Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
November 20, 2019

The Linux command line: a complete introduction (2nd ed.)
This is a wonderful introduction and tutorial meant to make readers comfortable and productive in the command line. It is not about system administration, Bash scripts, or any other tool, although they are all mentioned and covered at some length. It is about what users need to know... more
The activity of modern natural science has transformed our knowledge and control of the world about us; but in the process it has also transformed itself... more
- J. R. Ravetz (1971)
Reproducibility in scientific computing: ACM Computing Surveys

The authors discuss reproducible research, that is, research where the same task produces the same result as the original research. Researchers in the computing community are encouraged to make their... more

Computer & Info. Science Edu. (K.3.2) | Nov 19 19

Deep item-based collaborative filtering for top-N recommendation: ACM Trans. on Information Systems

Recommender systems are an essential component in digital platforms, nudging consumers toward more efficient decision making by predicting and presenting products and... more

General (H.0) | Nov 19 19

A survey on artifacts from CoNEXT, ICN, IMC, and SIGCOMM conferences in 2017: ACM SIGCOMM Computer Communication Review

This paper does precisely what the title says. It is an attempt to survey the current state of reproducibility in computer networking research. This is one of the more challenging areas of computing for... more

Data Communications (C.2.0...) | Nov 18 19

Potential ‘dark sides’ of leisure technology use in youth: Communications of the ACM

New computing technologies may sometimes adversely affect young users. What is the undesirable result of too much unrestrained computing on adolescents? Turel presents some... more

Social Issues (K.4.2) | Nov 18 19

Machine learning education for artists, musicians, and other creative practitioners: ACM Trans. on Computing Education

Together with colleagues from computer science, agriculture, food science, biology, and related fields, I am currently working on a framework for teaching artificial intelligence (AI) and machine learning... more

Computer Science Education (K.3.2...) | Nov 15 19

Automatic software repair: a bibliography: ACM Computing Surveys

There is a well-known saying in Silicon Valley about the omnipresence of programmable computers in our everyday life: software is eating the world, but unfortunately each bite comes with bugs. Such... more

Testing & Debugging (D.2.5) | Nov 13 19

Code Mining: IEEE Software

Can machine learning techniques be applied to software analysis to find bugs? That is, show a machine learning system examples of good and bad programs for training and then ask it to classify new code. The article begins with this question. Though admittedly not a... more

Data Mining (H.2.8...) | Nov 12 19

HIFUN - a high level functional query language for big data analytics: Journal of Intelligent Information Systems

Many big data projects have been developed over the past 15 years, and developments continue today. However, their formalism is different and specific to the implementation. A common... more

Query Languages (H.2.3...) | Nov 12 19

2018: a big year for privacy: Communications of the ACM

Privacy and security issues reached high visibility in 2018, with many major publicized incidents. Carl Landwehr starts with the Facebook–Cambridge Analytica scandal, and then describes regulatory efforts... more

Security, Integrity & Protection (H.2.0...) | Nov 7 19

Engineering trustworthy systems: Communications of the ACM

In this article--an extract of his book on 223 security principles [1]--Saydjari discusses the ten “most fundamental” principles. Both the book and article are addressed to software engineers who want to... more

Security (K.6.m...) | Nov 4 19

Advanced computing and systems for security: volume nine

The 2019 Applied Computation and Security Systems (ACSS) symposium discussed using fuzzy logic, geo maps, and other approaches to analyze, forecast, scale, and secure wireless sensor networks (WSNs). This volume... more
Security & Protection (D.4.6) | Nov 19 19

Data-driven science and engineering: machine learning, dynamical systems, and control

Gartner, an information technology (IT) research organization, tracks emerging and maturing technologies using its famous “hype cycle” graphics [1]. Data science, big data, and related analytics... more
Engineering (J.2...) | Nov 18 19

Decision-making analysis and optimization modeling of emergency warnings for major accidents

This research monograph essentially handles early emergency warning management and decision making in severe accidents. The authors consider specific examples of toxic gas leakages in China. The... more
Computers In Other Systems (J.7) | Nov 18 19

Security and defence in Europe

OK, so it’s another book on security, cyberwarfare, the danger of ..., and the need for an effective and affective defense. But from the first sentence of the excellent prologue, written by Ana Palacio, former Foreign Affairs Minister of Spain, I was hooked. I was reading... more
General (J.0) | Nov 18 19

Proactive and dynamic network defense

The study of network security probably started together with the development of computer networks. Proactive and adaptive network defense techniques are newer approaches, based on an asymmetry between attackers and defenders. Typically, defenders maintain a... more
Security & Protection (C.2.0...) | Nov 18 19

Data exploration using example-based methods

This book provides a comprehensive overview and description of a broad range of search algorithms. Because the authors are experts at example-based searching methods, the book discusses the application of... more
Statistical Computing (G.3...) | Nov 18 19

High performance computing for big data: methodologies and applications

This interesting book covers the latest issues in big data methodologies, with relevant examples to contextualize the content. The examples and discussion are very informative and full of details to guide the reader... more
General (I.0) | Nov 14 19

A new bio-inspired optimization algorithm based on the self-defense mechanism of plants in nature

The length of a long review article, this short book describes the details of a recently developed soft computing (that is, a bio-inspired metaheuristic) algorithm, tested for numerical optimization... more
Optimization (G.1.6) | Nov 14 19

Managing technical debt

Although technical debt has existed in software systems ever since there was software, the term “technical debt” and the metaphor comparing it to financial debt are more recent. This book is intended for practitioners. Its purpose is to provide them with practical advice... more
General (D.2.0) | Nov 13 19

Core Java, volume I--fundamentals (11th ed.)

Core Java is a longstanding series by computer science professor Cay Horstmann, who has written several books on programming languages. This edition is a classic textbook for high school seniors and... more
Java (D.3.2...) | Nov 12 19

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy