Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
March 23, 2017

A smartphone-based system for detecting hand tremors in unconstrained environments
García-Magariño et al. use smartphones in their research as tools to support the diagnosis of Parkinson’s disease. Smartphones are used in several studies with clinical assessments based on the Unified Parkinson’s Disease Rating Scale due to their capabilities to collect... more
The fact is that in admiring the productivity of genius our admiration has been misplaced. Nothing is easier than the generation of new ideas... more
- W. Ross Ashby (1956)
Efficient discovery of longest-lasting correlation in sequence databases: The VLDB Journal

Large quantities of data are stored every day in databases, but sooner or later these data must be extracted according to different criteria: these extractions constitute data sequences. One... more

Time Series Analysis (G.3...) | Mar 22 17

Pedagogy of game design: YouTube

Should video game design, or for that matter any sort of software design, be taught by a practitioner or an academic? The academic will have an organized and abstract understanding of the design process... more

Games (I.2.1...) | Mar 21 17

WebAL comes of age: a review of the first 21 years of artificial life on the web: Artificial Life

Soon after computers became available to researchers, they were used to explore concepts like cellular automata or self-replicating machines and organisms, the most... more

Artificial Intelligence (I.2) | Mar 21 17

Autonomic performance and power control for co-located web applications in virtualized datacenters: IEEE Transactions on Parallel and Distributed Systems

The proliferation of cloud computing and virtualized environments raises several performance issues regarding load balancing and power... more

Cloud Computing (C.2.4...) | Mar 21 17

Diverse and proportional size-l object summaries using pairwise relevance: The VLDB Journal

When we search the web, we usually enter one or more keywords; in (almost) no time, we receive back a list of websites that bear some relation to those keywords. Behind the scenes, a search engine... more

Information Search & Retrieval (H.3.3) | Mar 21 17

A new look at the semantic web: CACM

The numerous demands for prevalent web advertisements and documents call for new smart information dissemination systems. Emerging and future intelligent web systems ought to reflect the... more

Semantic Web (H.3.4...) | Mar 16 17

Finding local leaf vein patterns for legume characterization and classification: Machine Vision and Applications

Larese and Granitto essentially consider scale-invariant feature transform (SIFT) plus bag-of-words (BOW) plus support vector... more

Computer Vision (I.5.4...) | Mar 15 17

Discovering different kinds of smartphone users through their application usage behaviors: UbiComp 16

With the accelerating adoption of smartphones in the last decade, mobile applications have become increasingly popular as well, with app stores... more

Miscellaneous (H.5.m) | Mar 15 17

Resource-based modeling and simulation of business processes: SCSC 16

This interesting research paper explores the simulation-based analysis of business processes (BP), covering all phases in the BP life cycle, starting from design, to execution and improvement, to... more

Model Development (I.6.5) | Mar 14 17

Structural analysis of user choices for mobile app recommendation: ACM Transactions on Knowledge Discovery from Data

Mobile apps are rapidly evolving due to ongoing improvements in smartphone technology. However, the use of mobile devices introduces... more

Data Mining (H.2.8...) | Mar 14 17

Algebra for cryptologists

Cryptography is technically synonymous with information security. Providing security features for data and information is the most important concern in a business requirement. Most undergraduate... more
Data Encryption (E.3) | Mar 20 17

Evidence-based software engineering and systematic reviews

I reviewed a hard cover 399-page book composed of three parts and an appendix. The first part is titled “Evidence-Based Practices in Software Engineering,” which constitutes almost half of the book. The... more
Design Tools & Techniques (D.2.2) | Mar 17 17

Fuzzy logic in its 50th year: new developments, directions and challenges

Lotfi Zadeh published his initial work on fuzzy set theory in 1965. This volume celebrates a half century of progress in the research and applications of fuzzy set theory and fuzzy logic. The 16 contributions... more
Uncertainty, Fuzzy & Prob. Reas. (I.2.3...) | Mar 17 17

Issues in the use of neural networks in information retrieval

At the beginning of a calendar year that has been declared as the year of artificial intelligence (AI), with the revivals of bad and good experiences as well as fiercely debated topics in the traditional... more
Information Search & Retrieval (H.3.3) | Mar 15 17

Fraud analytics using descriptive, predictive, and social network techniques: a guide to data science for fraud detection

The general scope of fraud analytics comprises a set of both conceptual approaches and appropriate tools for detecting... more
Social Networking (H.3.4...) | Mar 15 17

Designing software architectures: a practical approach

It is often forgotten that common sense is the least common of the senses. Sensible design advice, guidelines, and heuristics are often no more than just that: plain old common sense. However, rational... more
Software Architectures (D.2.11) | Mar 15 17

Ethical reasoning in big data: an exploratory analysis

The Internet is an information superhighway upon which data, new technologies, and applications can be run. Right now, one of the most hyped and hoped-for applications is big data. We even hope... more
Content Analysis & Indexing (H.3.1) | Mar 14 17

Emerging trends in the evolution of service-oriented and enterprise architectures

Projects to modernize mission-critical IT services in established businesses suffer technical and nontechnical change management challenges. This collection of chapters presents an in-depth analysis... more
Software Architectures (D.2.11) | Mar 10 17

How not to network a nation: the uneasy history of the Soviet Internet

Why was the Internet invented in the US and not in the Soviet Union? Was its creation in the US the outcome of unique circumstances, or could it have been conceived, more or less independently, elsewhere? I know... more
History of Computing (K.2) | Mar 9 17

Computational personality analysis: introduction, practical applications and novel directions

Reading this book reminded me of an old joke. A man goes to see a fortuneteller on his 30th birthday to learn about his fate and future. After some analysis and contemplation, she says, “You... more
Natural Language Processing (I.2.7) | Mar 9 17

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy