Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
Misc

View:



Omission of quality software development practices : ACM Computing Surveys

Omitting quality assurance practices in software development such as inspection often results in software deficiencies that have to be addressed later. To better understand the factors...
Design (D.2.10) | Jul 26 18

Data-driven concurrency for high performance computing : ACM Transactions on Architecture and Code Optimization

Fine-grained dataflow computing creates circumstances that technologies, particularly hardware technologies, have difficulty handling. However, techniques...
Distributed Architectures (C.1.4...) | Aug 30 18

A Hoare logic for GPU kernels : ACM Transactions on Computational Logic

Graphics processing units (GPUs) are hardware accelerators, originally designed to facilitate the fast rendering of images. Later, they became popular for computing in performance-sensitive areas...
Logics of Programs (F.3.1...) | Aug 8 18

Maintaining architecture-implementation conformance to support architecture centrality : ACM Transactions on Software Engineering and Methodology

Software architecture plays a vital role in the life cycle of a software product, whether you follow agile principles or not. Software architectures allow one to...
Software Architectures (D.2.11) | Sep 4 18

When simpler data does not imply less information : ACM Transactions on the Web

This well-written paper reports on a study revealing the power of limited datasets to characterize mobile device users. This excellent work deserves attention both for the results and for the general explanations of...
General (H.2.0) | Aug 29 18

A moderately exponential time algorithm for k-IBDD satisfiability : Algorithmica

Branching programs can be modeled using binary decision diagrams (BDDs), which are rooted directed acyclic graphs with vertices labeled using variables of the program, and two sink nodes representing...
Algorithm Design & Analysis (G.4...) | Aug 15 18

Improved analysis of complete-linkage clustering : Algorithmica

The authors consider the problem of clustering n points in ℝd into k clusters, where the metric on ℝd has yet to be specified. They consider three possible measures: minimal diameter, minimal radius, and minimal...
Clustering (I.5.3) | Jul 31 18

Scheduling distributed clusters of parallel machines : Algorithmica

As large amounts of data continue to accumulate at never-before-seen rates, it becomes uneconomical to store it at a single location, not to mention storing copies at different locations. One solution is to...
Scheduling (D.4.1...) | Aug 17 18

A modified artificial bee colony approach for the 0-1 knapsack problem : Applied Intelligence

Many would consider the search for the optimal evolutionary computation (the collective noun for the multitude of search algorithms based on nature) algorithm by researchers the...
Discrete Mathematics (G.2) | Aug 22 18

ETARM: an efficient top-k association rule mining algorithm : Applied Intelligence

Association rule mining is a central component of data mining that deals with finding associations between elements in a database based on their use. The ubiquitous presence of association rules is...
Learning (I.2.6) | Aug 6 18



Advanced object-oriented programming in R

Computer science (CS) research has changed dramatically in recent years. It now often involves analyzing large datasets and testing hypotheses through a set of statistical tests. Along this line, R is one of the most widely used...
Object-Oriented Programming (D.1.5) | Aug 9 18

Advances in multirate systems

Multirate systems are systems in which multiple sampling rates are used for filtering data/signals. This book describes some advances in multirate systems. The main focus is on digital signal processing (DSP)-related applications. The descriptions in the...
Signal Analysis, Synthesis & Proc. (H.5.5...) | Aug 7 18

Advances in soft computing and machine learning in image processing

Both soft computing techniques and machine learning algorithms have very important tasks in image processing applications. With the artificial intelligence (AI)-based applications emerging in the market today, image processing techniques have gained more...
General (I.4.0) | Jul 19 18

An introduction to partial differential equations

Partial differential equations (PDEs) are used in several branches of engineering and science. For example, physical laws (like conservation of mass, momentum, and energy) model many physical, chemical...
Partial Differential Equations (G.1.8) | Jul 27 18

Artificial intelligence and economic theory

Artificial intelligence (AI) is increasingly used in many areas, including language translation, medical diagnosis, and so on. Of interest here are AI applications in stock market activities. Most investors are aware of programmed trading and high-frequency trading...
Economics (J.4...) | Jul 19 18

Attribute-based access control

In many applications, it becomes a necessity to define who (which user) is allowed to access what (which resource). This is achieved via access control. Several models for access control exist. Attribute-based access control (ABAC) is one of them, and forms...
Access Controls (D.4.6...) | Sep 5 18

Attribute-based access control

Due to the increasing distribution and complexity of current applications, attribute-based access control (ABAC) is slowly becoming the only way to control access. This monograph summarizes the accumulated knowledge on this important subject and has a...
Access Controls (D.4.6...) | Jul 20 18

Business process management cases: digital innovation and business transformation in practice

As the title promises, this book contains case descriptions and case studies. The introductory chapter tries to provide a framework and editorial guidelines for describing cases from business process...
Business (J.1...) | Jul 12 18

Codes, cryptology and curves with computer algebra

This volume offers a terse, highly formal exposition of the relation between the four subjects named in the title: codes (transformations of a stream of information), cryptology (transformations that seek to hide...
Data Encryption (E.3) | Sep 13 18

Complete guide to open source big data stack

Working with big data requires building up a network of services that allows for its effective use. In the scope of open-source systems, the big data stack is composed of open-source applications for understanding big data. The book’s title reveals its main purpose...
Content Analysis & Indexing (H.3.1) | Sep 6 18


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy