computing Education (TOCE)

There is a consensus in computer science (CS) education that student numbers are not growing; furthermore, the number of female students is still very low. This situation attracts considerable...
Computer Science Education (K.3.2...) | Aug 31 20

Systematically ensuring the confidence of real-time home automation IoT systems : ACM Transactions on Cyber-Physical Systems

The quick expansion of computing technology in many areas leads to different new paradigms; among them is the paradigm of...
Real-Time & Embedded Systems (D.4.7...) | Oct 13 20

Scratchpad-memory management for multi-threaded applications on many-core architectures : ACM Transactions on Embedded Computing Systems

This paper focuses on improving many-core architectures via software programmable or scratchpad memory (SPM): An SPM contains an array of...
Real-Time And Embedded Systems (C.3...) | Oct 7 20



Abstract algebra with applications

Any experienced teacher of a classical field of mathematics who wishes to publish a new textbook in such an area has to figure out how to present a topic with a long tradition to a new generation of readers. One approach is to present examples that show...
Mathematics & Statistics (J.2...) | Sep 18 20

Adversarial machine learning

Machine learning is behind many of the systems we typically use, both online and offline, and behind even more of the systems we might use in the future. Given their economic importance, they attract attackers who might be interested in interfering with their...
Learning (I.2.6) | Sep 8 20

Artificial intelligence and inclusive education

The recent foray of artificial intelligence (AI) applications into the domain of education has generated both excitement and concern among experts. Artificial intelligence and inclusive education, edited by...
Education (J.1...) | Aug 28 20

Automotive systems and software engineering

From their web profiles: “Yanja Dajsuren is a program director of the PDEng Software Technology program and assistant professor at the Software Engineering and Technology (SET) group, Eindhoven University of Technology...
Software Engineering (D.2) | Nov 4 20

Beginning Azure functions

This interesting book describes getting started with Azure. It includes a substantial tutorial that goes through all the basic steps to create an Azure account. Step-by-step details for creating a first Azure function follow. The book then covers programming with the Azure...
General (D.2.0) | Oct 23 20

Beginning Perl programming

Beginning Perl programming covers the basics of Perl: its origin, scalar variables, array variables, associative array variables, flow control, conditional expressions, basic input/output (I/O), advanced I/O, pattern matching, its utilities, filesystem and process control...
Multiparadigm Languages (D.3.2...) | Oct 22 20

Big data privacy preservation for cyber-physical systems

This monograph gives an introduction to cyber-physical systems (CPS). These are systems that are controlled by computers and influence objects in the physical world. Areas discussed include spectrum trading (where...
Security & Protection (C.2.0...) | Nov 11 20

Cybercryptography: applicable cryptography for cyberspace security

Cybersecurity is a major challenge today, as computing systems and networks play an increasingly important role in modern society. Cryptography addresses this problem based on mathematical theory, trying...
Cryptographic Controls (D.4.6...) | Aug 24 20

Data architecture (2nd ed.)

Showing a perceptible pattern as a line-edited transcript consolidated from one or more slide-based seminars, this book provides many illustrations that would otherwise have been the focus of a presenter’s lecture and interactive session. However, the printed...
Data Warehouse & Repository (H.2.7...) | Jul 31 20

Data-intensive workflow management: for clouds and data-intensive and scalable computing environments

Data-intensive workflows turn up in scientific domains where the most current information technologies find application areas. The “differentia specifica”...
Frameworks (D.3.3...) | Sep 16 20


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2020 ThinkLoud, Inc.
Terms of Use
| Privacy Policy