Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
February 15, 2019
Search
Highlight

Swarms and network intelligence in search
The book provides a unified and systematic view of the authors’ research in the area of swarm robotics, with an emphasis on swarm applications for search missions. A lot of the included work is previously published material. The book focuses on mathematical tools useful to the design and analysis of swarm systems. Information about... more
Quote
The power of logic and mathematics to surprise us depends, like their usefulness, on the limitations of our reason... more
- Alfred Jules Ayer (1936)
Articles
Grasshopper optimization algorithm for multi-objective optimization problems: Applied Intelligence

Describing the grasshopper optimization algorithm to solve multi-objective optimization problems, the key idea in this paper is to simulate the swarm behavior of grasshoppers to find an optimal or near-optimal... more

Optimization (E.5...) | Feb 15 19

Circuit complexity, proof complexity, and polynomial identity testing: Journal of the ACM

Cook and Reckhow [1] proved that NP ≠ coNP if and only if in every propositional proof system there is a tautology whose proof size has a super-polynomial lower bound (in terms of the... more

Complexity of Proof Procedures (F.2.2...) | Feb 13 19

Cross-dependency inference in multi-layered networks: ACM Transactions on Knowledge Discovery from Data

Current and emerging networks have a duty to promote interconnections for new collaborative research and business between academia and industry. Multi-layered networks require descriptions of relations among... more

Database Applications (H.2.8) | Feb 11 19

Improving integrated development environment commands knowledge with recommender systems: ICSE-SEET 18

Integrated development environments (IDEs) are an essential part of software developers’ toolkits, enabling them to efficiently author, manage, and test their development projects. As a developer’s... more

General (D.2.0) | Feb 11 19

Game description language and dynamic epistemic logic compared: IJCAI 18

Efficient modeling and reasoning are critical to pushing the frontiers in knowledge-based, dynamic multiagent systems. The authors note that while several languages have been proposed to carry out this goal... more

Games (I.2.1...) | Feb 7 19

Relational data factorization: Machine Learning

General methods take advantage of developing frameworks for data mining and machine learning that can be specialized for efficiency according to the problem domain. This paper discusses a declarative modeling method as a... more

Relational Databases (H.2.4...) | Feb 7 19

A generalized digraph model for expressing dependencies: RTNS 18

The authors characterize this paper as a work in progress in computer assisted verification (CAV) of task-scheduling models. Directed graph (digraph) models are expressive; however, as the authors point out... more

Correctness Proofs (D.2.4...) | Feb 7 19

A survey of virtual sample generation technology for face recognition: Artificial Intelligence Review

Just as the authors state that “virtual sample generation technology belongs to the category of machine learning,” nobody ever has enough real data to train a face recognition model, and... more

Sampling (I.4.1...) | Feb 7 19

A scalable and manageable IoT architecture based on transparent computing: Journal of Parallel and Distributed Computing

The Internet of things (IoT) has been emerging with a gradual tangible impact on everyday life. With such growth, its use cases are becoming more... more

Distributed Systems (C.2.4) | Feb 6 19

A long way to the top: IMC 18

Research communities that analyze parameters like Internet measurement, privacy, and network security typically use Internet top lists. As the selected Internet top list affects the research, it is very important... more

Security and Protection (C.2.0...) | Feb 5 19

Books
Introduction to compiler design (2nd ed.)

Compiler design seems to be a rather narrow topic, which should interest only computer science undergraduate or graduate students in the framework of a mandatory course. After all, how many people will have in their... more
Compilers (D.3.4...) | Feb 15 19

Neighborhood semantics for modal logic

Reading and writing a review of this wonderful book has been a pleasure. Knowing the basics of propositional modal logic may explain why I enjoyed reading it. The author has gathered and surveyed many papers in writing this book. This is a must-read for those... more
Modal Logic (F.4.1...) | Feb 14 19

Advance compression and watermarking technique for speech signals

In a time of increased interest in security assurance, all topics related to watermarking are important. While the book’s focus is securing speech, a technologically related problem of compression is also covered. While we are mostly used to image watermarking, security... more
Data Compaction & Compression (E.4...) | Feb 14 19

Distributed computing pearls

In computer science, the term “synchronization” can relate to coordination between processors or to contention. So I was expecting to find some program examples using the open message passing interface (OpenMPI) or a discussion of distributed... more
Distributed Systems (C.2.4) | Feb 13 19

REBUTTAL: Random numbers and computers

There is an error in the review. The reviewer states: “Also missing: the decimal expansions of irrational numbers (which are non-terminating and non-repeating) do not have a cycle from which they can be proposed as random number generators provided we can... more
Random Number Generation (G.3...) | Feb 13 19

RE-REBUTTAL: Random numbers and computers

There is no error in the review. The error lies in the way the author has interpreted it. It is not the randomness of pi that is missing from the book, but why it is important, as explicitly stated in my review. The following remark, found in Section 7.1, is grossly... more
Random Number Generation (G.3...) | Feb 13 19

Mobile payment systems

These days, if you go shopping in any of China’s major cities, one thing that you will probably not see is people making purchases using cash, or for that matter credit cards. Whether buying a TV, a burger, or groceries, the majority of retail transactions in China are now... more
Financial (J.1...) | Feb 12 19

Individual and collective graph mining

Having recently finished my course on web intelligence, with topics such as knowledge graphs, social network analysis, and web mining, as well as supervising a PhD candidate on graph-based querying and pattern matching for linked open data, this book could... more
Data Mining (H.2.8...) | Feb 11 19

Deep learning for biometrics

Identity management using biometrics--a fascinating research area--adds another dimension when coupled with deep learning techniques. Deep learning for biometrics, organized into four parts, highlights new possibilities within the domain. Part 1... more
Learning (I.2.6) | Feb 8 19

Internet infrastructure

Textbooks on computer networking theory abound, as do practitioner guides to the setup and administration of web servers and other Internet services. However, books that combine the two are less common. This text is an attempt to fill that niche. The authors seek to... more
Internet (C.2.1...) | Feb 8 19


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy