Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Best of 2016 Recommended by Editor Recommended by Reviewer Recommended by Reader
Search
These reviews are the most popular with readers.
 
Options: For the last:
 
  1-10 of 16251 results Ranking
  A survey on malware detection using data mining techniques
Ye Y., Li T., Adjeroh D., Iyengar S.  ACM Computing Surveys 50(3): 1-40, 2017. Type: Article

It is not new that software is eating the world [1]. Industries and businesses everywhere are being “softwareized.” Meanwhile, we cannot deny that malware (malicious software) is also having a feast. This paper provides a comprehensive...

1  
  The motivations of ubiquitous computing: revisiting the ideas behind and beyond the prototypes
Takayama L.  Personal and Ubiquitous Computing 21(3): 557-569, 2017. Type: Article

Research on the progress of ubiquitous computing (ubicomp), where computers are everywhere--versus only in one place, as it was with desktop computing--is presented in this paper. In this way, computers have become part of the environmen...

2  
  Approaches to co-evolution of metamodels and models: a survey
Hebig R., Khelladi D., Bendraou R.  IEEE Transactions on Software Engineering 43(5): 396-414, 2017. Type: Article

Model-driven approaches are widely used in small and big industries to design and develop embedded and large-scale systems, for example, in the automotive sector, in aircraft design, or in security. Metamodels are the formal definitions of the lan...

3  
  Making noise: using sound-art to explore technological fluency
Brunvand E., McCurdy N.  ACM Inroads 8(2): 60-65, 2017. Type: Article

A computing course for non-majors, where the students explored sound art--art for which sound is the principle medium--is described in this article. Note that sound art is distinct from music (although there may be some overlap), a disti...

4  
  A tool for xMAS-based modeling and analysis of communication fabrics in Simulink
Zhao X., Lu Z.  ACM Transactions on Modeling and Computer Simulation 27(3): 1-26, 2017. Type: Article

Because of the programmability challenge of timing-based hardware description languages (HDL) involving Verilog and VHDL, today many higher-level design languages and tools have been presented in academy and industry, in order to construct a digit...

5  
  Partial evaluation of string obfuscations for Java malware detection
Chawdhary A., Singh R., King A.  Formal Aspects of Computing 29(1): 33-55, 2017. Type: Article

Cyber security has become a major concern in government, industry, and academia and in the everyday lives of individuals. How we secure our information systems and maintain the privacy and integrity of our online presence and data is a significant...

6  
  Hybrid method for minimizing service delay in edge cloud computing through VM migration and transmission power control
Rodrigues T., Suto K., Nishiyama H., Kato N.  IEEE Transactions on Computers 66(5): 810-819, 2017. Type: Article

One of the most important requirements for an edge/cloud computing system is task latency, especially for some specific applications such as security alarm services and actuator feedback control in the Industrial Internet of Things (IIoT)....

7  
   Fog computing for sustainable smart cities: a survey
Perera C., Qin Y., Estrella J., Reiff-Marganiec S., Vasilakos A.  ACM Computing Surveys 50(3): 1-43, 2017. Type: Article

Fog computing attempts to bring the computational capabilities of clouds closer to the variety of devices that make up the Internet of Things (IoT) by creating local mini-clouds. It appears to be a very promising way to support large clusters of s...

8  
  Advanced machine learning with Python
Hearty J.,  Packt Publishing, Birmingham, UK, 2016. 278 pp. Type: Book (978-1-784398-63-7)

Machine learning and deep learning are two research areas that have created excitement and interest in many application domains. By using Python as the implementation medium, and by releasing most of the initial example set as an accompanying reso...

9  
  Towards authentication using multi-modal online activities
Gomi H., Yamaguchi S., Tsubouchi K., Sasaya N.  UbiComp 2017 (Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, Maui, Hawaii,  Sep 11-15, 2017) 37-40, 2017. Type: Proceedings

Authentication is an important aspect of day-to-day life. This paper shows the accuracy of activity-based authentication (ABA) for 1000 users accessing Yahoo! Japan websites. The authors claim this is the first evaluation of ABA under a large user...

10  
 
 
 
Display per page
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy