These reviews are the most popular with readers.
All Media Types
For the last:
A survey on malware detection using data mining techniques
Ye Y., Li T., Adjeroh D., Iyengar S. ACM Computing Surveys 50(3): 1-40, 2017. Type: Article
It is not new that software is eating the world . Industries and businesses everywhere are being “softwareized.” Meanwhile, we cannot deny that malware (malicious software) is also having a feast. This paper provides a comprehensive...
Making noise: using sound-art to explore technological fluency
Brunvand E., McCurdy N. ACM Inroads 8(2): 60-65, 2017. Type: Article
A computing course for non-majors, where the students explored sound art--art for which sound is the principle medium--is described in this article. Note that sound art is distinct from music (although there may be some overlap), a disti...
The motivations of ubiquitous computing: revisiting the ideas behind and beyond the prototypes
Takayama L. Personal and Ubiquitous Computing 21(3): 557-569, 2017. Type: Article
Research on the progress of ubiquitous computing (ubicomp), where computers are everywhere--versus only in one place, as it was with desktop computing--is presented in this paper. In this way, computers have become part of the environmen...
Approaches to co-evolution of metamodels and models: a survey
Hebig R., Khelladi D., Bendraou R. IEEE Transactions on Software Engineering 43(5): 396-414, 2017. Type: Article
Model-driven approaches are widely used in small and big industries to design and develop embedded and large-scale systems, for example, in the automotive sector, in aircraft design, or in security. Metamodels are the formal definitions of the lan...
A tool for xMAS-based modeling and analysis of communication fabrics in Simulink
Zhao X., Lu Z. ACM Transactions on Modeling and Computer Simulation 27(3): 1-26, 2017. Type: Article
Because of the programmability challenge of timing-based hardware description languages (HDL) involving Verilog and VHDL, today many higher-level design languages and tools have been presented in academy and industry, in order to construct a digit...
Partial evaluation of string obfuscations for Java malware detection
Chawdhary A., Singh R., King A. Formal Aspects of Computing 29(1): 33-55, 2017. Type: Article
Cyber security has become a major concern in government, industry, and academia and in the everyday lives of individuals. How we secure our information systems and maintain the privacy and integrity of our online presence and data is a significant...
Fog computing for sustainable smart cities: a survey
Perera C., Qin Y., Estrella J., Reiff-Marganiec S., Vasilakos A. ACM Computing Surveys 50(3): 1-43, 2017. Type: Article
Fog computing attempts to bring the computational capabilities of clouds closer to the variety of devices that make up the Internet of Things (IoT) by creating local mini-clouds. It appears to be a very promising way to support large clusters of s...
Towards authentication using multi-modal online activities
Gomi H., Yamaguchi S., Tsubouchi K., Sasaya N. UbiComp 2017 (Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, Maui, Hawaii, Sep 11-15, 2017) 37-40, 2017. Type: Proceedings
Authentication is an important aspect of day-to-day life. This paper shows the accuracy of activity-based authentication (ABA) for 1000 users accessing Yahoo! Japan websites. The authors claim this is the first evaluation of ABA under a large user...
Advanced machine learning with Python
Hearty J., Packt Publishing, Birmingham, UK, 2016. 278 pp. Type: Book (978-1-784398-63-7)
Machine learning and deep learning are two research areas that have created excitement and interest in many application domains. By using Python as the implementation medium, and by releasing most of the initial example set as an accompanying reso...
Basic graph theory
Rahman M., Springer International Publishing, New York, NY, 2017. 169 pp. Type: Book (978-3-319494-74-6)
Graph theory is fundamental to many modern algorithms in computer science (CS).
Basic graph theory
provides an introduction to the concepts for undergraduates. Unfortunately, the book is flawed in several respects....
Reproduction in whole or in part without permission is prohibited. Copyright © 2000-2017 ThinkLoud, Inc.