Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Conferences Tutorials
VLSI Routing Arrays Validation Optimization Verification
Neural nets RISC/CISC,VLIW architectures Distributed architectures Portable devices Servers Network architecture Distributed systems
Networks Security Embedded systems Object-oriented Java OO design State diagrams Software evolution UML C# Methodologies Coding Tools Correctness proofs Design
Structures Arrays Graphs Stacks Hash-tables Encryption Compression Objects Standards
Automata Parallelism Transforms Geometric Algorithms Patterns Invariants
Numerical Linear Algebra PDEs Finite element methods Combinatorics Graph Theory Probability and statistics Mathematical software
Human factors Data models Systems Information interfaces User interfaces Ergonomics Evaluation/methodology Interaction styles Warehouses Data mining Web Digital libraries
AI Expert systems Knowledge representation Learning Robotics Vision Geometry and modeling Graphics and realism Scene analysis Simulation theory Document preparation Learning Discrete event simulation Deduction Robotics Video analysis XML
Business Engineering Biosciences Humanities Arts Linguistics CAD Publishing
Privacy Regulation Systems design Security Crime Patents Strategic planning
Design Human factors Languages Performance Theory
Reviews limited to
Date Reviewed
Three bits suffice: explicit support for passive measurement of Internet latency in QUIC and TCP
De Vaere P., Bühler T., Kühlewind M., Trammell B.  IMC 2018 (Proceedings of the Internet Measurement Conference 2018, Boston, MA, 22-28, 2018. Type: Proceedings
Jun 17 2019
Understanding image representations by measuring their equivariance and equivalence
Lenc K., Vedaldi A.  International Journal of Computer Vision 127(5): 456-476, 2019. Type: Article
Jun 17 2019
Cyber-physical security and privacy in the electric smart grid
McMillin B., Roth T., Bertino E.,  Morgan&Claypool Publishers, 2017. 66 pp. Type: Book (978-1-681731-03-2)
Jun 14 2019
Empirically-based secure OS design
Weber S., Shostack A., Solworth J., Zurko M.  NSPW 2017 (Proceedings of the 2017 New Security Paradigms Workshop, Santa Cruz, CA,  Oct 1-4, 2017) 90-93, 2017. Type: Proceedings
Jun 13 2019
A comparative study on two XML editors (Oxygen and UltraEdit)
Li Y., Chau K., Wei Z., Kang Q.  ICCSP 2019 (Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, Kuala Lumpur, Malaysia,  Jan 19-21, 2019) 284-287, 2019. Type: Proceedings
Jun 12 2019
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy