Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
February 28, 2020

Tools and weapons: the promise and the peril of the digital age
Digital technology is both a sword and a plowshare. It is disruptive both in positive and negative ways, often at the same time. This book is a superbly written assembly of stories describing how Microsoft, often in partnership with other technology companies and governmental... more
Mathematics have been called many things. Among others, the queen of the sciences and the hand-maiden of the sciences. Therefore, while there seems to be some doubt regarding its... more
- John D. Williams (1966)
Zooming in on wide-area latencies to a global cloud provider: SIGCOMM 19

The authors measure wide area network (WAN) latency from the viewpoint of a large cloud provider, Azure, by tracking the round-trip time (RTT) of transmission control protocol (TCP) connections. Presenting... more

Cloud Computing (C.2.4...) | Feb 27 20

Hack for hire: Communications of the ACM

Attackers continue to seek account numbers and password information in order to compromise the bank and credit card accounts of customers. Understanding how hackers obtain user information can help enterprises install adequate security measures and save... more

Security & Protection (K.6.5) | Feb 27 20

Visual SLAM and structure from motion in dynamic environments: a survey: ACM Computing Surveys

Reconstructing an environment’s 3D models is traditionally a computer vision problem, crucial for virtual reality (VR) applications and mobile robots that have to estimate the pose of the camera... more

Reconstruction (I.4.5) | Feb 26 20

Discrete geodesic nets for modeling developable surfaces: ACM Transactions on Graphics

Developable surfaces are those that can be flattened to the plane isometrically, that is, without stretching or tearing. They play an important role in manufacturing and architecture, for... more

General (I.0) | Feb 25 20

Automatically learning semantic features for defect prediction: ICSE 16

Have data? Try teaching a machine. Any problem space that has a large amount of data is just asking for someone to apply machine learning to find a solution. Defect detection is one such domain. With... more

Debugging Aids (D.2.5...) | Feb 25 20

Explaining explanations in AI: FAT* 19

Everyone agrees that artificial intelligence (AI) should be explainable; there is even an abbreviation for this: xAI. But opinions differ on what it means. This paper is a survey of different approaches to xAI. Ideally, AI systems should provide fully transparent... more

General (I.0) | Feb 21 20

Protecting sensory data against sensitive inferences: W-P2DS 18

The paper’s description of a framework for mobile devices to block private information from going to apps includes the problem definition, components, and related experimental results. Section 1... more

General (I.0) | Feb 20 20

A framework for privacy-preserving data publishing with enhanced utility for cyber-physical systems: ACM Transactions on Sensor Networks

I recently did research on cyber-physical systems (CPSs) based on sensors that collect data about the humans who are wearing them... more

General (H.2.0) | Feb 19 20

Known and unknown facts of LoRa: ACM Transactions on Sensor Networks

Proposal and critique are two steps in the evolution of scientific theories and ideas: an idea is founded in a proposal and advanced via critiques. In the Internet of Things (IOT), equilibrium among power... more

General (C.2.0) | Feb 18 20

Deep neural networks classification over encrypted data: CODASPY 19

When we speak about a convolutional neural network (CNN) as a more complex deep learning algorithm, there are privacy-preserving issues that could be addressed in any study on the topic. In deep... more

Neural Nets (C.1.3...) | Feb 13 20

Quantum computing for everyone

Ever wonder if there is a way to understand quantum computing using only a modest extension of high school mathematics (no complex numbers, no eigenvectors, no Fourier transform)? Look no further. Professor Chris Bernhardt introduces the main topics in a simple... more
Systems & Information Theory (H.1.1) | Feb 27 20

Pro Python 3: features and tools for professional development (3rd ed.)

This is an excellent book aimed at intermediate-level programmers already familiar with basic Python. The book aims to take these programmers to the next level by encouraging good habits and by examining... more
Python (D.3.2...) | Feb 26 20

Project management theory and practice (3rd ed.)

It is a great pleasure to review the third edition of this valuable book, especially after reviewing its first edition in 2012 [1]. Comprehensively designed and restructured, this latest edition offers more knowledge and professional value for the project... more
General (K.6.0) | Feb 24 20

Early computing in Britain: Ferranti Ltd. and government funding, 1948 - 1958

For Britain at least, this volume addresses how computing transitioned as a technological innovation to become a commercial product. The innovative manufacturing company Ferranti Ltd. produced... more
History of Computing (K.2) | Feb 24 20

Professional red teaming: conducting successful cybersecurity engagements

Technical books about red teaming, or ethical hacking in general, run the risk of being outdated by the time they get published. New threats will have occurred, for example, making the attack specifics invalid... more
Security & Protection (K.6.5) | Feb 20 20

Computing and the National Science Foundation, 1950 - 2016

The National Science Foundation (NSF) is foundational to modern computing, and this organizational history incorporates oral histories and NSF documents to describe how NSF programs began and grew to become the... more
History of Computing (K.2) | Feb 20 20

The Haskell school of music: from signals to symphonies

Music and mathematics have been linked since the ancient Greeks, and computing can be seen as a constructive variant of mathematics. So it is no surprise that music applications were among the first... more
Music (J.5...) | Feb 19 20

VoIP technology: applications and challenges

Many of us are familiar with voice over Internet protocol (VoIP) technology, having replaced our traditional landline telephones with VoIP phones connected through a data network. Modern routers are often equipped with analog sockets so users can plug their existing... more
Network Protocols (C.2.2) | Feb 18 20

The software arts

Is the current approach to computing education wrong? The author of this book claims it should focus more strongly on its roots in the liberal arts. The book traces these roots and examines several central tenets of computing in this light. The introductory chapter... more
Computer Science Education (K.3.2...) | Feb 18 20

Grokking deep learning

Deep learning is a hot topic in artificial intelligence (AI). It is exciting to see a book that can help readers understand the ideas of deep learning without advanced knowledge of mathematics. The book is divided into 16 chapters. Chapter 1 presents the basic ideas of deep... more
Neural Nets (C.1.3...) | Feb 14 20

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2020 ThinkLoud, Inc.
Terms of Use
| Privacy Policy