Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
December 18, 2018

Data-driven concurrency for high performance computing
Fine-grained dataflow computing creates circumstances that technologies, particularly hardware technologies, have difficulty handling. However, techniques like coarsening computational grain and substituting software for hardware, as described in this paper, can help realize the... more
It has become a matter of course to us that even basic research in the field of nuclear physics is top secret nowadays, and that our laboratories are financed by the military... more
- J. Robert Oppenheimer (1964)
A pattern language for scalable microservices-based systems: ECSA 18

Identifying and codifying scalability issues across microservices-based distributed systems is challenging. This paper provides “a preliminary list of microservices architecture patterns” and “a principled patterns... more

Software Architectures (D.2.11) | Dec 14 18

Integrity-verifiable conjunctive keyword searchable encryption in cloud storage: International Journal of Information Security

Nowadays, data is becoming more and more confidential and sensitive, hence the growing need for encryption. But once data is encrypted, so are the keywords needed to search for it. So people... more

Data Encryption (E.3) | Dec 14 18

Infrastructural inaccessibility: tech entrepreneurs in occupied Palestine: ACM Transactions on Computer-Human Interaction

The paper describes how “tech entrepreneurs in occupied Palestine” are hindered by a lack of access to infrastructure. Particular immediate issues are... more

Organizational Impacts (K.4.3) | Dec 12 18

Research and application of block chain technology in crowdsourcing platform: ICEMC 18

Crowdsourcing is heavily dependent on mutual trust between key stakeholders in order to succeed, and lack of trust often leads to failures. Even exclusive platforms created to support crowdsourcing haven’t been... more

Electronic Commerce (K.4.4) | Dec 11 18

A verified SAT solver framework with learn, forget, restart, and incrementality: Journal of Automated Reasoning

SAT solvers are automatic decision procedures for the propositional satisfiability problem; they play an important role in planning... more

Learning (I.2.6) | Dec 10 18

Words become worlds: the LIT ROOM, a literacy support tool at room-scale: DIS 18

Different technologies may well become valuable tools for combating global childhood illiteracy. But how should cost-effective technologies be made available to help solve the digital divide and reading difficulties of... more

User Interfaces (H.5.2) | Dec 7 18

On an new algorithm for function approximation with full accuracy in the presence of discontinuities based on the immersed interface method: Journal of Scientific Computing

Linear algorithms for the approximation of smooth functions are stable and convergent, but if the functions are piecewise continuous then we encounter... more

Approximation (G.1.2) | Dec 6 18

Online estimation of discrete, continuous, and conditional joint densities using classifier chains: Data Mining and Knowledge Discovery

When considering data streams, the entire data stream is not available in one shot and estimates are needed, thus it is difficult to apply... more

Data Mining (H.2.8...) | Dec 6 18

Big data analytics in science: YouTube

The presenter frequently refers to slides on a screen via hand gestures; however, except for one instance, less than one-quarter of any slide is ever visible in the video. As a result, the presented material is very... more

General (H.2.0) | Dec 5 18

SQL tester: an online SQL assessment tool and its impact: ITiCSE 18

SQL Tester is an online practice and assessment tool for structured query language (SQL). Its code is available on GitHub. Students can answer the questions in any order and make as many attempts as they want... more

SQL (H.2.3...) | Dec 4 18

Analytical performance modeling for computer systems (3rd ed.)

Performance measurement and modeling is essential for both real systems and systems being modeled in a research environment. Without good models and tests to verify that the systems match those models, it can be very... more
Modeling of Computer Architecture (C.0...) | Dec 17 18

Machine learning for data streams

Data streams are everywhere. Sensors, people, and several applications continuously produce data streams, that is, related data items in temporal order, like the ones in financial markets or social media. They are also referred to as big data due to their high volume... more
Learning (I.2.6) | Dec 13 18

Advanced concepts for renewable energy supply of data centres

Data centers are large critical infrastructure facilities devoted to the data processing, data storage, and communications needed by an ever-growing number and diversity of services; they must stay connected to the... more
General (H.2.0) | Dec 7 18

Network routing (2nd ed.)

Network routing is an important aspect of networks. Routing architectures, algorithms, protocols, analysis, and operational deployment are investigated in this book via a detailed approach. The book has six parts. The first part (four chapters) starts with an introduction... more
Routing Protocols (C.2.2...) | Dec 4 18

Assessing and improving prediction and classification

There is an increased interest in machine learning (ML) in both academy and industry. One consequence is a greater demand for textbooks and other educational materials that explain the different facets of ML... more
Classifier Design & Evaluation (I.5.2...) | Nov 28 18

The book of why

The well-known 20th century scientist J. B. S. Haldane is famously quoted as having said, “Teleology is like a mistress to a biologist: he cannot live without her, but he’s unwilling to be seen with her in public.” Haldane’s point was that teleology, the study of purposes... more
Probability & Statistics (G.3) | Nov 27 18

Quantum computing

The book covers applications in quantum computing, along with some fundamental research. The application areas include cryptography, networking, image processing, optimization, and multi-user systems. The research work includes quantum field theory... more
Public Key Cryptosystems (E.3...) | Nov 26 18

Smart cards, tokens, security and applications (2nd ed.)

This edited book is divided into 18 chapters. Chapter 1 defines the concepts of smart cards, chips, and tamper resistance, and introduces issuer control and the main smart card applications, application... more
Security & Protection (K.6.5) | Nov 21 18

Cloud computing and software services

Cloud computing and software services includes many fruitful topics. In 17 chapters, the authors demonstrate their forte with interesting contributions to different branches of cloud computing. The first four chapters serve as an introduction, whereas the rest of... more
Cloud Computing (C.2.4...) | Nov 20 18

SCION: a secure Internet architecture

Researchers, graduate students, and deep practitioners in the Internet systems domain shouldn’t miss out on this body of work. It describes the essential elements of SCION--“an acronym for scalability, control, and isolation on next-generation networks”--and its... more
Internet (C.2.5...) | Nov 16 18

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy