Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
July 17, 2018
Search
Highlight

On the logos: a naïve view on ordinary reasoning and fuzzy logic
There are many books that you read to get answers to questions and doubts, and there are few books that leave you with more questions and doubts than before reading them. Yet, you can still be satisfied with such books because they give you the idea of the exciting... more
Quote
The world began without the human race and it will end without it. The institutions, manners, and customs which I shall have spent my life in cataloguing and trying to... more
- Claude Livi-Strauss (1955)
Articles
Maximizing polynomials subject to assignment constraints: ACM Transactions on Algorithms

This paper considers “the q-adic assignment problem.” Fix a number q (originally q=2), and suppose we are given, for some number n, a 2q-dimensional array of costs cu,v where u and v are q-tuples of indices... more

Algorithm Design & Analysis (G.4...) | Jul 13 18

Semantics-based analysis of content security policy deployment: ACM Transactions on the Web

Security is one of the biggest concerns in digital societies. Without reasonable levels of security, people will never really embrace the use of technology for tasks that they consider... more

Security (K.4.4...) | Jul 11 18

Mechanising and verifying the WebAssembly specification: CPP 18

Formal verification has had many successful applications to industry standards over the last few years, but an important question is whether formal verification can be included in standard design efforts. This paper... more

Semantics of Programming Lang. (F.3.2) | Jul 11 18

Comparative analysis of ellipsoidal methods for distributed data fusion: IMCOM 18

In multisensor systems, the fusion of information from multiple sensors can be done globally or locally in distributed “fusion centers.” The distributed approach has advantages in reliability, fault tolerance... more

Distributed Systems (C.2.4) | Jul 11 18

Seamless virtual network for international business continuity in presence of intentional blocks: ACM Transactions on Internet Technology

It is an accepted fact that international borders are vulnerable and permeable when it comes to information technology. This is why international businesses... more

Network Management (C.2.3...) | Jul 10 18

Unifying computing resources and access interface to support parallel and distributed computing education: Journal of Parallel and Distributed Computing

Parallel and distributed computing is a great solution in the modern systems world. The important issue when teaching parallel and... more

General (K.3.0) | Jul 10 18

Computing semantic similarity of concepts in knowledge graphs: IEEE Transactions on Knowledge and Data Engineering

Semantic similarity expresses the commonality among concepts; therefore, it may play a critical role in a wide range of computational applications. The... more

Measurements (D.4.8...) | Jul 9 18

Event summarization for sports games using Twitter streams: World Wide Web

The Wall Street Journal recently published an article by Jason Gay titled “How Twitter Rules the NBA” [1]. It contends that the National Basketball Association (NBA) is heavily linked to social media, especially... more

World Wide Web (WWW) (H.3.4...) | Jul 9 18

An effective characterization of the alternation hierarchy in two-variable logic: ACM Transactions on Computational Logic

Many interesting properties of words can be described in a first-order language with variables (x, y, ...) for positions and two basic properties: x < y (meaning that x is to the left of y) and Qax (meaning that letter... more

Formal Languages (F.4.3) | Jul 6 18

Discovering and understanding Android sensor usage behaviors with data flow analysis: World Wide Web

From 2008 to 2018, the use of mobile apps has grown exponentially, reaching more than 3.8 million apps in Google’s Play Store and two million apps in Apple’s App Store, followed... more

World Wide Web (WWW) (H.3.4...) | Jul 6 18

Books
Troublemakers

Berlin’s compelling volume is distinguished by an engaging writing style. Her chronological history of the Valley is punctuated by personal insights about the principals. As effective and engaging as the author is, though, it is the nuggets of humor, oddities... more
History of Computing (K.2) | Jul 17 18

Guide to data structures: a concise introduction using Java

Data structures seem to be the bane of every computer science (CS) undergraduate’s education. Thus, a good data structures text aimed at undergraduates is a necessity. Even though relatively few programmers actually implement data structures (as... more
Data Structures (E.1) | Jul 16 18

Deep learning with Python: a hands-on introduction

This book is written specifically for Python programmers who wish to learn how to apply their Python programming skills to machine learning applications. Consequently, a very brief introduction to... more
Learning (I.2.6) | Jul 16 18

Deception in the digital age

We are living in a very digitally connected world. An unwanted consequence is that each one of us who uses a computer, smartphone, tablet, or even smart TV could be targeted by individuals or groups who want to influence our beliefs and behaviors or gain... more
Abuse & Crime Involving Comp. (K.4.1...) | Jul 16 18

Nim in action

Among the newer programming languages, Nim has managed to distinguish itself on its own merits without any corporate support. Andreas Rumpf released the first Nim compiler written in Nim (then known as Nimrod) in 2008. Nim is open source; both development... more
General (D.1.0) | Jul 16 18

Mathematical grammar of biology

It is common knowledge that the code of life is represented by strings consisting of four letters (A, T, C, and G), and the names of Watson and Crick are often referenced to represent the scientific efforts that made understanding the genetic code possible... more
Biology & Genetics (J.3...) | Jul 13 18

Models of computation

Any formal definition of a language has to clearly specify its syntax (a grammatical specification that in some way fixes the structure of well-formed statements) and semantics (the manner in which meaning is assigned to well-formed statements). To these one may also... more
Models of Computation (F.1.1) | Jul 13 18

The Python 3 standard library by example (2nd ed.)

The power and capabilities of a modern computer programming language are often found in the libraries associated with the language. Python is no exception. Python’s standard library is a large body of modules and... more
Python (D.3.2...) | Jul 12 18

Deception in the digital age

The book’s ten chapters provide background on deception techniques and then examples linked to cyber deception. The introduction, “Cyberanthropology of Deception,” shows that deception is an old tactic, with evidence dating back to 2500 BCE. Examples... more
Abuse & Crime Involving Comp. (K.4.1...) | Jul 12 18

Business process management cases: digital innovation and business transformation in practice

As the title promises, this book contains case descriptions and case studies. The introductory chapter tries to provide a framework and editorial guidelines for describing cases from business process... more
Business (J.1...) | Jul 12 18


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy