Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
Misc

View:



A survey of tool-supported assurance case assessment techniques : ACM Computing Surveys

Assurance case assessment techniques find application in the study of complex system reliability and safety, for example, nuclear reactors, energy systems, aircraft, and so on. As the...
Introductory And Survey (A.1) | Mar 1 21

A systematic review on cloud testing : ACM Computing Surveys

In this survey paper, using over 150 selected articles between 2012 and 2017, the authors develop a framework to classify cloud testing research and to identify research trends and gaps in this area. The authors define six primary motivating...
General (D.2.0) | Jan 28 21

Applications of distributed ledger technologies to the Internet of Things: a survey : ACM Computing Surveys

If you have ever wondered how the Internet of Things (IoT)--the interconnection of physical and virtual things through existing and evolving communication...
Distributed Programming (D.1.3...) | Mar 22 21

Modeling information retrieval by formal logic: a survey : ACM Computing Surveys

As the title indicates, formal logic is used for modeling information retrieval (IR). Readers can expect a literature review (of IR models), supported with graphs, mathematical formulas, and examples that...
Retrieval Models (H.3.3...) | Apr 12 21

Orchestrating big data analysis workflows in the cloud : ACM Computing Surveys

When processing different big data workflows, many new and (so far) unknown patterns and performance requirements are visible. We are forced to search new processing models and...
Cloud Computing (C.2.4...) | Mar 2 21

Survey on combinatorial register allocation and instruction scheduling : ACM Computing Surveys

Compilers use heuristic algorithms to quickly produce inexact solutions for register assignment (assigning values to central processing unit [CPU] registers) and instruction scheduling (ordering instructions for...
Quadratic Programming Methods (G.1.6...) | Jan 26 21

Data-parallel structural optimisation in agent-based models : ACM SIGEVOlution

Modeling is a tool for studying a natural phenomenon. The accuracy of such a model depends on how well the model mimics the behavior of the system under study. The modeling of phenomena in ecology...
Multiagent Systems (I.2.11...) | Apr 16 21

Smart dispatching in heterogeneous systems : ACM SIGMETRICS Performance Evaluation Review

For modern computing platforms, heterogeneous processing nodes are the reality. Moreover, most traditional job assignment algorithms, which are designed for homogeneous systems, are not...
Performance Evaluation (H.3.4...) | Mar 31 21

Recognizing weak embeddings of graphs : ACM Transactions on Algorithms

The paper begins: “A continuous piecewise linear map ϕ : GM is a weak embedding if, for every ε > 0, ψε : GM with ||ϕ-ψε|| < ε.” The norm mentioned here is the uniform norm. The authors identify the...
Graph Theory (G.2.2) | Mar 12 21

Assessing neural network scene classification from degraded images : ACM Transactions on Applied Perception

One of the major problems faced by deep learning techniques--for example, deep convolutional neural networks (CNNs)--is uncontrolled behavior...
General (I.4.0) | Mar 23 21



5G enabled secure wireless networks

Wireless 5G networks are widely deployed and, compared to previous generations, carry vastly augmented data flows with low latency. Thus, their security and privacy aspects warrant special attention [1], even if a vast number of standards have...
Security & Protection (C.2.0...) | Jan 15 21

Algorithm design with Haskell

Algorithm design with Haskell is sectioned into six major parts, covering a multitude of topics and algorithms. There are too many individual topics to highlight in this review; however, as a programming lecturer, these few were of particular interest to me: timing, sorting...
Haskell (D.3.2...) | Mar 5 21

An introduction to compressed sensing

Compressed sensing has emerged as a key technology in the signal processing area. This disruptive technique has found applications in many real-life problems. We know from the classical Nyquist-Shannon theorem that a signal can be recovered perfectly from a set of uniformly...
General (G.0) | Feb 4 21

Artificial intelligence and judicial modernization

Artificial intelligence (AI) has been an important branch of computer science for more than three decades. AI has found applications in games like chess, natural language processing (NLP), robotics, social...
General (I.2.0) | Feb 19 21

C++17 standard library quick reference (2nd ed.)

This book is not intended for those wishing to learn C++. It assumes readers are familiar with C++ syntax and semantics. Readers that satisfy this knowledge requirement will find the book accessible and well organized. Readers proficient in other languages...
Object-Oriented FDL (H.2.3...) | Feb 1 21

Carl Adam Petri

Every computer scientist studies Petri nets in their early academic years. Petri nets are a powerful yet very intuitive modeling tool for concurrent and distributed systems. Such networks were introduced by Carl Adam Petri (1926-2010) in his PhD thesis, in 1962, and from that...
Petri Nets (D.2.2...) | Mar 25 21

Computer security and the Internet

Paul C. van Oorschot is a master who has made many diverse contributions to computer system security (very much including systems connected by the Internet), from applied cryptography to system usability. This range is a strength of the book: while it is...
Security & Protection (K.6.5) | Jan 6 21

Computer security and the Internet

Security is a hot, yet tough, topic these days. Computer security, in a broad sense, spans several interdisciplinary areas. It is sometimes difficult to identify good literature, both to grasp the essential ideas and to be able to teach them. This excellent book covers several useful...
Security & Protection (K.6.5) | Jan 4 21

Cybersecurity in Nigeria

Many of us have received a message from a “Nigerian prince” or a supposed “friend” in Nigeria. The first one involves an inheritance that the scammer needs to give out right away; in the second, said friend is asking for help with funds because they are stuck in Nigeria with no...
Government (J.1...) | Feb 11 21

Data-centric business and applications: evolvements in business information processing and management (vol. 2)

Data-centric business and applications are successful because they are based on historical, real-time, and predictive data, which provide insight into the behavior and minds of...
Information Systems Applications (H.4) | Apr 5 21


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2021 ThinkLoud, Inc.
Terms of Use
| Privacy Policy