Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
May 25, 2019

The discrete charm of the machine
Digital computers have found their way into every aspect of modern life. They are now essential for work and ubiquitous in leisure, and used from childhood to retirement age, through every stage of adult life. Although the number of digital computers in operation today is already mind boggling, it continues to grow at a fast pace. We... more
Every tool designed by man is a prosthetic device, and for every prosthetic device there is a means of control. Many tools are physical, and their control is manual. In... more
- Robin Milner (1997)
The evolution of an IT service desk: SIGUCCS 18

With the objective of “evolving” an information technology (IT) service desk after 35 years under the same management, Ryan Swan sets out to elaborate on the current status of the service desk and the deficiencies, in his view, that need to be... more

General (K.6.0) | May 23 19

Cyber security in the quantum era: Communications of the ACM

Quantum computing is a challenging and exciting new field. With its possibly enhanced computational power, many non-trackable problems may be solved efficiently. For many applications that depend on the computational... more

Security & Protection (K.6.5) | May 23 19

Scalable and efficient data analytics and mining with Lemonade: Proceedings of the VLDB Endowment

It is unreasonable to assume that data analysis experts are adept at computer programming. However, many tools that a data analyst may want to use require significant programming skills. Moreover, with... more

Data Mining (H.2.8...) | May 21 19

How testing helps to diagnose proof failures: Formal Aspects of Computing

Petiot et al. present testing software components that help optimize the effort of “applying deductive verification to formally prove that a [computer] program respects its formal specification.” The purpose of the proposed... more

Deduction & Theorem Proving (I.2.3) | May 10 19

Self-stabilizing repeated balls-into-bins: Distributed Computing

Starting with an arbitrary assignment of n balls to n bins, the balls-into-bins process repeatedly selects one ball from a non-empty bin and reassigns the selected ball to one of the n bins uniformly at random... more

Random Number Generation (G.3...) | May 9 19

A new block matching algorithm based on stochastic fractal search: Applied Intelligence

Block matching is an important technique for applications involving motion estimation, such as in video surveillance, TV broadcasting, video games, and so on. To improve the efficiency and... more

Algorithms (I.5.3...) | May 8 19

Interconnectability of session-based logical processes: ACM Transactions on Programming Languages and Systems

The analysis of communication network processes is an important topic in computer science. This paper compares two formalisms for describing such networks, namely linear logic (originally derived from an... more

Models of Computation (F.1.1) | May 6 19

Searching for global employability: ACM Transactions on Computing Education

Today’s higher education systems need to produce graduates with global employability that exhibits creativity and innovation, that is, the ability to solve open-ended problems in different cultural settings, but also domain-specific skill... more

Computer Science Education (K.3.2...) | May 3 19

Documenting trajectories in design space: FDG 18

The processes and methods used in the creation of games are often significantly different from conventional software engineering approaches. In this paper, the authors propose a research methodology for... more

General (K.8.0) | May 2 19

Neural network classifiers using a hardware-based approximate activation function with a hybrid stochastic multiplier: ACM Journal on Emerging Technologies in Computing Systems

Li et al. present a novel approach for optimizing neural network implementations, that is, “a new architecture of stochastic neural networks” with a hidden... more

Neural Nets (C.1.3...) | May 1 19

C++ templates (2nd ed.)

The evolution of the C++ language has created the need for revised material on C++ templates. It’s great to see this second edition of C++ templates out at this moment, as it provides a definitive guide to C++ templates with the latest C++ standards... more
C++ (D.3.2...) | May 24 19

Machine learning with TensorFlow

Machine learning with TensorFlow is a short book laid out in three parts. The first part (about 50 pages) gets the reader up to speed with today’s artificial intelligence (AI) and machine learning community. It also covers TensorFlow essentials, from introducing tensors... more
Learning (I.2.6) | May 23 19

Universal quantum computing

Quantum computing is one of the hottest research fields right now, although the theory behind it had its start in the early 1980s, when Richard Feynman asked in a lecture why simulating quantum effects with classical (non-quantum) computers is so tricky [1]. He... more
Information Theory (H.1.1...) | May 22 19

Handbook of model checking

Due to the proliferation and pervasiveness of hardware and software entities in everyday life, ascertaining their trustworthiness is of paramount importance. Model checking is a logic-based approach that determines whether the abstract model of an entity... more
Model Checking (D.2.4...) | May 20 19

The insider threat

Did you ever wish to find the names and addresses of any convicted sex offenders living in your area? The author of this book asserts that parents and employers can use information like this to build what she calls a “risk landscape.” As she explains, it is quite... more
Privacy (K.4.1...) | May 17 19

Programming for hybrid multi/manycore MPP systems

To quote John Levesque, coauthor and director of Cray’s Supercomputing Center of Excellence: “Ask not what your compiler can do for you, ask what you can do for your compiler.” As the book states, it is necessary for... more
Compilers (D.3.4...) | May 16 19

The materiality of interaction

The central theme of the book is the disappearing differences between cyberspace and the real world. In fact, the boundary for interaction between the two realms has never been strict, for example, as represented by the punch card at the dawn... more
Interaction Styles (H.5.2...) | May 15 19

Euclidean distance geometry

If someone has a set of objects whose positions are known, calculating the distances between them is not a problem. However, the inverse problem is difficult, that is, given a set of distances between objects, determine their positions. Unfortunately, several solutions... more
Geometrical Prob. & Computations (F.2.2...) | May 14 19

Monomial ideals and their decompositions

We usually solve problems by breaking them into smaller problems. In the predominant situations, we have linear systems that can be decomposed into several problems because these systems have a basis, that is, the system is the “product” of a... more
Graph Theory (G.2.2) | May 13 19

The discrete charm of the machine

Digital computers have found their way into every aspect of modern life. They are now essential for work and ubiquitous in leisure, and used from childhood to retirement age, through every stage of adult life. Although the number of digital computers in operation today is... more
General (I.2.0) | May 10 19

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy