Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Best of 2016 Recommended by Editor Recommended by Reviewer Recommended by Reader
Reviewers have found these items notable and have self-selected them for review.
  1-10 of 7184 results Date Reviewed  
  Arabic authorship attribution: an extensive study on Twitter posts
Altakrori M., Iqbal F., Fung B., Ding S., Tubaishat A.  ACM Transactions on Asian and Low-Resource Language Information Processing 18(1): 1-51, 2019. Type: Article

Altakrori et al. present an excellent study on Arabic authorship attributes from Twitter posts. The coverage of the subject is very extensive. The authors review a large body of related authorship attribution literature in short messages. Non-Arab...

Mar 25 2019  
  Package-aware scheduling of FaaS functions
Abad C., Boza E., van Eyk E.  ICPE 2018 (Companion of the 2018 ACM/SPEC International Conference on Performance Engineering, Berlin, Germany,  Apr 9-13, 2018) 101-106, 2018. Type: Proceedings

This paper applies the longstanding notion of caching to the new field of serverless computing. Moving computation to the data, that is, functions to the nodes where libraries are cached, is advantageous to function-as-a-service (FaaS) functions t...

Mar 22 2019  
  The digital and the real world: computational foundations of mathematics, science, technology, and philosophy
Mainzer K.,  World Scientific Publishing Co Pte Ltd, Singapore, 2018. 472 pp. Type: Book

The digital and the real world is a quite unique text that goes beyond the common clichés of describing digitalization as a global phenomenon. Instead, the book investigates the complex relationships between continuous physical reality...

Mar 22 2019  
  A novel multilayer AAA model for integrated applications
Rezakhani A., Shirazi H., Modiri N.  Neural Computing and Applications 29(10): 887-901, 2018. Type: Article

Unidimensional static security policies cannot cater to the needs of a growing enterprise anymore. Local regulations, business processes, operational levels, and threat modeling are the key anchors around which successful organizations build their...

Mar 22 2019  
   New solutions for cybersecurity
Shrobe H., Shrier D., Pentland A.,  MIT Press, Cambridge, MA, 2017. 504 pp. Type: Book (978-0-262535-37-3)

There is a growing recognition that “humans are now [deeply] embedded in three interconnected systems”--social, environmental, and cyber--and the sustainable development of this planet “rest[s] not only on the sustainab...

Mar 22 2019  
  Network function virtualization: concepts and applicability in 5G networks
Zhang Y.,  John Wiley & Sons, Inc., Hoboken, NJ, 2018. 192 pp. Type: Book (978-1-119390-60-2)

The exponential growth of cellular network data, which grows at a pace of 60 percent per year and is expected to increase even more due to the growth of Internet of Things (IoT) networks, poses some unprecedented challenges to the design of data n...

Mar 21 2019  
  The seven tools of causal inference, with reflections on machine learning
Pearl J.  Communications of the ACM 62(3): 54-60, 2019. Type: Article

Social media tells us that data science, machine learning (ML), and artificial intelligence (AI) are big. The author of this article, whose title evokes a well-known self-help book [1], has made important contributions to these areas. But when I s...

Mar 21 2019  
  A robust machine learning technique to predict low-performing students
Liao S., Zingaro D., Thai K., Alvarado C., Griswold W., Porter L.  ACM Transactions on Computing Education (TOCE) 19(3): 1-19, 2019. Type: Article

Academic failure is one of the most important problems in higher education institutions around the world. In a continuous cycle, universities admit new students and graduate others, but the road to success in academia is teeming with failures. Thi...

Mar 20 2019  
  Search-based program synthesis
Alur R., Singh R., Fisman D., Solar-Lezama A.  Communications of the ACM 61(12): 84-93, 2018. Type: Article

Program synthesis aims at the automatic generation of “an executable implementation ... from a high-level logical specification of the desired input-to-output behavior.” The review article concentrates on syntax-guided synthesis. This ...

Mar 19 2019  
  Blockchains from a distributed computing perspective
Herlihy M.  Communications of the ACM 62(2): 78-85, 2019. Type: Article, Reviews: (2 of 2)

Maurice Herlihy has published a book and numerous papers on distributed systems, and in particular concurrency, so he is in a very good position to judge blockchains. He has written here an excellent tutorial on blockchains from the point of view ...

Mar 18 2019  
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy