Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help


Testing extended finite state machines using NSGA-III : A-TEST 19

The goal of the paper is to describe how the non-dominated sorting genetic algorithm III (NSGA-III) algorithm generates test suites from extended finite-state machines (EFSMs). Each generated test...
General (D.2.0) | Nov 19 20

Credulous acceptability, poison games and modal logic : AAMAS 19

Abstract argumentation theory is based on the notion that argument x attacks argument y. A set of arguments S is “admissible” if no arguments within the set attack each other, and for every argument y that attacks an argument...
Modal Logic (F.4.1...) | Sep 30 20

A survey on deep learning: algorithms, techniques, and applications : ACM Computing Surveys

Deep learning (DL) algorithms, characterized by mapping from input to output (labels or classes) with multiple hidden layers in between, have revived the excitement of artificial intelligence...
Learning (I.2.6) | Oct 16 20

A survey on food computing : ACM Computing Surveys

The authors have written an extensive survey of the published literature related to food computing. The survey is about 26 pages long, with an additional ten pages of (about 300) references. The authors...
Image Databases (H.2.8...) | Nov 27 20

Probabilistic policy reuse for safe reinforcement learning : ACM Transactions on Autonomous and Adaptive Systems

Human and robot planners seek safe and optimal action plans. Learning to adapt good examples, such as the ones provided by a teacher, is an effective way to speed up action planning and can be used to start...
Learning (I.2.6) | Dec 17 20

Hierarchies in inclusion logic with lax semantics : ACM Transactions on Computational Logic

A natural interest of computational logic is to investigate decidable subsets of first-order logic. One such subset is the formalism of inclusion logic (FOI), introduced by Galliani as an evolution of dependence logic [1]...
General (F.0) | Oct 1 20

Adaptive architecture and personal data : ACM Transactions on Computer-Human Interaction

This paper focuses on the implications of sensors embedded in buildings to make the buildings responsive to people. An important issue is privacy. One reason these privacy issues are...
Architecture (J.5...) | Nov 20 20

Systematically ensuring the confidence of real-time home automation IoT systems : ACM Transactions on Cyber-Physical Systems

The quick expansion of computing technology in many areas leads to different new paradigms; among them is the paradigm of...
Real-Time & Embedded Systems (D.4.7...) | Oct 13 20

Scratchpad-memory management for multi-threaded applications on many-core architectures : ACM Transactions on Embedded Computing Systems

This paper focuses on improving many-core architectures via software programmable or scratchpad memory (SPM): An SPM contains an array of...
Real-Time And Embedded Systems (C.3...) | Oct 7 20

ELSA: a multilingual document summarization algorithm based on frequent itemsets and latent semantic analysis : ACM Transactions on Information Systems

“You shall know a word by the company it keeps” is perhaps the most famous quotation attributed to J. R. Firth [1]. Searching for ways to...
Database Applications (H.2.8) | Nov 16 20

5G enabled secure wireless networks

Wireless 5G networks are widely deployed and, compared to previous generations, carry vastly augmented data flows with low latency. Thus, their security and privacy aspects warrant special attention [1], even if a vast number of standards have...
Security and Protection (C.2.0...) | Jan 15 21

Automotive systems and software engineering

From their web profiles: “Yanja Dajsuren is a program director of the PDEng Software Technology program and assistant professor at the Software Engineering and Technology (SET) group, Eindhoven University of Technology...
Software Engineering (D.2) | Nov 4 20

Beginning Azure functions

This interesting book describes getting started with Azure. It includes a substantial tutorial that goes through all the basic steps to create an Azure account. Step-by-step details for creating a first Azure function follow. The book then covers programming with the Azure...
General (D.2.0) | Oct 23 20

Beginning Perl programming

Beginning Perl programming covers the basics of Perl: its origin, scalar variables, array variables, associative array variables, flow control, conditional expressions, basic input/output (I/O), advanced I/O, pattern matching, its utilities, filesystem and process control...
Multiparadigm Languages (D.3.2...) | Oct 22 20

Big data privacy preservation for cyber-physical systems

This monograph gives an introduction to cyber-physical systems (CPS). These are systems that are controlled by computers and influence objects in the physical world. Areas discussed include spectrum trading (where...
Security & Protection (C.2.0...) | Nov 11 20

Computer security and the Internet

Paul C. van Oorschot is a master who has made many diverse contributions to computer system security (very much including systems connected by the Internet), from applied cryptography to system usability. This range is a strength of the book: while it is...
Security & Protection (K.6.5) | Jan 6 21

Computer security and the Internet

Security is a hot, yet tough, topic these days. Computer security, in a broad sense, spans several interdisciplinary areas. It is sometimes difficult to identify good literature, both to grasp the essential ideas and to be able to teach them. This excellent...
Security & Protection (K.6.5) | Jan 4 21

Critical, transdisciplinary and embodied approaches in STEM education

This book presents a challenge similar to The White Room Challenge TV show on HGTV. How can teachers add more color, dimension, and depth to today’s traditional classrooms and educational experiences, which Rip Van...
Computer Science Education (K.3.2...) | Dec 8 20

Cyber operations (2nd ed.)

People have been trying to secure data communications networks against attack for decades. By providing instruction on how to attack and exploit a network, O’Leary helps the reader understand how to build in hardened security protection at the design and construction stage...
Security & Protection (K.6.5) | Dec 7 20

Deep learning for NLP and speech recognition

As has happened in other applied domains, deep learning has revolutionized natural language processing (NLP) systems, from speech recognition to neural machine translation. In 2017, Yoav Goldberg provided an easy-to-read overview of the (then) current...
Natural Language Processing (I.2.7) | Dec 22 20

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2021 ThinkLoud, Inc.
Terms of Use
| Privacy Policy