Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
September 25, 2018

Machine translation
This small book (approximately size A5), part of the Massachusetts Institute of Technology (MIT) Press “Essential Knowledge” series, captures the essence of the machine translation (MT) field, from its origins to the present. As opposed to review books or textbooks, its focus is a panoramic view of MT, at the cost of in-depth... more
In their capacity as a tool, computers will be but a ripple on the surface of our culture. In their capacity as intellectual challenge, they are without precedent... more
- Edsger W. Dijkstra (1972)
Characterization of context-free languages: Theoretical Computer Science

The authors prove that a generalized Greibach normal form (GNF) grammar still generates a context-free language. They expand the left side of GNF-type rules to be any nonempty product of variables... more

Grammar Types (F.4.2...) | Sep 20 18

VIRTIO-USER: a new versatile channel for kernel-bypass networks: KBNets 17

VIRTIO-USER is a userspace-based channel to facilitate container applications to benefit from kernel-bypass technologies. The authors explain that container networking or operating system (OS) virtualization technologies have... more

General (C.2.0) | Sep 19 18

Patmos: a time-predictable microprocessor: Real-Time Systems

While general-purpose computing looks for a good average execution time, a vital parameter of real-time/embedded platforms (mission critical applications, like in avionics) is the worst-case execution time... more

Microprocessor/computers (C.3...) | Sep 18 18

Using Bayesian network to estimate the value of decisions within the context of value-based software engineering: EASE 18

For longevity, a software company should adopt value-based decision making, in which the focus is on overall value creation rather than the required efforts... more

Types of Systems (H.4.2) | Sep 14 18

A FPGA based implementation of Sobel edge detection: Microprocessors & Microsystems

This paper examines the problem of optimizing the space requirements and latency for a field-programmable gate array (FPGA) implementation of a Sobel edge detection filter... more

Microprocessors/computers (B.7.1...) | Sep 13 18

Toward the robots of science fiction: YouTube

It was a pleasure to watch this presentation about the future of robotics, a hotly debated topic fueled by the controversy between robots defeating humans and robots augmenting and assisting humans, for... more

Robotics (I.2.9) | Sep 12 18

Learning safe multi-label prediction for weakly labeled data: Machine Learning

Many real-world applications involve learning in the presence of multiple labels. For example, in the case of images, a single image may be labeled sky, cloud, or even flower. To make matters more complicated... more

Machine Translation (I.2.7...) | Sep 11 18

Complexity and expressive power of weakly well-designed SPARQL: Theory of Computing Systems

The resource description framework (RDF) is a data model standard for the web that represents linked data as subject-predicate-object triples. Such triples can be naturally represented... more

Query Languages (H.2.3...) | Sep 10 18

Text and non-text separation in offline document images: a survey: International Journal on Document Analysis and Recognition

This survey on text and no-text separation in images presents a quite complete review (list of references) of image document analysis, including printed and handwritten texts. The authors present tables... more

General (I.7.0) | Sep 7 18

Configuration analysis and design of a multidimensional tele-operator based on a 3-P(4S) parallel mechanism: Journal of Intelligent and Robotic Systems

Parallel robots that use closed kinematic chains have interesting mechanical properties, such as stiffness, high precision, and good load capacity, at the cost of an increasing complexity in designing and solving... more

Robotics (I.2.9) | Sep 7 18

Software architecture for big data and the cloud

Systems and software architecture has been a significant engineering endeavor for many years, requiring formal languages and models to document and analyze the structure and functionality of systems. This... more
Software Architectures (D.2.11) | Sep 24 18

Once upon an algorithm

Martin Erwig emphasizes the general nature of computation and the use of computer science (CS) in this book. He uses well-known stories to explain computing concepts to readers not familiar with the field. The book’s two parts cover several topics... more
General (F.2.0) | Sep 21 18

Deception in the digital age

The basis of deception is misdirection: it amounts to making something insignificant seem important, while really relevant things go unnoticed. This strategy is used not only by spammers, crackers, cyber criminals, and cyber terrorists, but also by banks, credit card... more
Abuse & Crime Involving Comp. (K.4.1...) | Sep 14 18

Codes, cryptology and curves with computer algebra

This volume offers a terse, highly formal exposition of the relation between the four subjects named in the title: codes (transformations of a stream of information), cryptology (transformations that... more
Data Encryption (E.3) | Sep 13 18

Introduction to inverse problems for differential equations

Several mathematical problems in science, engineering, and technology are inverse problems. For example, inverse problem theory is often used in heat and mass transfer, imaging, hydrology, oceanography, and so on. In general, inverse problems are ill-posed... more
Inverse Problems (G.1.8...) | Sep 12 18

Complete guide to open source big data stack

Working with big data requires building up a network of services that allows for its effective use. In the scope of open-source systems, the big data stack is composed of open-source applications for understanding big data. The book’s title reveals its main purpose... more
Content Analysis & Indexing (H.3.1) | Sep 6 18

Attribute-based access control

In many applications, it becomes a necessity to define who (which user) is allowed to access what (which resource). This is achieved via access control. Several models for access control exist. Attribute-based access control (ABAC) is one of them, and forms... more
Access Controls (D.4.6...) | Sep 5 18

Dawn of the new everything

Virtual reality (VR) apps with inexpensive smartphone attachments are widely available today, but what would it have been like to obsess over VR long before it was technologically feasible? It would likely have taken a unique character, and Jaron Lanier certainly... more
Artificial, Aug. & Virtual Realities (H.5.1...) | Aug 31 18

Personal assistants

For those of us who have reached a certain age, the term “personal assistant” brings up images of a PalmPilot or something similar. Today, we might think of Cortana or Siri. On the other hand, an increasing concern in developed Western countries is the... more
Robotics (I.2.9) | Aug 30 18

Fuzzy graph theory

Fuzzy graph theory is a recently developed field, and thus many research opportunities exist. This book is a very good and suitable option for readers who wish to either begin or continue their studies in different areas of fuzzy graph theory. The book is divided into... more
Graph Theory (G.2.2) | Aug 24 18

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy