Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
July 16, 2018
Search
Highlight

On the logos: a naïve view on ordinary reasoning and fuzzy logic
There are many books that you read to get answers to questions and doubts, and there are few books that leave you with more questions and doubts than before reading them. Yet, you can still be satisfied with such books because they give you the idea of the exciting dynamism of science, which... more
Quote
There is no doubt that the large computer systems can effectively handle information as data. But the development of even the most sophisticated paper pushing. If, as I believe, the nature of... more
- Victor Rosenberg (1974)
Articles
Maximizing polynomials subject to assignment constraints: ACM Transactions on Algorithms

This paper considers “the q-adic assignment problem.” Fix a number q (originally q=2), and suppose we are given, for some number n, a 2q-dimensional array of costs cu,v where u and v are q-tuples of indices... more

Algorithm Design & Analysis (G.4...) | Jul 13 18

Semantics-based analysis of content security policy deployment: ACM Transactions on the Web

Security is one of the biggest concerns in digital societies. Without reasonable levels of security, people will never really embrace the use of technology for tasks that they consider... more

Security (K.4.4...) | Jul 11 18

Mechanising and verifying the WebAssembly specification: CPP 18

Formal verification has had many successful applications to industry standards over the last few years, but an important question is whether formal verification can be included in standard design efforts. This paper... more

Semantics of Programming Lang. (F.3.2) | Jul 11 18

Comparative analysis of ellipsoidal methods for distributed data fusion: IMCOM 18

In multisensor systems, the fusion of information from multiple sensors can be done globally or locally in distributed “fusion centers.” The distributed approach has advantages in reliability, fault tolerance... more

Distributed Systems (C.2.4) | Jul 11 18

Seamless virtual network for international business continuity in presence of intentional blocks: ACM Transactions on Internet Technology

It is an accepted fact that international borders are vulnerable and permeable when it comes to information technology. This is why international businesses... more

Network Management (C.2.3...) | Jul 10 18

Unifying computing resources and access interface to support parallel and distributed computing education: Journal of Parallel and Distributed Computing

Parallel and distributed computing is a great solution in the modern systems world. The important issue when teaching parallel and... more

General (K.3.0) | Jul 10 18

Computing semantic similarity of concepts in knowledge graphs: IEEE Transactions on Knowledge and Data Engineering

Semantic similarity expresses the commonality among concepts; therefore, it may play a critical role in a wide range of computational applications. The... more

Measurements (D.4.8...) | Jul 9 18

Event summarization for sports games using Twitter streams: World Wide Web

The Wall Street Journal recently published an article by Jason Gay titled “How Twitter Rules the NBA” [1]. It contends that the National Basketball Association (NBA) is heavily linked to social media, especially Twitter. This newspaper... more

World Wide Web (WWW) (H.3.4...) | Jul 9 18

An effective characterization of the alternation hierarchy in two-variable logic: ACM Transactions on Computational Logic

Many interesting properties of words can be described in a first-order language with variables (x, y, ...) for positions and two basic properties: x < y (meaning that x is to the left of y) and Qax (meaning that letter... more

Formal Languages (F.4.3) | Jul 6 18

Discovering and understanding Android sensor usage behaviors with data flow analysis: World Wide Web

From 2008 to 2018, the use of mobile apps has grown exponentially, reaching more than 3.8 million apps in Google’s Play Store and two million apps in... more

World Wide Web (WWW) (H.3.4...) | Jul 6 18

Books
Mathematical grammar of biology

It is common knowledge that the code of life is represented by strings consisting of four letters (A, T, C, and G), and the names of Watson and Crick are often referenced to represent the scientific efforts that made understanding the genetic code possible. Leaving aside the... more
Biology & Genetics (J.3...) | Jul 13 18

Models of computation

Any formal definition of a language has to clearly specify its syntax (a grammatical specification that in some way fixes the structure of well-formed statements) and semantics (the manner in which meaning is assigned to well-formed statements). To these one may also... more
Models of Computation (F.1.1) | Jul 13 18

Deception in the digital age

The book’s ten chapters provide background on deception techniques and then examples linked to cyber deception. The introduction, “Cyberanthropology of Deception,” shows that deception is an old tactic, with evidence dating back to 2500 BCE. Examples... more
Abuse & Crime Involving Comp. (K.4.1...) | Jul 12 18

The Python 3 standard library by example (2nd ed.)

The power and capabilities of a modern computer programming language are often found in the libraries associated with the language. Python is no exception. Python’s standard library is a large body of modules and... more
Python (D.3.2...) | Jul 12 18

Business process management cases: digital innovation and business transformation in practice

As the title promises, this book contains case descriptions and case studies. The introductory chapter tries to provide a framework and editorial guidelines for describing cases from business process... more
Business (J.1...) | Jul 12 18

Deception in the digital age

Psychology and sociology may be surpassing technology as the key to online deception. This book reminds me of the old adage that access through personal interaction is often more effective than other techniques in espionage. While not always true, there is a strong... more
Abuse & Crime Involving Comp. (K.4.1...) | Jul 11 18

Introduction to deep learning using R: a step-by-step guide to learning and implementing deep learning models using R

This is the era of machine intelligence. The domain of machine learning, and in particular deep learning, has evolved rapidly, and we have started to develop and use real-life applications from this evolution. The... more
Statistical Computing (G.3...) | Jul 11 18

Introduction to learning classifier systems

In the preface, Introduction to learning classifier systems presents itself as an introductory textbook for undergraduate or graduate students, as well as for practitioners. The scope of the is encompassing, and its brevity splendid. Learning classifier systems... more
Learning (I.2.6) | Jul 11 18

Computing highly oscillatory integrals

Even though the numerical computation of integrals is a topic that has been investigated for many centuries, current textbooks have failed to describe certain facets in detail. One of these missing areas is the special case of when the integrand oscillates rapidly. Deaño... more
Quad. & Numerical Differentiation (G.1.4) | Jul 10 18

Probability and computing (2nd ed.)

Probability in computer science plays the same role as in physics: while there is a large corpus of theories and methodologies based on a purely deterministic underpinning, the introduction of probability opens the door to a vast field of new theories, methods, and related... more
Probabilistic Algorithms (G.3...) | Jul 10 18


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy