Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
View:  Show:    

General Literature (A)
A survey of tool-supported assurance case assessment techniques : ACM Computing Surveys

Assurance case assessment techniques find application in the study of complex system reliability and safety, for example, nuclear reactors, energy systems, aircraft, and so on. As the...
Introductory And Survey (A.1) | Mar 1 21

Hardware (B)
Compiling with continuations, or without? Whatever. : Proceedings of the ACM on Programming Languages

The front end of a compiler analyzes a computer program’s source code and parses it into an intermediate representation (IR). The back end then takes this IR and translates it into machine code...
General (B.0) | Dec 16 20

Computer Systems Organization (C)
Data-driven model-based detection of malicious insiders via physical access logs : ACM Transactions on Modeling and Computer Simulation

Employees with security clearance will perhaps continue to pose the ultimate security threat to businesses, organizations...
Security & Protection (C.2.0...) | Mar 8 21

Orchestrating big data analysis workflows in the cloud : ACM Computing Surveys

When processing different big data workflows, many new and (so far) unknown patterns and performance requirements are visible. We are forced to search new processing models and...
Cloud Computing (C.2.4...) | Mar 2 21

Software (D)
Applications of distributed ledger technologies to the Internet of Things: a survey : ACM Computing Surveys

If you have ever wondered how the Internet of Things (IoT)--the interconnection of physical and virtual things through existing and evolving communication...
Distributed Programming (D.1.3...) | Mar 22 21

Tapir: embedding recursive fork-join parallelism into LLVM’s intermediate representation : ACM Transactions on Parallel Computing

A typical compiler has a front end that analyzes the source text and converts it to a language-independent IR whose structure and operations support...
Parallel Programming (D.1.3...) | Feb 22 21

Coding-data portability in systematic literature reviews: a W3C’s open annotation approach : EASE 19

Systematic literature reviews (SLRs) involve several steps: the planning step, which identifies the scope of literature according to the research goals, and develops a coding protocol; the analysis step, which...
Software Engineering (D.2) | Apr 9 21

An analysis of inheritance hierarchy evolution : EASE 19

This is a refreshing paper on ten open-source systems and their use of “inheritance” programing concepts. Computer languages have evolved with the type-safe extensibility concept of inheritance, which is embodied in OO patterns...
General (D.2.0) | Apr 13 21

Parallel cost analysis : ACM Transactions on Computational Logic

In this paper, the authors present “static cost analysis for distributed systems that exploits the parallelism among distributed locations to infer a more precise estimation of the parallel cost.” Such a parallel...
General (D.2.0) | Apr 2 21

CPS design with learning-enabled components: a case study : RSP 19

Cyber-physical systems (CPSs) integrate hardware/software components with mechanical/electronic equipment to operate in applications for robotics, avionics, smart grids, and the like. This paper presents a case study for...
General (D.2.0) | Mar 29 21

General Literature (A)

Diversity in visualization

Diversity in visualization is a small book, spanning 88 pages (nine chapters plus references and editor/author bios). Yet it is very surprising, in a very good sense. The book is the result of "observations ... based on the analysis of data about the IEEE VIS family of...
General (A.0) | Feb 26 21

Hardware (B)

Mastering frequency domain techniques for the stability analysis of LTI time delay systems

Time delay systems are ubiquitous. They are found in controllers of all sorts, where information from sensors may undergo a delay (perhaps computational) before being used as control inputs. Some systems...
General (B.0) | Jan 8 21

Computer Systems Organization (C)

5G enabled secure wireless networks

Wireless 5G networks are widely deployed and, compared to previous generations, carry vastly augmented data flows with low latency. Thus, their security and privacy aspects warrant special attention [1], even if a vast number of standards have...
Security & Protection (C.2.0...) | Jan 15 21

Software (D)

Reflections on programming systems

The book’s ten chapters may remind readers that the essential state of affairs in programming systems has not substantially changed since the early 1960s. Chapter 1--an overview of what follows--starts with a relatively familiar epigraph, published in 1968: “Today we...
Software Architectures (D.2.11) | Jan 21 21

Carl Adam Petri

Every computer scientist studies Petri nets in their early academic years. Petri nets are a powerful yet very intuitive modeling tool for concurrent and distributed systems. Such networks were introduced by Carl Adam Petri (1926-2010) in his PhD thesis, in 1962, and from that...
Petri Nets (D.2.2...) | Mar 25 21

Modern Fortran explained

First introduced in 1957, FORTRAN was designed to be easier than an assembler language for writing algebraic equations on a computer. In this, FORTRAN was spectacularly successful. More than 60 years later, Fortran (officially renamed since Fortran 90)...
Fortran (D.3.2...) | Mar 19 21

Essential C# 8.0 (7th ed.)

This book describes the C#, a general-purpose programming language used in the commercial world. The book has a very detailed explanation of various language constructs. The constructs are explained with code listings and their background concepts. The...
C# (D.3.2...) | Mar 11 21

Algorithm design with Haskell

Algorithm design with Haskell is sectioned into six major parts, covering a multitude of topics and algorithms. There are too many individual topics to highlight in this review; however, as a programming lecturer, these few were of particular interest to me: timing, sorting...
Haskell (D.3.2...) | Mar 5 21

Foundations of information security: a straightforward introduction

Like the subtitle suggests, this book is a gentle introduction to the subject of information security. It doesn’t assume any special background from the reader other than an understanding of the basic...
Cryptographic Controls (D.4.6...) | Feb 2 21

Stochastic geometry

In the era BC (“before computers”), the standard way to reason about geometric objects, dating back to Euclid, was a logical proof system based on axioms. This approach is symbolic, dealing with entities such as points and lines. It leverages human spatial...
Stochastic Analysis (D.4.8...) | Apr 13 21

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2021 ThinkLoud, Inc.
Terms of Use
| Privacy Policy