Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
May 20, 2019
Search
Highlight

The discrete charm of the machine: why the world became digital
Digital computers have found their way into every aspect of modern life. They are now essential for work and ubiquitous in leisure, and used from childhood to retirement age, through every stage of adult life. Although the number of digital computers in operation today is already mind boggling... more
Quote
This risk, of buggy software corrupting data, has always been with us. The question is not whether... more
- Ed Felten (2009)
Articles
How testing helps to diagnose proof failures: Formal Aspects of Computing

Petiot et al. present testing software components that help optimize the effort of “applying deductive verification to formally prove that a [computer] program respects its formal specification.” The purpose of... more

Deduction & Theorem Proving (I.2.3) | May 10 19

Self-stabilizing repeated balls-into-bins: Distributed Computing

Starting with an arbitrary assignment of n balls to n bins, the balls-into-bins process repeatedly selects one ball from a non-empty bin and reassigns the selected ball to one of the n bins uniformly at random. This results in each... more

Random Number Generation (G.3...) | May 9 19

A new block matching algorithm based on stochastic fractal search: Applied Intelligence

Block matching is an important technique for applications involving motion estimation, such as in video surveillance, TV broadcasting, video games, and so on. To improve the efficiency and... more

Algorithms (I.5.3...) | May 8 19

Interconnectability of session-based logical processes: ACM Transactions on Programming Languages and Systems

The analysis of communication network processes is an important topic in computer science. This paper compares two formalisms for describing such networks, namely linear logic... more

Models of Computation (F.1.1) | May 6 19

Searching for global employability: ACM Transactions on Computing Education

Today’s higher education systems need to produce graduates with global employability that exhibits creativity and innovation, that is, the ability to solve open-ended problems in different cultural... more

Computer Science Education (K.3.2...) | May 3 19

Documenting trajectories in design space: FDG 18

The processes and methods used in the creation of games are often significantly different from conventional software engineering approaches. In this paper, the authors propose a research methodology for game design, framed as a way of systematically... more

General (K.8.0) | May 2 19

Neural network classifiers using a hardware-based approximate activation function with a hybrid stochastic multiplier: ACM Journal on Emerging Technologies in Computing Systems

Li et al. present a novel approach for optimizing neural network implementations, that is, “a new architecture of stochastic neural networks” with a hidden... more

Neural Nets (C.1.3...) | May 1 19

Artificial intelligence: looking through the Pygmalion lens: AI & Society

This paper reminds me of early nuclear energy “control” advocacy. In fact, the discovery of uranium, and specifically the widespread global knowledge of a significant inventive process that allows the release of a huge... more

General (I.2.0) | Apr 29 19

The human infrastructure of El Paquete, Cuba’s offline Internet: interactions

Cubans do not have online access to the Internet, nor instantaneous communication with people outside of Cuba. Even cellphone technology inside Cuba is limited. Responding to that void, an informal network... more

Local & Wide-Area Networks (C.2.5) | Apr 29 19

Hawking’s nightmare: Communications of the ACM

Stephen Hawking once said, “If aliens visit us, the outcome would be much as when Columbus landed in America, which didn’t turn out well for the Native Americans. We only have to look at ourselves to see how intelligent life might develop into something... more

General (D.2.0) | Apr 26 19

Books
The insider threat

Did you ever wish to find the names and addresses of any convicted sex offenders living in your area? The author of this book asserts that parents and employers can use information like this to build what she calls a “risk landscape.” As she explains, it is quite easy to... more
Privacy (K.4.1...) | May 17 19

Programming for hybrid multi/manycore MPP systems

To quote John Levesque, coauthor and director of Cray’s Supercomputing Center of Excellence: “Ask not what your compiler can do for you, ask what you can do for your compiler.” As the book states, it is... more
Compilers (D.3.4...) | May 16 19

The materiality of interaction

The central theme of the book is the disappearing differences between cyberspace and the real world. In fact, the boundary for interaction between the two realms has never been strict, for example, as represented by the punch card at the dawn of... more
Interaction Styles (H.5.2...) | May 15 19

Euclidean distance geometry

If someone has a set of objects whose positions are known, calculating the distances between them is not a problem. However, the inverse problem is difficult, that is, given a set of distances between objects, determine their positions. Unfortunately, several solutions... more
Geometrical Prob. & Computations (F.2.2...) | May 14 19

Monomial ideals and their decompositions

We usually solve problems by breaking them into smaller problems. In the predominant situations, we have linear systems that can be decomposed into several problems because these systems have a basis, that is, the system is the “product” of a... more
Graph Theory (G.2.2) | May 13 19

The discrete charm of the machine

Digital computers have found their way into every aspect of modern life. They are now essential for work and ubiquitous in leisure, and used from childhood to retirement age, through every stage of adult life. Although the number of digital computers in operation today is... more
General (I.2.0) | May 10 19

Feature selection and enhanced krill herd algorithm for text document clustering

This monograph, which comes out of the author’s PhD thesis, studies text document clustering with the help of the krill herd (KH) algorithm. KH is a relatively new class of bio-inspired algorithms. The essence of the... more
Feature Evaluation & Selection (I.5.2...) | May 10 19

The dream machine

The dream machine is a focused look at the history of computing, emphasizing the contrast between a view of computers as powerful descendants of the slide rule with a view of computers as human partners and enhancers of human performance. The subtitle... more
History of Computing (K.2) | May 9 19

Learning representation for multi-view data analysis: models and applications

Ding et al.’s Learning representation for multi-view data analysis not only provides cutting-edge research on multi-view data representation and analysis, but also provides several visual applications and practical challenges, including unbalanced or incomplete... more
Classifier Design & Evaluation (I.5.2...) | May 7 19

Human centered software product lines

To quote the authors of chapter 3, “[graphical user interface, GUI] design remains an open, wicked, complex and multifaceted problem, owing to ever increasing variability to design options resulting from multiple contexts of use... more
Software Management (K.6.3) | May 3 19


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy