Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
May 22, 2019
Search
Highlight

The discrete charm of the machine
Digital computers have found their way into every aspect of modern life. They are now essential for work and ubiquitous in leisure, and used from childhood to retirement age, through every stage of adult life. Although the number of digital computers in operation today is already mind boggling, it continues to grow at a fast pace. We... more
Quote
People fret about privacy, but what are the consequences of giving it all up?... more
- Evan Ratliff (2009)
Articles
Scalable and efficient data analytics and mining with Lemonade: Proceedings of the VLDB Endowment

It is unreasonable to assume that data analysis experts are adept at computer programming. However, many tools that a data analyst may want to use require significant programming skills. Moreover, with... more

Data Mining (H.2.8...) | May 21 19

How testing helps to diagnose proof failures: Formal Aspects of Computing

Petiot et al. present testing software components that help optimize the effort of “applying deductive verification to formally prove that a [computer] program respects its formal specification.” The purpose of the proposed... more

Deduction & Theorem Proving (I.2.3) | May 10 19

Self-stabilizing repeated balls-into-bins: Distributed Computing

Starting with an arbitrary assignment of n balls to n bins, the balls-into-bins process repeatedly selects one ball from a non-empty bin and reassigns the selected ball to one of the n bins uniformly at random... more

Random Number Generation (G.3...) | May 9 19

A new block matching algorithm based on stochastic fractal search: Applied Intelligence

Block matching is an important technique for applications involving motion estimation, such as in video surveillance, TV broadcasting, video games, and so on. To improve the efficiency and... more

Algorithms (I.5.3...) | May 8 19

Interconnectability of session-based logical processes: ACM Transactions on Programming Languages and Systems

The analysis of communication network processes is an important topic in computer science. This paper compares two formalisms for describing such networks, namely linear logic (originally derived from an... more

Models of Computation (F.1.1) | May 6 19

Searching for global employability: ACM Transactions on Computing Education

Today’s higher education systems need to produce graduates with global employability that exhibits creativity and innovation, that is, the ability to solve open-ended problems in different cultural settings, but also domain-specific skill... more

Computer Science Education (K.3.2...) | May 3 19

Documenting trajectories in design space: FDG 18

The processes and methods used in the creation of games are often significantly different from conventional software engineering approaches. In this paper, the authors propose a research methodology for... more

General (K.8.0) | May 2 19

Neural network classifiers using a hardware-based approximate activation function with a hybrid stochastic multiplier: ACM Journal on Emerging Technologies in Computing Systems

Li et al. present a novel approach for optimizing neural network implementations, that is, “a new architecture of stochastic neural networks” with a hidden... more

Neural Nets (C.1.3...) | May 1 19

The human infrastructure of El Paquete, Cuba’s offline Internet: interactions

Cubans do not have online access to the Internet, nor instantaneous communication with people outside of Cuba. Even cellphone technology inside Cuba is limited. Responding to that void, an informal network... more

Local & Wide-Area Networks (C.2.5) | Apr 29 19

Artificial intelligence: looking through the Pygmalion lens: AI & Society

This paper reminds me of early nuclear energy “control” advocacy. In fact, the discovery of uranium, and specifically the widespread global knowledge of a significant inventive process that allows the release of a huge... more

General (I.2.0) | Apr 29 19

Books
Universal quantum computing

Quantum computing is one of the hottest research fields right now, although the theory behind it had its start in the early 1980s, when Richard Feynman asked in a lecture why simulating quantum effects with classical (non-quantum) computers is so tricky [1]. He... more
Information Theory (H.1.1...) | May 22 19

Handbook of model checking

Due to the proliferation and pervasiveness of hardware and software entities in everyday life, ascertaining their trustworthiness is of paramount importance. Model checking is a logic-based approach that determines whether the abstract model of an entity... more
Model Checking (D.2.4...) | May 20 19

The insider threat

Did you ever wish to find the names and addresses of any convicted sex offenders living in your area? The author of this book asserts that parents and employers can use information like this to build what she calls a “risk landscape.” As she explains, it is quite... more
Privacy (K.4.1...) | May 17 19

Programming for hybrid multi/manycore MPP systems

To quote John Levesque, coauthor and director of Cray’s Supercomputing Center of Excellence: “Ask not what your compiler can do for you, ask what you can do for your compiler.” As the book states, it is necessary for... more
Compilers (D.3.4...) | May 16 19

The materiality of interaction

The central theme of the book is the disappearing differences between cyberspace and the real world. In fact, the boundary for interaction between the two realms has never been strict, for example, as represented by the punch card at the dawn... more
Interaction Styles (H.5.2...) | May 15 19

Euclidean distance geometry

If someone has a set of objects whose positions are known, calculating the distances between them is not a problem. However, the inverse problem is difficult, that is, given a set of distances between objects, determine their positions. Unfortunately, several solutions... more
Geometrical Prob. & Computations (F.2.2...) | May 14 19

Monomial ideals and their decompositions

We usually solve problems by breaking them into smaller problems. In the predominant situations, we have linear systems that can be decomposed into several problems because these systems have a basis, that is, the system is the “product” of a... more
Graph Theory (G.2.2) | May 13 19

The discrete charm of the machine

Digital computers have found their way into every aspect of modern life. They are now essential for work and ubiquitous in leisure, and used from childhood to retirement age, through every stage of adult life. Although the number of digital computers in operation today is... more
General (I.2.0) | May 10 19

Feature selection and enhanced krill herd algorithm for text document clustering

This monograph, which comes out of the author’s PhD thesis, studies text document clustering with the help of the krill herd (KH) algorithm. KH is a relatively new class of bio-inspired algorithms. The essence of the... more
Feature Evaluation & Selection (I.5.2...) | May 10 19

The dream machine

The dream machine is a focused look at the history of computing, emphasizing the contrast between a view of computers as powerful descendants of the slide rule with a view of computers as human partners and enhancers of human performance. The subtitle... more
History of Computing (K.2) | May 9 19


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy