Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help


General tiebreaking schemes for computational social choice : AAMAS 15

Tiebreaking is a natural issue in social choice and in computational social choice. However, with the passing of time, it has become more and more clear that tiebreaking is a quite important and subtle...
Multiagent Systems (I.2.11...) | May 23 16

Delay/power modeling and optimization of FinFET circuit modules under PVT variations : ACM Journal on Emerging Technologies in Computing Systems

Driven by the increasing demands of low power and high performance, the semiconductor industry has pushed the device...
Simulation (B.6.3...) | Apr 28 16

May-happen-in-parallel analysis for actor-based concurrency : ACM Trans. on Computational Logic

When we run a program on a modern compiler, or in a browser, what is it that makes the program execute reasonably quickly, and without using unreasonable amounts of space...
Semantics of Programming Lang. (F.3.2) | Apr 28 16

Participatory cultural mapping based on collective behavior data in location-based social networks : ACM Trans. on Intelligent Systems and Technology

Cultural mapping provides a simple and direct visual tool to identify and analyze different aspects of culture from a local perspective. By adopting...
Social & Behavioral Sciences (J.4) | May 11 16

Truthfulness and stochastic dominance with monetary transfers : ACM Transactions on Economics and Computation

It is desirable to design auctions in such a way that participants have a financial incentive to provide true information about their interests. At first...
Numerical Algorithms & Problems (F.2.1) | Apr 29 16

Digital wildfires: propagation, verification, regulation, and responsible innovation : ACM Transactions on Information Systems

“Digital wildfire” describes the rapid spread of “rumor and false/malicious information.” The authors provide an excellent review of research concerning...
Public Policy Issues (K.4.1) | May 25 16

SAfeDJ: a crowd-cloud codesign approach to situation-aware music delivery for drivers : ACM Transactions on Multimedia Computing, Communications, and Applications

Hu et al. describe a music recommendation system for drivers based on the driver’s social condition and fatigue level and the road condition. It uses a...
Distributed Systems (C.2.4) | May 10 16

Linux XIA: an interoperable meta network architecture to crowdsource the future Internet : ANCS 15

The Internet becomes increasingly available each day. Access to it in a variety of forms posts challenges to the traditional design of the Internet protocol (IP). This inspiring paper introduces the Linux kernel...
Network Communications (C.2.1...) | May 18 16

Optimal routing with scheduling and channel assignment in multi-power multi-radio wireless sensor networks : Ad Hoc Networks

A multi-functional technology in the wireless sensor networking (WSN) area is tackled in this paper: routing optimization (RO) with scheduling, channel, and power assignment (SCP) in multi-power multi-radio...
Routing Protocols (C.2.2...) | May 20 16

A formalization of programs in first-order logic with a discrete linear order : Artificial Intelligence

Computer programs are language expressions of computations in terms of both the computer, as their computing agent, and behavior, as the computation they represent...
Logics & Meanings of Programs (F.3) | May 24 16

Active subspaces: emerging ideas for dimension reduction in parameter studies

“SIAM Spotlights” is a new series of short books on topics in computational mathematics and scientific computing. The topic here is active subspaces and how they can reduce the dimension of a parameter...
Model Development (I.6.5) | May 13 16

Ada’s legacy

Known as the first computer programmer, and popularized by the programming language named after her, who really was Augusta Ada, Countess of Lovelace, and what does she signify for us? Ada’s legacy, a collection of papers based on a 2013 conference, gives a...
Ada Lovelace (K.2...) | May 13 16

Assessment in online and blended learning environments

Educators around the world have taken every opportunity offered by advances in technology to improve teaching and learning in higher education. Some examples of such technologies include online...
Computer Uses in Education (K.3.1) | May 10 16

Big data fundamentals

This book is mistitled, probably to take advantage of the demand for titles in big data. In the first place, I don’t believe there are any “fundamentals” to big data in the way that normalization and ACID (an acronym for atomicity, consistency, isolation, durability)...
Content Analysis & Indexing (H.3.1) | May 2 16

Bio-inspired computation in telecommunications

Are you an engineer in telecommunications responsible for planning and laying out complex communication networks in a cost-effective, optimal way? Or, are you an Internet-based service provider such...
Data Communications (C.2.0...) | May 11 16

Build your own 2D game engine and create great web games: using HTML5, JavaScript, and WebGL

Among the properties of desirable computer games is the quality of the graphical display. A good graphical display requires the creation of a large amount of supporting code and other software resources...
Games (K.8.0...) | May 20 16

CMDB systems: making change work in the age of cloud and agile

Configuration management databases (CMDBs) are tools that provide a single, trusted source of information on how IT environments are configured and how IT systems interact with each other...
Distributed Systems (C.2.4) | May 18 16

Computer and communication networks

With this second edition, Nader Mir provides a comprehensive introduction to the most important topics in current networking. The almost 900-page book is composed of 22 chapters addressing packet-switching concepts, the well-known...
Data Communications (C.2.0...) | May 26 16

Core Java: volume 1—fundamentals (10th ed.)

The Java language has recently been extended and improved with new features in Java 8; it is great for us to have a book that covers the essential features for Java programming usage. Core Java consists...
Object-Oriented Programming (D.1.5) | May 4 16


At almost 900 pages, this is actually almost two complete books: one on cryptography and cryptanalysis, and the other on the rich history of the subject. Cryptography is the art of making secure building blocks; cryptanalysis is the art of breaking them. In the work, the...
Data Encryption (E.3) | May 6 16

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2016 ThinkLoud, Inc.
Terms of Use
| Privacy Policy