Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help


Surveying stylometry techniques and applications : ACM Computing Surveys

Stylometry is analysis of textual data to find hidden patterns. This paper provides a comprehensive survey on this topic. The paper contains three main parts. In the first part, the authors consider five...
Natural Language Processing (I.2.7) | Apr 19 18

Toward optimal self-adjusting heaps : ACM Transactions on Algorithms

A self-adjusting heap is a heap data structure “that does not [need to] explicitly maintain structural information”; instead, during each access or update operation, the heap is adjusted in a uniform way. Why is a...
Data Structures (E.1) | Mar 19 18

Perceived space in the HTC Vive : ACM Transactions on Applied Perception

This introduction is useful in that it discusses some of the issues that have challenged the development of virtual environments (VEs) and how some of these have already been resolved. Kelly et al. investigate...
Virtual Reality (I.3.7...) | Apr 4 18

Control strategies for self-adaptive software systems : ACM Transactions on Autonomous and Adaptive Systems

How can we develop advanced control strategies for self-adaptive software systems? If you are interested in an extended answer, please read this paper. Its aim is to provide an overview of the control techniques...
Computer-Aided Software Eng. (D.2.2...) | Apr 13 18

Differential hybrid games : ACM Transactions on Computational Logic

As software becomes ever more pervasive in safety-critical devices--from pacemakers to cars, from robots to airplanes--it is important that we have means of insuring their safety. For some of the more...
Semantics of Programming Lang. (F.3.2) | Mar 22 18

Designing for transformative play : ACM Transactions on Computer-Human Interaction

Could the design of specific game types lead to better user experiences? Does a specific type of game make it more enjoyable, and increase the quality of...
Interaction Styles (H.5.2...) | Apr 9 18

Toward a geographic understanding of the sharing economy : ACM Transactions on Computer-Human Interaction

In the sharing economy (dynamic services for consumers for ride sharing, resource sharing for paid part-time work, and so on), the physical geographical area where the consumer resides...
Collaborative Computing (H.5.3...) | Mar 5 18

Fast and accurate time-series clustering : ACM Transactions on Database Systems

Clustering temporal data, namely time series, is a challenging and expensive computational task in terms of accuracy and speed. Despite the fact that a wide variety of time-series clustering algorithms exist...
Clustering (H.3.3...) | Apr 16 18

Learning k for kNN classification : ACM Transactions on Intelligent Systems and Technology

This paper aims to improve the performance of the k-nearest neighbors (kNN) approach and its variants in three data mining applications--classification...
Data Mining (H.2.8...) | Mar 27 18

Algorithm 980: sparse QR factorization on the GPU : ACM Transactions on Mathematical Software

Many large-scale scientific and engineering computational problems lead, after some kind of discretization, to the solution of huge systems of linear algebraic equations and/or linear least...
Parallel Processors (C.1.2...) | Mar 14 18

5G wireless systems: simulation and evaluation techniques

Yang et al. set out their objective of pursuing the latest research simulations and evaluations of possible 5G candidate technologies to comply with the identified International Telecommunication Union (ITU) 5G...
Signal Processing Systems (C.3...) | Apr 4 18

Advances in smart cities: smarter people, governance, and solutions

With the growth of information technology (IT), cities are growing through enhanced technologies, giving rise to the concept of the smart city. This book explains the concept of a smart city, its requirements...
Organizational Impacts (K.4.3) | Mar 16 18

Agile UX storytelling: crafting stories for better software development

If you are familiar with agile methodology in the software development life cycle (SDLC), then you will know that user stories are used to create a shared understanding between the project team and stakeholders about...
Dist., Maint. & Enhancement (D.2.7) | Mar 21 18

An introduction to machine learning (2nd ed.)

In his introduction, the author states that “machine learning has come of age.” In many ways, if the scope and methods are those established in the book, it is true. But from the point of view of recent research and especially industrial initiatives, this is not true in...
Learning (I.2.6) | Mar 9 18

Automotive software architectures

The automotive industry is experiencing the most rapid changes in its evolution toward semi- and fully autonomous vehicles. Software is driving the car, augmenting or replacing the human driver. Possibly this is the only book that covers the whole breadth...
Software Architectures (D.2.11) | Mar 9 18

Beginning data science in R: data analysis, visualization, and modelling for the data scientist

Data science has existed for 40 years, but is increasingly receiving more attention since large amounts of structured and unstructured data (big data) are collected every day within...
Database Management (H.2) | Mar 23 18

Beginning functional JavaScript: functional programming with JavaScript using ECMAScript 6

Functional programming is a programming paradigm centered on the evaluation of mathematical functions and is a declarative language of expressions. Side effects are unacceptable. Whenever a function...
Applicative (Functional) Prog. (D.1.1) | Mar 22 18

Bridging the gap between requirements engineering and software architecture

This is a very extensive research work on the framework and methodology to improve software architecture and hence software development by using QuaDRA (short for quality-based co-development of the...
Requirements/Specifications (D.2.1) | Mar 2 18

Codes and rings: theory and practice

Error-correcting codes are everywhere and play an important role in our daily lives, from scanning barcodes or participating in a Skype chat, a credit card transaction, or a phone call, to storing data on computers. They provide data reliability in all forms of information storage...
Coding & Information Theory (E.4) | Mar 29 18

Cognitive informatics in health and biomedicine: understanding and modeling health behaviors

Health-related decisions are often based on personal experiences, biases, trust, knowledge (or lack of it), and the physical and social environment (availability, friends and family, and so on). This book fills an important gap by discussing health informatics concepts from...
Health (J.3...) | Apr 9 18

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy