
Foundations of session types and behavioural contracts
: ACM Computing Surveys
We are familiar with the notion of types as classifying what a program component does and permissible use of the component. A type system will tell us that a method call must have arguments of particular...
Studies of Program Constructs (F.3.3)  Jun 15 16
Protecting software through obfuscation: Can it keep pace with progress in code analysis?
: ACM Computing Surveys
Software obfuscation is an attempt to hide the real intent of a piece of software. The first obfuscated malware appeared in 1986, and sophistication...
Protection Mechanisms (D.2.0...)  Jun 22 16
Beat frequency detectorbased highspeed true random number generators: statistical modeling and analysis
: ACM Journal on Emerging Technologies in Computing Systems
With the increased number of personal electronic devices, the security of these devices and personal information has become a big concern. As...
General (B.7.0)  Jun 16 16
A study of relationship between performance, temperament and personality of a software programmer
: ACM SIGSOFT Software Engineering Notes
Does a programmer’s personality impact her or his programming performance? Understanding what drives the quality of software production is the topic of a large effort from the software engineering...
Distribution, Maint. & Enhancement (D.2.7)  Jun 8 16
A crowdpowered system for fashion similarity search
: ACM Transactions on Intelligent Systems and Technology
Analyzing fashion images and trends in online social networks offers a wide range of commercial opportunities, most of which are still completely unexplored. However, despite the enthusiastic...
Information Search & Retrieval (H.3.3)  Jun 7 16
Algorithm 957: evaluation of the repeated integral of the coerror function by halfrange GaussHermite quadrature
: ACM Transactions on Mathematical Software
The accurate evaluation of the repeated integrals of the coerror function defined as .... The usual method for evaluating this function is based on three...
Quad. & Numerical Differentiation (G.1.4)  Jun 24 16
Testing matrix function algorithms using identities
: ACM Transactions on Mathematical Software
Functional identity can be analyzed using reference solutions or with the Python library SciPy module that contains many probability distributions, one of...
Mathematical Software (G.4)  Jun 17 16
Control explicitdata symbolic model checking
: ACM Transactions on Software Engineering and Methodology
There is a recent trend toward the automation of the model checking and computer program verification process. The program or the model being verified and its verifiable property need to be restricted...
Software/Program Verification (D.2.4)  Jun 9 16
Metric temporal logic revisited
: Acta Informatica
The extension of temporal logic to measuring time durations is the basis of the theory of timed and hybrid automata, leading to the verification of metric temporal properties. Alur et al. (reference [1]...
Temporal Logic (F.4.1...)  Jun 3 16
A new packet scheduling algorithm for access points in crowded WLANs
: Ad Hoc Networks
Trying to use a wireless access point in a crowded venue can be very frustrating. The bandwidth is limited, at least in the short term; therefore...
Local & WideArea Networks (C.2.5)  Jun 20 16


A guide to graph colouring: algorithms and applications
Graph coloring is an active field of research that poses many theoretical challenges and has lots of applications in practice. Numerous problems in graph coloring are quite easy to state, but very...
Graph Algorithms (G.2.2...)
 Jun 22 16
Advances in Physarum machines: sensing and computing with slime mould
Ever since I was given an old plastic lunchbox containing a sample Physarum culture, I have been fascinated by this biological system. I had been about to teach schoolkids about computing and was...
Biology & Genetics (J.3...)
 Jun 7 16
Agile software development teams
Combined economic and technological benefits are appealing to many software companies. Traditionally, when companies are developing software, the biggest problem is detecting an error at the end of...
Programming Teams (D.2.9...)
 Jun 3 16
Algebraic coding theory: revised edition
Algebraic coding theory has its roots in mathematics and applications in computer science, and its origins in electrical engineering. I was unaware of the area back in 1993, when I joined the PhD program...
Coding & Information Theory (E.4)
 Jun 22 16
An introduction to neural information processing
Brains gather, store, and act on data gathered from their surroundings. This means that the data so taken in must be converted into information for further processing. On a physical level, we know that brains are composed of several types of specialized...
Biology & Genetics (J.3...)
 Jun 7 16
Automotive Ethernet
Increased use of electronics in vehicles and the need to enable communication between different electronic control units (ECUs) in the vehicle have given rise to invehicle networking. To handle varying requirements of automotive applications such as data rate...
Ethernet (C.2.1...)
 Jun 1 16
Big data analysis
Volume 16 of a series titled “Studies in Big Data,” published by Springer, this book is composed of 13 chapters. Most contributions are from Europe, with two from Canada and one from China. There is also one contribution from a company from Palo Alto...
Content Analysis & Indexing (H.3.1)
 Jun 10 16
Big data analytics with Spark: a practitioner’s guide to using Spark for large scale data analysis
Programmers seeking to learn the Spark framework and its libraries will benefit greatly from this book. It is a collection of workshops and tutorials on the World Wide Web (WWW) to learn Spark and its...
Content Analysis & Indexing (H.3.1)
 Jun 8 16
CSA guide to cloud computing: implementing cloud privacy and security
The Cloud Security Alliance (CSA) is the leading notforprofit organization in cloud security, which is evident in the body of research they have produced over the years.
This book, written by three...
Cloud Computing (C.2.4...)
 Jun 20 16
Computational music analysis
Understanding the science of music and then exploring the musical meaningfulness of such a scientific study is precisely what excites every scientific music researcher. This book, edited by David...
Sound & Music Computing (H.5.5)
 Jun 28 16

