Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help


Plus ça change, plus c’est la même chose : ACM Inroads

History repeats itself. That is the premise of the paper. Since the 1960s, there has been a lot of discussion and standards/organizations/certificates/buzzwords...
CS & IS Education (K.3.2) | Jul 21 15

(Leveled) fully homomorphic encryption without bootstrapping : ACM Trans. on Computation Theory

If you work with large amounts of data being hosted on public clouds, homomorphic encryption (HE) is an extremely innovative idea to add security...
Public Key Cryptosystems (E.3...) | Jul 24 15

K2: a mobile operating system for heterogeneous coherence domains : ACM Trans. on Computer Systems

Power management is the unsung hero of mobile computing and the limiting frontier of future mobile technology. Improvements in energy usage will expand our horizons past mobile...
Organization & Design (D.4.7) | Jul 28 15

Evaluation of a context-aware voice interface for ambient assisted living: qualitative user study vs. quantitative system evaluation : ACM Transactions on Accessible Computing

Despite the increasing use of mobile technology, in particular smartphones, there are still situations where people in distress may not be able to use...
Natural Language (H.5.2...) | Jul 23 15

Gatling: automatic performance attack discovery in large-scale distributed systems : ACM Transactions on Information and System Security

A distributed system consists of many individual and independent nodes interacting with one another using a standardized set of protocols. Since the scale of nodes is often thousands or even millions...
Distributed Systems (C.2.4) | Aug 18 15

Execution trace-driven energy-reliability optimization for multimedia MPSoCs : ACM Transactions on Reconfigurable Technology and Systems

Dynamic task scheduling and fault tolerance in multiprocessor systems-on-chip (MPSoCs) are explored in this paper. The paper describes a...
Reliability, Test. & Fault-Tolerance (B.8.1) | Aug 19 15

Detection of political manipulation in online communities through measures of effort and collaboration : ACM Transactions on the Web

Online social media is a popular research topic for both computer and social scientists as it can be investigated with robust analytic...
Web-Based Services (H.3.5...) | Aug 17 15

Richer interface automata with optimistic and pessimistic compatibility : Acta Informatica

This paper considers the problems associated with the composition of modal interface automata. A modal interface automaton (MIA) has both must transitions, which specify that a transition...
Automata (F.1.1...) | Aug 12 15

A constrained growing grid neural clustering model : Applied Intelligence

The growing grid (GG) algorithm reduces the dimensional complexity of a dataset, irrespective of its topological structure. This model grows its units with a fixed rate, and fine-tunes its topological structure in growing and...
Artificial Intelligence (I.2) | Aug 24 15

A novel similarity measure on intuitionistic fuzzy sets with its applications : Applied Intelligence

Intuitionistic fuzzy sets (IFS) represent a concept that addresses the analysis of not necessarily numerical variables by specifying, besides their membership and non...
Uncertainty, Fuzzy & Prob. Reas. (I.2.3...) | Aug 6 15

3D animation for the raw beginner using Maya

This book comprises 17 chapters, plus a 16-page color insert. Despite its title, even a mostly baked beginner will find the exercises challenging, the language undiluted, and the capacities, layers of interface, and encyclopedic functionality of the principal tool...
3D Graphics & Realism (I.3.7) | Aug 6 15

Advanced metaprogramming in classic C++

C++ has proved a remarkable chameleon of a language. It started as a simple preprocessor that used C as a backend, became a real object-oriented language, added templates and the standard template library, and now increasingly uses template...
C++ (D.3.2...) | Aug 20 15

Agile performance improvement: the new synergy of agile and human performance technology

Like the combination of chocolate and peanut butter in Reese’s Peanut Butter Cups, this book successfully melds the methods of agile software development (ASD) and human performance technology...
Metrics (D.2.8) | Aug 19 15

Algorithmic foundations of robotics XI: selected contributions of the 11th International Workshop on the Algorithmic Foundations of Robotics

To date, robotics comprises a mature theoretical field where some of those theoretical contributions have been mostly demonstrated in laboratory conditions. However, nowadays, robotics is experiencing...
Robotics (I.2.9) | Aug 18 15

Alien agency

There aren’t any asteroids hitting our mother planet or Martian humanoids taking over museums and art galleries. The aliens in Alien agency: experimental encounters with art in the making, according to author Chris Salter, are evoked in three empirically...
Fine Arts (J.5...) | Aug 11 15

Cloud computing: a hands-on approach

This book surprised me in many ways. Let’s start with the negative surprise: it is not as carefully written as I would have liked it to be. Typographical errors, grammatically incorrect sentences, and redundancies and inconsistencies in coverage and depth...
Cloud Computing (C.2.4...) | Aug 21 15

Computing handbook (3rd ed.)

This handbook, now in its third edition, is encyclopedic in nature with articles (chapters) covering all aspects of information systems and technology. This edition greatly expands the knowledge base and topics of computer and information sciences and is...
General (K.7.0) | Jul 28 15

Counterfeit integrated circuits: detection and avoidance

Counterfeit integrated circuits (ICs) are an emerging problem in the semiconductor industry due to their worldwide production and distribution. How to prevent the increasing threat of counterfeiting is...
General (B.7.0) | Aug 13 15

Creativity in the digital age

“Creativity” seems to be the buzzword of the year. The call for creativity--the act of coming up with something new, unique, different, or innovative--has permeated the digital world. This edited book takes a look at the fundamentals of digital creativity...
Arts & Humanities (J.5) | Aug 21 15

Cyber warfare: building the scientific foundation

This collection of basic research is designed for advanced students and practitioners. With a broad orientation including botnets, honeypots, human factors, game theory, big data, and cognitive...
Security & Protection (K.6.5) | Jul 23 15

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2015 ThinkLoud, Inc.
Terms of Use
| Privacy Policy