Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Best of 2016 Recommended by Editor Recommended by Reviewer Recommended by Reader
Reviewers have found these items notable and have self-selected them for review.
  1-10 of 7293 results Date Reviewed  
  Coders: the making of a new tribe and the remaking of the world
Thompson C.,  Penguin Books, New York, NY, 2019. 448 pp. Type: Book (978-0-735220-56-0)

Programmers are among the most influential people who are quietly changing the world. Software is an inseparable part of human life in this modern world, and programmers are tinkering with programs, continuously influencing a specific set of peopl...

Jan 23 2020  
  Predicting students’ final degree classification using an extended profile
Al-Sudani S., Palaniappan R.  Education and Information Technologies 24(4): 2357-2369, 2019. Type: Article

Student retention is of great concern to higher education institutions, and a higher dropout rate may be reflected in the university’s reputation. Extensive studies have attempted to identify at-risk students in an attempt to reduce student ...

Jan 21 2020  
  Artificial psychology: psychological modeling and testing of AI systems
Crowder J., Carbone J., Friess S.,  Springer International Publishing, New York, NY, 2019. 169 pp. Type: Book (978-3-030170-79-0)

According to the authors, Dan Curtis proposed artificial psychology as a theoretical discipline in 1963 (p. 164). During the 56 years since, it can be expected to have broadly expanded in both complexity and overarching clarity; this book demonstr...

Jan 17 2020  
  ELSA: a multilingual document summarization algorithm based on frequent itemsets and latent semantic analysis
Cagliero L., Garza P., Baralis E.  ACM Transactions on Information Systems 37(2): 1-33, 2019. Type: Article

Multi-document summarization involves the automatic generation of concise summaries of a number of textual documents, with the goal of succinctly presenting the most salient information. This allows readers to get the main idea without reading the...

Jan 16 2020  
  Semi-automatic safety analysis and optimization
Munk P., Abele A., Thaden E., Nordmann A., Amarnath R., Schweizer M., Burton S.  DAC 2018 (Proceedings of the 55th Annual Design Automation Conference, San Francisco, CA,  Jun 24-29, 2018) 1-6, 2018. Type: Proceedings

Model-based development (MBD) has been widely used in software development for a long time, and software models are increasingly used in the field of safety analysis. This paper presents a new approach to model-based safety analysis (MBSA) in this...

Jan 15 2020  
  Lai-Massey cipher designs: history, design criteria and cryptanalysis
Nakahara J.,  Springer International Publishing, New York, NY, 2018. 726 pp. Type: Book (978-3-319682-72-3)

Ciphers, which are widely used for encrypting communication, are often classified as either stream ciphers or block ciphers. A stream cipher is defined as “a symmetric cipher that operates with a time-varying transformation on individual pla...

Jan 13 2020  
  Exploiting the power of group differences: using patterns to solve data analysis problems
Dong G.,  Morgan&Claypool Publishers, San Rafael, CA, 2019. 148 pp. Type: Book (978-1-681735-02-3)

Emerging patterns (EPs) can be used as features, as simple classifiers, and as subpopulation signatures or characterizations. This book presents methods for investigating group differences based on EPs for a variety of data analysis problems. Thes...

Jan 10 2020  
  Ray tracing: a tool for all
Peddie J.,  Springer International Publishing, New York, NY, 2019. 348 pp. Type: Book (978-3-030174-89-7)

In the appendix, Peddie makes the claim that artist Albrecht Dürer originated ray tracing with his 1502 painting of a hare, which displays all of the visual techniques of composition that ray tracing must apply in a good image. Computational ...

Jan 9 2020  
  Internet of Things: information security challenges and solutions
Miloslavskaya N., Tolstoy A.  Cluster Computing 22(1): 103-119, 2019. Type: Article

The Internet of Things (IoT) has gained tremendous popularity over the years, allowing objects to be connected without intervention from humans. While this has opened up many opportunities for developing services and applications, it has many info...

Jan 9 2020  
  How might we increase system trustworthiness?
Neumann P.  Communications of the ACM 62(10): 23-25, 2019. Type: Article

With the ever-increasing number of vulnerabilities and threats against systems and networks, one would wonder the best way to make systems more trusted. In reality, there is no best way because the causes of the problems have been overlooked. The ...

Jan 8 2020  
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2020 ThinkLoud, Inc.
Terms of Use
| Privacy Policy