Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
Misc

View:



Cooperative heterogeneous multi-robot systems: a survey : ACM Computing Surveys

To automatically solve complex tasks--for example, in domestic services, intelligent transportation, surveillance, and emergency response--we expect that one single robot cannot succeed; so...
Robotics (I.2.9) | Aug 7 19

Smart city system design : ACM Computing Surveys

As the authors state, “smart city applications in healthcare, transportation, utility, safety, and environmental health” are likely to benefit from machine intelligence and Internet of Things (IoT) technology. In this survey article on smart city system design...
Security & Protection (C.2.0...) | Aug 16 19

Software-defined networking-based DDoS defense mechanisms : ACM Computing Surveys

This article surveys distributed denial-of-service (DDoS) attacks on software-defined networks (SDNs). SDNs separate the control plane from the data plane in computer networks, thus...
Security & Protection (D.4.6) | Jul 26 19

Rumor blocking through online link deletion on social networks : ACM Trans. on Knowledge Discovery from Data

Today, people often depend on social networking services to get information. It is often observed that rumors spread quickly over social networks, owing to personal relationships. Social networking...
Network Architecture & Design (C.2.1) | Aug 21 19

Algorithm 993 : ACM Trans. on Mathematical Software

The Kronecker product of two matrices replaces each element of the first matrix with a multiple of a copy of the second matrix. The history, applications, and properties of the Kronecker and the symmetric...
Numerical Algorithms & Problems (F.2.1) | Aug 14 19

Interconnectability of session-based logical processes : ACM Transactions on Programming Languages and Systems

The analysis of communication network processes is an important topic in computer science. This paper compares two formalisms for describing such networks, namely linear logic (originally derived from an...
Models of Computation (F.1.1) | May 6 19

FeatherNet : ACM Transactions on Reconfigurable Technology and Systems

For some time, application-specific integrated circuits (ASICs) have been used to efficiently accelerate computational performance in many areas of technology, including Internet of Things (IoT)...
General (B.0) | Jul 30 19

Take it or leave it: a survey study on operating system upgrade practices : ACSAC 18

Periodic software updates are a necessary evil to keep computers and other digital devices protected from viruses and other malicious forms of exploitation; still, many users resent reminders from vendors...
Testing & Debugging (D.2.5) | Aug 19 19

The art, poetics, and grammar of technological innovation as practice, process, and performance : AI & Society

Intrigued by the almost lyrical title (notice the alliteration of three “p”s) and the somewhat improbable connection of technology innovation to art and grammar, I...
Philosophical Foundations (I.2.0...) | Aug 1 19

A new block matching algorithm based on stochastic fractal search : Applied Intelligence

Block matching is an important technique for applications involving motion estimation, such as in video surveillance, TV broadcasting, video games, and so on. To improve the efficiency and...
Algorithms (I.5.3...) | May 8 19



A philosophy of software design

I distinctly recall the first class I taught in software design, in 1980. One student from that course is now a computer science (CS) professor and department head at a major college in Tel Aviv. This anecdote, with its dating, is relevant to this book. It is well known that a...
General (D.0) | Jun 3 19

Beginning blockchain

Blockchain, a distributed ledger technology, is experiencing a surge of popular interest in the context of various domains, including electronic health records, supply chains, cryptocurrencies, and electronic voting, to name a few. A blockchain is defined as a system of record to...
Cybercash, Digital Cash (K.4.4...) | Jul 8 19

Building blockchain projects

Readers will get a first look at how to access the Ethereum blockchain and working code, as well as how to “do” something with this technology. Unlike Bitcoin, the preceding cryptocurrency, Ethereum can execute arbitrary programs on its blockchain, that is...
Distributed Databases (H.2.4...) | May 28 19

Building your online store with WordPress and WooCommerce

This is a how-to book on using WordPress and WooCommerce--WooCommerce is a plugin for WordPress, creating an e-commerce store. The text goes through the steps required to configure...
Electronic Commerce (K.4.4) | Jun 27 19

C++ templates (2nd ed.)

The evolution of the C++ language has created the need for revised material on C++ templates. It’s great to see this second edition of C++ templates out at this moment, as it provides a definitive guide to C++ templates with the latest C++ standards. The...
C++ (D.3.2...) | May 24 19

Calendrical calculations (4th ed.)

Calendrical computation is motivated by a collision between incommensurability and importance. The month (the time from one new moon to another) is not an integral number of days, and the year (the time between successive spring equinoxes) is not an...
Mathematics & Statistics (J.2...) | Jul 30 19

Comprehensive healthcare simulation

There have been many changes in the ways in which surgeons gain early experience. These include a worldwide reduction in working hours and a migration from hands-on apprenticeship-type training. There have also been changes in patient expectations, particularly...
Life & Medical Sciences (J.3) | Jun 19 19

Computational artifacts

The philosophy of any discipline must account for the goals, methodology, and subject matter of the discipline [1]. There is a well-developed body of scholarship on the philosophy of mathematics and of science, especially physics and biology, and more recently...
General (A.0) | Jul 15 19

Computational texture and patterns

This slim volume considers the question of representing and matching textures and similar patterns. This question is closely related to recognition--for example, recognizing that something is a picture of a leafless tree--and segmentation, that is, picking out the...
Vision & Scene Understanding (I.2.10) | Aug 16 19

Contactless 3D fingerprint identification

I am interested in machine learning (ML)-based image classification. Thus, I thought this book may be an interesting read about how ML techniques are applied to fingerprinting. As it turns out, the book is not about ML, but just plain mathematics and algorithms...
Computer Vision (I.5.4...) | Aug 13 19


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy