Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help

Select Issue:

Hall of shame & fame:
If you are looking for an inspired paper about computer programming, you should read this one. The authors skillfully discuss pedagogical patterns dedicated to object-oriented programming in higher-level courses of computer science (CS). The hall of fame is a...
Computer Science Education (K.3.2...) | Jan 3 18

Hiding the metadata in communication systems:
Security and privacy are two critical concerns in today’s mobile world, especially with regard to the Internet, social networking, and communications systems such as chat systems and messaging. Great strides have been made in the area of really strong cryptography...
Data Mining (H.2.8...) | Jan 3 18

There’s a creepy guy on the other end at Google!: Information Retrieval
Mental models in youth are deeply explored in this paper that investigates the ways in which students (aged 10-14) mentally visualize the inner workings of the Google search engine. The authors delve...
Computer Uses in Education (K.3.1) | Jan 4 18

Detecting cooperative and organized spammer groups in micro-blogging community: Data Mining and Knowledge Discovery
Public relations (PR) companies hire and pay cooperative and organized spammer groups to post specific content on online microblogging...
Social Networking (H.3.4...) | Jan 4 18

ARMISCOM: Service Oriented Computing and Applications
The evolution of service-oriented architecture (SOA) and the demands from industry provide opportunity on one hand, and requirements on the other--to develop fault-tolerant, robust, and resilient configurations of...
Fault-Tolerance (D.4.5...) | Jan 4 18

When it comes to software engineering, it is not new that industry plays an important (if not the most important) role in leveraging innovation in the field. But it is also true that some innovations lack a...
Data Mining (H.2.8...) | Jan 4 18

Security for the robot operating system: Robotics and Autonomous Systems
This paper is one of the few reported studies on the security of robotic operating systems. As such, it has clear value to make robotic system designers and users aware of the...
Robotics (I.2.9) | Jan 8 18

Location detection and disambiguation from Twitter messages: Journal of Intelligent Information Systems
Imagine Twitter as a location-based service that helps businesses and other organizations to act according to the location data from Twitter messages. Maybe it sounds strange or impossible, but it is a reality...
Data Mining (H.2.8...) | Jan 8 18

Designing a semantic model for a wide-spectrum language with concurrency: Formal Aspects of Computing
A concurrent wide-spectrum language combines a concurrent programming language with specification constructs. Colvin et al. provide a unified framework for defining the...
Concurrency (D.4.1...) | Jan 10 18

Robust adaptive neural network-based trajectory tracking control approach for nonholonomic electrically driven mobile robots: Robotics and Autonomous Systems
This is not your casual weekend read. We are hearing over and over this year that artificial intelligence (AI) is finally “taking over the world.” Maybe or maybe...
Autonomous Vehicles (I.2.9...) | Jan 10 18

Multimodal interaction with W3C standards

With computing machinery (for example, the Internet of Things [1] and virtual reality [2]) rapidly penetrating the consumer market, human-computer interaction is rapidly becoming an outdated paradigm and...
Interaction Styles (H.5.2...) | Jan 2 18

Big data of complex networks

Big data is currently one of the hottest topics in every field. With the advances of computing and networking and with more complex human interactions and activities, big data can only become bigger and more important. How to tame this ever-growing beast...
Database Applications (H.2.8) | Jan 3 18

Harmonies of disorder

Norbert Wiener was one of the great geniuses of the 20th century. Harmonies of disorder is a brilliant biography that carefully details every aspect of Wiener’s background and contributions without using any equations, making it accessible to general...
Biographies/Autobiographies (A.0...) | Jan 3 18

Working with coders

On the very first page of chapter 1, Gleeson provides a callout with the simple but profound observation: “Building software is nothing like building a house.” Software development is a tricky process...
General (D.1.0) | Jan 3 18

Practical LXC and LXD

Virtualized environments, both virtual machines (VMs) and containers, have become the essential technologies of elastic cloud computing services. System administrators of such services frequently encounter Linux-based virtualization, in particular...
Real-Time & Embedded Systems (D.4.7...) | Jan 3 18

Spatial network big databases

Spatial network big data (SNBD) can be widely found in every corner of modern society. Examples include temporally detailed road maps that provide car speeds every minute for every road segment and GPS trace data from our cell phones. SNBD features the...
Spatial Databases & GIS (H.2.8...) | Jan 4 18

Phrase mining from massive text and its applications

The extraction of what the authors call “quality phrases” from text is the topic of discussion in this monograph. To get an idea of what is meant by “quality” for a phrase, consider the three-word phrase “relational...
Data Mining (H.2.8...) | Jan 4 18

Cybersecurity for industry 4.0

Industry 4.0 is a term that describes what is often called the fourth industrial revolution. The first three were mechanization, mass production, and computers and automation. The fourth is the cyber-physical...
Security & Protection (K.6.5) | Jan 4 18

Perl 6 fundamentals

We have been hearing about Perl 6 for some 15 years, but I have yet to meet anyone who actually uses it. The author observes that Perl 6 differs significantly from Perl 5, but he believes that it offers advantages in regular expression operations and Unicode support that more than...
General (D.1.0) | Jan 5 18

Basic graph theory

Graph theory is a branch of discrete mathematics that has numerous theoretical and practical applications in a wide variety of areas. In this book, the author presents the fundamental concepts and terminology of graph theory in a simple, straightforward, and effective...
Graph Theory (G.2.2) | Jan 9 18

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy