Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help


Bridging the chasm : ACM Computing Surveys

Software is notoriously difficult to get right even for experienced, professional software developers using modern software engineering practices. If these experts can’t produce correct programs, what chance do...
Software Development (K.6.3...) | Nov 2 17

Improving loop dependence analysis : ACM Transactions on Architecture and Code Optimization

Research on multicore utilization embraces three major categories of topics: investigations regarding the issues of multicore interaction functionality, operating system affairs and compilers, and programming...
SIMD Processors (C.1.2...) | Dec 7 17

The logical view on continuous Petri nets : ACM Transactions on Computational Logic

The reachability problem for standard Petri nets is EXPSPACE hard, and the coverability problem is EXPSPACE complete. However, more efficient algorithms exist for variants of the standard nets...
Automata (F.1.1...) | Nov 17 17

Cyber security and the role of intelligent systems in addressing its challenges : ACM Transactions on Intelligent Systems and Technology

Individuals, organizations, and societies have come to rely more and more on computational infrastructure, ranging from our personal computing devices to...
Intelligent Agents (I.2.11...) | Nov 8 17

Discovering user behavioral features to enhance information search on big data : ACM Transactions on Interactive Intelligent Systems

Cassavia et al. reduce theory into practice in this paper. All too often, the disciplines we live in exist abstractly with theories or dense algorithms...
Management (D.2.9) | Nov 10 17

Have you lost the thread? Discovering ongoing conversations in scattered dialog blocks : ACM Transactions on Interactive Intelligent Systems

This interesting read addresses the problem of discovering conversations within dialog blocks. Parallel conversational threads occur in many scenarios...
Learning (I.2.6) | Dec 4 17

Numerically aware orderings for sparse symmetric indefinite linear systems : ACM Transactions on Mathematical Software

The LDLT decomposition of a real symmetric matrix where L is lower triangular with unit diagonal and D diagonal except for 2x2 blocks is a challenge...
Numerical Linear Algebra (G.1.3) | Nov 16 17

Gunrock: GPU graph analytics : ACM Transactions on Parallel Computing

Graphs are fundamental data structures for modeling social interactions, computer networks, and physical simulations. Graph analytic libraries provide optimized primitives and application programming...
Graphics Processors (I.3.1...) | Nov 30 17

Link prediction in fuzzy social networks using distributed learning automata : Applied Intelligence

Link prediction is an active area within the broader research on social network analysis (SNA) that tries to predict future links using a social network structure. The purpose of link prediction...
Automata (F.1.1...) | Nov 28 17

Artificial cognition for social humanrobot interaction : Artificial Intelligence

Robotics is a practical, task-oriented branch of embodied artificial intelligence for solving real-world problems. This paper deals with a challenging sub-theme of robotics, aiming at a goal in the real world: how...
Robotics (I.2.9) | Oct 25 17

Advances in electrodermal activity processing with applications for mental health

Electrodermal activity (EDA) designates the variation in the electrical characteristics of the skin. The most pertinent property is skin conductance, quantified by measuring the current flow between two skin...
Medical Information Systems (J.3...) | Oct 27 17

Aesthetics of universal knowledge

As its name reveals, this book purports to describe what these authors choose to refer to as “aesthetics” and what they call “universal knowledge.” A tiny group of European sophisticates claim the right to show all of us natives (90 percent of the world) what universal...
Arts & Humanities (J.5) | Nov 30 17

Blockchain basics

Although blockchain is, among other things, a promising new technology, there is also a lot of hype surrounding it. Its proponents have suggested that it can do everything from tracking tuna to ending world poverty. Part of the problem is that, as with many new...
Data Encryption (E.3) | Oct 26 17

Classical Fortran: programming for engineering and scientific applications (2nd ed.)

Should scientists and engineers learn Fortran? The answer is, “Yes, of course.” Fortran is still the dominant programming language in scientific computing [1,2]. That answer probably means modern Fortran...
Sequential Programming (D.1.4) | Nov 27 17

Compact data structures

Compact data structures address two aspects of the problem posed by large quantities of data: efficient storage of the data, and efficient access and processing of the data by the algorithms suitable for defined classes of problems. (The concept is closely related to...
Data Structures (E.1) | Oct 26 17

Competing against luck: the story of innovation and customer choice

At a recent meeting of the International Standards Organization (ISO) Technical Committee (TC) 279, about 60 experts from 30-plus countries engaged in a spirited discussion and debate about how to help...
Economics (J.4...) | Nov 8 17

Computational autism

Galitsky summarizes research and practice from two decades aimed at describing, defining, implementing, and applying computer systems that model, simulate, elucidate, and rehabilitate autism. While “rehabilitation” is a frequently stated goal, it feels like the term...
Health (J.3...) | Nov 29 17

Cyber security. Simply. Make it happen.: leveraging digitization through IT security

The book is edited by Ferri Abolhassan, from Telekom Deutschland, who collected 11 chapters, each one from a different author. All chapters serve as the basis for a discussion on digitization and its impact on the...
Security & Protection (K.6.5) | Nov 28 17

Cyberspace: risks and benefits for society, security and development

Cyberspace is a part of daily life for businesses, government officials, and everyday people to some extent. It has made life fast, transparent, and simple at the expense of risks. Hence, experts working...
Security & Protection (K.6.5) | Nov 28 17

Darkweb cyber threat intelligence mining

Darkweb cyber threat intelligence mining, by seven authors from Arizona State University, deals with the question of how data can be extracted from the darknet and then later used to provide more advanced threat intelligence for organizations. In other words...
Data Mining (H.2.8...) | Oct 25 17

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy