Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help


The privacy implications of cyber security systems : ACM Computing Surveys

This paper provides an accessible overview of the issues that spring up when looking into the privacy of cybersecurity systems. The paper starts by classifying cybersecurity technologies using four different...
Privacy (K.4.1...) | Jun 15 18

Maximizing polynomials subject to assignment constraints : ACM Transactions on Algorithms

This paper considers “the q-adic assignment problem.” Fix a number q (originally q=2), and suppose we are given, for some number n, a 2q-dimensional array of costs cu,v where u and v...
Algorithm Design & Analysis (G.4...) | Jul 13 18

On ordering multi-robot task executions within a cyber physical system : ACM Transactions on Autonomous and Adaptive Systems

The paper addresses the important problem of task execution by a multi-robot system. Many papers cover task allocation, but do not explicitly address...
Robotics (I.2.9) | Jun 12 18

An effective characterization of the alternation hierarchy in two-variable logic : ACM Transactions on Computational Logic

Many interesting properties of words can be described in a first-order language with variables (x, y, ...) for positions and two basic properties: x < y (meaning that x is to the left of y) and Qax (meaning that letter...
Formal Languages (F.4.3) | Jul 6 18

Decomposing images into layers via RGB-space geometry : ACM Transactions on Graphics

The notion of representing a color image as a set of translucent layers, each of a single (non-primary) color, is useful in the field of digital image painting. Although the layering is not present...
General (I.4.0) | Jun 22 18

Architectural principles for cloud software : ACM Transactions on Internet Technology

What comes to mind first with cloud system architectures is the ubiquitous use of microservices, supported by total virtualization from hardware to middleware to applications: virtual machines...
Cloud Computing (C.2.4...) | Jun 14 18

Seamless virtual network for international business continuity in presence of intentional blocks : ACM Transactions on Internet Technology

It is an accepted fact that international borders are vulnerable and permeable when it comes to information technology. This is why international businesses...
Network Management (C.2.3...) | Jul 10 18

Profit maximization with sufficient customer satisfactions : ACM Transactions on Knowledge Discovery from Data

This paper focuses on the prospects of “profit maximization with sufficient customer satisfaction.” The authors present 11 lemmas, nine examples, six...
Electronic Commerce (K.4.4) | Jun 15 18

Conditioning in probabilistic programming : ACM Transactions on Programming Languages and Systems

Machine learning, possibly contrary to popular belief, is not just about endless variations of neural networks. There is also a thriving subculture of probabilistic programming based on Bayesian principles...
Probabilistic Computation (F.1.2...) | Jun 13 18

Lightweight, obfuscation-resilient detection and family identification of Android malware : ACM Transactions on Software Engineering and Methodology

Malware is undoubtedly one of the most real and potent threats in the smartphone industry. Android’s open ecosystem in terms of code as well as...
Security and Protection (C.2.0...) | Jun 22 18

An introduction to distance geometry applied to molecular geometry

The most common way of determining the structures of molecules in a solution is nuclear magnetic resonance (NMR). The signals measured are caused by the flipping of the spins of paramagnetic nuclei in a...
Geometrical Problems & Comp. (F.2.2...) | Jun 7 18

Aviation security, privacy, data protection and other human rights

Enerstvedt, having an interesting background in both formal education and industry experience, has artfully combined a discussion of aviation security technology with privacy and human rights in a 453-page...
Security & Protection (K.6.5) | May 30 18

Bioinformatics for evolutionary biologists: a problems approach

This book was specifically designed to keep all elements needed for understanding the fundamental research approaches used in bioinformatics in a single text. It aims to help future evolutionary biologists...
Biology & Genetics (J.3...) | Jun 21 18

Business process management cases: digital innovation and business transformation in practice

As the title promises, this book contains case descriptions and case studies. The introductory chapter tries to provide a framework and editorial guidelines for describing cases from business process...
Business (J.1...) | Jul 12 18

Coding literacy: how computer programming is changing writing

Like reading and writing, programming has become an essential fundamental tool to organize information. A few centuries ago, being able to write and read, whether in Spanish, English, or French, was a way to be...
General (D.1.0) | Jul 9 18

Compact representations for the design of quantum logic

This book is in the area of quantum computer design. It proposes a new approach for such designs. It provides the background information required to understand the new approach. It also describes experimental results of the approach. Part 1 has two chapters. The first...
Computer-Aided Design (CAD) (J.6...) | Jun 21 18

Computer networking problems and solutions

Many computer networking books have been adopted in universities and are very popular [1,2,3], so it is hard for a new book to make an impact unless it differentiates in a significant way. This book tries to achieve this...
General (C.2.0) | Jun 28 18

Computing highly oscillatory integrals

Even though the numerical computation of integrals is a topic that has been investigated for many centuries, current textbooks have failed to describe certain facets in detail. One of these missing areas is the special case of when the integrand oscillates rapidly. Deaño...
Quad. & Numerical Differentiation (G.1.4) | Jul 10 18

Cracking codes with Python: an introduction to building and breaking ciphers

One of the many things I like about the Python programming language is that, once you learn basic Python programming, a whole host of other interesting ideas are within your grasp. I am one of those...
Data Encryption (E.3) | Jun 1 18

Credit scoring and its applications (2nd ed.)

Anyone involved in credit scoring, from financial professionals to advanced students in mathematics and business, should own this treatise. Heavily mathematical in its approach, it addresses the practical mechanics...
Financial (J.1...) | Jun 21 18

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy