Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
August 26, 2016
Search
Highlight

What are the elements of software design
This is my second attempt to formally review a video for Computing Reviews. In the first attempt, the quality of production was so totally awful (with no relation to the lecturer) that any attempt to honestly review it was simply hopeless. In this video, the subject is somewhat better, though there still remains much room for... more
Quote
I’m increasingly convinced that debates about the [National Information Infrastructure] are distractions from the real problems facing the nation. What I... more
- Gary Chapman (1996)
Articles
Exploiting hierarchical locality in deep parallel architectures: ACM Transactions on Architecture and Code Optimization

Locality awareness in programs can be used to improve their execution performance on parallel computers. Modern parallel computers have many levels of parallelism; many cores on a chip and many... more

Processors (D.3.4) | Aug 26 16

An improved augmented reality system based on AndAR: Journal of Visual Communication and Image Representation

Chen et al. introduce an augmented reality (AR) mechanism in mobile computing using AndAR as the AR development kit for developing augmented reality applications in Android... more

Artificial, Augmented & VR (H.5.1...) | Aug 23 16

A strand graph semantics for DNA-based computation: Theoretical Computer Science

Petersen et al. provide several excellent definitions and results on strand graph semantics for DNA computation in this lengthy but technically very sound paper. They very carefully review the state of art and... more

Biology & Genetics (J.3...) | Aug 23 16

The risks of self-auditing systems: Communications of the ACM

Impartial risk assessments of systems require independent external audits. Identifying risks posed by automatic self-auditing systems is not easy. How should internal self-auditing computing devices... more

Security & Protection (D.4.6) | Aug 22 16

Rigorous modeling and analysis of interoperable medical devices: MSM 16

“First, do no harm” meets the Internet of Things (IoT)? This paper proposes that we need to be sure that medical systems are functional, safe, and secure--of course. Further, the authors try to show how... more

Model Checking (D.2.4...) | Aug 19 16

Fine-grained appliance usage and energy monitoring through mobile and power-line sensing: Pervasive and Mobile Computing

Energy consumption is a current concern in many aspects of daily life. The concept of smart buildings, where researchers propose... more

General (K.4.0) | Aug 18 16

Systematic automation of scenario-based testing of user interfaces: EICS 16

In May 2016, the driver of a Tesla Model S equipped with the autopilot feature was killed when his vehicle crashed into a tractor-trailer [1]. Tesla confirmed that the vehicle’s autopilot was active and that its... more

User Interfaces (D.2.2...) | Aug 18 16

Rigorous modeling and analysis of interoperable medical devices: MSM 16

With the advent of the electronic health record (EHR), the quality of patient care increased. Many hospitals are encouraging patients to voluntarily provide their own health status (patient health record, PHR) to... more

Model Checking (D.2.4...) | Aug 18 16

On the impact of personality in massive open online learning: UMAP 16

This paper presents two research questions that revolve around how a student’s personality reflects their academic success. The authors collected data from a massive open online course (MOOC)... more

Distance Learning (K.3.1...) | Aug 17 16

The yoking-proof-based authentication protocol for cloud-assisted wearable devices: Personal and Ubiquitous Computing

To understand the problem raised in the paper, we have to clarify two important concepts included in its title. One of the concepts is yoking-proof-based... more

Cloud Computing (C.2.4...) | Aug 16 16

Books
Beginning JSON

JSON stands for JavaScript object notation. It is a data-interchange format that has become very popular with web applications. Although important by itself, a data format is better understood inside a context or ecosystem. This is why, before explaining JSON, the first three... more
JavaScript (D.3.2...) | Aug 26 16

Agent-based modelling in economics

The social sciences have long been plagued by physics envy. The seductive simplicity of closed-form equations with strong predictive power in dealing with billiard balls, planets, and electrons suggests that we ought to be able to analyze the behavior of people with... more
Multiagent Systems (I.2.11...) | Aug 25 16

Machine learning paradigms: applications in recommender systems

Information overload has been a known phenomenon for at least the last two decades. Reordering or filtering search results, individualizing searched information, and providing recommendations are essential... more
Learning (I.2.6) | Aug 25 16

Docker containers

When Computing Reviews invited me to review this book, I thought it would be a good way for me to understand what exactly docker containers are. After reading and rereading the first few chapters, I was still as ignorant as in the beginning, so I decided to take a... more
Systems Programs & Utilities (D.4.9) | Aug 24 16

Sublinear algorithms for big data applications

“Big data” is the current buzzword pervading both the worlds of academia and industry. Between hype and distractions, research and innovation on big data proceeds at a very quick pace; in particular, the main subject of this book, the computational... more
Algorithms (I.5.3...) | Aug 24 16

Structural pattern recognition with graph edit distance

Defining the distance between two points in 2D or even 3D Euclidean space is easy and intuitive; we have easily understood the concept from our early school years. But what about defining the dissimilarity (that is, distance) between data types that cannot be... more
Design Methodology (I.5.2) | Aug 23 16

Principles of systems science

In October 1995, at the opening ceremonies of the University of Lincolnshire and Humberside (now the University of Lincoln), Her Majesty Queen Elizabeth II asked then Dean Mike C. Jackson of the Lincoln School of Management if he could tell her in a sentence... more
Systems & Information Theory (H.1.1) | Aug 23 16

Turing’s revolution: the impact of his ideas about computability

In his famous 1936 paper, Alan Turing solved an outstanding problem in mathematics--“What is an algorithm?”--and laid out the (theoretical) basis for the development of digital computers and programming languages... more
Models of Computation (F.1.1) | Aug 23 16

Engineering safe and secure cyber-physical systems: the specification PEARL approach

Self-driving cars, process control systems, automatic pilot avionics, medical monitoring systems, smart cities, and the Internet of Things: welcome to the wonderful world of cyber-physical systems... more
Real-Time & Embedded Systems (C.3...) | Aug 23 16

Unsupervised learning algorithms

This book offers a comprehensive overview of unsupervised learning; editors Celebi and Aydin provide an introduction. Many of the chapters, which are detailed below, describe clustering algorithms. Other chapters consider anomaly detection or are... more
Learning (I.2.6) | Aug 22 16


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2016 ThinkLoud, Inc.
Terms of Use
| Privacy Policy