Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
December 12, 2018
Search
Highlight

Software systems engineering programmes a capability approach
This excellent paper “focuses on things that a software developer must be able to do when developing and maintaining a product” and proposes a body of fundamental capabilities that were needed when the software engineering profession was first identified (in the... more
Quote
The new technologies for storing and retrieving information will, and should, be used increasingly--to store and retrieve information. The book will remain as the... more
- J. G. Goellner (1981)
Articles
Infrastructural inaccessibility: tech entrepreneurs in occupied Palestine: ACM Transactions on Computer-Human Interaction

The paper describes how “tech entrepreneurs in occupied Palestine” are hindered by a lack of access to infrastructure. Particular immediate issues are... more

Organizational Impacts (K.4.3) | Dec 12 18

Research and application of block chain technology in crowdsourcing platform: ICEMC 18

Crowdsourcing is heavily dependent on mutual trust between key stakeholders in order to succeed, and lack of trust often leads to failures. Even exclusive platforms created to support crowdsourcing haven’t been... more

Electronic Commerce (K.4.4) | Dec 11 18

A verified SAT solver framework with learn, forget, restart, and incrementality: Journal of Automated Reasoning

SAT solvers are automatic decision procedures for the propositional satisfiability problem; they play an important role in planning... more

Learning (I.2.6) | Dec 10 18

Words become worlds: the LIT ROOM, a literacy support tool at room-scale: DIS 18

Different technologies may well become valuable tools for combating global childhood illiteracy. But how should cost-effective technologies be made available to help solve the digital divide and reading difficulties of... more

User Interfaces (H.5.2) | Dec 7 18

On an new algorithm for function approximation with full accuracy in the presence of discontinuities based on the immersed interface method: Journal of Scientific Computing

Linear algorithms for the approximation of smooth functions are stable and convergent, but if the functions are piecewise continuous then we encounter... more

Approximation (G.1.2) | Dec 6 18

Online estimation of discrete, continuous, and conditional joint densities using classifier chains: Data Mining and Knowledge Discovery

When considering data streams, the entire data stream is not available in one shot and estimates are needed, thus it is difficult to apply... more

Data Mining (H.2.8...) | Dec 6 18

Big data analytics in science: YouTube

The presenter frequently refers to slides on a screen via hand gestures; however, except for one instance, less than one-quarter of any slide is ever visible in the video. As a result, the presented material is very... more

General (H.2.0) | Dec 5 18

SQL tester: an online SQL assessment tool and its impact: ITiCSE 18

SQL Tester is an online practice and assessment tool for structured query language (SQL). Its code is available on GitHub. Students can answer the questions in any order and make as many attempts as they want... more

SQL (H.2.3...) | Dec 4 18

The secret formula for choosing the right next role: Communications of the ACM

Like it or not, tech professionals still very much enjoy great career opportunities. Searching and changing positions, with various motivations, is just a part of life for some tech professionals. Reported in a... more

Occupations (K.7.1) | Dec 3 18

Reshaping the African Internet: Computer Communications

When the focus of one’s teaching happens to relate to a topic that one is reviewing, it is a good way to share knowledge from one field to another. I happen to be teaching a course on African government and politics this semester, and this... more

Internet (C.2.1...) | Nov 30 18

Books
Advanced concepts for renewable energy supply of data centres

Data centers are large critical infrastructure facilities devoted to the data processing, data storage, and communications needed by an ever-growing number and diversity of services; they must stay connected to the... more
General (H.2.0) | Dec 7 18

Network routing (2nd ed.)

Network routing is an important aspect of networks. Routing architectures, algorithms, protocols, analysis, and operational deployment are investigated in this book via a detailed approach. The book has six parts. The first part (four chapters) starts with an introduction... more
Routing Protocols (C.2.2...) | Dec 4 18

Assessing and improving prediction and classification

There is an increased interest in machine learning (ML) in both academy and industry. One consequence is a greater demand for textbooks and other educational materials that explain the different facets of ML to a heterogeneous readership. While many... more
Classifier Design & Evaluation (I.5.2...) | Nov 28 18

The book of why

The well-known 20th century scientist J. B. S. Haldane is famously quoted as having said, “Teleology is like a mistress to a biologist: he cannot live without her, but he’s unwilling to be seen with her in public.” Haldane’s point was that teleology, the study of purposes... more
Probability & Statistics (G.3) | Nov 27 18

Quantum computing

The book covers applications in quantum computing, along with some fundamental research. The application areas include cryptography, networking, image processing, optimization, and multi-user systems. The research work includes quantum field theory... more
Public Key Cryptosystems (E.3...) | Nov 26 18

Smart cards, tokens, security and applications (2nd ed.)

This edited book is divided into 18 chapters. Chapter 1 defines the concepts of smart cards, chips, and tamper resistance, and introduces issuer control and the main smart card applications, application... more
Security & Protection (K.6.5) | Nov 21 18

Cloud computing and software services

Cloud computing and software services includes many fruitful topics. In 17 chapters, the authors demonstrate their forte with interesting contributions to different branches of cloud computing. The first four chapters serve as an introduction, whereas the rest of... more
Cloud Computing (C.2.4...) | Nov 20 18

SCION: a secure Internet architecture

Researchers, graduate students, and deep practitioners in the Internet systems domain shouldn’t miss out on this body of work. It describes the essential elements of SCION--“an acronym for scalability, control, and isolation on next-generation networks”--and its... more
Internet (C.2.5...) | Nov 16 18

Linux hardening in hostile networks

The book’s preface notes that many of the available hardening guides were written some years ago. Its chapters are therefore intended to replace the outdated information found in those guides with... more
Linux (D.4.0...) | Nov 15 18

Computational phylogenetics

Evolutionary biology broadly covers phylogeny or the phylogenetic tree, representing the relationships among individuals or groups of organisms. Specifically, computational phylogenetics deals with the implementation of computational methods and... more
Biology & Genetics (J.3...) | Nov 14 18


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy