Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Conferences Tutorials
 
VLSI Routing Arrays Validation Optimization Verification
 
Neural nets RISC/CISC,VLIW architectures Distributed architectures Portable devices Servers Network architecture Distributed systems
 
Networks Security Embedded systems Object-oriented Java OO design State diagrams Software evolution UML C# Methodologies Coding Tools Correctness proofs Design
 
Structures Arrays Graphs Stacks Hash-tables Encryption Compression Objects Standards
 
Automata Parallelism Transforms Geometric Algorithms Patterns Invariants
 
Numerical Linear Algebra PDEs Finite element methods Combinatorics Graph Theory Probability and statistics Mathematical software
 
Human factors Data models Systems Information interfaces User interfaces Ergonomics Evaluation/methodology Interaction styles Warehouses Data mining Web Digital libraries
 
AI Expert systems Knowledge representation Learning Robotics Vision Geometry and modeling Graphics and realism Scene analysis Simulation theory Document preparation Learning Discrete event simulation Deduction Robotics Video analysis XML
 
Business Engineering Biosciences Humanities Arts Linguistics CAD Publishing
 
Privacy Regulation Systems design Security Crime Patents Strategic planning
 
Design Human factors Languages Performance Theory
 
 
Reviews limited to
Date Reviewed
 
 
Three bits suffice: explicit support for passive measurement of Internet latency in QUIC and TCP
De Vaere P., Bühler T., Kühlewind M., Trammell B.  IMC 2018 (Proceedings of the Internet Measurement Conference 2018, Boston, MA, 22-28, 2018. Type: Proceedings
Jun 17 2019
 
 
Understanding image representations by measuring their equivariance and equivalence
Lenc K., Vedaldi A.  International Journal of Computer Vision 127(5): 456-476, 2019. Type: Article
Jun 17 2019
 
 
Cyber-physical security and privacy in the electric smart grid
McMillin B., Roth T., Bertino E.,  Morgan&Claypool Publishers, 2017. 66 pp. Type: Book (978-1-681731-03-2)
Jun 14 2019
 
 
Empirically-based secure OS design
Weber S., Shostack A., Solworth J., Zurko M.  NSPW 2017 (Proceedings of the 2017 New Security Paradigms Workshop, Santa Cruz, CA,  Oct 1-4, 2017) 90-93, 2017. Type: Proceedings
Jun 13 2019
 
 
A comparative study on two XML editors (Oxygen and UltraEdit)
Li Y., Chau K., Wei Z., Kang Q.  ICCSP 2019 (Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, Kuala Lumpur, Malaysia,  Jan 19-21, 2019) 284-287, 2019. Type: Proceedings
Jun 12 2019
 
  more..    
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy