Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help


A survey on gait recognition : ACM Computing Surveys

Gait recognition is a biometric method that uses sensor data to recognize people based on body shape and walking styles. Gait data is acquired from video images, inertial sensors, or sensors in the environment. The possible...
Introductory & Survey (A.1) | Jun 8 21

Applications of distributed ledger technologies to the Internet of Things: a survey : ACM Computing Surveys

If you have ever wondered how the Internet of Things (IoT)--the interconnection of physical and virtual things through existing and evolving communication...
Distributed Programming (D.1.3...) | Mar 22 21

Modeling information retrieval by formal logic: a survey : ACM Computing Surveys

As the title indicates, formal logic is used for modeling information retrieval (IR). Readers can expect a literature review (of IR models), supported with graphs, mathematical formulas, and examples that...
Retrieval Models (H.3.3...) | Apr 12 21

Orchestrating big data analysis workflows in the cloud : ACM Computing Surveys

When processing different big data workflows, many new and (so far) unknown patterns and performance requirements are visible. We are forced to search new processing models and...
Cloud Computing (C.2.4...) | Mar 2 21

Data-parallel structural optimisation in agent-based models : ACM SIGEVOlution

Modeling is a tool for studying a natural phenomenon. The accuracy of such a model depends on how well the model mimics the behavior of the system under study. The modeling of phenomena in ecology, microbiology, social...
Multiagent Systems (I.2.11...) | Apr 16 21

Smart dispatching in heterogeneous systems : ACM SIGMETRICS Performance Evaluation Review

For modern computing platforms, heterogeneous processing nodes are the reality. Moreover, most traditional job assignment algorithms, which are designed for homogeneous systems, are not...
Performance Evaluation (H.3.4...) | Mar 31 21

Recognizing weak embeddings of graphs : ACM Transactions on Algorithms

The paper begins: “A continuous piecewise linear map ϕ : GM is a weak embedding if, for every ε > 0, ψε : GM with ||ϕ-ψε|| < ε.” The norm mentioned here is the uniform norm. The authors identify the...
Graph Theory (G.2.2) | Mar 12 21

Assessing neural network scene classification from degraded images : ACM Transactions on Applied Perception

One of the major problems faced by deep learning techniques--for example, deep convolutional neural networks (CNNs)--is uncontrolled behavior...
General (I.4.0) | Mar 23 21

An innovative approach for ad hoc network establishment in disaster environments by the deployment of wireless mobile agents : ACM Transactions on Autonomous and Adaptive Systems

This paper considers the challenges to mobile wireless robots (WRs) in disaster environments: the unknown environment; the complexity of the...
General (I.2.0) | Jul 6 21

Designing robot teams for distributed construction, repair, and maintenance : ACM Transactions on Autonomous and Adaptive Systems

Human beings consider some environments hostile, such as deep space, nuclear reactors, or contaminated areas, and thus are not very keen on working in...
General (I.2.0) | Jul 30 21

A practical guide to digital forensics investigations

Digital forensics has gained much interest in recent decades. Computing devices are widespread and used for countless applications. As a result, a huge number of digital traces can be fetched, analyzed, and, in case of a crime, used as evidence. A practical guide to...
Abuse & Crime Involving Comp. (K.4.2...) | Jul 28 21

Advanced Perl Programming

I am not an everyday Perl programmer; that said, since learning it in the mid-90s from an excellent book by Randal L. Schwartz [1], I am always on the lookout to expand my knowledge of the language to see what else I need to acquire to become an expert. This...
Perl (D.4.9...) | May 31 21

Advanced Perl programming

Advanced Perl programming is the third book in a three-book set by William “Bo” Rothwell [1,2]. The three books are titled (and subtitled) in a manner suggesting a pedagogy in Perl that takes readers from a novice state to an expert state. This was an unfortunate...
Perl (D.4.9...) | Jun 4 21

Agile project management with Azure DevOps

Agile methodologies have become the preferred way to manage software projects. According to different reports, more than 70 percent of projects use some sort of agile practices. As remote jobs become more popular, and especially in light of the recent impacts of...
Project & People Management (K.6.1) | Jul 8 21

Algorithms for optimization

Anyone wanting to publish a book in a respectable and classical research field needs to find a niche to justify the originality. This statement includes the area of mathematical optimization, which interests Kochenderfer and Wheeler. They decided to focus on the...
Optimization (B.1.4...) | Apr 27 21

Automated machine learning

A dataset, generically speaking, is a collection of numbers. It constitutes an information element when structure and context are assigned. The objective of machine learning (ML) is to interpret an information element as a human would. This requires further...
Learning (I.2.6) | Jun 14 21

Bandit algorithms

This book is on bandit algorithms. The word “bandit” is commonly understood to mean an armed thief who is usually a member of a group or band. However, in the context of this book, bandit refers to a type of slot machine with a large metal pole or handle on the side that...
Learning (I.2.6) | May 3 21

Bayesian analysis in natural language processing (2nd ed.)

Morgan & Claypool’s “Synthesis Lectures on Human Language Technologies” series provides grounded theory and practical approaches in an applied research sense. This book is in this series. Chapter 1 gives an...
Natural Language Processing (I.2.7) | May 28 21

Beginning Perl programming

Perl 5 is a robust cross-platform language that has, as the author relates, been in use for more than two decades and become deeply embedded in the corporate information technology (IT) world. Most UNIX-based operating systems have a standard Perl...
Multiparadigm Languages (D.3.2...) | Jun 29 21

Blown to bits (2nd ed.)

Technology has generated cultural anxiety throughout history [1]. Digital technologies are no exception. Digitalization anxiety greatly relates to high levels of uncertainty regarding the implications brought by “the integration of [digital] technologies in all aspects...
Social Issues (K.4.2) | Jun 9 21

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2021 ThinkLoud, Inc.
Terms of Use
| Privacy Policy