Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
June 22, 2017

Mathematical analysis and the mathematics of computation
Even though there are many deep connections between mathematical analysis and the mathematics of computation, these two fields are usually taught completely separately from each other. This traditional approach has the disadvantage that the concepts from analysis... more
Computing Reviews Announces 21st Annual Best of Computing
Best Reviews
Notable Books and Articles

... more
How many crowdsourced workers should a requester hire?: Annals of Mathematics and Artificial Intelligence

How many crowdsourced workers do you optimally need to ensure an acceptable quality in the (averaged) results of outsourced tasks? The surprising answer is ten to 11, as this paper proves in a lucid... more

The Computer Industry (K.1) | Jun 22 17

Autonomous human-robot proxemics: Autonomous Robots

When humans interact, the interaction partners are expected to respect culture-defined interaction spaces, ranging from intimate over personal and social to public space. Social robots that interact with humans should be... more

Robotics (I.2.9) | Jun 21 17

Information-theoretic caching: sequential coding for computing: IEEE Transactions on Information Theory

Streaming video sequences can be encoded in real time by applying a variable of some average rate of bits per symbol. Such a technique stores both the data sequence and the request sequence simultaneously... more

Data Models (H.2.1...) | Jun 21 17

A survey on ensemble learning for data stream classification: ACM Computing Surveys

The automation of several processes, such as business transactions, smartphones, and various types of sensors, has severely increased the number... more

Classifier Design & Evaluation (I.5.2...) | Jun 16 17

Supervisory routing control for dynamic load balancing in low data rate wireless sensor networks: Wireless Networks

Penetration of wireless sensor networking (WSN) technology in different aspects of human life has made its problems more salient than ever. Routing... more

Sensor Networks (C.2.1...) | Jun 16 17

Tied factors analysis for high-dimensional image feature extraction and recognition application: Pattern Analysis & Applications

Face recognition is one of those unstructured tasks that the human brain excels at, but that is difficult for computers to perform. But... more

Feature Evaluation & Selection (I.5.2...) | Jun 15 17

On the geometry and algebra of networks with state: Theoretical Computer Science

Several models have been proposed for the modeling of and reasoning about concurrent networks, the most widely known being the several variants of Petri nets. One interesting problem is the dichotomy... more

Petri Nets (D.2.2...) | Jun 14 17

Design and implementation of Java bindings in Open MPI: Parallel Computing

You should read this paper if you’re tasked with parallelizing an existing Java application or building a new parallel application with Java and performance is important to you. If you have previously... more

Parallel Programming (D.1.3...) | Jun 14 17

A survey on resource scheduling in cloud computing: issues and challenges: Journal of Grid Computing

This is one of the best survey papers I have ever come across. It provides a thorough review of resource scheduling algorithms (RSAs) with a particular focus on cloud computing. While... more

Cloud Computing (C.2.4...) | Jun 14 17

Autism and technology: beyond assistance & intervention: CHI EA 16

This publication presents the underlying philosophy of the “Autism and Technology: Beyond Assistance & Interventions” workshop on various aspects of the design principles and impact of... more

Assist. Tech. for People w/ Disabil. (K.4.2...) | Jun 14 17

Handbook of biometrics for forensic science

Biometric samples have been used in forensic examinations for decades. However, this book is a compilation of efforts by several groups to systematize the union of the two sciences into a body of knowledge to be used, in... more
Abuse & Crime Inv. Computers (K.4.1...) | Jun 22 17

Computational models of motivation for game-playing agents

One of the major dimensions in which current computer models of players in a gaming system differ from actual human players is affective aspects. Creating a computational model of motivation that can... more
Multiagent Systems (I.2.11...) | Jun 22 17

Smart learning objects for smart education in computer science: theory, methodology and robot-based implementation

Explaining the motivation for this book, the author states in the preface that there is a shift observed in education from teacher-centered learning to student-centered learning. Among several signs... more
Computer Science Education (K.3.2...) | Jun 22 17

Deep learning

Neural net technology, like some teenagers, has grown by fits and starts. Originating as a biological model [1], it was first promoted as a computational tool, the “perceptron,” by Frank Rosenblatt [2]. Minsky and Papert vigorously opposed the model [3] in order to promote the... more
Learning (I.2.6) | Jun 21 17

Simulation modeling and analysis (5th ed.)

Simulation models imitate the behavior of complex systems, including manufacturing processes and real-world service facilities. They are designed to gain some understanding of how the actual system behaves under different circumstances, to evaluate the... more
Modeling & Prediction (D.4.8...) | Jun 21 17

Evolutionary computer vision: the first footprints

Olague is not a newcomer to the fusion field of evolutionary computation and computer vision. He has published research articles on the nexus of these fields over the last two decades. Having personally taught courses on the individual fields, I find the... more
Vision & Scene Understanding (I.2.10) | Jun 21 17

Big data science & analytics: a hands-on approach

This book provides rich knowledge on big data analytics from theory to practical applications. Readers can get a sense of this from its subtitle. The book is organized in three parts. Part 1, “Big Data Analytics... more
Information Storage & Retrieval (H.3) | Jun 20 17

Ten laws for security

In contrast to many security texts that are focused on interpreting the checklists included in one of the many published security standards (for example, ISO 27002:2005) to assess and improve an... more
Security & Protection (K.6.5) | Jun 19 17

Basic concepts in data structures

Data structures are a well-established part of the computer science (CS) curriculum. Courses and textbooks vary in emphasis. Often the introductory sequence for CS majors and others includes both programming and data structures so that... more
Data Structures (E.1) | Jun 15 17

Serious games: foundations, concepts and practice

The book Serious games is a collection of overview chapters intended as a comprehensive introduction for a diverse set of stakeholders. Given the wide spectrum of stakeholder backgrounds, the editors chose to have themes elaborated at a level accessible... more
Games (K.8.0...) | Jun 15 17

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy