Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
View:  Show:    

Hardware (B)
Fifty years of P vs. NP and the possibility of the impossible : Communications of the ACM

The P versus NP problem is one of the most fundamental and well-known unresolved questions in computer science. In comparison with the 2009 Communications article by the same...
Algorithms (B.2.4...) | Jun 27 22

A review on virtual reality and augmented reality use-cases of brain computer interface based applications for smart cities : Microprocessors & Microsystems

Current computing and user interface technologies permit increasingly direct connections between the human brain and computers. The technologies include various types of displays, such as traditional...
Input/Output Devices (B.4.2) | Feb 2 23

Computer Systems Organization (C)
One-hop out-of-band control planes for multi-hop wireless sensor networks : ACM Transactions on Sensor Networks

Wireless sensor networks (WSNs) have expanded in the last decade. Sensors are deployed in an environment to control the data generated within that area, without any wiring...
General (C.0) | Jan 26 23

Securing communication data in pervasive social networking based on trust with KP-ABE : ACM Transactions on Cyber-Physical Systems

This paper looks at the crucial issues of security, user privacy, and communication integrity, inherent to the pervasive social networking (PSN) (a cyber-physical social system for nearby...
General (C.2.0) | Apr 28 22

AI-based computer vision using deep learning in 6G wireless networks : Computers and Electrical Engineering

The development of sixth-generation (6G) wireless networks is expected to revolutionize the way we use the Internet and handle data. This new network will offer faster speeds, better security, and more...
Wireless Communication (C.2.1...) | Mar 22 23

TSLAM: A trust-enabled self-learning agent model for service matching in the cloud market : ACM Transactions on Autonomous and Adaptive Systems

Cloud services and cloud computing in general have experienced explosive growth. Undoubtedly it is easier for users, even sophisticated ones, to leave the...
Cloud Computing (C.2.4...) | Feb 15 22

Data storage auditing service in cloud computing : World Wide Web

Cloud computing provides a convenient, scalable, and cost-effective data storage solution that is particularly attractive to small organizations who lack internal information technology (IT) resources. However, this new solution also...
Cloud Computing (C.2.4...) | Feb 7 22

Software (D)
SARDE: a framework for continuous and self-adaptive resource demand estimation : ACM Transactions on Autonomous and Adaptive Systems

Reliable performance estimation of complex software systems requires models that are adaptable to the system’s environment and workload. Grohmann...
General (D.0) | Apr 6 22

On the model of computation: counterpoint: parallel programming wall and multicore software spiral: denial hence crisis : Communications of the ACM

Vishkin’s counterpoint to Dally [1] talks about what the model of computation should now be in light of multicore processors (and their programming difficulties) and parallel processing. His view...
General (D.1.0) | Jan 24 23

On the model of computation: point: we must extend our model of computation to account for cost and location : Communications of the ACM

The model of any process demonstrates its functionality and is useful for its study and analysis. For example, the Turing machine is a model for computation. However, the random-access machine (RAM) model is...
General (D.1.0) | Jan 23 23

Software (D)

Clean craftsmanship: disciplines, standards, and ethics

At first, computer programming was reserved for highly skilled people. Over the decades, programming languages have become more and more user friendly, making them accessible to more people. Nowadays, several countries around the world are...
General (D.0) | Sep 21 22

The language of SQL

Structured query language (SQL) allows programmers to interact with a data repository through a relational database management system (RDBMS). The language of SQL is divided into 20 easy chapters. It also includes three appendices about installing and running...
General (D.3.0) | Dec 23 22

Numerical methods using Java: for data science, analysis, and engineering

It is fairly safe to say that most scientific, mathematical, and engineering software has been written in Fortran or C/C++. Libraries of software implementing algorithms have been written and distributed in these languages. The “Numerical Recipes” series by Press et al...
Java (D.3.2...) | Dec 6 22

Embracing modern C++ safely

Embracing modern C++ safely is for professionals involved in large-scale projects using the C++ programming language. It describes various safe, conditionally safe, and unsafe features in C++11 and C++14. Each feature covered includes...
C++ (D.3.2...) | Oct 3 22

Functional interfaces in Java: fundamentals and examples

Functional programming is a programming paradigm that emphasizes the use of functions to break down a problem into subtasks. Everything is done with functions, and the building blocks are just functions. This is in contrast to other paradigms, such as...
Java (D.3.2...) | Sep 27 22

Data (E)

On the epistemology of data science: conceptual tools for a new inductivism

This book discusses the fundamental theory of data science, including its methods, validity, and scope. The author introduces and addresses key concepts of data science as an inductive methodology, in an appropriate order, in order to guide scientists and...
General (E.0) | Feb 7 23

Social big data analytics: practices, techniques, and applications

Thanks to the advances in wireless sensor communication, large-scale storage, and computing technologies, those who can afford to be in one or more of the available platforms--the Internet, WhatsApp, or Twitter, to name a few--are connected directly (or at most...
General (E.0) | Nov 8 22

Discovery of ill-known motifs in time series data

Today, as we are drowning in data, we desperately need bits of dry land where we can climb out of the information ocean and gain useful perspectives. The book under review provides one such vantage point, and anyone whose work involves finding patterns in...
Coding & Information Theory (E.4) | Oct 11 22

Theory Of Computation (F)

Quantum computing: an applied approach (2nd ed.)

Quantum computing is a new paradigm of computing that comes from an idea proposed, in the 1980s, by the Nobel Prize winning physicist Richard Feynman. Based on the principles of quantum mechanics, such as the superposition and entanglement of particles...
General (F.0) | Feb 3 23

A quantum computation workbook

Quantum computing is a complex and highly interdisciplinary field that assumes deep knowledge of particle physics, quantum mechanics theory, mathematics, and information theory, to name the most important disciplines outside the also essential...
Models of Computation (F.1.1) | Jan 30 23

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2023 ThinkLoud®
Terms of Use
| Privacy Policy