Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help


A survey on malware detection using data mining techniques : ACM Computing Surveys

It is not new that software is eating the world [1]. Industries and businesses everywhere are being “softwareized.” Meanwhile, we cannot deny that malware (malicious software) is also having...
Security & Protection (D.4.6) | Sep 22 17

Bridging the chasm : ACM Computing Surveys

Software is notoriously difficult to get right even for experienced, professional software developers using modern software engineering practices. If these experts can’t produce correct programs, what chance do...
Software Development (K.6.3...) | Nov 2 17

Fog computing for sustainable smart cities: a survey : ACM Computing Surveys

Fog computing attempts to bring the computational capabilities of clouds closer to the variety of devices that make up the Internet of Things (IoT) by creating local mini-clouds. It appears to be a very promising...
General (I.2.0) | Oct 5 17

Making noise: using sound-art to explore technological fluency : ACM Inroads

A computing course for non-majors, where the students explored sound art--art for which sound is the principle medium--is described in this article. Note that sound art is distinct from music (although there may be some...
Computers & Education (K.3) | Sep 25 17

The logical view on continuous Petri nets : ACM Transactions on Computational Logic

The reachability problem for standard Petri nets is EXPSPACE hard, and the coverability problem is EXPSPACE complete. However, more efficient algorithms exist for variants of the standard nets...
Automata (F.1.1...) | Nov 17 17

Cyber security and the role of intelligent systems in addressing its challenges : ACM Transactions on Intelligent Systems and Technology

Individuals, organizations, and societies have come to rely more and more on computational infrastructure, ranging from our personal computing devices to...
Intelligent Agents (I.2.11...) | Nov 8 17

Discovering user behavioral features to enhance information search on big data : ACM Transactions on Interactive Intelligent Systems

Cassavia et al. reduce theory into practice in this paper. All too often, the disciplines we live in exist abstractly with theories or dense algorithms. The authors...
Management (D.2.9) | Nov 10 17

Numerically aware orderings for sparse symmetric indefinite linear systems : ACM Transactions on Mathematical Software

The LDLT decomposition of a real symmetric matrix where L is lower triangular with unit diagonal and D diagonal except for 2x2 blocks is a challenge...
Numerical Linear Algebra (G.1.3) | Nov 16 17

A tool for xMAS-based modeling and analysis of communication fabrics in Simulink : ACM Transactions on Modeling and Computer Simulation

Because of the programmability challenge of timing-based hardware description languages (HDL) involving Verilog and VHDL, today many higher-level...
Performance Analysis & Design Aids (B.2.2) | Sep 27 17

Artificial cognition for social humanrobot interaction : Artificial Intelligence

Robotics is a practical, task-oriented branch of embodied artificial intelligence for solving real-world problems. This paper deals with a challenging sub-theme of robotics, aiming at a goal in the real world: how...
Robotics (I.2.9) | Oct 25 17

4G: LTE-Advanced Pro and the road to 5G (3rd ed.)

Long-term evolution (LTE) and 4G are the state of the art in mobile telecommunications, and the latest in a three-decade journey of technological innovation and development. We have moved from voice-centric systems with 1G and 2G, to mobile broadband...
Wireless Communication (C.2.1...) | Oct 12 17

Advanced persistent security

Winkler and Gomes define “advanced persistent security” as “defense in depth” (multilayered attack protection) that is enhanced by a comprehensive methodology for integrating attack detection capabilities and proactively implementing and executing an...
Security & Protection (K.6.5) | Oct 12 17

Advances in electrodermal activity processing with applications for mental health

Electrodermal activity (EDA) designates the variation in the electrical characteristics of the skin. The most pertinent property is skin conductance, quantified by measuring the current flow between two skin...
Medical Information Systems (J.3...) | Oct 27 17

Big data computing

Nowadays, digital data is everywhere: cellphones, computers, Internet, satellites, credit card payments, and so on. Data is flowing constantly around us. So, the question is: How can someone manage and process such a heterogeneous, complex, and vast...
Content Analysis & Indexing (H.3.1) | Oct 24 17

Biometrics in a data driven world

Whereas the term “biometrics” in general refers to the use of computational methods applied to data from biological sciences, in this volume the assumed meaning is techniques for identifying people based on their body and behavioral traits. In other words, this book...
Security & Protection (K.6.5) | Oct 5 17

Blockchain basics

Although blockchain is, among other things, a promising new technology, there is also a lot of hype surrounding it. Its proponents have suggested that it can do everything from tracking tuna to ending world poverty. Part of the problem is that, as with many new...
Data Encryption (E.3) | Oct 26 17

Compact data structures

Compact data structures address two aspects of the problem posed by large quantities of data: efficient storage of the data, and efficient access and processing of the data by the algorithms suitable for defined classes of problems. (The concept is closely related to...
Data Structures (E.1) | Oct 26 17

Competing against luck: the story of innovation and customer choice

At a recent meeting of the International Standards Organization (ISO) Technical Committee (TC) 279, about 60 experts from 30-plus countries engaged in a spirited discussion and debate about how to help...
Economics (J.4...) | Nov 8 17

Complex systems: relationships between control, communications and computing

This collection of papers primarily discusses the complexities of control systems; communication and computing are discussed as more minor topics. It includes five loosely coupled parts. Prior to Part 1, it starts with a comprehensive introduction...
Network Architecture & Design (C.2.1) | Oct 16 17

Darkweb cyber threat intelligence mining

Darkweb cyber threat intelligence mining, by seven authors from Arizona State University, deals with the question of how data can be extracted from the darknet and then later used to provide more advanced threat intelligence for organizations. In other words...
Data Mining (H.2.8...) | Oct 25 17

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy