




The evolution of an IT service desk: SIGUCCS 18
With the objective of “evolving” an information technology (IT) service desk after 35 years under the same management, Ryan Swan sets out to elaborate on the current status of the service desk and the deficiencies, in his view, that need to be... more
General (K.6.0)  May 23 19
Cyber security in the quantum era: Communications of the ACM
Quantum computing is a challenging and exciting new field. With its possibly enhanced computational power, many nontrackable problems may be solved efficiently. For many applications that depend on the computational... more
Security & Protection (K.6.5)  May 23 19
Scalable and efficient data analytics and mining with Lemonade: Proceedings of the VLDB Endowment
It is unreasonable to assume that data analysis experts are adept at computer programming. However, many tools that a data analyst may want to use require significant programming skills. Moreover, with... more
Data Mining (H.2.8...)  May 21 19
How testing helps to diagnose proof failures: Formal Aspects of Computing
Petiot et al. present testing software components that help optimize the effort of “applying deductive verification to formally prove that a [computer] program respects its formal specification.” The purpose of the proposed... more
Deduction & Theorem Proving (I.2.3)  May 10 19
Selfstabilizing repeated ballsintobins: Distributed Computing
Starting with an arbitrary assignment of n balls to n bins, the ballsintobins process repeatedly selects one ball from a nonempty bin and reassigns the selected ball to one of the n bins uniformly at random... more
Random Number Generation (G.3...)  May 9 19
A new block matching algorithm based on stochastic fractal search: Applied Intelligence
Block matching is an important technique for applications involving motion estimation, such as in video surveillance, TV broadcasting, video games, and so on. To improve the efficiency and... more
Algorithms (I.5.3...)  May 8 19
Interconnectability of sessionbased logical processes: ACM Transactions on Programming Languages and Systems
The analysis of communication network processes is an important topic in computer science. This paper compares two formalisms for describing such networks, namely linear logic (originally derived from an... more
Models of Computation (F.1.1)  May 6 19
Searching for global employability: ACM Transactions on Computing Education
Today’s higher education systems need to produce graduates with global employability that exhibits creativity and innovation, that is, the ability to solve openended problems in different cultural settings, but also domainspecific skill... more
Computer Science Education (K.3.2...)  May 3 19
Documenting trajectories in design space: FDG 18
The processes and methods used in the creation of games are often significantly different from conventional software engineering approaches. In this paper, the authors propose a research methodology for... more
General (K.8.0)  May 2 19
Neural network classifiers using a hardwarebased approximate activation function with a hybrid stochastic multiplier: ACM Journal on Emerging Technologies in Computing Systems
Li et al. present a novel approach for optimizing neural network implementations, that is, “a new architecture of stochastic neural networksâ€ť with a hidden... more
Neural Nets (C.1.3...)  May 1 19









C++ templates (2nd ed.)
The evolution of the C++ language has created the need for revised material on C++ templates. It’s great to see this second edition of C++ templates out at this moment, as it provides a definitive guide to C++ templates with the latest C++ standards... more
C++ (D.3.2...)  May 24 19
Machine learning with TensorFlow
Machine learning with TensorFlow is a short book laid out in three parts. The first part (about 50 pages) gets the reader up to speed with today’s artificial intelligence (AI) and machine learning community. It also covers TensorFlow essentials, from introducing tensors... more
Learning (I.2.6)  May 23 19
Universal quantum computing
Quantum computing is one of the hottest research fields right now, although the theory behind it had its start in the early 1980s, when Richard Feynman asked in a lecture why simulating quantum effects with classical (nonquantum) computers is so tricky [1]. He... more
Information Theory (H.1.1...)  May 22 19
Handbook of model checking
Due to the proliferation and pervasiveness of hardware and software entities in everyday life, ascertaining their trustworthiness is of paramount importance. Model checking is a logicbased approach that determines whether the abstract model of an entity... more
Model Checking (D.2.4...)  May 20 19
The insider threat
Did you ever wish to find the names and addresses of any convicted sex offenders living in your area? The author of this book asserts that parents and employers can use information like this to build what she calls a “risk landscape.” As she explains, it is quite... more
Privacy (K.4.1...)  May 17 19
Programming for hybrid multi/manycore MPP systems
To quote John Levesque, coauthor and director of Cray’s Supercomputing Center of Excellence: “Ask not what your compiler can do for you, ask what you can do for your compiler.” As the book states, it is necessary for... more
Compilers (D.3.4...)  May 16 19
The materiality of interaction
The central theme of the book is the disappearing differences between cyberspace and the real world. In fact, the boundary for interaction between the two realms has never been strict, for example, as represented by the punch card at the dawn... more
Interaction Styles (H.5.2...)  May 15 19
Euclidean distance geometry
If someone has a set of objects whose positions are known, calculating the distances between them is not a problem. However, the inverse problem is difficult, that is, given a set of distances between objects, determine their positions. Unfortunately, several solutions... more
Geometrical Prob. & Computations (F.2.2...)  May 14 19
Monomial ideals and their decompositions
We usually solve problems by breaking them into smaller problems. In the predominant situations, we have linear systems that can be decomposed into several problems because these systems have a basis, that is, the system is the “product” of a... more
Graph Theory (G.2.2)  May 13 19
The discrete charm of the machine
Digital computers have found their way into every aspect of modern life. They are now essential for work and ubiquitous in leisure, and used from childhood to retirement age, through every stage of adult life. Although the number of digital computers in operation today is... more
General (I.2.0)  May 10 19


