Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
February 22, 2018

Deep learning for mobile multimedia
Deep learning architectures, tools, and algorithms are, in general, not adapted to the storage and computation resources of a mobile device. Thus, one needs better hardware for mobile devices and smaller footprints for learning and inference algorithms. This survey paper giving an overview of various technologies and... more
We speak of our belief in the positive aspects of computer use. Paramount among the problems facing humanity are the control of population... more
- Gotlieb & Borodin (1973)
A hierarchical classifier based on human blood plasma fluorescence for non-invasive colorectal cancer screening: Artificial Intelligence in Medicine

Classification in artificial intelligence aims to separate data into categories using available variables. High dimensionality and inherent variability in... more

Medicine & Science (I.2.1...) | Feb 21 18

Federated IoT services leveraging 5G technologies at the edge: Ad Hoc Networks

The highly anticipated fifth generation of wireless mobile technology is called 5G. It promises to enable innovative services and applications that require huge performance increases... more

Wireless Communication (C.2.1...) | Feb 21 18

Tape music archives: from preservation to access: International Journal on Digital Libraries

Magnetic tape doesn’t keep well. It was produced in a range of materials for use with a range of specific technologies. How best can we preserve magnetic tape recordings? This paper discusses a methodology... more

Music (J.5...) | Feb 21 18

Wikiometrics: a Wikipedia based ranking system: World Wide Web

Wikipedia is one of the most popular websites. It is famous for showing crowd intelligence in many areas, including science, medicine, physics, and so on. People use Wikipedia to learn and extend their... more

World Wide Web (WWW) (H.3.4...) | Feb 21 18

Millimeter-wave wireless communications for IoT-cloud supported autonomous vehicles: overview, design, and challenges: IEEE Communications Magazine

The autonomous vehicle is being considered as the technology of the future. Many companies and researchers are working toward making this a... more

Autonomous Vehicles (I.2.9...) | Feb 20 18

Collaborative agile learning in online environments: Computers & Education

Perhaps online training will continue to survive the competition from traditional classrooms. What changes should online academic institutions make with regard to instruction in order to satisfy both students and industry?... more

Collaborative Learning (K.3.1...) | Feb 20 18

Plane formation by synchronous mobile robots in the three-dimensional Euclidean space: Journal of the ACM

This is an interesting and thorough investigation of the plane formation problem. This problem addresses how a large group of robots moving in 3D Euclidean... more

Robotics (I.2.9) | Feb 16 18

Scalable computational techniques for centrality metrics on temporally detailed social network: Machine Learning

To analyze social networks, where social interactions change over time, special graphs and methods are needed. In this paper, social networks are... more

Dynamic Programming (I.2.8...) | Feb 15 18

Shape classification using spectral graph wavelets: Applied Intelligence

Spectral analysis on a triangle mesh gained its popularity in shape retrieval due to the success of shape-DNA, which is easy to compute yet can achieve an accuracy of over 90 percent in some tests... more

Graph & Tree Search Strategies (I.2.8...) | Feb 15 18

Asymptotic medians of random permutations sampled from reversal random walks: Theoretical Computer Science

The area of application of this interesting, and quite advanced, five-page paper is in the study of genomics and chromosomal... more

Permutations & Combinations (G.2.1...) | Feb 15 18

From Internet of Things to smart cities

The proliferation of electronic smart devices, and the ability to gather the data they generate in conjunction with prompt processing and feedback, is already having great consequences in our daily lives. Applications in environmental monitoring, automated control... more
Real-Time & Embedded Systems (C.3...) | Feb 21 18

Game theory: a classical introduction, mathematical games, and the tournament

A good definition of the word “game” in the context of game theory is provided in this book: A game is any situation involving more than one individual, each of which can make more than one action, such that... more
Numerical Algorithms & Problems (F.2.1) | Feb 21 18

Discrete probability models and methods

Due to advances in both theory and practice, there has been a recent explosion in courses on network science and data science. These demand a solid background in probabilistic methods. For example, Markov chains are used for node ranking in complex networks, and... more
Probabilistic Computation (F.1.2...) | Feb 21 18

A practical approach to compiler construction

Several comprehensive books have been written about compiler construction. Any new book on this topic is inevitably going to be compared against those works. However, by taking a different approach, a new book can set... more
Compilers (D.3.4...) | Feb 16 18

Software failure investigation: a near-miss analysis approach

This book bothered me. There were profound positives and profound negatives that I discovered as I proceeded through the (very short, barely 100-meaty-page) book. First, the positives. There is a great need for this book. It attacks its title topic, software failure... more
Testing & Debugging (D.2.5) | Feb 15 18

Scientific programming and computer architecture

You can find books that teach you how to write efficient code in a specific language. The efficiency here comes from using good algorithms and making the best use of the language capability. You can also find books... more
General (C.1.0) | Feb 14 18

Researching complex information infrastructures

This volume is the PhD dissertation of the author at the University of Siegen, and it falls into the broad thread of organizational aspects in computer-supported cooperative work from the 1980s. It refers also largely, in nontechnical terms, to the concept of shared... more
General (H.3.0) | Feb 12 18

Understanding the digital world

The digital world is changing very rapidly with advancements in the embedded hardware and software on which it depends. Both the hardware and software changes inflict concerns about privacy and security over the Internet and for its users around the world... more
Web-Based Interaction (H.5.3...) | Feb 9 18

Ethics, law and the politics of information: a guide to the philosophy of Luciano Floridi

The premise of this book is that information and communication technologies (ICT) are “altering our representation and understanding of reality and of ourselves.” A typical assertion, giving... more
General (K.5.0) | Feb 9 18

Advances in user authentication

Authentication involves validating the authenticity of something or someone. This book is on advances in user authentication. It is authored by Dipankar Dasgupta, a faculty member at the University of Memphis, along with his former students Arunava Roy and Abhijit... more
Authentication (K.6.5...) | Feb 9 18

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy