Reviewers have found these items notable and have self-selected them for review.
All Media Types
Why interactive learning environments can have it all: resolving design conflicts between competing goals
Rau M., Aleven V., Rummel N., Rohrbach S. CHI 2013 (Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Paris, France, Apr 27-May 2, 2013) 109-118, 2013. Type: Proceedings
As the educational world grapples with online design and delivery issues, there will inevitably be discord between the various stakeholders. Competing goals represent the major area of conflict and often result in problematic solutions that may...
May 22 2013
Limits of region-based dynamic binary parallelization
Edler von Koch T., Franke B. VEE 2013 (Proceedings of the 9th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, Houston, TX, Mar 16-17, 2013) 13-22, 2013. Type: Proceedings
Parallel computation is everywhere, from small portable devices to laptops, desktops, and data centers. This wealth of available parallelism challenges computer scientists and developers alike to rethink algorithms and rewrite old sequential...
May 17 2013
Privacy and security for cloud computing
Pearson S., Yee G., Springer Publishing Company, Incorporated, 2012. 322 pp. Type: Book (978-1-447141-88-4)
Cloud computing is a new phenomenon with enormous potential that is changing the way enterprises function. However, to achieve its potential, issues related to privacy, security, and trust must be satisfactorily addressed. No standard definition...
May 17 2013
Digital forensics for enterprise rights management systems
Schrittwieser S., Kieseberg P., Weippl E. IIWAS 2012 (Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services, Bali, Indonesia, Dec 3-5, 2012) 111-120, 2012. Type: Proceedings
Enterprise rights management (ERM) is concerned with managing and protecting data in an enterprise context. Digital forensics issues run into considerations of encryption and access protection. Existing guidelines and standards, such as National...
May 16 2013
A new marker-less 3D Kinect-based system for facial anthropometric measurements
Loconsole C., Barbosa N., Frisoli A., Costa Orvalho V. AMDO 2012 (Proceedings of the 7th International Conference on Articulated Motion and Deformable Objects, Mallorca, Spain, Jul 11-13, 2012) 124-133, 2012. Type: Proceedings
Facial anthropometry is the science of measuring the human face by identifying and marking landmark points on the subject (face). Measurements between the landmarks are then either taken manually by calipers or estimated through image processing...
May 14 2013
Introduction to cryptography with Maple
Pardo J., Springer Publishing Company, Incorporated, 2012. 735 pp. Type: Book (978-3-642321-65-8)
Maple is a widely used mathematical tool for scientific computations. Since cryptography involves many complicated math operations, it is difficult to reveal its design principles using a traditional programming language, such as C or Java. In...
May 13 2013
More reputable recommenders give more accurate recommendations?
Yuan W., Guan D., Han Y., Lee S., Lee Y. ICUIMC 2013 (Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, Kota Kinabalu, Malaysia, Jan 17-19, 2013) 1-8, 2013. Type: Proceedings
Predictive analytics has hit the mainstream, thanks to the emergence of many day-to-day consumer applications such as Pandora, Netflix, Yelp, and Epinions, all of which contain some variation of a recommendation engine. These engines (or systems) ...
May 6 2013
The application of FPGA-based discrete wavelet transform system in EEG analysis
Li N., Nie Y., Zhu W. ISDEA 2012 (Proceedings of the 2012 2nd International Conference on Intelligent System Design and Engineering Application, Jan 6-7, 2012) 1306-1309, 2012. Type: Proceedings
In this paper, a distributed modular version of the Mallat algorithm is used as the finite impulse response (FIR) filter module of a field-programmable gate array (FPGA)-based discrete wavelet transform system for electroencephalogram (EEG)...
May 6 2013
Secure and resilient software: requirements, test cases, and testing methods
Merkow M., Raghavan L., CRC Press, Inc., Boca Raton, FL, 2012. 278 pp. Type: Book (978-1-439866-21-4)
Nobel laureate James D. Watson exhorts you to “read around your subject” ; for what it’s worth, so do I. Despite my experience as a specialist in safety-critical software, I nevertheless read, enjoyed, and learned from this...
May 3 2013
Data analytics: models and algorithms for intelligent data analysis
Runkler T., VIEWEG, Wiesbaden, Germany, 2012. 147 pp. Type: Book (978-3-834825-88-9)
Data mining and knowledge discovery has become an important field in computer science (CS) over the past few decades. As the amount of available information has been increasing rapidly, the mining of data from the web, in particular from social...
May 3 2013
Reproduction in whole or in part without permission is prohibited. Copyright © 2000-2013 ThinkLoud, Inc.