Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
September 25, 2016
Search
Highlight

Automatic extraction of indicators of compromise for web applications
Small, harmless scripts can help identify compromised websites that have remained undetected for years. By analyzing external components used by attackers to make a compromised page run smoothly, for example JavaScript libraries or scripts to implement visual effects, and... more
Quote
The problem with complex systems like nuclear power plants, the AIDS virus, the economy or the human genome is that we cannot do the kinds of experiments needed to create a reliable... more
- John L. Casti (1997)
Articles
Declarative framework for specification, simulation and analysis of distributed applications: IEEE Transactions on Knowledge and Data Engineering

Distributed applications are normally overlaid on a network of computing elements (nodes). Their specification requires the declaration of each... more

Distributed Applications (C.2.4...) | Sep 23 16

Coupling interactions and performance: predicting team performance from thin slices of conflict: ACM Transactions on Computer-Human Interaction

The basic question is whether the performance of a team can be predicted from a 15-minute observation, a “thin slice” of the... more

User/Machine Systems (H.1.2) | Sep 21 16

Prediction of who will be the next speaker and when using gaze behavior in multiparty meetings: ACM Transactions on Interactive Intelligent Systems

The authors study an issue that, as far as I know, has not been studied in the past: predicting the next speaker and the timing of the start of his or her... more

User/Machine Systems (H.1.2) | Sep 21 16

Computational health informatics in the big data age: a survey: ACM Computing Surveys

Global information and communications technology (ICT) resources have been changing lives; fast networks and mobile devices offer “always-on” services, extending the possibilities of personal... more

Data Mining (H.2.8...) | Sep 21 16

Why designers might want to redesign company processes to get to better UX design: a case study: CHI EA 16

In this paper, the authors summarize the various problems faced by software/user experience (UX) designers in implementing change that on the surface seems like an easy job that has widespread... more

Requirements/Specifications (D.2.1) | Sep 21 16

Topology-aware virtual machine placement in data centers: Journal of Grid Computing

Cloud computing infrastructures, consisting of myriad central processing units (CPUs), storage devices, and network connections, depend heavily on virtualized components. Virtualized... more

Cloud Computing (C.2.4...) | Sep 20 16

Workload characterization: a survey revisited: ACM Computing Surveys

This paper considers the process of characterizing workloads in different kinds of computing services. It starts with a brief discussion of what a workload is and how characterizing workloads leads to better... more

Performance of Systems (C.4) | Sep 20 16

Practical approximate k-nearest neighbor queries with location and query privacy: IEEE Transactions on Knowledge and Data Engineering

Location-based services (LBS) have been used as a Trojan horse to reveal users’ private data. Since they run on mobile applications, individuals can... more

Wireless Communication (C.2.1...) | Sep 20 16

Interactive systems for learning programming at scale: YouTube

Are you designing interactive learning services for teaching programming? Are you curious to explore how to improve the learner’s experience while learning a programming language for the first... more

Computer Science Education (K.3.2...) | Sep 15 16

The grammar of mammalian brain capacity: Theoretical Computer Science

Which aspects of the language faculty are uniquely human, and which are shared with other mammals? In this paper, Rodriguez and Granger try to address this fundamental question from an innovative neuro-computational perspective... more

Language Models (I.2.7...) | Sep 15 16

Books
Data wrangling with Python

“Wrangle” is a new version of an old word that has evolved in some interesting and revealing ways. Originally, wrangle meant to argue or dispute. For example, you might wrangle with your neighbor over a property line. The meaning drifted over time so that one might... more
Python (D.3.2...) | Sep 22 16

REBUTTAL: Improving computer science education

I want to thank the reviewer for this appraisal, which I read with great interest. She rightly said that “we should be concerned with logical thinking and putting the resulting thoughts into practice.” She also rightly added, “word processing, spreadsheets, and databases... more
Computer Science Education (K.3.2...) | Sep 21 16

Trust and communication in a digitized world: models and concepts of trust research

Trust is foundational for all interactions. While one might suppose that digital interactions are inherently disadvantaged in creating trust, the authors demonstrate that this stereotype may not... more
Data Communications (C.2.0...) | Sep 20 16

Enterprise IoT: a definitive handbook

The Internet of Things (IoT), the idea of connecting everything using Internet protocols, is one of the most innovative visions across industries as well as daily life. A wide range of subjects, from tiny sensors to big data analysis, are related to IoT; it is not easy for... more
Internet (C.2.1...) | Sep 20 16

Updating to remain the same: habitual new media

This book can best be described as a semi-poetic media studies rant. It reminded me of some of the works I have read by Marshall McLuhan, most of which I barely understood but some bits of which provided profoundly deep insights. To be honest, when I started... more
General (K.4.0) | Sep 19 16

High performance parallelism pearls

High performance parallelism pearls is a collection of loosely connected chapters, each one containing a discussion about parallelization or optimization of code in a particular scientific field. The book, written by experts in data centers, academia, and... more
Parallel Programming (D.1.3...) | Sep 16 16

Principles and methods of quantum information technologies

Quantum information technologies is the name given to theories and applications of the principles of quantum mechanics as applied to computation and information processing. The former uses the properties of quantum mechanical objects to implement algorithms that... more
Advanced Technologies (B.7.1...) | Sep 16 16

Java precisely

Java is a programming language that has significantly grown in size and complexity since its inception in the ’90s. The mission of Java precisely is to concisely present technical aspects that are reputed difficult. This is particularly relevant since recent additions in the... more
Java (D.3.2...) | Sep 15 16

Situated dialog in speech-based human-computer interaction

Speech-based applications and systems (spoken dialogue and multimodal systems) are actually being implemented for a broad range of domains and applications such as medical applications... more
Interaction Styles (H.5.2...) | Sep 15 16

Cognitive infocommunications (CogInfoCom)

There is general agreement that devices (including computers, robots, and other gadgets) and their interconnection will be increasingly more adaptive and--despite the overuse of the term--“intelligent.” Cognitive infocommunications looks at this... more
Cognitive Simulation (I.2.0...) | Sep 15 16


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2016 ThinkLoud, Inc.
Terms of Use
| Privacy Policy