Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
Misc

View:



Testing extended finite state machines using NSGA-III : A-TEST 19

The goal of the paper is to describe how the non-dominated sorting genetic algorithm III (NSGA-III) algorithm generates test suites from extended finite-state machines (EFSMs). Each generated test...
General (D.2.0) | Nov 19 20

A survey of tool-supported assurance case assessment techniques : ACM Computing Surveys

Assurance case assessment techniques find application in the study of complex system reliability and safety, for example, nuclear reactors, energy systems, aircraft, and so on. As the authors state, "significant research...
Introductory And Survey (A.1) | Mar 1 21

A survey on food computing : ACM Computing Surveys

The authors have written an extensive survey of the published literature related to food computing. The survey is about 26 pages long, with an additional ten pages of (about 300) references. The authors...
Image Databases (H.2.8...) | Nov 27 20

A systematic review on cloud testing : ACM Computing Surveys

In this survey paper, using over 150 selected articles between 2012 and 2017, the authors develop a framework to classify cloud testing research and to identify research trends and gaps in this area. The authors define six primary motivating...
General (D.2.0) | Jan 28 21

Orchestrating big data analysis workflows in the cloud : ACM Computing Surveys

When processing different big data workflows, many new and (so far) unknown patterns and performance requirements are visible. We are forced to search new processing models and...
Cloud Computing (C.2.4...) | Mar 2 21

Survey on combinatorial register allocation and instruction scheduling : ACM Computing Surveys

Compilers use heuristic algorithms to quickly produce inexact solutions for register assignment (assigning values to central processing unit [CPU] registers) and instruction scheduling (ordering instructions for...
Quadratic Programming Methods (G.1.6...) | Jan 26 21

Probabilistic policy reuse for safe reinforcement learning : ACM Transactions on Autonomous and Adaptive Systems

Human and robot planners seek safe and optimal action plans. Learning to adapt good examples, such as the ones provided by a teacher, is an effective way to speed up action planning and can be used to start...
Learning (I.2.6) | Dec 17 20

Self-awareness in software engineering: a systematic literature review : ACM Transactions on Autonomous and Adaptive Systems

As researchers in the field of distributed software systems, the authors feel as though software self-awareness is becoming more and more...
General (D.2.0) | Jan 29 21

Adaptive architecture and personal data : ACM Transactions on Computer-Human Interaction

This paper focuses on the implications of sensors embedded in buildings to make the buildings responsive to people. An important issue is privacy. One reason these privacy issues are...
Architecture (J.5...) | Nov 20 20

ELSA: a multilingual document summarization algorithm based on frequent itemsets and latent semantic analysis : ACM Transactions on Information Systems

“You shall know a word by the company it keeps” is perhaps the most famous quotation attributed to J. R. Firth [1]. Searching for ways to...
Database Applications (H.2.8) | Nov 16 20



5G enabled secure wireless networks

Wireless 5G networks are widely deployed and, compared to previous generations, carry vastly augmented data flows with low latency. Thus, their security and privacy aspects warrant special attention [1], even if a vast number of standards have...
Security & Protection (C.2.0...) | Jan 15 21

An introduction to compressed sensing

Compressed sensing has emerged as a key technology in the signal processing area. This disruptive technique has found applications in many real-life problems. We know from the classical Nyquist-Shannon theorem that a signal can be recovered perfectly from a set of uniformly...
General (G.0) | Feb 4 21

Artificial intelligence and judicial modernization

Artificial intelligence (AI) has been an important branch of computer science for more than three decades. AI has found applications in games like chess, natural language processing (NLP), robotics, social media, and so on. Several countries deploy AI in electronic...
General (I.2.0) | Feb 19 21

C++17 standard library quick reference (2nd ed.)

This book is not intended for those wishing to learn C++. It assumes readers are familiar with C++ syntax and semantics. Readers that satisfy this knowledge requirement will find the book accessible and well organized. Readers proficient in other languages...
Object-Oriented FDL (H.2.3...) | Feb 1 21

Computer security and the Internet

Paul C. van Oorschot is a master who has made many diverse contributions to computer system security (very much including systems connected by the Internet), from applied cryptography to system usability. This range is a strength of the book: while it is...
Security & Protection (K.6.5) | Jan 6 21

Computer security and the Internet

Security is a hot, yet tough, topic these days. Computer security, in a broad sense, spans several interdisciplinary areas. It is sometimes difficult to identify good literature, both to grasp the essential ideas and to be able to teach them. This excellent book covers several useful...
Security & Protection (K.6.5) | Jan 4 21

Critical, transdisciplinary and embodied approaches in STEM education

This book presents a challenge similar to The White Room Challenge TV show on HGTV. How can teachers add more color, dimension, and depth to today’s traditional classrooms and educational experiences, which Rip Van...
Computer Science Education (K.3.2...) | Dec 8 20

Cyber operations (2nd ed.)

People have been trying to secure data communications networks against attack for decades. By providing instruction on how to attack and exploit a network, O’Leary helps the reader understand how to build in hardened security protection at the design and construction stage...
Security & Protection (K.6.5) | Dec 7 20

Cybersecurity in Nigeria

Many of us have received a message from a “Nigerian prince” or a supposed “friend” in Nigeria. The first one involves an inheritance that the scammer needs to give out right away; in the second, said friend is asking for help with funds because they are stuck in Nigeria with no...
Government (J.1...) | Feb 11 21

Deep learning approaches to text production

Curiosity in natural language production (or generation) does not seem to be going away. Newer frameworks and newer approaches, with some of them causing paradigm shifts, are helping the cause. Through this book, Shashi Narayan...
Learning (I.2.6) | Feb 23 21


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2021 ThinkLoud, Inc.
Terms of Use
| Privacy Policy