Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
December 8, 2019

Bits and bugs: a scientific and historical review of software failures in computational science
Niels Bohr, in confronting the subtleties and paradoxes of quantum theory, said to one of his many famous students and acolytes, “These issues are so serious that one can only joke about them” [1]. The vernacular main title of this excellent and very important book brought Bohr’s... more
Those labours which belong to the various branches of the mathematical sciences, although on first consideration they seem to be the exclusive province of... more
- L. F. Menabrea (1842)
A multi-level-optimization framework for FPGA-based cellular neural network implementation: ACM Journal on Emerging Technologies in Computing Systems

Multi-level optimizations for cellular neural network design with Zybo and ZedBoard field-programmable gate arrays (FPGAs), including the system... more

General (B.0) | Dec 3 19

Assessing neural network scene classification from degraded images: ACM Trans. on Applied Perception

Image processing and understanding human vision have shared interests and methods since the beginning of computer vision research. In recent years, deep learning and in particular... more

General (I.4.0) | Nov 27 19

Schedulability analysis of tasks with corunner-dependent execution times: ACM Trans. on Embedded Computing Systems

Scarce computer memory and processor core resources create crucial challenges to the real-time execution of concurrent software. How should a multicore... more

Real-Time & Embedded Systems (D.4.7...) | Nov 22 19

Contextual visualization: IEEE Computer Graphics and Applications

If users cannot see the breakdown of data hidden behind summaries visualized as charts or pies, they will go to another website to find the information. Unseen information can lead to biased findings presented by summaries... more

General (I.3.0) | Nov 22 19

On the impact of programming languages on code quality: a reproduction study: ACM Trans. on Programming Languages and Systems

E. W. Dijkstra’s classic A discipline of programming [1] has rightly achieved the sort of permanent validity that mathematician G. H. Hardy spoke of in his... more

General (D.2.0) | Nov 21 19

A first look at Certification Authority Authorization (CAA): ACM SIGCOMM Computer Communication Review

The cornerstone of information and communications technology (ICT), security provides and maintains robustness, sustainability, and reliability. Using web services by referring to different web pages... more

Security & Protection (C.2.0...) | Nov 21 19

DeepFL: integrating multiple fault diagnosis dimensions for deep fault localization: ISSTA 19

Testing is a very important activity in software development. With testing comes the need to find the origin of the defects detected. This need is also important when failures occur in production.... more

Testing & Debugging (D.2.5) | Nov 21 19

Deep item-based collaborative filtering for top-N recommendation: ACM Trans. on Information Systems

Recommender systems are an essential component in digital platforms, nudging consumers toward more efficient decision making by predicting and... more

General (H.0) | Nov 19 19

Reproducibility in scientific computing: ACM Computing Surveys

The authors discuss reproducible research, that is, research where the same task produces the same result as the original research. Researchers in the computing community are encouraged to make their... more

Computer & Info. Science Edu. (K.3.2) | Nov 19 19

Potential ‘dark sides’ of leisure technology use in youth: Communications of the ACM

New computing technologies may sometimes adversely affect young users. What is the undesirable result of too much unrestrained computing on adolescents? Turel presents some... more

Social Issues (K.4.2) | Nov 18 19

Learning Java with games

True to its title, this book will guide readers through Java with an appealing, well-structured sequence of increasingly complex coding tasks, leading eventually to journeyman fluency in writing a graphical user interface (GUI) application--that is, if one is willing to... more
Java (D.3.2...) | Dec 6 19

Theory of modeling and simulation (3rd ed.)

By the authors’ reckoning, modeling needs an established body of knowledge, usable by all specialists in the discipline. This work begins by explaining concepts related to the levels of system specification and their formalism (both computationally and... more
General (I.6.0) | Dec 5 19

Lie group machine learning

Machine learning, one of the evergreen fields of electrical engineering, has recently gained momentum and has a number of new and innovative applications. Related fields, such as artificial intelligence, deep learning, brain learning, tensor flow, and so on... more
Neural Nets (I.5.1...) | Dec 4 19

Integer linear programming in computational and systems biology

Integer linear programming (ILP) is an optimization method that depends on the satisfaction of a set of linear equality or inequality relationships and has solutions with integer (rather than continuous)... more
Linear Programming (G.1.6...) | Dec 2 19

Quantitative intertextuality

Intertextuality is a term used to denote the idea that there are relationships between texts. This includes the conscious modeling of one text on another, allusions to phrases from other texts, and even plagiarism. The goal of this book is to introduce readers to the use of... more
Learning (I.2.6) | Nov 26 19

Cryptographic and information security approaches for images and videos

Cryptography is the art of securing communications transmitted through insecure channels. It consists of mechanisms to keep the data confidential by preventing access to unapproved individuals, maintaining... more
Cryptographic Controls (D.4.6...) | Nov 26 19

All data are local

Two important points of general interest can be drawn from this book, although both points require more effort than most readers are willing to make. The first point, as the title suggests, is that all data is local. This can be taken to mean that data is (or “are,” which we... more
Social & Behavioral Sciences (J.4) | Nov 25 19

Decrypting the encryption debate

Both business and government organizations routinely protect information by encrypting data. Encryption is also used to protect information from the prying eyes of competitors and foreign governments, becoming an important and indispensable tool for citizens... more
Cryptographic Controls (D.4.6...) | Nov 22 19

The theory of quantum information

Information theory has its modern origins in the 1948 work [1] of Claude Shannon, who gave results that addressed two key problems: the extent to which information can be compressed without loss, and the rate at which information can be transmitted... more
Information Theory (H.1.1...) | Nov 21 19

Querying graphs

Graph data management (GDM) has become an increasingly important discipline, both in academia and in industry. One reason is that graph data has been ubiquitously created, collected, and released for analysis and learning. Every day, massive amounts of... more
Query Processing (H.2.4...) | Nov 21 19

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy