Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
Misc

View:



A survey on DHT-based routing for large-scale mobile ad hoc networks : ACM Computing Surveys

Mobile ad hoc networks (MANETs) are critical in the mobile era. There are more and more people using mobile networks, meaning more and more...
Network Protocols (C.2.2) | Dec 8 14

EduPaL: enabling blended learning in resource constrained environments : ACM DEV-5 14

EduPaL, a portable learning platform, is useful when the Internet connection is intermittent and cost constraints are important. The platform is based on a low-cost universal serial bus (USB) flash...
Distance Learning (K.3.1...) | Jan 20 15

Matrix calculus for classical and quantum circuits : ACM Journal on Emerging Technologies in Computing Systems

Excepting the final measurement, quantum computations are reversible computations. Quantum computers are infamously hard to construct...
General (F.0) | Dec 17 14

A synthesized definition of computer ethics : ACM SIGCAS Computers & Society

“This paper presents details of a content analysis study that analyzed definitions of computer ethics,” because consensus is lacking on the meaning of the...
Computer & Info. Sci. Ed. (K.3.2) | Dec 30 14

Exploring smart grid and data center interactions for electric power load balancing : ACM SIGMETRICS Performance Evaluation Review

Cloud computing requires huge data centers that consume significant amounts of electric energy. Such a significant energy consumer may be a risk...
Performance Of Systems (C.4) | Dec 15 14

RIVER: reconfigurable flow and fabric for real-time signal processing on FPGAs : ACM Trans. on Reconfigurable Technology and Systems

The authors of this paper describe an architecture called RIVER and a design flow for field-programmable gate arrays. They...
Real-Time & Embedded Systems (C.3...) | Dec 11 14

User vulnerability and its reduction on a social networking site : ACM Transactions on Knowledge Discovery from Data

Social media users sometimes expose their friends to confidentiality and safety breaches. To what extent are companionable users vulnerable to security...
Database Administration (H.2.7) | Dec 8 14

A stochastic process model of the hop count distribution in wireless sensor networks : Ad Hoc Networks

In general, this is an appropriate paper with fine structures, methodologies, analyses, and detailed simulation on a proposed stochastic process model for the hop count...
Sensor Networks (C.2.1...) | Jan 22 15

An adaptation algorithm for an intelligent natural language tutoring system : Computers & Education

Conversational intelligent tutoring systems (CITS) use natural language dialogue between the learner and the system as the medium of instruction. In the...
Computer-Managed Instruction (K.3.1...) | Dec 16 14

Technology use and academic performance : Computers & Education

This paper revisits the topic that links technology usage and academic performance by posing two hypotheses. First, there will be a negative correlation between technology...
Computer Uses in Education (K.3.1) | Dec 16 14



Algebraic circuits

Digital circuits that emulate operations drawn from algebraic structures like rings or fields are often called algebraic circuits. For example, linear feedback shift registers (LFSRs), used in coding...
Design Aids (B.7.2) | Dec 30 14

Android apps for absolute beginners (3rd ed.)

This third edition is current enough to include a chapter on the then, in 2014, forthcoming Android 5.0. That being said, the primary focus is Android 4.x. The author describes the target reader as someone who is tech savvy but not a programmer. He offers to...
General (D.1.0) | Jan 22 15

Augmented marked graphs

In order to manage the complexity of some practical systems, structuring reusable components is very useful; this is component-based system design. The components are obtained from the functional requirements, and then the system is...
Graph Theory (G.2.2) | Jan 20 15

Bayesian probability theory: applications in the physical sciences

I did not know enough, a half century ago, to decide between being a frequentist or being a Bayesian at the time an application of Bayes’ theorem forced itself into my physics thesis. Of course, “as everyone...
Physical Sciences & Engineering (J.2) | Jan 12 15

Beginning Google Glass development

Google Glass embraces at least three technology areas (ubiquitous computing, Internet of Things, and wearable technologies), all of which find a place in any survey on recent technology trends. Like...
General (D.4.0) | Jan 6 15

Beginning Python visualization: crafting visual transformation scripts (2nd ed.)

Any scientist or engineer confronting the task of analyzing a mountain of data from an experiment or simulation is quite aware of the truth of the statement that a picture is worth a thousand words...
General (D.1.0) | Jan 2 15

Building JavaScript games: for phones, tablets, and desktop

This book is about programming, advanced programming, game programming, object-oriented programming, graphics programming, animation, and game design. If you already know something...
Games (K.8.0...) | Jan 14 15

Building an information security awareness program: defending against social engineering and technical threats

As it is often said, people are the weakest link in information security. For this reason, security training and education, or security awareness, as it commonly called, is generally acknowledged to...
Security & Protection (K.6.5) | Jan 7 15

Business intelligence

On the book’s webpage, there is a brief description of the meaning of business intelligence (BI): “to large organizations, business intelligence promises the capability of collecting and analyzing internal and external data to generate knowledge and...
Business (J.1...) | Jan 5 15

Category theory for the sciences

One can erect a system of mathematics on various foundations. Euclid provided the first known formal system, based on geometric notions such as points in a space, straight lines, and distance. Classical probability theory is grounded in the idea of sets, set...
Mathematical Logic (F.4.1) | Jan 26 15


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2015 ThinkLoud, Inc.
Terms of Use
| Privacy Policy