Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search

Select Issue:





Maintaining architecture-implementation conformance to support architecture centrality: ACM Transactions on Software Engineering and Methodology
Software architecture plays a vital role in the life cycle of a software product, whether you follow agile principles or not. Software architectures allow one to...
Software Architectures (D.2.11) | Sep 4 18

An in-vehicle software defined network architecture for connected and automated vehicles:
The expansion of communication networks has made the efficient configuration and management of these networks challenging. Software-defined...
Autonomous Vehicles (I.2.9...) | Sep 4 18

A novel stock recommendation system using Guba sentiment analysis: Personal and Ubiquitous Computing
It’s pretty obvious that if you know what investors are thinking, you can predict what stocks they’ll buy and sell. Stock scams have operated for years on the complement of this thought, that is, attempt to...
Information Filtering (H.3.3...) | Sep 5 18

Configuration analysis and design of a multidimensional tele-operator based on a 3-P(4S) parallel mechanism: Journal of Intelligent and Robotic Systems
Parallel robots that use closed kinematic chains have interesting mechanical properties, such as stiffness, high precision, and good load capacity, at the cost of an increasing complexity in designing and solving...
Robotics (I.2.9) | Sep 7 18

Text and non-text separation in offline document images: International Journal on Document Analysis and Recognition
This survey on text and no-text separation in images presents a quite complete review (list of references) of image document analysis, including printed and handwritten texts. The authors present tables...
General (I.7.0) | Sep 7 18

Complexity and expressive power of weakly well-designed SPARQL: Theory of Computing Systems
The resource description framework (RDF) is a data model standard for the web that represents linked data as subject-predicate-object triples. Such triples can be naturally represented...
Query Languages (H.2.3...) | Sep 10 18

Learning safe multi-label prediction for weakly labeled data: Machine Learning
Many real-world applications involve learning in the presence of multiple labels. For example, in the case of images, a single image may be labeled sky, cloud, or even flower. To make matters more complicated...
Machine Translation (I.2.7...) | Sep 11 18

Toward the robots of science fiction:
It was a pleasure to watch this presentation about the future of robotics, a hotly debated topic fueled by the controversy between robots defeating humans and robots augmenting and assisting humans, for...
Robotics (I.2.9) | Sep 12 18

A FPGA based implementation of Sobel edge detection: Microprocessors & Microsystems
This paper examines the problem of optimizing the space requirements and latency for a field-programmable gate array (FPGA) implementation of a Sobel edge detection filter...
Microprocessors And Microcomputers (B.7.1...) | Sep 13 18

Using Bayesian network to estimate the value of decisions within the context of value-based software engineering:
For longevity, a software company should adopt value-based decision making, in which the focus is on overall value creation rather than the required efforts...
Types Of Systems (H.4.2) | Sep 14 18




Attribute-based access control

In many applications, it becomes a necessity to define who (which user) is allowed to access what (which resource). This is achieved via access control. Several models for access control exist. Attribute-based access control (ABAC) is one of them, and forms...
Access Controls (D.4.6...) | Sep 5 18

Complete guide to open source big data stack

Working with big data requires building up a network of services that allows for its effective use. In the scope of open-source systems, the big data stack is composed of open-source applications for understanding big data. The book’s title reveals its main purpose...
Content Analysis And Indexing (H.3.1) | Sep 6 18

Introduction to inverse problems for differential equations

Several mathematical problems in science, engineering, and technology are inverse problems. For example, inverse problem theory is often used in heat and mass transfer, imaging, hydrology, oceanography, and so on. In general, inverse problems are ill-posed...
Inverse Problems (G.1.8...) | Sep 12 18

Codes, cryptology and curves with computer algebra

This volume offers a terse, highly formal exposition of the relation between the four subjects named in the title: codes (transformations of a stream of information), cryptology (transformations that seek to hide...
Data Encryption (E.3) | Sep 13 18

Deception in the digital age

The basis of deception is misdirection: it amounts to making something insignificant seem important, while really relevant things go unnoticed. This strategy is used not only by spammers, crackers, cyber criminals, and cyber terrorists, but also by banks, credit card...
Abuse And Crime Involving Computers (K.4.1...) | Sep 14 18

Once upon an algorithm

Martin Erwig emphasizes the general nature of computation and the use of computer science (CS) in this book. He uses well-known stories to explain computing concepts to readers not familiar with the field. The book’s two parts cover several topics that are then...
General (F.2.0) | Sep 21 18


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy