Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
October 28, 2016

Safeguarding users’ sensitive data in the cloud and the browser
In this 54-minute video presentation, Brad Karp of University College London talks about “safeguarding users’ sensitive data in the cloud and the browser.” The title is very inviting to those who want to know how to protect sensitive data. Today, the use of cloud services... more
Consider any one relay. At any given time, say a millisecond, it can be in either of two states; that is, it can be transmitting one signal or none. Hence, two... more
- Warren S. McCulloch (1948)
A survey on wireless indoor localization from the device perspective: ACM Computing Surveys

This long survey considers the problems related to wirelessly localizing objects in an indoor setting. For the purpose of dividing the problem, the authors consider two categories: device based and... more

Miscellaneous (C.2.m) | Oct 28 16

Algorithms for computing backbones of propositional formulae: AI Comm.

The backbone (also called “necessary variables” or “fixed assignments”) of a propositional formula φ is the set of literals that are true in all models of the formula. Put... more

Algorithms (I.1.2) | Oct 27 16

Application of IT in healthcare: a systematic review: ACM SIGBioinformatics Record

Toor and Chana present a cogent overview of emerging trends in information technology in the broader healthcare sector, distilled from 108 papers that were analyzed and ultimately classified into four... more

Health (J.3...) | Oct 27 16

Smart agents and fog computing for smart city applications: Smart-CT 16

An agent is a computer system that is situated in some environment and can act autonomously. Fog computing is a computing paradigm in which computation is executed on a computing node that resides... more

General (I.2.0) | Oct 27 16

Quantitative analysis of the mission impact for host-level cyber defensive mitigations: ANSS 16

Discussion and qualitative analysis on mitigation issues of cyber security from the host’s perspective are provided in this paper. The contribution... more

Security & Protection (C.2.0...) | Oct 26 16

Intercrossed access controls for secure financial services on multimedia big data in cloud systems: ACM Trans. on Multimedia Computing, Communications & Applications

Supposedly this paper is about financial and cloud security, but I could not find much about these aspects in the authors’ model. Their security... more

Security & Protection (D.4.6) | Oct 26 16

Querying graphs with data: Journal of the ACM

Various approaches to querying so-called graphs with data are described very comprehensively in this paper. In principle, this category of graphs is called (labeled) property graphs in the graph database... more

Data Models (H.2.1...) | Oct 25 16

On BLAS level-3 implementations of common solvers for (quasi-) triangular generalized Lyapunov equations: ACM Transactions on Mathematical Software

Each of the generalized Lyapunov matrix equations can be seen simply as a system of linear equations in the elements of the unknown matrix X. For... more

Numerical Linear Algebra (G.1.3) | Oct 20 16

A high performance QDWH-SVD solver using hardware accelerators: ACM Transactions on Mathematical Software

To make effective use of modern computer hardware, algorithms have to be carefully designed with concurrency in mind: in particular... more

Mathematical Software (G.4) | Oct 20 16

A vision for heart rate health through wearables: UbiComp 16

Mobile health (mHealth) is an increasingly important area of biomedical informatics that is focused on the use of wearable sensors, such as those found in smartphones, to monitor health. This is an... more

Miscellaneous (H.5.m) | Oct 19 16

Verified functional programming in Agda

Verification used to be a daunting task, to be performed only in extreme circumstances, at great cost. Our knowledge of how to perform verification, at least for certain kinds of code, has progressed so much that there... more
Spec., Verif. & Reas. about Prog. (F.3.1) | Oct 28 16

Private data and public value: governance, green consumption, and sustainable supply chains

This edited volume is in a series on “Public Administration and Information Technology,” while the bookstore filing recommendation over the barcode states “Social Sciences/Political... more
Government (J.1...) | Oct 28 16

Readings in formal epistemology: sourcebook

When I was an undergraduate student decades ago, one of the courses I took to meet the required number of upper division credit hours in philosophy was on epistemology, the study of knowledge: How... more
Social & Behavioral Sciences (J.4) | Oct 28 16

Perspectives on change: what academics, consultants and managers really think about change

As Greek philosopher Heraclitus wrote 25 centuries ago, “change is the only constant in life,” so, in theory, there is nothing new about this idea. The novel development is that... more
Project & People Management (K.6.1) | Oct 28 16

The Scottish book (2nd ed.)

The Scottish book is a legend among mathematicians and computer scientists. It has nothing to do with Scots or Scotland, and could rather be called the Polish book, as it took its name from the Scottish Café... more
Mathematics & Statistics (J.2...) | Oct 28 16

Cybersecurity lexicon

Consider this a “handy desk reference for architects, engineers, building managers, students, researchers, and consultants interested in preventing cyber-physical attacks against their facilities”... more
Security & Protection (K.6.5) | Oct 27 16

Codes, ciphers and spies: tales of military intelligence in World War I

The invention of asymmetric key cryptography by Diffie and Hellman in 1976 [1] is generally accepted as the milestone that defines the boundary between classic and modern cryptography. Before 1976... more
Data Encryption (E.3) | Oct 27 16

Common Lisp recipes: a problem-solution approach

Lisp, the second high-level programming language invented at the dawn of the computer age, has never been out of fashion, especially for artificial intelligence and other specialized areas. When the Lisp community... more
Applicative (Functional) Prog. (D.1.1) | Oct 27 16

Critical infrastructure protection research: results of the first critical infrastructure protection research project in Hungary

The term “critical infrastructure” suggests a nation’s systems that deliver services and protection to its inhabitants. Here, we find a book that can be divided into three parts. A lengthy introduction... more
Security & Protection (K.6.5) | Oct 27 16

Security requirements engineering: designing secure socio-technical systems

Dalpiaz et al. set out to address both students and practitioners with this book. Chapter 2 starts with a very high-level overview of computer and information security. The basic requirements... more
Security & Protection (K.6.5) | Oct 27 16

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2016 ThinkLoud, Inc.
Terms of Use
| Privacy Policy