Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help


A survey on malware detection using data mining techniques : ACM Computing Surveys

It is not new that software is eating the world [1]. Industries and businesses everywhere are being “softwareized.” Meanwhile, we cannot deny that malware (malicious software) is also having...
Security & Protection (D.4.6) | Sep 22 17

A survey on systems security metrics : ACM Computing Surveys

As information security becomes a mainstream discipline and is talked about on primetime news and in cafes, among the first questions after the dust around the breach of the day settles would be whether...
Security & Protection (K.6.5) | Aug 3 17

A taxonomy and survey of cloud resource orchestration techniques : ACM Computing Surveys

Cloud services provide computing resources (for example, infrastructure, platform, and software) as services. Utilizing these cloud resources...
Online Information Services (H.3.5) | Aug 9 17

Multi-contact locomotion using a contact graph with feasibility predictors : ACM Trans. on Graphics

A method to compose multi-contact locomotion for characters in complex environments is proposed in this paper. This is accomplished through a two-step process, where existing motion data is first pre...
Animation (I.3.7...) | Aug 10 17

Fine-grain power breakdown of modern out-of-order cores and its implications on Skylake-based systems : ACM Transactions on Architecture and Code Optimization

Extreme-scale data centers and supercomputers draw many megawatts of power to function. By today’s standards, drawing one megawatt of power...
Microprocessors & computers (B.7.1...) | Aug 28 17

Improving resource efficiency at scale with Heracles : ACM Transactions on Computer Systems

Most of the paper’s authors are connected to Google, and their work centers on Google workload performance improvement. They’ve developed runtime controller software, Heracles, that uses...
Cloud Computing (C.2.4...) | Sep 6 17

Unveiling correlations via mining human-thing interactions in the Web of Things : ACM Transactions on Intelligent Systems and Technology

Today we find ourselves in a situation where there is an overabundance of data in information networks. This being the case, there...
Online Information Services (H.3.5) | Sep 11 17

Building the Internet of Things with Bluetooth Smart : Ad Hoc Networks

The paper looks at the current state of Bluetooth Low Energy (BLE) as a communication platform to connect resource-constrained devices to the Internet, and presents a purportedly first-of-its-kind open...
Internet (C.2.5...) | Aug 23 17

Theory blending: extended algorithmic aspects and examples : Annals of Mathematics and Artificial Intelligence

Conceptual blending addresses framing new concepts based on existing ones. Blending theory can be applied to a variety of areas, but the most popular in literature seems to be education in the sense of blended...
Analysis of Algo. & Prob. Complexity (F.2) | Aug 1 17

D-Brane: a diplomacy playing agent for automated negotiations research : Applied Intelligence

Diplomacy is a board game conceived in the 1950s, set in Europe before World War I. Two to seven players control the armed forces of major European powers, establishing and betraying alliances through...
Games (I.2.1...) | Sep 7 17

A practical approach to compiler construction

Designing an undergraduate compiler construction textbook is difficult. The market is diverse, with different departments having quite different goals and diverse prerequisites for their courses. Although very few graduates of these programs will ever write a...
Compilers (D.3.4...) | Aug 30 17

Advanced machine learning with Python

Machine learning and deep learning are two research areas that have created excitement and interest in many application domains. By using Python as the implementation medium, and by releasing most of the initial example set as an accompanying resource with this book, John...
Python (D.3.2...) | Sep 22 17

Agile modeling with UML

In object-oriented (OO) software development, unified modeling language (UML) is a popular and important tool for object-oriented modeling and architecture description. The models, created using UML, could be used to generate codes. The object constraint...
Software Development (K.6.3...) | Aug 31 17

Algorithms and models for network data and link analysis

A recent article in The Economist noted that data is to the twenty-first century what oil was to the twentieth century. Data is almost ubiquitously generated by humans as part of their everyday interactions on...
Network Management (C.2.3...) | Sep 8 17

Algorithms for data science

This 430-page book contains an excellent collection of information on the subject of practical algorithms used in data science. The authors present the algorithms in the context of applications. The discussion of each algorithm starts with some basic concepts...
Content Analysis & Indexing (H.3.1) | Sep 11 17

Artificial intelligence in financial markets

Focused on artificial intelligence and its application in finance, this book is the first volume in the series “New Developments in Quantitative Trading and Investment.” Split into five sections, the first reviews artificially...
Applications & Expert Systems (I.2.1) | Sep 20 17

Beginning Power BI (2nd ed.)

The goal of this book is to expose readers to the various tools in Microsoft’s self-service BI stack, built over Excel 2016, comprising Power Pivot, Power BI Desktop, Power Query, and DAX to enable them to analyze and gain insight into their data. This book can be taken...
Excel (H.4.1...) | Aug 14 17

Blockchain applications: a hands-on approach

Digital payments through secure online transactions are gaining in popularity. Also, digital transactions must be secure and reliable without the involvement of a centralized authority keeping record...
Payment Schemes (K.4.4...) | Aug 28 17

Blockchain applications: a hands-on approach

Digital payments through secure online transactions are gaining in popularity. Also, digital transactions must be secure and reliable without the involvement of a centralized authority keeping record of such transactions. Blockchain is an emerging...
Data Encryption (E.3) | Aug 25 17

Boolean functions and their applications in cryptography

Coding theory and cryptography are the backbone of modern-day information and communication technology (ICT). Boolean functions (BF) turn out to be one of the most beautiful building blocks for both...
Coding & Information Theory (E.4) | Aug 23 17

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy