Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
March 25, 2019

New solutions for cybersecurity
There is a growing recognition that “humans are now [deeply] embedded in three interconnected systems”--social, environmental, and cyber--and the sustainable development of this planet “rest[s] not only on the sustainability of the social and the natural system, but also on... more
Forget Moore’s law, but not because it’s merely a commitment by the semiconductor industry to drive silicon gate technology forward 67 percent a year... more
- Michael S. Malone (2002)
Understanding cross-site linking in online social networks: ACM Transactions on the Web

This paper is a data-driven analysis of cross-site linking in online social networks, including Foursquare, Facebook, and Twitter. It describes the user behavior behind cross-site linking and why users... more

Social Networking (H.3.4...) | Mar 22 19

A novel multilayer AAA model for integrated applications: Neural Computing and Applications

Unidimensional static security policies cannot cater to the needs of a growing enterprise anymore. Local regulations, business processes, operational levels, and threat modeling are the... more

Neural Nets (C.1.3...) | Mar 22 19

Package-aware scheduling of FaaS functions: ICPE 18

This paper applies the longstanding notion of caching to the new field of serverless computing. Moving computation to the data, that is, functions to the nodes where libraries are cached, is advantageous... more

Scheduling (D.4.1...) | Mar 22 19

Context-driven and real-time provisioning of data-centric IoT services in the cloud: ACM Transactions on Internet Technology

The Internet of Things (IoT) and cloud computing infrastructure are synonymous in contemporary computing, insomuch as the phenomena relate... more

Cloud Computing (C.2.4...) | Mar 21 19

The seven tools of causal inference, with reflections on machine learning: Communications of the ACM

Social media tells us that data science, machine learning (ML), and artificial intelligence (AI) are big. The author of this article, whose title evokes a well-known self-help book... more

Learning (I.2.6) | Mar 21 19

A robust machine learning technique to predict low-performing students: ACM Transactions on Computing Education (TOCE)

Academic failure is one of the most important problems in higher education institutions around the world. In a continuous cycle, universities admit new... more

Computer Uses in Education (K.3.1) | Mar 20 19

Symbolic checking of fuzzy CTL on fuzzy program graph: Acta Informatica

This paper presents a new temporal logic for fuzzy logic systems, fuzzy computation tree logic (FzCTL), based on previous work on Kripke structures for fuzzy logic systems, that is, fuzzy program graph (FzPG)... more

Temporal Logic (F.4.1...) | Mar 20 19

Digital revolution and its impact on education systems in developing countries: Education and Information Technologies

This paper is a literature review on the use of digital technologies in education. The context is so-called “developing countries.” It discusses... more

General (K.3.0) | Mar 19 19

Search-based program synthesis: Communications of the ACM

Program synthesis aims at the automatic generation of “an executable implementation ... from a high-level logical specification of the desired input-to-output behavior.” The review article concentrates on... more

General (D.1.0) | Mar 19 19

Blockchains from a distributed computing perspective: Communications of the ACM

Maurice Herlihy has published a book and numerous papers on distributed systems, and in particular concurrency, so he is in a very good position to judge blockchains. He has written here an excellent... more

Cybercash, Digital Cash (K.4.4...) | Mar 18 19

New solutions for cybersecurity

There is a growing recognition that “humans are now [deeply] embedded in three interconnected systems”--social, environmental, and cyber--and the sustainable development of this planet “rest[s] not only on the sustainability of the social and the... more
Security & Protection (K.6.5) | Mar 22 19

The digital and the real world

The digital and the real world is a quite unique text that goes beyond the common clichés of describing digitalization as a global phenomenon. Instead, the book investigates the complex relationships between continuous physical reality and digital... more
General (F.0) | Mar 22 19

Network function virtualization

The exponential growth of cellular network data, which grows at a pace of 60 percent per year and is expected to increase even more due to the growth of Internet of Things (IoT) networks, poses some unprecedented challenges to the design of data networks. To cope with... more
General (C.2.0) | Mar 21 19

Introduction to recursive programming

Self-directed action can challenge the notion of action and defy understanding. It can trap one in a disorienting hall of mirrors or in a contorted posture. Recursion, which employs a function that calls itself, is an example. It is as conceptually elegant as it is subtle and... more
Recursion (D.3.3...) | Mar 20 19

Social interactions in virtual worlds

As the title implies, this book is a compilation of studies on how virtual worlds may have applications to the real world. The editors claim that readers will find data on how individuals and pairs behave within a game; what patterns of behavior exist within groups; how... more
Artificial, Aug. & Virt. Realities (H.5.1...) | Mar 15 19

Absolute FreeBSD (3rd ed.)

There are more than 700 pages in this book, and the author suggests that it should be read in entirety, from front to back! Most readers will be happy to skip the introductory text and jump straight to chapter 2, “Before You Install,” where they can learn what sort of... more
Unix (D.4.0...) | Mar 15 19

Beginning robotics with Raspberry Pi and Arduino

The language used in this book is very close to beginner level. It includes many examples, with code, images, and details of the materials needed to assemble the presented robot. The book’s ten chapters cover five key aspects related to low-cost robots: the robot... more
Microprocessors & computers (B.7.1...) | Mar 14 19

Deep learning for computer vision with Python

Internet resources for learning artificial intelligence (AI), especially regarding the subtopic of machine learning (ML), are expanding rapidly. Two resources, presented as online books, are the subject of this review. Both resources overlap in coverage of ML and deep... more
Computer Vision (I.5.4...) | Mar 12 19

Polar codes

Coding and information theory is at the heart of modern communication and computer technologies. Shannon’s seminal work shows that you can transmit bits on a noisy channel using code, and the probability of error can be made arbitrarily small provided the code... more
Coding & Information Theory (E.4) | Mar 7 19

Fog computing

In a nutshell, fog computing tries to transfer familiar concepts from cloud computing, like virtualization, elastic scalability, and everything-as-a-service (XaaS), closer to the sensors and devices of the Internet of Things (IoT) or to end users, to the so-called “edge,” to reduce... more
Distributed Networks (C.2.1...) | Mar 6 19

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy