Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
April 24, 2017
Search
Highlight

Designing software architectures
It is often forgotten that common sense is the least common of the senses. Sensible design advice, guidelines, and heuristics are often no more than just that: plain old common sense. However, rational reminders of our own fallibility and cognitive biases in the form of design methods... more
Quote
Cyberpublishing will have to involve technologies that will contribute toward an interactive and participatory environment, that will encourage dynamic... more
- Hal Berghel (2000)
Articles
Computer vision and natural language processing: recent approaches in multimedia and robotics: ACM Computing Surveys

Robot learning operates at the crossroads of disciplines such as machine learning, robotics engineering, and developmental robotics for lifelong learning... more

General (I.2.0) | Apr 21 17

Digital wellness services for young elderly: a missed opportunity for mobile services: Journal of Theoretical and Applied Electronic Commerce Research

This is a preliminary report/proposal about using mobile digital services to help the “young elderly,” that is, people between 60 and 75 years old... more

Electronic Commerce (K.4.4) | Apr 20 17

Context-based unsupervised ensemble learning and feature ranking: Machine Learning

An unsupervised ensemble learning and feature ranking method in which the combiner has no information about the expert’s performance, methods, and the data with... more

Feature Evaluation & Selection (I.5.2...) | Apr 20 17

Crowdsourced data management: a survey: IEEE Transactions on Knowledge and Data Engineering

Many data management and analytics tasks, notably entity resolution, sentiment analysis, and image recognition, cannot always be fulfilled through automated software processes alone, but also... more

Data Models (H.2.1...) | Apr 18 17

Optimizing data placement on GPU memory: a portable approach: IEEE Transactions on Computers

We say that a computational artifact is “portable” if it can be implemented on a variety of targets. In this paper, the portable artifact is a strategy for the... more

Performance Analysis & Design Aids (B.3.3) | Apr 17 17

Usage, costs, and benefits of continuous integration in open-source projects: ASE 16

A profound revolution has been taking place throughout software engineering, led again by the software industry. Continuous integration (CI) was first discussed in 1991, but until recently only a handful... more

General (D.2.0) | Apr 12 17

Foundations for using linear temporal logic in Event-B refinement: Formal Aspects of Computing

Event-B is a formal method for system-level modeling and analysis. In the last decade, Event-B refinement has generated a lot of interest as a formalism for developing highly reliable software... more

Mechanical Verification (F.3.1...) | Apr 12 17

A mathematical theory of resources: Information and Computation

Many of the physical sciences ultimately deal with resources. The important questions are: Can a given resource be converted into another? And if so... more

Math. Logic & Formal Languages (F.4) | Apr 12 17

Open-ended evolution: perspectives from the OEE workshop in York: Artificial Life

An open-ended evolutionary (OEE) system, conceived to be part of artificially intelligent systems (biological or otherwise), has been vaguely defined as one capable of producing a continual... more

Artificial Intelligence (I.2) | Apr 11 17

An empirical study of the effectiveness of telepresence as a business meeting mode: Information Technology and Management

Telepresence is enhanced video conferencing, where participants from various locations see each other in life-size, voices seem to come from the speaker... more

Video (H.5.1...) | Apr 11 17

Books
Bayesian methods in the search for MH370

One can seldom consider mathematics-heavy books as exciting page-turners. Yet, Bayesian methods in the search for MH370 is so far the best one I have encountered that could stand up to such a description. Published by... more
Prob. Algorithms (Inc. Monte Carlo) (G.3...) | Apr 21 17

The fundamentals of computational intelligence: system approach

Not for the faint-hearted or those without mathematical knowledge, the rhythm of this book is as follows: first, it provides a profound formal description grounded in mathematics in some sections of... more
Uncertainty, Fuzzy & Prob. Reas. (I.2.3...) | Apr 21 17

J. Michael Dunn on information based logics

Apart from introductory material and an “autobio,” these articles on Dunn’s work can be divided into three areas: Relevance logic (which Australians call “relevant” logic), the area in which Dunn did his doctoral thesis... more
Knowledge Rep. Formalisms & Meth. (I.2.4) | Apr 20 17

Designing with Xilinx FPGAs: using Vivado

This highly practical compendium of articles from different authors covers topics about, as the title of the book says, design methods using field-programmable gate array (FPGA) devices from the vendor Xilinx. FPGA devices are among the most... more
Gate Arrays (B.7.1...) | Apr 20 17

Managing software process evolution

Building a software artifact necessarily involves a methodology, commonly referred to as a software development process. Evolving this process is necessary to cope with new requirements and new technologies. User expectations are evolving... more
Software Process (K.6.3...) | Apr 19 17

Bitcoin and blockchain security

Recently there has been a lot of buzz about Bitcoin and blockchains. Bitcoin is a digital currency that has received considerable attention in the past decade. The design of Bitcoin offers the world the hope of a low-cost, decentralized, and anonymous currency. It... more
Electronic Commerce (K.4.4) | Apr 17 17

Cyber-security of SCADA and other industrial control systems

Industrial control systems (ICSs) are systems comprising computers and devices that may be electrical and/or mechanical in nature. They are widely used to partially or totally control equipment in... more
Security & Protection (K.6.5) | Apr 17 17

ITIL Practitioner guidance

ITIL Practitioner guidance is a six-chapter, detailed guide, with another chapter containing a handy toolkit that provides adopters with initial foundational templates, worksheets, and assessments... more
Management Techniques (K.6.1...) | Apr 14 17

Parameterized algorithms

There are 36 definitions of complexity like the 36 flavors of ice cream! In simplest terms, complexity refers to the amount of resources consumed to execute an algorithm (resources here imply running time, space, computational effort, and so on... more
Nonnumerical Algorithms & Problems (F.2.2) | Apr 13 17

Atari to Zelda: Japan’s videogames in global contexts

It is becoming increasingly important for researchers to critically engage with video games since they are widely believed to be the fastest-growing form of media over the coming years. One facet of this engagement... more
Games (K.8.0...) | Apr 13 17


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy