Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
January 26, 2020
Search
Highlight

On the impact of programming languages on code quality: a reproduction study
E. W. Dijkstra’s classic A discipline of programming [1] has rightly achieved the sort of permanent validity that mathematician G. H. Hardy spoke of in his famous A mathematician’s apology [2]. Dijkstra’s preface explains--to the satisfaction of many computing scientists... more
Quote
We can make some rough estimates of the amount by which computer technology can increase our ability to find and utilize information... more
- Douglas S. Robertson (1998)
Articles
Self-healing UI: UIST 19

Compared to living things like animals or plants, today’s electronic devices are quite fragile. Even minor “injuries” render them incapacitated, or limit their functionality. Sometimes they can be repaired, although this requires intervention by skilled and motivated humans... more

User Interfaces (D.2.2...) | Jan 23 20

Predicting students’ final degree classification using an extended profile: Education and Information Technologies

Student retention is of great concern to higher education institutions, and a higher dropout rate may be reflected in the university’s reputation. Extensive studies have attempted to... more

General (K.3.0) | Jan 21 20

Research on LRU optimal division method considering comprehensive cost of development and maintenance: CSAE 19

Efforts can be made to reduce life cycle costs and improve equipment availability. This is not only an issue of (company) low-maintenance costs and high availability, but can also be a big challenge... more

Modeling Methodologies (I.6.5...) | Jan 17 20

ELSA: a multilingual document summarization algorithm based on frequent itemsets and latent semantic analysis: ACM Transactions on Information Systems

Multi-document summarization involves the automatic generation of concise summaries of a number of textual documents, with the goal of succinctly... more

Database Applications (H.2.8) | Jan 16 20

Semi-automatic safety analysis and optimization: DAC 18

Model-based development (MBD) has been widely used in software development for a long time, and software models are increasingly used in the field of safety analysis. This paper presents a new approach to... more

Engineering (J.2...) | Jan 15 20

Modular product programs: ACM Transactions on Programming Languages and Systems

Some properties of programs are not about a single run of the program; instead, they relate multiple runs. For example, a program is deterministic if, given the same input, two... more

Formal Methods (D.2.4...) | Jan 14 20

An effective and versatile distance measure for spatiotemporal trajectories: Data Mining and Knowledge Discovery

With the increasing accumulation of spatial temporal path data, such as in the truck and cab datasets considered here, the need for effective path... more

Data Mining (H.2.8...) | Jan 9 20

Internet of Things: information security challenges and solutions: Cluster Computing

The Internet of Things (IoT) has gained tremendous popularity over the years, allowing objects to be connected without intervention from humans. While this has opened up many... more

Security, Integrity & Protection (H.2.0...) | Jan 9 20

How might we increase system trustworthiness?: Communications of the ACM

With the ever-increasing number of vulnerabilities and threats against systems and networks, one would wonder the best way to make systems more... more

General (H.0) | Jan 8 20

An analysis of performance evolution of Linux’s core operations: SOSP 19

The GNU Linux operating system (OS) has become, for better or worse, the dominant OS for computer science (CS) research, for deploying large-scale Internet/cloud infrastructures and supercomputers, as well as... more

Linux (D.4.0...) | Jan 6 20

Books
Passive network synthesis: an approach to classification

This interesting and technically oriented book was written for an audience with some advanced knowledge and understanding of passive networks and network synthesis. The authors have tried to convey the latest... more
Logic Design (B.6) | Jan 24 20

Wandering towards a goal: how can mindless mathematical laws give rise to aims and intention?

Since 2008, the Foundational Questions Institute has sponsored an annual essay competition. This volume offers the 17 best submissions to the contest that ran from December 2016 to March 2017. The’... more
General (G.0) | Jan 24 20

A people’s history of computing in the United States

From 1965 to 1975, if you were to ask someone in the field what was going on in computing, you would likely get one of two answers. People in business data processing would point to the dominance of... more
History of Computing (K.2) | Jan 24 20

Coders

Programmers are among the most influential people who are quietly changing the world. Software is an inseparable part of human life in this modern world, and programmers are tinkering with programs, continuously influencing a specific set of people and sometimes all of... more
General (K.7.0) | Jan 23 20

Simplicity is complex: foundations of cyber-physical system design

First of all, I must say that this is a very good book. However, it did not captivate me, as I expected something different based on the subtitle. The book exposes exactly what the subtitle indicates... more
General (D.2.0) | Jan 23 20

From urban legends to political fact-checking: online scrutiny in America, 1990-2015

In this fascinating five-chapter book, the authors discuss the history of online scrutiny in the US from 1990 to 2015. They review some basic frameworks of online communication; examine the role of... more
History of Computing (K.2) | Jan 21 20

Taming uncertainty

Dealing with uncertainty lies at the heart of what it means to be human. Every day we use limited information to make decisions on the basis of predicted future events, which are themselves shrouded in uncertainty. While many of the decisions we make are often banal (for... more
Social & Behavioral Sciences (J.4) | Jan 21 20

Artificial psychology: psychological modeling and testing of AI systems

According to the authors, Dan Curtis proposed artificial psychology as a theoretical discipline in 1963 (p. 164). During the 56 years since, it can be expected to have broadly expanded in both complexity... more
Psychology (J.4...) | Jan 17 20

Sweetie 2.0: using artificial intelligence to fight webcam child sex tourism

Webcam-related child sexual abuse, an emerging crime of the 21st century, involves perpetrators using digital media to commit offenses. Adequate amendments to substantive criminal and procedural criminal... more
Law (J.1...) | Jan 17 20

Oceanographic analysis with R

This book is about using state-of-the-art software--in this case, the R language--to solve oceanographic problems. The use of computer software in this field is relatively new. Oceanography, the study of the physical and biological aspects of the ocean, clearly dates... more
Earth & Atmospheric Sciences (J.2...) | Jan 16 20


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2020 ThinkLoud, Inc.
Terms of Use
| Privacy Policy