Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help


Foundations of session types and behavioural contracts : ACM Computing Surveys

We are familiar with the notion of types as classifying what a program component does and permissible use of the component. A type system will tell us that a method call must have arguments of particular...
Studies of Program Constructs (F.3.3) | Jun 15 16

Protecting software through obfuscation: Can it keep pace with progress in code analysis? : ACM Computing Surveys

Software obfuscation is an attempt to hide the real intent of a piece of software. The first obfuscated malware appeared in 1986, and sophistication...
Protection Mechanisms (D.2.0...) | Jun 22 16

Beat frequency detector-based high-speed true random number generators: statistical modeling and analysis : ACM Journal on Emerging Technologies in Computing Systems

With the increased number of personal electronic devices, the security of these devices and personal information has become a big concern. As...
General (B.7.0) | Jun 16 16

A study of relationship between performance, temperament and personality of a software programmer : ACM SIGSOFT Software Engineering Notes

Does a programmer’s personality impact her or his programming performance? Understanding what drives the quality of software production is the topic of a large effort from the software engineering...
Distribution, Maint. & Enhancement (D.2.7) | Jun 8 16

A crowd-powered system for fashion similarity search : ACM Transactions on Intelligent Systems and Technology

Analyzing fashion images and trends in online social networks offers a wide range of commercial opportunities, most of which are still completely unexplored. However, despite the enthusiastic...
Information Search & Retrieval (H.3.3) | Jun 7 16

Algorithm 957: evaluation of the repeated integral of the coerror function by half-range Gauss-Hermite quadrature : ACM Transactions on Mathematical Software

The accurate evaluation of the repeated integrals of the coerror function defined as .... The usual method for evaluating this function is based on three...
Quad. & Numerical Differentiation (G.1.4) | Jun 24 16

Testing matrix function algorithms using identities : ACM Transactions on Mathematical Software

Functional identity can be analyzed using reference solutions or with the Python library SciPy module that contains many probability distributions, one of...
Mathematical Software (G.4) | Jun 17 16

Control explicit--data symbolic model checking : ACM Transactions on Software Engineering and Methodology

There is a recent trend toward the automation of the model checking and computer program verification process. The program or the model being verified and its verifiable property need to be restricted...
Software/Program Verification (D.2.4) | Jun 9 16

Metric temporal logic revisited : Acta Informatica

The extension of temporal logic to measuring time durations is the basis of the theory of timed and hybrid automata, leading to the verification of metric temporal properties. Alur et al. (reference [1]...
Temporal Logic (F.4.1...) | Jun 3 16

A new packet scheduling algorithm for access points in crowded WLANs : Ad Hoc Networks

Trying to use a wireless access point in a crowded venue can be very frustrating. The bandwidth is limited, at least in the short term; therefore...
Local & Wide-Area Networks (C.2.5) | Jun 20 16

A guide to graph colouring: algorithms and applications

Graph coloring is an active field of research that poses many theoretical challenges and has lots of applications in practice. Numerous problems in graph coloring are quite easy to state, but very...
Graph Algorithms (G.2.2...) | Jun 22 16

Advances in Physarum machines: sensing and computing with slime mould

Ever since I was given an old plastic lunchbox containing a sample Physarum culture, I have been fascinated by this biological system. I had been about to teach schoolkids about computing and was...
Biology & Genetics (J.3...) | Jun 7 16

Agile software development teams

Combined economic and technological benefits are appealing to many software companies. Traditionally, when companies are developing software, the biggest problem is detecting an error at the end of...
Programming Teams (D.2.9...) | Jun 3 16

Algebraic coding theory: revised edition

Algebraic coding theory has its roots in mathematics and applications in computer science, and its origins in electrical engineering. I was unaware of the area back in 1993, when I joined the PhD program...
Coding & Information Theory (E.4) | Jun 22 16

An introduction to neural information processing

Brains gather, store, and act on data gathered from their surroundings. This means that the data so taken in must be converted into information for further processing. On a physical level, we know that brains are composed of several types of specialized...
Biology & Genetics (J.3...) | Jun 7 16

Automotive Ethernet

Increased use of electronics in vehicles and the need to enable communication between different electronic control units (ECUs) in the vehicle have given rise to in-vehicle networking. To handle varying requirements of automotive applications such as data rate...
Ethernet (C.2.1...) | Jun 1 16

Big data analysis

Volume 16 of a series titled “Studies in Big Data,” published by Springer, this book is composed of 13 chapters. Most contributions are from Europe, with two from Canada and one from China. There is also one contribution from a company from Palo Alto...
Content Analysis & Indexing (H.3.1) | Jun 10 16

Big data analytics with Spark: a practitioner’s guide to using Spark for large scale data analysis

Programmers seeking to learn the Spark framework and its libraries will benefit greatly from this book. It is a collection of workshops and tutorials on the World Wide Web (WWW) to learn Spark and its...
Content Analysis & Indexing (H.3.1) | Jun 8 16

CSA guide to cloud computing: implementing cloud privacy and security

The Cloud Security Alliance (CSA) is the leading not-for-profit organization in cloud security, which is evident in the body of research they have produced over the years. This book, written by three...
Cloud Computing (C.2.4...) | Jun 20 16

Computational music analysis

Understanding the science of music and then exploring the musical meaningfulness of such a scientific study is precisely what excites every scientific music researcher. This book, edited by David...
Sound & Music Computing (H.5.5) | Jun 28 16

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2016 ThinkLoud, Inc.
Terms of Use
| Privacy Policy