Cooperative heterogeneous multi-robot systems: a survey
: ACM Computing Surveys
To automatically solve complex tasks--for example, in domestic services, intelligent transportation, surveillance, and emergency response--we expect that one single robot cannot succeed; so...
Robotics (I.2.9) | Aug 7 19
Smart city system design
: ACM Computing Surveys
As the authors state, “smart city applications in healthcare, transportation, utility, safety, and environmental health” are likely to benefit from machine intelligence and Internet of Things (IoT) technology. In this survey article on smart city system design...
Security & Protection (C.2.0...) | Aug 16 19
Software-defined networking-based DDoS defense mechanisms
: ACM Computing Surveys
This article surveys distributed denial-of-service (DDoS) attacks on software-defined networks (SDNs). SDNs separate the control plane from the data plane in computer networks, thus...
Security & Protection (D.4.6) | Jul 26 19
Rumor blocking through online link deletion on social networks
: ACM Trans. on Knowledge Discovery from Data
Today, people often depend on social networking services to get information. It is often observed that rumors spread quickly over social networks, owing to personal relationships. Social networking...
Network Architecture & Design (C.2.1) | Aug 21 19
: ACM Trans. on Mathematical Software
The Kronecker product of two matrices replaces each element of the first matrix with a multiple of a copy of the second matrix. The history, applications, and properties of the Kronecker and the symmetric...
Numerical Algorithms & Problems (F.2.1) | Aug 14 19
Interconnectability of session-based logical processes
: ACM Transactions on Programming Languages and Systems
The analysis of communication network processes is an important topic in computer science. This paper compares two formalisms for describing such networks, namely linear logic (originally derived from an...
Models of Computation (F.1.1) | May 6 19
: ACM Transactions on Reconfigurable Technology and Systems
For some time, application-specific integrated circuits (ASICs) have been used to efficiently accelerate computational performance in many areas of technology, including Internet of Things (IoT)...
General (B.0) | Jul 30 19
Take it or leave it: a survey study on operating system upgrade practices
: ACSAC 18
Periodic software updates are a necessary evil to keep computers and other digital devices protected from viruses and other malicious forms of exploitation; still, many users resent reminders from vendors...
Testing & Debugging (D.2.5) | Aug 19 19
The art, poetics, and grammar of technological innovation as practice, process, and performance
: AI & Society
Intrigued by the almost lyrical title (notice the alliteration of three “p”s) and the somewhat improbable connection of technology innovation to art and grammar, I...
Philosophical Foundations (I.2.0...) | Aug 1 19
A new block matching algorithm based on stochastic fractal search
: Applied Intelligence
Block matching is an important technique for applications involving motion estimation, such as in video surveillance, TV broadcasting, video games, and so on. To improve the efficiency and...
Algorithms (I.5.3...) | May 8 19
A philosophy of software design
I distinctly recall the first class I taught in software design, in 1980. One student from that course is now a computer science (CS) professor and department head at a major college in Tel Aviv. This anecdote, with its dating, is relevant to this book. It is well known that a...
| Jun 3 19
Blockchain, a distributed ledger technology, is experiencing a surge of popular interest in the context of various domains, including electronic health records, supply chains, cryptocurrencies, and electronic voting, to name a few. A blockchain is defined as a system of record to...
Cybercash, Digital Cash (K.4.4...)
| Jul 8 19
Building blockchain projects
Readers will get a first look at how to access the Ethereum blockchain and working code, as well as how to “do” something with this technology. Unlike Bitcoin, the preceding cryptocurrency, Ethereum can execute arbitrary programs on its blockchain, that is...
Distributed Databases (H.2.4...)
| May 28 19
Building your online store with WordPress and WooCommerce
This is a how-to book on using WordPress and WooCommerce--WooCommerce is a plugin for WordPress, creating an e-commerce store. The text goes through the steps required to configure...
Electronic Commerce (K.4.4)
| Jun 27 19
C++ templates (2nd ed.)
The evolution of the C++ language has created the need for revised material on C++ templates. It’s great to see this second edition of C++ templates out at this moment, as it provides a definitive guide to C++ templates with the latest C++ standards.
| May 24 19
Calendrical calculations (4th ed.)
Calendrical computation is motivated by a collision between incommensurability and importance. The month (the time from one new moon to another) is not an integral number of days, and the year (the time between successive spring equinoxes) is not an...
Mathematics & Statistics (J.2...)
| Jul 30 19
Comprehensive healthcare simulation
There have been many changes in the ways in which surgeons gain early experience. These include a worldwide reduction in working hours and a migration from hands-on apprenticeship-type training. There have also been changes in patient expectations, particularly...
Life & Medical Sciences (J.3)
| Jun 19 19
The philosophy of any discipline must account for the goals, methodology, and subject matter of the discipline . There is a well-developed body of scholarship on the philosophy of mathematics and of science, especially physics and biology, and more recently...
| Jul 15 19
Computational texture and patterns
This slim volume considers the question of representing and matching textures and similar patterns. This question is closely related to recognition--for example, recognizing that something is a picture of a leafless tree--and segmentation, that is, picking out the...
Vision & Scene Understanding (I.2.10)
| Aug 16 19
Contactless 3D fingerprint identification
I am interested in machine learning (ML)-based image classification. Thus, I thought this book may be an interesting read about how ML techniques are applied to fingerprinting. As it turns out, the book is not about ML, but just plain mathematics and algorithms...
Computer Vision (I.5.4...)
| Aug 13 19