Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
January 24, 2021

Envisioning education in a post-work leisure-based society
It would be difficult, if not impossible, to capture the essence of this interesting book in a short review. Nonetheless, I will do my best, at the risk of oversimplifying it. The book is based on five basic premises. First, mechanical versus creative labor is inherently... more
There is an enormous difference between one who is monolingual and someone who at least knows a second language well, because it makes you much more conscious about the phenomenon... more
- Edsger W. Dijkstra (2001)
Quantum relational Hoare logic: Proceedings of the ACM on Programming Languages

All programs need to be verified--even post-quantum cryptography software. To prove properties of such protocols requires proofs that involve not only quantum programming, but also pairs of programs, an... more

Models Of Computation (F.1.1) | Jan 22 21

A predicate transformer semantics for effects (functional pearl): Proceedings of the ACM on Programming Languages

Proving properties of imperative programs with side effects is quite arduous. Purely functional code, on the other hand, has a relatively pleasant equational theory that enables... more

General (D.2.0) | Jan 20 21

Securing the device drivers of your embedded systems: framework and prototype: ARES 19

Device drivers in embedded systems are often filled with defects and security issues, which occur at any stage. During either buildtime or runtime, logical errors can have a significant impact. Although there is... more

Real-Time & Embedded Systems (D.4.7...) | Jan 19 21

Research on text location and recognition in natural images with deep learning: ICAAI 18

A technical account, this paper reports on experiments carried out with combinations of deep learning techniques. The purpose of the proposed research is to explore and evaluate... more

General (I.0) | Jan 14 21

Formalizing and implementing distributed ledger objects: NETYS 18

As the authors note, “despite the hype about blockchains and distributed ledgers, no formal abstraction of these objects has been proposed.” Maurice Herlihy also observed this in his 2017... more

Semantics of Programming Lang. (F.3.2) | Jan 13 21

DeepXplore: automated whitebox testing of deep learning systems: Communications of the ACM

Many of us use trustworthy electronic systems, from self-driving car owners to online bankers and shoppers. How should real-life computer systems be methodically tested for nearly all potential faults and malware... more

Learning (I.2.6) | Jan 12 21

Linked open knowledge organization systems: APPIS 19

Knowledge organization systems (KOS) allow for establishing and accessing a common vocabulary and concepts in a domain. Linked data refers to a semantic web knowledge organization method that links... more

General (I.0) | Jan 5 21

Computing the geometric intersection number of curves: Journal of the ACM

More than a century ago, Poincaré asked for a procedure to determine if a closed curve γ on a compact surface S could be contracted to a point, and suggested a computationally expensive method. Dehn proposed a simpler combinatorial... more

General (G.0) | Jan 1 21

Rethinking regex engines to address ReDoS: ESEC/FSE 19

Regular expressions (regexes) are widely used across computer science applications and software components. However, not all programming languages are immune to regular expression DoS attacks... more

Security & Protection (D.4.6) | Dec 31 20

Cybersecurity is not very important: Ubiquity

Hardly a day goes by without media reports of dramatic cybersecurity breaches somewhere in the world, and we have come to accept that substantial resources are needed to prevent these attacks. Little thought... more

Security & Protection (K.6.5) | Dec 24 20

Reflections on programming systems

The book’s ten chapters may remind readers that the essential state of affairs in programming systems has not substantially changed since the early 1960s. Chapter 1--an overview of what follows--starts with a relatively familiar epigraph, published in 1968: “Today we... more
Software Architectures (D.2.11) | Jan 21 21

Mixture models and applications

Mixture models refer to the fact that many datasets have an internal structure that can be better analyzed with more than one probability distribution as models for the data. These two (or more) models may be more or less mixed in terms of data dispersion, for... more
Models (I.5.1) | Jan 18 21

5G enabled secure wireless networks

Wireless 5G networks are widely deployed and, compared to previous generations, carry vastly augmented data flows with low latency. Thus, their security and privacy aspects warrant special attention [1], even if a vast number of standards have... more
Security and Protection (C.2.0...) | Jan 15 21

Transformative teaching

Teaching in higher education institutions is often a challenge, especially for those new to the profession. Classes/eligibility are typically not prescribed for teachers in this space, apart from subject knowledge. This can result in mediocre teachers unless one... more
Computer & Info. Science Edu. (K.3.2) | Jan 11 21

Mastering frequency domain techniques for the stability analysis of LTI time delay systems

Time delay systems are ubiquitous. They are found in controllers of all sorts, where information from sensors may undergo a delay (perhaps computational) before being used as control inputs. Some systems... more
General (B.0) | Jan 8 21

Machine learning and artificial intelligence

With a good balance of theory and practice, the book effectively combines machine learning (ML) and artificial intelligence (AI) topics. Unlike other books on AI, Machine learning and artificial intelligence is not very mathematically... more
General (I.2.0) | Jan 7 21

Computer security and the Internet

Paul C. van Oorschot is a master who has made many diverse contributions to computer system security (very much including systems connected by the Internet), from applied cryptography to system usability. This range is a strength of the book: while it is... more
Security & Protection (K.6.5) | Jan 6 21

Computer security and the Internet

Security is a hot, yet tough, topic these days. Computer security, in a broad sense, spans several interdisciplinary areas. It is sometimes difficult to identify good literature, both to grasp the essential ideas and to be able to teach them. This excellent... more
Security & Protection (K.6.5) | Jan 4 21

Fundamentals of artificial intelligence

This book introduces the fundamentals of artificial intelligence (AI). It can be used as a computer science (CS) textbook for graduate or undergraduate students, or as a resource for researchers. The book has 21 chapters. The first chapter is an introduction... more
General (I.2.0) | Dec 30 20

General video game artificial intelligence

It’s a jungle out there: exploding asteroids, fire-breathing dragons, and maniacal cultists, among other lethal threats. What and how can you teach newborn babies, somehow fitted with a hero’s body and magical weapons, to defend themselves and survive for an hour? And... more
Games (I.2.1...) | Dec 29 20

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2021 ThinkLoud, Inc.
Terms of Use
| Privacy Policy