Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Computer Applications (J) > Computer-Aided Engineering (J.6) > Computer-Aided Design (CAD) (J.6...)  
 
Options:
 
  1-10 of 241 Reviews about "Computer-Aided Design (CAD) (J.6...)": Date Reviewed
  Beginning design for 3D printing
Micallef J.,  Apress, New York, NY, 2015. 428 pp. Type: Book (978-1-484209-47-9)

Six months after having been given a 3D printer as a Christmas present, having not used it even once, I realized I needed something very basic to get me started. I could not keep relying on my teenage son to keep designing everything I needed. Thi...

Aug 8 2016
  The status, challenges, and future of additive manufacturing in engineering
Gao W., Zhang Y., Ramanujan D., Ramani K., Chen Y., Williams C., Wang C., Shin Y., Zhang S., Zavattieri P.  Computer-Aided Design 6965-89, 2015. Type: Article

There has been exponential growth in the field of manufacturing technology with emerging concepts like additive manufacturing (AM). AM is a technique that adds or deposits layers of material to build 3D objects using digital 3D design. According t...

Jul 29 2016
  Security of IoT systems: design challenges and opportunities
Xu T., Wendt J., Potkonjak M.  ICCAD 2014 (Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design, San Jose, CA,  Nov 3-6, 2014) 417-423, 2014. Type: Proceedings, Reviews: (2 of 2)

A security professional considers the small memory sizes of Internet of Things (IoT) systems as physical limitations to security, privacy, communication, computation, and trusted sensing. Security challenges of designing new IoT systems with senso...

Nov 10 2015
  Security of IoT systems: design challenges and opportunities
Xu T., Wendt J., Potkonjak M.  ICCAD 2014 (Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design, San Jose, CA,  Nov 3-6, 2014) 417-423, 2014. Type: Proceedings, Reviews: (1 of 2)

The title of this paper is somewhat misleading. I expected a survey of numerous security techniques for embedded systems, but in reality the authors only explore physical unclonable functions (PUFs), essentially hardware circuits that produce glob...

Sep 29 2015
  Mathematics for computer graphics (4th ed.)
Vince J.,  Springer Publishing Company, Incorporated, London, UK, 2014. 429 pp. Type: Book (978-1-447162-89-6)

Mathematics plays an important role in computer graphics. Knowing the mathematics behind the scene helps us to understand and use all kinds of technologies in the field of computer graphics. It is great to have a book that covers most of the key p...

Aug 5 2014
  LEGO Technic robotics
Rollins M.,  Apress, Berkeley, CA, 2013. 300 pp. Type: Book (978-1-430249-80-1)

Have you ever tried to build a mechanism, able to move as you want, by combining basic elements and bricks? You can of course do this by trying every possible combination, but you might appreciate having some guidelines to make it easier. The inte...

Aug 16 2013
  Finger-based multitouch interface for performing 3D CAD operations
Radhakrishnan S., Lin Y., Zeid I., Kamarthi S.  International Journal of Human-Computer Studies 71(3): 261-275, 2013. Type: Article

Interacting with computers by touching objects (or at least their representations) on a computer display is very appealing, but progress has been hindered by engineering and cost factors until recently. Smartphones, tablets, and similar device...

Aug 14 2013
  Programming finite elements in Java
Nikishkov G.,  Springer Publishing Company, Incorporated, New York, NY, 2010. 402 pp. Type: Book (978-1-848829-71-8)

Finite element analysis is a technique from applied mathematics that is widely used to model stress forces, fluid dynamics, and other mechanical processes. The best thing about this book is that it is good for computer scientists as well as mechan...

Jan 30 2013
  Vehicle surveillance with a generic, adaptive, 3D vehicle model
Leotta M., Mundy J.  IEEE Transactions on Pattern Analysis and Machine Intelligence 33(7): 1457-1469, 2011. Type: Article

The real world and the virtual world are generally considered to be two separate worlds. Leotta and Mundy, however, have changed that. In their paper, they present an approach to track vehicles in surveillance videos based on a virtual computer-ai...

Dec 1 2011
  Mathematics for computer graphics
Vince J.,  Springer, New York, NY, 2010. 312 pp. Type: Book (978-1-849960-22-9)

Many computer graphics students have difficulty understanding and applying the applicable mathematics. The mathematics required for computer graphics does not normally involve calculus, but it can be intense nonetheless. Extensive applications of ...

Sep 29 2010
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy