Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help


A survey of machine learning for big code and naturalness : ACM Computing Surveys

There is a rising demand for effective software tools that can help developers build reliable and maintainable software systems. There has been abundant research to help developers track bugs and verify program...
Software Engineering (D.2) | Nov 4 21

A survey on gait recognition : ACM Computing Surveys

Gait recognition is a biometric method that uses sensor data to recognize people based on body shape and walking styles. Gait data is acquired from video images, inertial sensors, or sensors in the environment. The possible...
Introductory & Survey (A.1) | Jun 8 21

A survey on session-based recommender systems : ACM Computing Surveys

Wang et al. present a comprehensive survey with this paper. A session-based recommender system (SBRS) is a system that makes recommendations to users based on short-term, dynamic user preferences (in a...
Marketing (J.1...) | Dec 2 21

Automated expertise retrieval: a taxonomy-based survey and open issues : ACM Computing Surveys

Due to the rigorous advancement in skill sets through knowledge enhancement, multiple methods of sharing the required skills can challenge industries that are looking for the “right fit.” At the same time, the...
General (H.0) | Aug 31 21

Environmental audio scene and sound event recognition for autonomous surveillance : ACM Computing Surveys

As my colleagues and I define in a previous paper, “environmental sound recognition (AESR) is a relatively new discipline of computer science destined to...
Sound & Music Computing (H.5.5) | Nov 11 21

Photoplethysmogram-based cognitive load assessment using multi-feature fusion model : ACM Transactions on Applied Perception

Physiological measures of cognitive load have become more accessible with advancements in neuro-imaging devices and wearable technology, and provide...
Perceptual Reasoning (I.2.10...) | Oct 8 21

An innovative approach for ad hoc network establishment in disaster environments by the deployment of wireless mobile agents : ACM Transactions on Autonomous and Adaptive Systems

This paper considers the challenges to mobile wireless robots (WRs) in disaster environments: the unknown environment; the complexity of the...
General (I.2.0) | Jul 6 21

Designing robot teams for distributed construction, repair, and maintenance : ACM Transactions on Autonomous and Adaptive Systems

Human beings consider some environments hostile, such as deep space, nuclear reactors, or contaminated areas, and thus are not very keen...
General (I.2.0) | Jul 30 21

Knowledge management for self-organised resource allocation : ACM Transactions on Autonomous and Adaptive Systems

Social systems are mainly controlled self-organizing systems dependent on participation and cooperation. The complexity of the social world needs...
Distributed Artificial Intelligence (I.2.11) | Jun 10 21

Incomplete SMT techniques for solving non-linear formulas over the integers : ACM Transactions on Computational Logic

It is well known that nonlinear integer arithmetic is undecidable due to a negative answer to Hilbert’s tenth problem. Still, constraint solving over nonlinear integer polynomials has...
General (G.0) | May 27 21

A beginners guide to Python 3 programming

This comprehensive, well-written book covers the programming language Python in great depth--likely more than the “beginner” suggested in the title needs. Indeed, novice programmers who work their way through the...
Python (D.3.2...) | Aug 5 21

A brief history of computing (3rd ed.)

The first four chapters of A brief history of computing are similar to what is usually described in the history section of an introductory computer science (CS) textbook: everything from ancient civilizations like Egypt to Turing and the first computers. The following...
History of Computing (K.2) | Dec 28 21

A systems approach to language pedagogy

Tajino, the editor of this brilliant edition, has compiled various approaches to language pedagogy from several authors. And he successfully uses the concept of a systems approach as the core of this research...
Education (J.1...) | Aug 13 21

Artificial intelligence for a better future

Ethics may save us from the possibly negative effects of artificial intelligence (AI). The author, Stahl, leads the SHERPA consortium, whose work is the basis of this book. Project Sherpa stands for “shaping the ethical dimensions of smart information systems.” First...
Ethics (K.4.1...) | Dec 21 21

Cognitive Internet of Things: frameworks, tools and applications

The introduction to this book cites its aim: “to collect a series of state-of-the-art contributions to the fields of computational neuroscience, computational cognition and perception, computer vision, natural language processing, human action analysis and related...
Internet (C.2.1...) | Jan 7 22

Competitive programming in Python

Programming contests typically ask teams of programmers to develop solutions to several posed problems in a limited amount of time. Knowledge of algorithms and the techniques for implementing those algorithms efficiently are critical for success...
Python (D.3.2...) | Dec 9 21

Computer networks and the Internet

Most people in the developed world routinely use the Internet, but only a small minority understands the technologies on which its services depend. Howser provides a detailed description of these technologies, supported by practical exercises using the...
General (C.2.0) | Aug 17 21

Creating good data

The dream of all writers: to be the right person, at the right place, at the right time. Harry Foxwell hit the jackpot: (1) An excellent author with a gift of insight. (2) The right place: the world. (3) The right time: the pandemic. Every scientist, every research...
Data Types & Structures (D.3.3...) | Sep 2 21

Crypto dictionary

Why do we need a dictionary when we have the Internet? Dictionary: A worthless book now that the Internet exists. This Crypto dictionary entry might seem to indicate the author sees no need for his own work. But Crypto dictionary is not your run-of-the-mill...
Reference (A.2) | Aug 25 21

Data cleaning

Data cleaning provides an extensive literature review. It showcases the body of work that academia has produced over the last decades on the subject of data cleaning automation. Identifying and correcting dirty data by means of a computer is a task with...
Error Handling & Recovery (D.2.5...) | Aug 4 21

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2022 ThinkLoud, Inc.
Terms of Use
| Privacy Policy