Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
September 19, 2018
Search
Highlight
Attribute-based access control
In many applications, it becomes a necessity to define who (which user) is allowed to access what (which resource). This is achieved via access control. Several models for access control exist. Attribute-based access control (ABAC) is one of them, and forms the focus of this book, published as part of a National Institute of Standards and Technology (NIST)... more
Quote
It’s hard to conceive offhand of a less promising consumer innovation than a computer that comes factory equipped with “emotions”--but here’s a candidate... more
- David Gelernter (1994)
Articles
Patmos: a time-predictable microprocessor: Real-Time Systems

While general-purpose computing looks for a good average execution time, a vital parameter of real-time/embedded platforms (mission critical applications, like in avionics) is the worst-case execution... more

Microprocessor/computers (C.3...) | Sep 18 18

Using Bayesian network to estimate the value of decisions within the context of value-based software engineering: EASE 18

For longevity, a software company should adopt value-based decision making, in which the focus is on overall value creation rather than the required efforts... more

Types of Systems (H.4.2) | Sep 14 18

A FPGA based implementation of Sobel edge detection: Microprocessors & Microsystems

This paper examines the problem of optimizing the space requirements and latency for a field-programmable gate array (FPGA) implementation of a Sobel edge detection filter... more

Microprocessors/computers (B.7.1...) | Sep 13 18

Toward the robots of science fiction: YouTube

It was a pleasure to watch this presentation about the future of robotics, a hotly debated topic fueled by the controversy between robots defeating humans and robots augmenting and assisting humans, for... more

Robotics (I.2.9) | Sep 12 18

Learning safe multi-label prediction for weakly labeled data: Machine Learning

Many real-world applications involve learning in the presence of multiple labels. For example, in the case of images, a single image may be labeled sky, cloud, or even flower. To make matters more complicated, the dataset... more

Machine Translation (I.2.7...) | Sep 11 18

Complexity and expressive power of weakly well-designed SPARQL: Theory of Computing Systems

The resource description framework (RDF) is a data model standard for the web that represents linked data as subject-predicate-object triples. Such triples can be naturally represented as labeled directed graphs... more

Query Languages (H.2.3...) | Sep 10 18

Configuration analysis and design of a multidimensional tele-operator based on a 3-P(4S) parallel mechanism: Journal of Intelligent and Robotic Systems

Parallel robots that use closed kinematic chains have interesting mechanical properties, such as stiffness, high precision, and good load capacity, at the cost of... more

Robotics (I.2.9) | Sep 7 18

Text and non-text separation in offline document images: a survey: International Journal on Document Analysis and Recognition

This survey on text and no-text separation in images presents a quite complete review (list of references) of image document analysis... more

General (I.7.0) | Sep 7 18

A novel stock recommendation system using Guba sentiment analysis: Personal and Ubiquitous Computing

It’s pretty obvious that if you know what investors are thinking, you can predict what stocks they’ll buy and sell. Stock scams have operated for years on the complement of this thought, that is, attempt to... more

Information Filtering (H.3.3...) | Sep 5 18

Maintaining architecture-implementation conformance to support architecture centrality: ACM Transactions on Software Engineering and Methodology

Software architecture plays a vital role in the life cycle of a software product, whether you follow agile principles or not. Software architectures allow one to... more

Software Architectures (D.2.11) | Sep 4 18

Books
Deception in the digital age

The basis of deception is misdirection: it amounts to making something insignificant seem important, while really relevant things go unnoticed. This strategy is used not only by spammers, crackers, cyber criminals, and cyber terrorists, but also by banks, credit card... more
Abuse & Crime Involving Comp. (K.4.1...) | Sep 14 18

Codes, cryptology and curves with computer algebra

This volume offers a terse, highly formal exposition of the relation between the four subjects named in the title: codes (transformations of a stream of information), cryptology (transformations that seek to hide the original content), curves (specifically... more
Data Encryption (E.3) | Sep 13 18

Introduction to inverse problems for differential equations

Several mathematical problems in science, engineering, and technology are inverse problems. For example, inverse problem theory is often used in heat and mass transfer, imaging, hydrology, oceanography, and so on. In general, inverse problems are ill-posed... more
Inverse Problems (G.1.8...) | Sep 12 18

Complete guide to open source big data stack

Working with big data requires building up a network of services that allows for its effective use. In the scope of open-source systems, the big data stack is composed of open-source applications for understanding big data. The book’s title reveals its main purpose... more
Content Analysis & Indexing (H.3.1) | Sep 6 18

Attribute-based access control

In many applications, it becomes a necessity to define who (which user) is allowed to access what (which resource). This is achieved via access control. Several models for access control exist. Attribute-based access control (ABAC) is one of them, and forms... more
Access Controls (D.4.6...) | Sep 5 18

Dawn of the new everything

Virtual reality (VR) apps with inexpensive smartphone attachments are widely available today, but what would it have been like to obsess over VR long before it was technologically feasible? It would likely have taken a unique character, and Jaron Lanier certainly... more
Artificial, Aug. & Virtual Realities (H.5.1...) | Aug 31 18

Personal assistants

For those of us who have reached a certain age, the term “personal assistant” brings up images of a PalmPilot or something similar. Today, we might think of Cortana or Siri. On the other hand, an increasing concern in developed Western countries is the... more
Robotics (I.2.9) | Aug 30 18

Fuzzy graph theory

Fuzzy graph theory is a recently developed field, and thus many research opportunities exist. This book is a very good and suitable option for readers who wish to either begin or continue their studies in different areas of fuzzy graph theory. The book is divided into... more
Graph Theory (G.2.2) | Aug 24 18

Machine translation

This small book (approximately size A5), part of the Massachusetts Institute of Technology (MIT) Press “Essential Knowledge” series, captures the essence of the machine translation (MT) field, from its origins to the present. As opposed to review books or... more
Machine Translation (I.2.7...) | Aug 20 18

Microservices with Azure

This introductory book on microservices and Microsoft Azure Service Fabric will help readers understand good development practices, that is, using proven architectural patterns to address common architectural challenges associated with the microservices... more
Cloud Computing (C.2.4...) | Aug 17 18


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy