Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help


The privacy implications of cyber security systems : ACM Computing Surveys

This paper provides an accessible overview of the issues that spring up when looking into the privacy of cybersecurity systems. The paper starts by classifying cybersecurity technologies using four different...
Privacy (K.4.1...) | Jun 15 18

Maximizing polynomials subject to assignment constraints : ACM Transactions on Algorithms

This paper considers “the q-adic assignment problem.” Fix a number q (originally q=2), and suppose we are given, for some number n, a 2q-dimensional array of costs cu,v where u and v are q-tuples of indices...
Algorithm Design & Analysis (G.4...) | Jul 13 18

On ordering multi-robot task executions within a cyber physical system : ACM Transactions on Autonomous and Adaptive Systems

The paper addresses the important problem of task execution by a multi-robot system. Many papers cover task allocation, but do not explicitly address...
Robotics (I.2.9) | Jun 12 18

An effective characterization of the alternation hierarchy in two-variable logic : ACM Transactions on Computational Logic

Many interesting properties of words can be described in a first-order language with variables (x, y, ...) for positions and two basic properties: x < y (meaning that x is to the left of y) and Qax (meaning that letter...
Formal Languages (F.4.3) | Jul 6 18

Decomposing images into layers via RGB-space geometry : ACM Transactions on Graphics

The notion of representing a color image as a set of translucent layers, each of a single (non-primary) color, is useful in the field of digital image painting. Although the layering is not present...
General (I.4.0) | Jun 22 18

Architectural principles for cloud software : ACM Transactions on Internet Technology

What comes to mind first with cloud system architectures is the ubiquitous use of microservices, supported by total virtualization from hardware to middleware to applications: virtual machines...
Cloud Computing (C.2.4...) | Jun 14 18

Seamless virtual network for international business continuity in presence of intentional blocks : ACM Transactions on Internet Technology

It is an accepted fact that international borders are vulnerable and permeable when it comes to information technology. This is why international businesses...
Network Management (C.2.3...) | Jul 10 18

Profit maximization with sufficient customer satisfactions : ACM Transactions on Knowledge Discovery from Data

This paper focuses on the prospects of “profit maximization with sufficient customer satisfaction.” The authors present 11 lemmas, nine examples, six...
Electronic Commerce (K.4.4) | Jun 15 18

Conditioning in probabilistic programming : ACM Transactions on Programming Languages and Systems

Machine learning, possibly contrary to popular belief, is not just about endless variations of neural networks. There is also a thriving subculture of probabilistic programming based on Bayesian principles...
Probabilistic Computation (F.1.2...) | Jun 13 18

Lightweight, obfuscation-resilient detection and family identification of Android malware : ACM Transactions on Software Engineering and Methodology

Malware is undoubtedly one of the most real and potent threats in the smartphone industry. Android’s open ecosystem in terms of code as well as...
Security and Protection (C.2.0...) | Jun 22 18

An introduction to distance geometry applied to molecular geometry

The most common way of determining the structures of molecules in a solution is nuclear magnetic resonance (NMR). The signals measured are caused by the flipping of the spins of paramagnetic nuclei in a...
Geometrical Problems & Comp. (F.2.2...) | Jun 7 18

Analytical methods for network congestion control

This is one of the most comprehensive books I have read recently, and it is a must-read for a serious network designer. This book uses a step-by-step approach to build a mathematical model to understand, design, and fix network congestion. This book...
Network Architecture & Design (C.2.1) | May 3 18

Aviation security, privacy, data protection and other human rights

Enerstvedt, having an interesting background in both formal education and industry experience, has artfully combined a discussion of aviation security technology with privacy and human rights in a 453-page...
Security & Protection (K.6.5) | May 30 18

Beginning artificial intelligence with the Raspberry Pi

For anybody looking for a fast and basic introduction to the field of artificial intelligence (AI) or machine learning (ML) supported by many practical examples for one’s own implementation, the book by Norris...
General (I.2.0) | May 11 18

Bioinformatics for evolutionary biologists: a problems approach

This book was specifically designed to keep all elements needed for understanding the fundamental research approaches used in bioinformatics in a single text. It aims to help future evolutionary biologists...
Biology & Genetics (J.3...) | Jun 21 18

Building web applications with Visual Studio 2017

In recent times, the .NET ecosystem has witnessed a rapid transformation in many services it offers. It includes a completely rewritten Entity Framework Core that is designed not only to support multiple platforms, but also to offer features such as nonrelational...
Systems & Software (H.3.4) | May 4 18

Business process management cases: digital innovation and business transformation in practice

As the title promises, this book contains case descriptions and case studies. The introductory chapter tries to provide a framework and editorial guidelines for describing cases from business process...
Business (J.1...) | Jul 12 18

Cloud computing (2nd ed.)

In recent years, the applications and architectural specifications of cloud computing have been major streams of investigation. Besides the cloud’s technical significance at performing practical projects, it has opened a new horizon within the computing...
Distributed Systems (C.2.4) | May 8 18

Coding literacy: how computer programming is changing writing

Like reading and writing, programming has become an essential fundamental tool to organize information. A few centuries ago, being able to write and read, whether in Spanish, English, or French, was a way to be...
General (D.1.0) | Jul 9 18

Compact representations for the design of quantum logic

This book is in the area of quantum computer design. It proposes a new approach for such designs. It provides the background information required to understand the new approach. It also describes experimental results of the approach. Part 1 has two chapters. The first...
Computer-Aided Design (CAD) (J.6...) | Jun 21 18

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy