




Grasshopper optimization algorithm for multiobjective optimization problems: Applied Intelligence
Describing the grasshopper optimization algorithm to solve multiobjective optimization problems, the key idea in this paper is to simulate the swarm behavior of grasshoppers to find an optimal or nearoptimal... more
Optimization (E.5...)  Feb 15 19
Circuit complexity, proof complexity, and polynomial identity testing: Journal of the ACM
Cook and Reckhow [1] proved that NP ≠ coNP if and only if in every propositional proof system there is a tautology whose proof size has a superpolynomial lower bound (in terms of the... more
Complexity of Proof Procedures (F.2.2...)  Feb 13 19
Crossdependency inference in multilayered networks: ACM Transactions on Knowledge Discovery from Data
Current and emerging networks have a duty to promote interconnections for new collaborative research and business between academia and industry. Multilayered networks require descriptions of relations among... more
Database Applications (H.2.8)  Feb 11 19
Improving integrated development environment commands knowledge with recommender systems: ICSESEET 18
Integrated development environments (IDEs) are an essential part of software developers’ toolkits, enabling them to efficiently author, manage, and test their development projects. As a developer’s... more
General (D.2.0)  Feb 11 19
Game description language and dynamic epistemic logic compared: IJCAI 18
Efficient modeling and reasoning are critical to pushing the frontiers in knowledgebased, dynamic multiagent systems. The authors note that while several languages have been proposed to carry out this goal... more
Games (I.2.1...)  Feb 7 19
Relational data factorization: Machine Learning
General methods take advantage of developing frameworks for data mining and machine learning that can be specialized for efficiency according to the problem domain. This paper discusses a declarative modeling method as a... more
Relational Databases (H.2.4...)  Feb 7 19
A generalized digraph model for expressing dependencies: RTNS 18
The authors characterize this paper as a work in progress in computer assisted verification (CAV) of taskscheduling models. Directed graph (digraph) models are expressive; however, as the authors point out... more
Correctness Proofs (D.2.4...)  Feb 7 19
A survey of virtual sample generation technology for face recognition: Artificial Intelligence Review
Just as the authors state that “virtual sample generation technology belongs to the category of machine learning,” nobody ever has enough real data to train a face recognition model, and... more
Sampling (I.4.1...)  Feb 7 19
A scalable and manageable IoT architecture based on transparent computing: Journal of Parallel and Distributed Computing
The Internet of things (IoT) has been emerging with a gradual tangible impact on everyday life. With such growth, its use cases are becoming more... more
Distributed Systems (C.2.4)  Feb 6 19
A long way to the top: IMC 18
Research communities that analyze parameters like Internet measurement, privacy, and network security typically use Internet top lists. As the selected Internet top list affects the research, it is very important... more
Security and Protection (C.2.0...)  Feb 5 19









Introduction to compiler design (2nd ed.)
Compiler design seems to be a rather narrow topic, which should interest only computer science undergraduate or graduate students in the framework of a mandatory course. After all, how many people will have in their... more
Compilers (D.3.4...)  Feb 15 19
Neighborhood semantics for modal logic
Reading and writing a review of this wonderful book has been a pleasure. Knowing the basics of propositional modal logic may explain why I enjoyed reading it. The author has gathered and surveyed many papers in writing this book. This is a mustread for those... more
Modal Logic (F.4.1...)  Feb 14 19
Advance compression and watermarking technique for speech signals
In a time of increased interest in security assurance, all topics related to watermarking are important. While the book’s focus is securing speech, a technologically related problem of compression is also covered. While we are mostly used to image watermarking, security... more
Data Compaction & Compression (E.4...)  Feb 14 19
Distributed computing pearls
In computer science, the term “synchronization” can relate to coordination between processors or to contention. So I was expecting to find some program examples using the open message passing interface (OpenMPI) or a discussion of distributed... more
Distributed Systems (C.2.4)  Feb 13 19
REBUTTAL: Random numbers and computers
There is an error in the review.
The reviewer states:
“Also missing: the decimal expansions of irrational numbers (which are nonterminating and nonrepeating) do not have a cycle from which they can be proposed as random number generators provided we can... more
Random Number Generation (G.3...)  Feb 13 19
REREBUTTAL: Random numbers and computers
There is no error in the review. The error lies in the way the author has interpreted it. It is not the randomness of pi that is missing from the book, but why it is important, as explicitly stated in my review. The following remark, found in Section 7.1, is grossly... more
Random Number Generation (G.3...)  Feb 13 19
Mobile payment systems
These days, if you go shopping in any of China’s major cities, one thing that you will probably not see is people making purchases using cash, or for that matter credit cards. Whether buying a TV, a burger, or groceries, the majority of retail transactions in China are now... more
Financial (J.1...)  Feb 12 19
Individual and collective graph mining
Having recently finished my course on web intelligence, with topics such as knowledge graphs, social network analysis, and web mining, as well as supervising a PhD candidate on graphbased querying and pattern matching for linked open data, this book could... more
Data Mining (H.2.8...)  Feb 11 19
Deep learning for biometrics
Identity management using biometricsa fascinating research areaadds another dimension when coupled with deep learning techniques. Deep learning for biometrics, organized into four parts, highlights new possibilities within the domain.
Part 1... more
Learning (I.2.6)  Feb 8 19
Internet infrastructure
Textbooks on computer networking theory abound, as do practitioner guides to the setup and administration of web servers and other Internet services. However, books that combine the two are less common. This text is an attempt to fill that niche. The authors seek to... more
Internet (C.2.1...)  Feb 8 19


