Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
January 20, 2017

The accidental taxonomist (2nd ed.)
The human urge to name and classify is ancient. According to the Bible, the first task ever performed by a human was the formation of a taxonomy, when Adam named the animals. But he left no documentation for others to use. Carl Linnaeus filled this gap in the 18th century, enabling the systematic development of the biological... more
This real or apparent likeness of figures is the fundamental basis of all truths and of all we know. Among these sciences, evidently those whose signs are less... more
- J. Offray de La Mettrie (1748)
Application of IT in healthcare: a systematic review: ACM SIGBioinformatics Record

Information technology (IT) is expanding its scope from communications to other fields, including engineering, the environment, healthcare, and... more

Health (J.3...) | Jan 19 17

Multiple kernel fuzzy SVM-based data fusion for improving peptide identification: IEEE/ACM Trans. on Computational Biology & Bioinformatics

This paper proposes a fuzzy support vector machine (SVM)-based data fusion technique that aims to distinguish true or false peptide... more

Biology & Genetics (J.3...) | Jan 19 17

High-performance data structures for de novo assembly of genomes: cache oblivious generic programming: BCB 16

This short paper presents a C++ library, in a generic programming style, for more efficient de novo genome assembly. The basic idea is to use a cache... more

Software Libraries (D.2.2...) | Jan 19 17

A new efficient algorithm for the all sorting reversals problem with no bad components: IEEE/ACM Trans. on Computational Biology & Bioinformatics

The paradigm of Wang’s paper is computational biology, more specifically genome rearrangement. The genome rearrangement problem simply means... more

Biology & Genetics (J.3...) | Jan 17 17

A deterministic fully polynomial time approximation scheme for counting integer knapsack solutions made easy: Theoretical Computer Science

The knapsack problem (KP) appears in many forms in science, economics, and engineering. The classical formulation uses a set of items, each with a weight and a value, and asks to determine the number... more

Dynamic Programming (I.2.8...) | Jan 16 17

A new faster algorithm for factoring skew polynomials over finite fields: Journal of Symbolic Computation

Let k be a finite field of characteristic p and size pqr, and let σ be an automorphism of k of order r. The ring of skew polynomials... more

Computations on Polynomials (F.2.1...) | Jan 13 17

Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares: Theoretical Computer Science

Libert et al. develop a fully distributed, non-interactive, adaptively secure threshold signature scheme with scalable share size. A threshold... more

Public Key Cryptosystems (E.3...) | Jan 13 17

An approach to checking consistency between UML class model and its Java implementation: IEEE Transactions on Software Engineering

Checking for consistency between a design and its implementation is usually done manually. It is crucial to check that the diagrams... more

UML (D.3.2...) | Jan 12 17

Results of a digital library curriculum field test: Int. Journal on Digital Libraries

The digital library curriculum was the result of a 2006 to 2009 project funded by the National Science Foundation through grants to Virginia Tech and the... more

Digital Libraries (H.3.7) | Jan 6 17

Explaining mixture models through semantic pattern mining and banded matrix visualization: Machine Learning

Data analysis is concerned with making data comprehensible and amenable to interpretation by domain specialists. The central contribution of this paper is... more

Pattern Recognition (I.5) | Jan 3 17

Digital defense: a cybersecurity primer

Digital defense is a well-written, easy-to-follow, practical book, suitable for personal as well as professional use. It makes for a worthy read as we live in a digital world and are exposed to many known and unknown... more
Security & Protection (K.6.5) | Jan 19 17

DITA -- the topic-based XML standard: a quick start

Unlike classic Hypertext Markup Language (HTML), which is oriented to the format of material presented on web pages, Extensible Markup Language (XML) allows developers to separate content from format. There are many special-purpose XML implementations... more
Standards (I.7.2...) | Jan 19 17

The art of electronics

It is difficult to imagine late-night bedtime reading of a 1,192 page, 2.3 kg book. Yet this is what I found myself doing when I got my hands on the third edition of this Horowitz and Hill classic. Although I’m a proud and happy owner of the book’s 1989 second... more
Electronics (J.2...) | Jan 19 17

Foundations of quantum programming

We keep hearing several buzzwords: big data, Internet of Things, machine learning, and quantum computing. This last one is the most “futuristic” among them in the sense that you cannot go online and buy... more
Physics (J.2...) | Jan 19 17

Reconsidering change management: applying evidence-based insights in change management practice

Imagine a group of managers and employees of an organization engaged in a simple experiential exercise designed to demonstrate barriers to change [1]. One of the participants plays the role of chief... more
General (K.6.0) | Jan 18 17

Penetration testing basics: a quick-start guide to breaking into systems

Penetration testing basics is a small book, about 110 pages, that intends to give readers a quick start with penetration testing, in seven chapters. The first chapter explains what penetration testing... more
Security & Protection (K.6.5) | Jan 18 17

Computer supported qualitative research

Today both qualitative and quantitative research involves heavy use of computer tools. Learning about the tools used for deep qualitative research is important for researchers. This is an area of... more
Social & Behavioral Sciences (J.4) | Jan 18 17

Computer age statistical inference: algorithms, evidence, and data science

No healthy scientific discipline stands still, and active practitioners recognize the flux of ideas and frequently contribute to it. But the exigencies of pedagogy make it difficult for a student to understand the trajectory of a... more
Mathematics & Statistics (J.2...) | Jan 18 17

Digital watermarking: techniques and trends

Digital watermarking has many applications, including steganography, data authentication, and digital rights management. It is a challenging problem, since the techniques used are dependent on the type of media being watermarked, and the... more
Security & Protection (K.6.5) | Jan 18 17

Exploratory programming for the arts and humanities

This unusual title intends to introduce programming “to readers with a background in the arts and humanities.” It is based on Python and Processing free distributions. After some introductory conceptual writing... more
Arts & Humanities (J.5) | Jan 18 17

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy