Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help


Fraction-free factoring revisited : ACM Communications in Computer Algebra

This is the abstract of a poster presented at the International Symposium on Symbolic and Algebraic Computation (ISSAC) 2014 dealing with Gaussian elimination over a ring...
Nonnumerical Alg. & Prob. (F.2.2) | Jul 16 15

Plus ça change, plus c’est la même chose : ACM Inroads

History repeats itself. That is the premise of the paper. Since the 1960s, there has been a lot of discussion and standards/organizations/certificates/buzzwords...
CS & IS Education (K.3.2) | Jul 21 15

(Leveled) fully homomorphic encryption without bootstrapping : ACM Trans. on Computation Theory

If you work with large amounts of data being hosted on public clouds, homomorphic encryption (HE) is an extremely innovative idea to add security...
Public Key Cryptosystems (E.3...) | Jul 24 15

K2: a mobile operating system for heterogeneous coherence domains : ACM Trans. on Computer Systems

Power management is the unsung hero of mobile computing and the limiting frontier of future mobile technology. Improvements in energy usage...
Organization & Design (D.4.7) | Jul 28 15

Who will retweet this? Detecting strangers from Twitter to retweet information : ACM Trans. on Intelligent Systems and Technology

The authors of this paper are from Google, IBM Research, and Utah State University. These are smart folks, and the study shows it...
User Interfaces (H.5.2) | Jul 8 15

Evaluation of a context-aware voice interface for ambient assisted living: qualitative user study vs. quantitative system evaluation : ACM Transactions on Accessible Computing

Despite the increasing use of mobile technology, in particular smartphones, there are still situations where people in distress may not be able to use...
Natural Language (H.5.2...) | Jul 23 15

To match or not to match: economics of cookie matching in online advertising : ACM Transactions on Economics and Computation

Cookies are extensively adopted in the current web scenario. A cookie is a small file placed on a user’s computer that permits a website to record...
Social & Behavioral Sciences (J.4) | Jul 13 15

Simplifying data disclosure configurations in a cloud computing environment : ACM Transactions on Intelligent Systems and Technology

The complexity involved in migrating data between systems in a cloud computing environment is much higher than that in local networks. This...
Data Sharing (H.3.5...) | Jul 20 15

GPU concurrency: weak behaviours and programming assumptions : ASPLOS 15

A memory consistency model (MCM) is a specification that describes the value(s) that a memory location should hold based on the causal history of operations that may or may not be associated with that...
General (B.3.0) | Jul 16 15

Ziria: a DSL for wireless systems programming : ASPLOS 15

Software-defined radio (SDR) facilitates innovation in various wireless protocol designs and deployments. In SDR, a lot of conventional radio hardware components are replaced by efficient software...
Specialized App. Lang. (D.3.2...) | Jul 20 15

Agile anywhere: essays on agile projects and beyond

A key part of agile is the ability to handle change. This book exemplifies this principle, being a refocused second edition of Agile software engineering [1]. The book’s central tenet is that “agility can be...
Management (D.2.9) | Jul 17 15

An introduction to agent-based modeling: modeling natural, social, and engineered complex systems with NetLogo

Readers who are already familiar with agent-based modeling are probably already aware of this book and would certainly recognize the name of the first author. So, I will address the beginning of this...
Multiagent Systems (I.2.11...) | Jun 30 15

Artificial cognitive systems: a primer

Since the earliest days of computers, researchers have sought to use them to emulate human cognition. Some early demonstrations of such “artificial intelligence” (playing checkers, diagnosing...
Cognitive Simulation (I.2.0...) | Jun 30 15

Beginning Java 8 fundamentals: language syntax, arrays, data types, objects, and regular expressions

Java was born more than two decades ago, aiming to be simple and targeting embedded platforms. Over the years, however, Java has grown to provide a rather rich set of features and can run on a broad...
Java (D.3.2...) | Jul 16 15

Big data, little data, no data: scholarship in the networked world

This book is a resource for understanding issues related to data collection, storage, and sharing practices across disciplines. The book has three parts: “Data and Scholarship,” “Case Studies in Data Scholarship,” and “Data...
Database Applications (H.2.8) | Jun 23 15

Business intelligence guidebook: from data integration to analytics

Anyone tasked with business intelligence and data integration will want this outstanding introduction and guidebook. No specialized knowledge or technical skills are required to follow the presented...
Data Mining (H.2.8...) | Jun 23 15

Complex networks: an algorithmic perspective

Complex networks, that is, networks with complex topological features, are ubiquitous in almost every branch of science and technology. As a result, the study of complex networks has become a...
Network Problems (G.2.2...) | Jul 8 15

Computing handbook (3rd ed.)

This handbook, now in its third edition, is encyclopedic in nature with articles (chapters) covering all aspects of information systems and technology. This edition greatly expands the knowledge base and topics of computer and information sciences and is...
General (K.7.0) | Jul 28 15

Cyber warfare: building the scientific foundation

This collection of basic research is designed for advanced students and practitioners. With a broad orientation including botnets, honeypots, human factors, game theory, big data, and cognitive...
Security & Protection (K.6.5) | Jul 23 15

Data and Goliath: the hidden battles to capture your data and control your world

Bruce Schneier has written another reasoned, balanced, well-documented, and very readable book. Part 1, “The World We’re Creating,” starts with the observation...
Organizational Impacts (K.4.3) | Jul 15 15

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2015 ThinkLoud, Inc.
Terms of Use
| Privacy Policy