




Scalable and efficient data analytics and mining with Lemonade: Proceedings of the VLDB Endowment
It is unreasonable to assume that data analysis experts are adept at computer programming. However, many tools that a data analyst may want to use require significant programming skills. Moreover, with... more
Data Mining (H.2.8...)  May 21 19
How testing helps to diagnose proof failures: Formal Aspects of Computing
Petiot et al. present testing software components that help optimize the effort of “applying deductive verification to formally prove that a [computer] program respects its formal specification.” The purpose of the proposed... more
Deduction & Theorem Proving (I.2.3)  May 10 19
Selfstabilizing repeated ballsintobins: Distributed Computing
Starting with an arbitrary assignment of n balls to n bins, the ballsintobins process repeatedly selects one ball from a nonempty bin and reassigns the selected ball to one of the n bins uniformly at random... more
Random Number Generation (G.3...)  May 9 19
A new block matching algorithm based on stochastic fractal search: Applied Intelligence
Block matching is an important technique for applications involving motion estimation, such as in video surveillance, TV broadcasting, video games, and so on. To improve the efficiency and... more
Algorithms (I.5.3...)  May 8 19
Interconnectability of sessionbased logical processes: ACM Transactions on Programming Languages and Systems
The analysis of communication network processes is an important topic in computer science. This paper compares two formalisms for describing such networks, namely linear logic (originally derived from an... more
Models of Computation (F.1.1)  May 6 19
Searching for global employability: ACM Transactions on Computing Education
Today’s higher education systems need to produce graduates with global employability that exhibits creativity and innovation, that is, the ability to solve openended problems in different cultural settings, but also domainspecific skill... more
Computer Science Education (K.3.2...)  May 3 19
Documenting trajectories in design space: FDG 18
The processes and methods used in the creation of games are often significantly different from conventional software engineering approaches. In this paper, the authors propose a research methodology for... more
General (K.8.0)  May 2 19
Neural network classifiers using a hardwarebased approximate activation function with a hybrid stochastic multiplier: ACM Journal on Emerging Technologies in Computing Systems
Li et al. present a novel approach for optimizing neural network implementations, that is, “a new architecture of stochastic neural networksâ€ť with a hidden... more
Neural Nets (C.1.3...)  May 1 19
The human infrastructure of El Paquete, Cuba’s offline Internet: interactions
Cubans do not have online access to the Internet, nor instantaneous communication with people outside of Cuba. Even cellphone technology inside Cuba is limited. Responding to that void, an informal network... more
Local & WideArea Networks (C.2.5)  Apr 29 19
Artificial intelligence: looking through the Pygmalion lens: AI & Society
This paper reminds me of early nuclear energy “control” advocacy. In fact, the discovery of uranium, and specifically the widespread global knowledge of a significant inventive process that allows the release of a huge... more
General (I.2.0)  Apr 29 19









Universal quantum computing
Quantum computing is one of the hottest research fields right now, although the theory behind it had its start in the early 1980s, when Richard Feynman asked in a lecture why simulating quantum effects with classical (nonquantum) computers is so tricky [1]. He... more
Information Theory (H.1.1...)  May 22 19
Handbook of model checking
Due to the proliferation and pervasiveness of hardware and software entities in everyday life, ascertaining their trustworthiness is of paramount importance. Model checking is a logicbased approach that determines whether the abstract model of an entity... more
Model Checking (D.2.4...)  May 20 19
The insider threat
Did you ever wish to find the names and addresses of any convicted sex offenders living in your area? The author of this book asserts that parents and employers can use information like this to build what she calls a “risk landscape.” As she explains, it is quite... more
Privacy (K.4.1...)  May 17 19
Programming for hybrid multi/manycore MPP systems
To quote John Levesque, coauthor and director of Cray’s Supercomputing Center of Excellence: “Ask not what your compiler can do for you, ask what you can do for your compiler.” As the book states, it is necessary for... more
Compilers (D.3.4...)  May 16 19
The materiality of interaction
The central theme of the book is the disappearing differences between cyberspace and the real world. In fact, the boundary for interaction between the two realms has never been strict, for example, as represented by the punch card at the dawn... more
Interaction Styles (H.5.2...)  May 15 19
Euclidean distance geometry
If someone has a set of objects whose positions are known, calculating the distances between them is not a problem. However, the inverse problem is difficult, that is, given a set of distances between objects, determine their positions. Unfortunately, several solutions... more
Geometrical Prob. & Computations (F.2.2...)  May 14 19
Monomial ideals and their decompositions
We usually solve problems by breaking them into smaller problems. In the predominant situations, we have linear systems that can be decomposed into several problems because these systems have a basis, that is, the system is the “product” of a... more
Graph Theory (G.2.2)  May 13 19
The discrete charm of the machine
Digital computers have found their way into every aspect of modern life. They are now essential for work and ubiquitous in leisure, and used from childhood to retirement age, through every stage of adult life. Although the number of digital computers in operation today is... more
General (I.2.0)  May 10 19
Feature selection and enhanced krill herd algorithm for text document clustering
This monograph, which comes out of the author’s PhD thesis, studies text document clustering with the help of the krill herd (KH) algorithm.
KH is a relatively new class of bioinspired algorithms. The essence of the... more
Feature Evaluation & Selection (I.5.2...)  May 10 19
The dream machine
The dream machine is a focused look at the history of computing, emphasizing the contrast between a view of computers as powerful descendants of the slide rule with a view of computers as human partners and enhancers of human performance. The subtitle... more
History of Computing (K.2)  May 9 19


