Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help


A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks : ACM Computing Surveys

Social engineering attacks include a large variety of ways to manipulate and deceive users. A specific type is semantic attacks that deceive rather than...
Security & Protection (D.4.6) | Feb 3 16

Between insanity and love : ACM SIGCAS Computers and Society

The premise of this paper is that humans can have legitimate feelings of love or sexual desire for nonorganic objects, specifically robots or graphical constructions such as avatars. This claim...
Ethics (K.4.1...) | Feb 9 16

Guiding novice web workers in making image descriptions using templates : ACM Transactions on Accessible Computing

Making science, technology, engineering, and math (STEM) education available to all who are capable of learning is a moral imperative. Yet our educational system (including authors, textbook publishers...
Social Issues (K.4.2) | Jan 26 16

Sorting and selection with imprecise comparisons : ACM Transactions on Algorithms

Sorting and selection with imprecise comparisons has long been the focus of extensive research attention among theoreticians. There have been a number of models and frameworks of imprecision...
Nonnumerical Algorithms & Problems (F.2.2) | Feb 1 16

Accessing tape music documents on mobile devices : ACM Transactions on Multimedia Computing, Communications, and Applications

Canazza, Fantozzi, and Pretto present a methodology to access digitized copies of tape music using mobile devices. The aim is to gather and include the notes, history, and other ancillary information...
Systems (H.5.5...) | Feb 2 16

A logical approach to deciding semantic subtyping : ACM Transactions on Programming Languages and Systems

Although object-oriented subtyping has been efficiently resolved by compilers for years, this paper shows how subtyping in Extensible Markup Language (XML)-centric functional languages can be done...
Polymorphism (D.3.3...) | Jan 11 16

Shuffle index: efficient and private access to outsourced data : ACM Transactions on Storage

There exists “a clear need to provide proper confidentiality protection” to outsourced data where the data itself and access to that data is “not under the control of the data owner.” Content...
Relational Databases (H.2.4...) | Jan 20 16

Deterministic ordered restarting automata for picture languages : Acta Informatica

Languages of pictures (2D matrices with entries from a finite alphabet) have been studied since Blum and Hewitt [1]; Rosenfeld [2]; and Siromoney, Siromoney, and Krithivasan [3]. A nondeterministic...
Automata (F.1.1...) | Dec 30 15

A novel locally guided genome reassembling technique using an artificial ant system : Applied Intelligence

Since no technique exists to read the full DNA, DNA fragments (called reads) are generated through chemical processing, and algorithms try to reconstruct the complete DNA...
Biology & Genetics (J.3...) | Dec 31 15

A supervised particle swarm algorithm for real-parameter optimization : Applied Intelligence

Optimization using swarm algorithms is a topic that has attracted research since the introduction of the particle swarm optimization (PSO) paradigm in the 1990s. Many variants of...
Global Optimization (G.1.6...) | Dec 30 15

An introduction to machine learning

Given the booming popularity of machine learning, a good introductory textbook would indeed be quite valuable. A number of rather advanced textbooks exist, but most of them require a solid background in mathematics, with a heavy focus on probability...
Learning (I.2.6) | Jan 28 16


A perennial challenge in cognitive science is framing an architecture powerful enough to be a credible support for human reasoning, yet simple enough to map to the known machinery of the human brain. Work done in the 1970s on systems such as Soar framed many of the problems, but the...
Cognitive Simulation (I.2.0...) | Jan 25 16

Biomedical engineering: frontier research and converging technologies

Biomedical engineering is a maturing field characterized by a new generation of researchers capable of readily spanning engineering, medicine, and biology. This edited collection of timely review...
Biology & Genetics (J.3...) | Feb 5 16

Business process transformation: the Process Tangram framework

In this book, the phrase “business process transformation” is used to connote a collection of tools and techniques, unified by a methodology, for redesigning today’s business processes. One aspect that distinguishes today’s redesign of business...
Organizational Impacts (K.4.3) | Feb 3 16

Cloud computing design patterns

Design patterns document well-known solutions to common design problems. Originally introduced by a landmark 1977 architecture book [1], they have been widely adopted in the software engineering...
Cloud Computing (C.2.4...) | Jan 20 16

Computer vision: a reference guide

An encyclopedia of machine vision, with thorough alphabetized articles on theories and technologies for image processing, modeling, classification, and understanding, is provided in this reference. From epipolar and Euclidian geometry or eigenspace...
General (I.4.0) | Jan 5 16

Countdown to a moon launch

Five, four, three, two, one, ignition... Most of us know that bit of the countdown to a rocket launch, perhaps from watching one on television or in a movie--dramatic and usually followed by lots of flame and a rocket ascending into the sky (and usually lots more...
Aerospace (J.2...) | Dec 24 15

Design science research methods and patterns: innovating information and communication technology (2nd ed.)

Research methods for design science are presented in this book. It has adapted techniques from traditional disciplines to design science. For instance, iterative prototyping is a method used in software...
General (H.0) | Feb 3 16

Design thinking research: making design thinking foundational

Compilations are usually a mixed bag, with some great papers and a few that leave you scratching your head. Design thinking research is like that. For example, “Preserving Access to Previous System States...
General (K.7.0) | Jan 27 16

Designing and building a security operations center

Many companies that operate their own cyber security organization have a security operations center (SOC). Many others still cope with incident management, but do not have an SOC. This is a fact; however...
Security & Protection (C.2.0...) | Jan 11 16

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2016 ThinkLoud, Inc.
Terms of Use
| Privacy Policy