Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
June 22, 2021
Search
Highlight

Modern Fortran explained: incorporating Fortran 2018
First introduced in 1957, FORTRAN was designed to be easier than an assembler language for writing algebraic equations on a computer. In this, FORTRAN was spectacularly successful. More than 60 years later, Fortran (officially renamed since Fortran 90) [1] continues... more
Quote
We build computers and programs for many reasons. We build them to serve society and as tools for carrying out the economic tasks of society. But as... more
- A. Newell & H.A. Simon (1975)
Articles
Widar2.0: passive human tracking with a single Wi-Fi link:

This work demonstrates that it is possible to track the location of a person, with sub-meter accuracy, using only one single Wi-Fi link between a pair of commercial off-the-shelf (COTS) Wi-Fi devices (“one access... more

Human Factors (H.1.2...) | Jun 22 21

An army of me: sockpuppets in online discussion communities: WWW 17

Online discussion platforms have become an important part of social life. However, they may be abused, for instance, to deceive and create an illusion of public consensus or save people from being banned, or to vandalize content on... more

General (H.0) | Jun 21 21

Securing and self recovery of virtual machines in cloud with an autonomic approach using snapshots: Mobile Networks and Applications

Virtual machines (VMs) in the form of cloud computing are now mainstream for the delivery of information technology (IT) services. However, the... more

General (C.2.0) | Jun 17 21

Knowledge management for self-organised resource allocation: ACM Transactions on Autonomous and Adaptive Systems

Social systems are mainly controlled self-organizing systems dependent on participation and cooperation. The complexity of the social world needs continuous redesigns of these systems toward functional... more

Distributed Artificial Intelligence (I.2.11) | Jun 10 21

A survey on gait recognition: ACM Computing Surveys

Gait recognition is a biometric method that uses sensor data to recognize people based on body shape and walking styles. Gait data is acquired from video images, inertial sensors, or sensors in the environment... more

Introductory & Survey (A.1) | Jun 8 21

Toward effective robot-child tutoring: ACM Transactions on Interactive Intelligent Systems

Are robots effective learning tools for children? This paper hopes to answer this question. However, the study seems to raise more questions than it answers due to its short time... more

Education (J.1...) | Jun 7 21

ChronicleDB: a high-performance event store: ACM Transactions on Database Systems

A database is a warehouse of information; its contents can be anything from bank account details for millions of customers to the large historical weather-related data used for analysis. There are several database... more

General (H.2.0) | Jun 2 21

Rehumanized crowdsourcing: CHI 19

Crowdsourcing is the practice of obtaining information or input into a task from a large number of people, either paid or unpaid, typically via the Internet. With its fast growth, crowdsourcing has produced large volumes of data manually labeled via human crowds... more

Human Factors (H.1.2...) | Jun 1 21

Incomplete SMT techniques for solving non-linear formulas over the integers: ACM Transactions on Computational Logic

It is well known that nonlinear integer arithmetic is undecidable due to a negative answer to Hilbert’s tenth problem. Still, constraint solving over nonlinear integer polynomials has attracted considerable attention... more

General (G.0) | May 27 21

Quality of CRM systems: a systematic mapping study: SBQS 19

Editor’s Note: All papers in the Proceedings of the XVIII Brazilian Symposium on Software Quality (SBQS 2019) are in Portuguese. Companies use customer relationship management (CRM) systems to collect/update... more

General (D.2.0) | May 24 21

Books
Distributed real-time systems

This textbook summarizes contemporary knowledge and paradigms of real-time systems in a monographic way. It fits an undergraduate-level course since it starts with basic hardware and low-level real-time system characteristics. Being a textbook, the body of... more
Organization & Design (D.4.7) | Jun 18 21

Cognition and intractability

Is thinking computable--not just in principle, but in practice? In the past this was the subject of vigorous exchanges between philosophers [1,2,3]; today, with the promise of artificial intelligence (AI) appearing ever brighter--in what is arguably its third or fourth... more
Complexity Measures & Classes (F.1.3) | Jun 15 21

Automated machine learning

A dataset, generically speaking, is a collection of numbers. It constitutes an information element when structure and context are assigned. The objective of machine learning (ML) is to interpret an information element as a human would. This requires further... more
Learning (I.2.6) | Jun 14 21

Fuzzy collaborative forecasting and clustering

Collaborative machine learning (ML) has been gaining momentum in the last few years for several in-demand reasons, including privacy-preserving data analysis, sharing complex computations (such as those... more
Fuzzy Set (I.5.1...) | Jun 14 21

Blown to bits (2nd ed.)

Technology has generated cultural anxiety throughout history [1]. Digital technologies are no exception. Digitalization anxiety greatly relates to high levels of uncertainty regarding the implications brought by “the integration of [digital] technologies in all aspects... more
Social Issues (K.4.2) | Jun 9 21

Advanced Perl programming

Advanced Perl programming is the third book in a three-book set by William “Bo” Rothwell [1,2]. The three books are titled (and subtitled) in a manner suggesting a pedagogy in Perl that takes readers from a novice state to an expert state. This was an... more
Perl (D.4.9...) | Jun 4 21

Uncertainty management with fuzzy and rough sets

This volume contains papers presented at the Second International Symposium on Fuzzy and Rough Sets. The symposium drew 55 submissions; 30 were accepted for presentation. Extended versions of 20 accepted papers are included in this book, published in Springer’s... more
General (F.0) | Jun 3 21

Advanced Perl Programming

I am not an everyday Perl programmer; that said, since learning it in the mid-90s from an excellent book by Randal L. Schwartz [1], I am always on the lookout to expand my knowledge of the language to see what else I need to acquire to become an expert. This book... more
Perl (D.4.9...) | May 31 21

Bayesian analysis in natural language processing (2nd ed.)

Morgan & Claypool’s “Synthesis Lectures on Human Language Technologies” series provides grounded theory and practical approaches in an applied research sense. This book is in this series. Chapter 1 gives an... more
Natural Language Processing (I.2.7) | May 28 21

Sandworm

“Digital security” has been a buzzword of the past decades. The vulnerabilities grow as fast as the digital networks and systems, or rather faster--all new technologies add to the long list of possible means and/or targets for hackers. A personal laptop or... more
Government (J.1...) | May 26 21


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2021 ThinkLoud, Inc.
Terms of Use
| Privacy Policy