Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
Misc

View:



Automatic software repair: a bibliography : ACM Computing Surveys

The author successfully provides a big picture view of automatic software repair. The survey covers an impressive list of papers, giving an excellent overview of automatic software repair. Those papers are...
Testing & Debugging (D.2.5) | Oct 11 18

Systematically understanding the cyber attack business: a survey : ACM Computing Surveys

Cybercrime is a lucrative business with a very positive return on investment. To combat the cybercrime business, it helps to understand how it operates. The authors use the value chain analysis method to...
Security & Protection (K.6.5) | Oct 19 18

Data-driven concurrency for high performance computing : ACM Transactions on Architecture and Code Optimization

While in procedural parallel programming with multithreading lemmas, the synchronization of the sequences of parallel execution of tasks is...
Distributed Architectures (C.1.4...) | Oct 8 18

Infrastructural inaccessibility: tech entrepreneurs in occupied Palestine : ACM Transactions on Computer-Human Interaction

The paper describes how “tech entrepreneurs in occupied Palestine” are hindered by a lack of access to infrastructure. Particular immediate issues are...
Organizational Impacts (K.4.3) | Dec 12 18

Synthetic depth-of-field with a single-camera mobile phone : ACM Transactions on Graphics

In a photograph, depth-of-field is the part of the image that is sharp or focused, in contrast to other areas that are defocused or blurred. Depth-of-field can be deep (meaning the whole image is well focused...
Computer Graphics (I.3) | Nov 29 18

Inferring extended probabilistic finite-state automaton models from software executions : ACM Transactions on Software Engineering and Methodology

To facilitate the testing and maintenance of software systems, researchers have generated behavioral models in the form of finite-state automata from...
Formal Methods (D.2.4...) | Oct 25 18

3D metal printing technology: the need to re-invent design practice : AI & Society

Additive manufacturing (AM) (also know as 3D printing) is the process of manufacturing objects directly from 3D model data, typically using a layer-by-layer...
Manufacturing (J.1...) | Oct 4 18

Mitigating risks of digitalization through managed industrial security services : AI & Society

This paper discusses the risks of industrial security services. Moreover, the authors consider future automation scenarios as well as the major concepts involved in industrial security...
Security & Protection (K.6.5) | Oct 19 18

Sentence entailment in compositional distributional semantics : Annals of Mathematics and Artificial Intelligence

Systems for natural language understanding are now quite good and becoming commonplace. Unfortunately, some of the most powerful are also quite opaque: there is no satisfactory...
Semantics (D.3.1...) | Nov 2 18

Comparative study of computational algorithms for the Lasso with high-dimensional, highly correlated data : Applied Intelligence

High-dimensional data analysis boils down to statistical regression, or selecting the variables that guarantee the most stable results across a wide variety of...
Algorithm Design & Analysis (G.4...) | Oct 24 18



A formal theory of commonsense psychology

In introducing commonsense psychology, this book motivates readers to consider computational psychology. It describes the foundational building blocks of such computations. It provides not only purely...
Psychology (J.4...) | Oct 5 18

A journey through discrete mathematics: a tribute to Jiří Matoušek

Professor Jiří Matoušek was a distinguished scientist with significant achievements in the areas of discrete and “computational geometry, topology, and some aspects of metric space theory.” His work in...
General (G.2.0) | Oct 11 18

A systematic approach to learning robot programming with ROS

Robots are based on very complex systems that require expertise in many areas. In recent years, robot operating system (ROS) has become the standard for controlling robots. ROS offers a complete set of tools and a...
Robotics (I.2.9) | Sep 28 18

Advanced concepts for renewable energy supply of data centres

Data centers are large critical infrastructure facilities devoted to the data processing, data storage, and communications needed by an ever-growing number and diversity of services; they must stay connected to the...
General (H.2.0) | Dec 7 18

Assessing and improving prediction and classification

There is an increased interest in machine learning (ML) in both academy and industry. One consequence is a greater demand for textbooks and other educational materials that explain the different facets of ML to a heterogeneous readership. While many...
Classifier Design & Evaluation (I.5.2...) | Nov 28 18

Attribute-based access control

In many applications, it becomes a necessity to define who (which user) is allowed to access what (which resource). This is achieved via access control. Several models for access control exist. Attribute-based access control (ABAC) is one of them, and forms the...
Access Controls (D.4.6...) | Sep 5 18

Autonomy and artificial intelligence

The volume collects works from two symposia, held at Stanford University, in 2015 and 2016. The central question is the relationship between autonomous systems and artificial intelligence (AI), as well as research opportunities for integrating autonomous...
Applications & Expert Systems (I.2.1) | Oct 3 18

Big data factories

In the technology world, ABCD is a buzzword. “A” stands for artificial intelligence (AI), “B” for blockchain, “C” for cloud, and “D” for big data. “D” especially is the origin of the others: you need the cloud because you have to store big data; blockchains can be used to...
Content Analysis & Indexing (H.3.1) | Oct 16 18

Cloud computing and software services

Cloud computing and software services includes many fruitful topics. In 17 chapters, the authors demonstrate their forte with interesting contributions to different branches of cloud computing. The first four chapters serve as an introduction, whereas the rest of...
Cloud Computing (C.2.4...) | Nov 20 18

Codes, cryptology and curves with computer algebra

This volume offers a terse, highly formal exposition of the relation between the four subjects named in the title: codes (transformations of a stream of information), cryptology (transformations that seek to hide...
Data Encryption (E.3) | Sep 13 18


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy