Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
October 18, 2017
Search
Highlight

#Indigenous: tracking the connective actions of Native American advocates on Twitter
Today, social movements are more prevalent than ever. Individuals use multiple social media platforms to organize their voices, which turn into political actions. In some ways, these online social movements are more powerful than face-to-face interactions. Where society once... more
Quote
The difference between tolerable programmer[s] and great programmer[s] is not how many programming languages they know. [...] It’s whether they can communicate their ideas... more
- Joel Spolsky (2005)
Articles
Class confessions: restorative properties in online experiences of socioeconomic stigma: CHI 17

Since modern society provides more opportunities for those with college and university degrees, the number of applications to most prestigious colleges... more

Group & Organization Interfaces (H.5.3) | Oct 16 17

An efficient schedulability analysis for optimizing systems with adaptive mixed-criticality scheduling: Real-Time Systems

Mixed-criticality (MC) systems are of particular interest today. The adaptive scheduling of tasks on such systems attracts a lot of attention because of the complexity of the activity due to the high number of... more

Optimization (G.1.6) | Oct 16 17

Fast rendezvous on a cycle by agents with different speeds: Theoretical Computer Science

Feinerman et al. provide illustrations concerned with the usefulness of different processing speeds and asynchrony of tasks of the operating agents in distributed computing... more

Heterogeneous (Hybrid) Systems (C.1.3...) | Oct 16 17

Spatiotemporal-MIMO channel estimator and beamformer for 5G: IEEE Transactions on Wireless Communications

The foundation of the ideas in this paper dates back to the 1980s, with investigations about the locus and properties of sensor array manifolds to find... more

Wireless Communication (C.2.1...) | Oct 13 17

What technological features are used in smartphone apps that promote physical activity? A review and content analysis: Personal and Ubiquitous Computing

A systematic review of the use of mobile technology to promote physical activity is proposed in this paper. The number of apps aimed at healthcare available in commercial stores is strongly and constantly... more

Social Networking (H.3.4...) | Oct 12 17

Knowledge graph for TCM health preservation: Artificial Intelligence in Medicine

This paper introduces a knowledge graph for traditional Chinese medicine (TCM) health preservation. TCM plays a vital role in Chinese culture. With the development of information technology... more

Graph & Tree Search Strategies (I.2.8...) | Oct 12 17

Towards authentication using multi-modal online activities: UbiComp 17

Authentication is an important aspect of day-to-day life. This paper shows the accuracy of activity-based authentication (ABA) for 1000 users accessing Yahoo! Japan websites. The authors claim this... more

Authentication (K.6.5...) | Oct 5 17

Fog computing for sustainable smart cities: a survey: ACM Computing Surveys

Fog computing attempts to bring the computational capabilities of clouds closer to the variety of devices that make up the Internet of Things (IoT) by creating local mini-clouds. It appears to be a very promising... more

General (I.2.0) | Oct 5 17

Partial evaluation of string obfuscations for Java malware detection: Formal Aspects of Computing

Cyber security has become a major concern in government, industry, and academia and in the everyday lives of individuals. How we secure our information systems and maintain the privacy... more

Partial Evaluation (F.3.2...) | Oct 2 17

A tool for xMAS-based modeling and analysis of communication fabrics in Simulink: ACM Transactions on Modeling and Computer Simulation

Because of the programmability challenge of timing-based hardware description languages (HDL) involving Verilog and VHDL, today many higher-level... more

Performance Analysis & Design Aids (B.2.2) | Sep 27 17

Books
Incidental exposure to online news

This is a very short book--really more of a monograph at less than 90 pages, including front pieces, table of contents, bibliography, and index. It aims to examine the patterns of how people stumble... more
Multimedia Information Systems (H.5.1) | Oct 17 17

Complex systems: relationships between control, communications and computing

This collection of papers primarily discusses the complexities of control systems; communication and computing are discussed as more minor topics. It includes five loosely coupled parts. Prior to Part1, it starts with a... more
Network Architecture & Design (C.2.1) | Oct 16 17

Security-aware design for cyber-physical systems: a platform-based approach

Our daily life and the objects that surround us are becoming more and more intertwined in networks of computers and algorithms, in a manner so pervasive that often we fail to appreciate how much we... more
Security & Protection (C.2.0...) | Oct 13 17

4G: LTE-Advanced Pro and the road to 5G (3rd ed.)

Long-term evolution (LTE) and 4G are the state of the art in mobile telecommunications, and the latest in a three-decade journey of technological innovation and development. We have moved from voice-centric systems with 1G and 2G, to mobile broadband... more
Wireless Communication (C.2.1...) | Oct 12 17

Advanced persistent security

Winkler and Gomes define “advanced persistent security” as “defense in depth” (multilayered attack protection) that is enhanced by a comprehensive methodology for integrating attack detection capabilities and proactively implementing and executing an... more
Security & Protection (K.6.5) | Oct 12 17

Introduction to computer networking

Gigabit Ethernet? That’s the same as fast Ethernet, with faster clock speeds, isn’t it? Actually it’s not; depending on the physical media, there may be differences in encoding schemes and signaling logic levels. This book is full of interesting information like that, with concise details about each variant of the technology... more
General (C.2.0) | Oct 12 17

Simulating prehistoric and ancient worlds

Regardless of location of archaeological finds--royal tombs to refuse dumps--questions of how the people who left objects lived persist among both professionals and interested laypeople. If written records have been preserved, much of the guesswork is eliminated... more
Simulation Support Systems (I.6.7) | Oct 11 17

Nine steps to success (3rd ed.)

Executive management is becoming increasingly aware of their obligations to shareholders, partners, customers, and regulators to ensure that their organizations are defended against, and can recover from, cyber attack. Cyber security threats are... more
System Management (K.6.4) | Oct 10 17

Kalman filtering (5th ed.)

Kalman filtering (KF) is a wide class of algorithms designed, in words selected from this outstanding book, “to obtain an optimal estimate” of the state of a system from information in the presence of noise. Applications of KF were, by 1980, endemic to the aerospace... more
Kalman Filtering (I.4.4...) | Oct 9 17

MATLAB machine learning

Machine learning, a branch of artificial intelligence (AI) research, is accelerating human-machine interactions in this developing world. MATLAB is a mathematical tool aiding in such interactions. This book presents MATLAB implementation in machine learning. This book consists of 12 chapters grouped into two parts... more
Matlab (G.4...) | Oct 6 17


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy