Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help


A survey on malware detection using data mining techniques : ACM Computing Surveys

It is not new that software is eating the world [1]. Industries and businesses everywhere are being “softwareized.” Meanwhile, we cannot deny that malware (malicious software) is also having...
Security & Protection (D.4.6) | Sep 22 17

Fog computing for sustainable smart cities: a survey : ACM Computing Surveys

Fog computing attempts to bring the computational capabilities of clouds closer to the variety of devices that make up the Internet of Things (IoT) by creating local mini-clouds. It appears to be a very promising...
General (I.2.0) | Oct 5 17

Making noise: using sound-art to explore technological fluency : ACM Inroads

A computing course for non-majors, where the students explored sound art--art for which sound is the principle medium--is described in this article. Note that sound art is distinct from music (although there may be some...
Computers & Education (K.3) | Sep 25 17

Fine-grain power breakdown of modern out-of-order cores and its implications on Skylake-based systems : ACM Transactions on Architecture and Code Optimization

Extreme-scale data centers and supercomputers draw many megawatts of power to function. By today’s standards, drawing one megawatt of power...
Microprocessors & computers (B.7.1...) | Aug 28 17

Improving resource efficiency at scale with Heracles : ACM Transactions on Computer Systems

Most of the paper’s authors are connected to Google, and their work centers on Google workload performance improvement. They’ve developed runtime controller software, Heracles, that uses...
Cloud Computing (C.2.4...) | Sep 6 17

Unveiling correlations via mining human-thing interactions in the Web of Things : ACM Transactions on Intelligent Systems and Technology

Today we find ourselves in a situation where there is an overabundance of data in information networks. This being the case, there...
Online Information Services (H.3.5) | Sep 11 17

A tool for xMAS-based modeling and analysis of communication fabrics in Simulink : ACM Transactions on Modeling and Computer Simulation

Because of the programmability challenge of timing-based hardware description languages (HDL) involving Verilog and VHDL, today many higher-level...
Performance Analysis & Design Aids (B.2.2) | Sep 27 17

Building the Internet of Things with Bluetooth Smart : Ad Hoc Networks

The paper looks at the current state of Bluetooth Low Energy (BLE) as a communication platform to connect resource-constrained devices to the Internet, and presents a purportedly first-of-its-kind open...
Internet (C.2.5...) | Aug 23 17

D-Brane: a diplomacy playing agent for automated negotiations research : Applied Intelligence

Diplomacy is a board game conceived in the 1950s, set in Europe before World War I. Two to seven players control the armed forces of major European powers, establishing and betraying alliances through...
Games (I.2.1...) | Sep 7 17

Temporal probabilistic measure for link prediction in collaborative networks : Applied Intelligence

Research on social networks is a fashionable field, along with forecasting the behaviors of entities that are represented as nodes in a graph describing the...
Social Networking (H.3.4...) | Sep 12 17

4G: LTE-Advanced Pro and the road to 5G (3rd ed.)

Long-term evolution (LTE) and 4G are the state of the art in mobile telecommunications, and the latest in a three-decade journey of technological innovation and development. We have moved from voice-centric systems with 1G and 2G, to mobile broadband...
Wireless Communication (C.2.1...) | Oct 12 17

Advanced machine learning with Python

Machine learning and deep learning are two research areas that have created excitement and interest in many application domains. By using Python as the implementation medium, and by releasing most of the initial example set as an accompanying resource...
Python (D.3.2...) | Sep 22 17

Advanced persistent security

Winkler and Gomes define “advanced persistent security” as “defense in depth” (multilayered attack protection) that is enhanced by a comprehensive methodology for integrating attack detection capabilities and proactively implementing and executing an...
Security & Protection (K.6.5) | Oct 12 17

Algorithms and models for network data and link analysis

A recent article in The Economist noted that data is to the twenty-first century what oil was to the twentieth century. Data is almost ubiquitously generated by humans as part of their everyday interactions on...
Network Management (C.2.3...) | Sep 8 17

Algorithms for data science

This 430-page book contains an excellent collection of information on the subject of practical algorithms used in data science. The authors present the algorithms in the context of applications. The discussion of each algorithm starts with some basic concepts...
Content Analysis & Indexing (H.3.1) | Sep 11 17

An introduction to online computation

This text is an important contribution to the field of online algorithms. In a traditional (offline) algorithm all of the data is present before the algorithm executes. While for an online algorithm the data is presented in a piecewise fashion, most of the data is unknown...
Online Computation (F.1.2...) | Oct 3 17

Artificial intelligence in financial markets

Focused on artificial intelligence and its application in finance, this book is the first volume in the series “New Developments in Quantitative Trading and Investment.” Split into five sections, the first reviews artificially intelligent applications in finance, including...
Applications & Expert Systems (I.2.1) | Sep 20 17

Basic graph theory

Graph theory is fundamental to many modern algorithms in computer science (CS). Basic graph theory provides an introduction to the concepts for undergraduates. Unfortunately, the book is flawed in several respects. Rooted in mathematics long...
Graph Theory (G.2.2) | Sep 29 17

Beyond jQuery

Beyond jQuery was a unique book to review. I enjoyed almost every page, yet disagree with the book’s apparent purpose, as presented in the first few chapters. But just as I was prepared to write a scathingly ambivalent review, the author redeemed himself with some...
JavaScript (D.3.2...) | Sep 28 17

Big data analytics: methods and applications

The rapid growth of online information systems, the ease of collecting data across many users, and the potential commercial value of learning about those users have led to growing interest in methods...
Content Analysis And Indexing (H.3.1) | Sep 26 17

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy