Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
August 6, 2020

Toward automatic verification of quantum programs
Even if a world of quantum computing for everyone is years (if not decades) away, research on designing proper ways to program such systems has been ongoing for quite some time. History shows that programming is hard; making correct programs, that is, ones that conform to specifications, requires rigor and formal reasoning... more
How the art of reasoning is necessary
When one of his audience said, ‘Convince me that logic is useful,’ he said, Would you have me demonstrate it? ‘Yes.’ Well... more
- Epictetus (108)
AndroZoo: collecting millions of Android apps for the research community: MSR 16

This is basically a data collection paper. How did the authors collect more than three million free Android apps (more than 20 terabytes)? The answer: it’s somewhat more delicate than one might... more

Mobile Processors (C.1.4...) | Aug 5 20

Performance analysis of linear receivers for uplink massive MIMO FBMC-OQAM systems: IEEE Transactions on Signal Processing

Progressive improvements have been made to the offset-quadratic-amplitude-modulation-based filter-bank multicarrier (FBMC-OQAM) signaling scheme, for... more

Signal Processing Systems (C.3...) | Aug 4 20

The rise of serverless computing: Communications of the ACM

In spite of a somewhat confusing introduction--“the server is dead, long live the server”--this informative article gives an overview of the relatively new phenomenon of serverless computing. It includes definitions... more

General (C.0) | Aug 3 20

Should researchers use data from security breaches?: Communications of the ACM

The use of data derived from publicly exposed and security loophole databases will continue to be a controversial subject of debate for legal scholars and IT computing ethics specialists. Should computing... more

Ethics (K.4.1...) | Jul 30 20

Toward automatic verification of quantum programs: Formal Aspects of Computing

Even if a world of quantum computing for everyone is years (if not decades) away, research on designing proper ways to program such systems has been... more

Information Theory (H.1.1...) | Jul 28 20

Management system for secure mobile application development: ACM TURC 19

Our increasing reliance on mobile apps elevates their insecurities and shines a spotlight on their vulnerabilities. The author introduces a secure mobile app development approach that is proactive... more

General (K.6.0) | Jul 22 20

What makes a great manager of software engineers?: IEEE Transactions on Software Engineering

The non-physical nature of software is unique among products developed in the field of engineering; this fact places extreme importance on the qualities that the members of the software engineering team... more

Software Management (K.6.3) | Jul 21 20

Hospitality of chatbot building platforms: SQUADE 19

Chatbots provide for natural language computer conversations, popularized with personal voice assistants like Siri and Alexa. Suitable architecture frameworks for building chatbots are reframed into the “hospitality” of a... more

General (D.2.0) | Jul 9 20

Engineering resilient collective adaptive systems by self-stabilisation: ACM Transactions on Modeling and Computer Simulation

Smart cities, together with the Internet of Things (IoT), are becoming reality at an accelerated speed, supported by the fifth generation of mobile technology... more

Software Engineering (D.2) | Jul 8 20

Local distance restricted bribery in voting: AAMAS 19

The bribery problem asks whether there exists an appropriate-“cost” collection of voters in an election such that, if one strategically changes their votes, one’s favored candidate will win. In that model, each... more

Multiagent Systems (I.2.11...) | Jul 6 20

Data architecture (2nd ed.)

Showing a perceptible pattern as a line-edited transcript consolidated from one or more slide-based seminars, this book provides many illustrations that would otherwise have been the focus of a presenter’s lecture and interactive session. However, the printed... more
Data Warehouse & Repository (H.2.7...) | Jul 31 20

Future automation

Timothy Carone provides a visionary outlook on what will probably be called our digitized future. The book is split into 11 chapters. First, the author introduces autonomous systems (ASs). ASs are (in addition to the Internet of Things, IoT) the core element of the... more
Automation (K.4.3...) | Jul 29 20

Practical Flutter

One of the reasons a business may develop an application for mobile devices is for its branding and digital presence. In today’s market, that requires making the application available for both Android and iOS. The traditional way to accomplish this is to... more
Object-Oriented Design Methods (D.2.2...) | Jul 27 20

Explainable AI: interpreting, explaining and visualizing deep learning

Deep learning has become so dominant in machine learning, and artificial intelligence (AI) as a whole, that its intrinsic lack of interpretability is paradigmatic for the whole field of explainable AI (XAI). This is why progress in... more
Learning (I.2.6) | Jul 24 20

Transmedia knowledge for liberal arts and community engagement

McKenzie made his legacy teaching and working on projects related to the liberal arts, providing students with the skills and knowledge to formulate effective arguments, communicate well, and solve... more
Arts & Humanities (J.5) | Jul 23 20

Social practices and dynamic non-humans

In the contemporary world, there is perhaps an implicit, or even explicit, presumption that human experience matters above all--human society and actions seek to quash, or at least subjugate to the extreme, all nonhuman actors and their... more
Robotics (I.2.9) | Jul 20 20

Applied machine learning

Machine learning methods find application in almost any domain that makes use of some form of computation. These algorithms build appropriate models that help in making predictions; thus, they are of interest in industry as well as in business scenarios. This book is... more
Learning (I.2.6) | Jul 17 20

Information technology for peace and security

A book with this title might seem to be only marginally relevant for corporate security personnel who are not fighting wars or keeping peace. However, in a typical contextual security analysis, you will find terms like “state actors” and “organized crime” to indicate... more
Military (J.1...) | Jul 16 20

Network economics

Network engineers frequently need to interact with business-oriented departments in their company. To do so effectively, it is necessary to be equipped with at least basic knowledge of economic problems related to the technological field. For instance, being... more
Economics (J.4...) | Jul 15 20

DevOps for SharePoint

The existence of, and respect for, software engineering principles in the lives of software engineers, developers, and project managers is quite rich. Moving beyond systems development life cycle (SDLC)-driven models such as waterfall and agile has shown the... more
Automation (K.4.3...) | Jul 14 20

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2020 ThinkLoud, Inc.
Terms of Use
| Privacy Policy