Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
January 22, 2020

On the impact of programming languages on code quality: a reproduction study
E. W. Dijkstra’s classic A discipline of programming [1] has rightly achieved the sort of permanent validity that mathematician G. H. Hardy spoke of in his famous A mathematician’s apology [2]. Dijkstra’s preface explains--to the satisfaction of many computing scientists... more
The Computer Person’s Prayer
Our program, who art in Memory, Hello be thy name. Thy Operating System come, thy commands be done, at the Printer as they... more
- John A. Barry (1993)
Predicting students’ final degree classification using an extended profile: Education and Information Technologies

Student retention is of great concern to higher education institutions, and a higher dropout rate may be reflected in the university’s reputation. Extensive studies have attempted to identify at-risk students in an... more

General (K.3.0) | Jan 21 20

Research on LRU optimal division method considering comprehensive cost of development and maintenance: CSAE 19

Efforts can be made to reduce life cycle costs and improve equipment availability. This is not only an issue of (company) low-maintenance... more

Modeling Methodologies (I.6.5...) | Jan 17 20

ELSA: a multilingual document summarization algorithm based on frequent itemsets and latent semantic analysis: ACM Transactions on Information Systems

Multi-document summarization involves the automatic generation of concise summaries of a number of textual documents, with the goal of succinctly... more

Database Applications (H.2.8) | Jan 16 20

Semi-automatic safety analysis and optimization: DAC 18

Model-based development (MBD) has been widely used in software development for a long time, and software models are increasingly used in the field of safety analysis. This paper presents a new approach to... more

Engineering (J.2...) | Jan 15 20

Modular product programs: ACM Transactions on Programming Languages and Systems

Some properties of programs are not about a single run of the program; instead, they relate multiple runs. For example, a program is deterministic if, given the same input, two... more

Formal Methods (D.2.4...) | Jan 14 20

An effective and versatile distance measure for spatiotemporal trajectories: Data Mining and Knowledge Discovery

With the increasing accumulation of spatial temporal path data, such as in the truck and cab datasets considered here, the need for effective path... more

Data Mining (H.2.8...) | Jan 9 20

Internet of Things: information security challenges and solutions: Cluster Computing

The Internet of Things (IoT) has gained tremendous popularity over the years, allowing objects to be connected without intervention from humans. While this has opened up many opportunities for... more

Security, Integrity & Protection (H.2.0...) | Jan 9 20

How might we increase system trustworthiness?: Communications of the ACM

With the ever-increasing number of vulnerabilities and threats against systems and networks, one would wonder the best way to make systems more trusted. In reality, there is no... more

General (H.0) | Jan 8 20

An analysis of performance evolution of Linux’s core operations: SOSP 19

The GNU Linux operating system (OS) has become, for better or worse, the dominant OS for computer science (CS) research, for deploying large-scale Internet/cloud infrastructures and supercomputers, as well as... more

Linux (D.4.0...) | Jan 6 20

A survey on compiler autotuning using machine learning: ACM Computing Surveys

Most modern compilers contain an optimization phase that tries to optimize the emitted machine code with respect to different objectives. Often this phase is heuristic, and the heuristics can usually be... more

Compilers (D.3.4...) | Dec 31 19

Taming uncertainty

Dealing with uncertainty lies at the heart of what it means to be human. Every day we use limited information to make decisions on the basis of predicted future events, which are themselves shrouded in uncertainty. While many of the decisions we make are often banal (for... more
Social & Behavioral Sciences (J.4) | Jan 21 20

From urban legends to political fact-checking: online scrutiny in America, 1990-2015

In this fascinating five-chapter book, the authors discuss the history of online scrutiny in the US from 1990 to 2015. They review some basic frameworks of online communication; examine the role of... more
History of Computing (K.2) | Jan 21 20

Artificial psychology: psychological modeling and testing of AI systems

According to the authors, Dan Curtis proposed artificial psychology as a theoretical discipline in 1963 (p. 164). During the 56 years since, it can be expected to have broadly expanded in both complexity... more
Psychology (J.4...) | Jan 17 20

Sweetie 2.0: using artificial intelligence to fight webcam child sex tourism

Webcam-related child sexual abuse, an emerging crime of the 21st century, involves perpetrators using digital media to commit offenses. Adequate amendments to substantive criminal and procedural criminal... more
Law (J.1...) | Jan 17 20

Oceanographic analysis with R

This book is about using state-of-the-art software--in this case, the R language--to solve oceanographic problems. The use of computer software in this field is relatively new. Oceanography, the study of the physical and biological aspects of the ocean, clearly... more
Earth & Atmospheric Sciences (J.2...) | Jan 16 20

Lai-Massey cipher designs

Ciphers, which are widely used for encrypting communication, are often classified as either stream ciphers or block ciphers. A stream cipher is defined as “a symmetric cipher that operates with a time-varying transformation on individual plain-text digits. By... more
Cryptographic Controls (D.4.6...) | Jan 13 20

Data management in machine learning systems

Supervised machine learning (ML) systems need labeled datasets for training and testing models, and unsupervised ML systems need datasets for identifying hidden patterns. If the datasets for an application could be... more
General (H.2.0) | Jan 10 20

Exploiting the power of group differences: using patterns to solve data analysis problems

Emerging patterns (EPs) can be used as features, as simple classifiers, and as subpopulation signatures or characterizations. This book presents methods for investigating group differences based on EPs for a variety of data analysis problems. These... more
General (G.0) | Jan 10 20

Ray tracing: a tool for all

In the appendix, Peddie makes the claim that artist Albrecht Dürer originated ray tracing with his 1502 painting of a hare, which displays all of the visual techniques of composition that ray must apply in a good image. Computational ray tracing is not quite... more
Raytracing (I.3.7...) | Jan 9 20

Big data and innovation in tourism, travel, and hospitality

While collecting data has always been an important aspect of the tourism, travel, and hospitality industry, big data has changed the landscape and brought metrics-based strategies to the spotlight. In this book, the... more
General (K.6.0) | Jan 8 20

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2020 ThinkLoud, Inc.
Terms of Use
| Privacy Policy