Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help

Select Issue:

Heads-up limit hold’em poker is solved: Communications of the ACM
First of all, the title is at least misleading. Heads-up limit hold’em (HULHE) poker, a two-person Texas hold’em game with limitations, is a small subset of the Texas hold’em universe. When the article was...
Games (I.2.1...) | Jul 2 18

Conflict resolution: Journal of Automated Reasoning
This work introduces the conflict resolution calculus (CR), which is shown to use unification “to generalize conflict-driven clause learning,” and an...
Mathematical Logic (F.4.1) | Jul 3 18

Locating maximal approximate runs in a string: Theoretical Computer Science
Repetition and periodicity play an essential role in efficient pattern matching, data analysis, and data compression. This paper presents an efficient algorithm to identify maximal sequences of approximate repetitions within a...
Pattern Matching (F.2.2...) | Jul 3 18

Automatic synthesis of logical models for order-sorted first-order theories: Journal of Automated Reasoning
Many problems in formal program analysis and verification can be reduced to determining whether a logical theory (a set of logic formulas) derived from the program has a...
Logics And Meanings Of Programs (F.3) | Jul 5 18

The orchestration of a collaborative information seeking learning task: Information Retrieval
The paper provides a collaborative information seeking (CIS) learning task and definitions and descriptions for CIS, along with studies/examples. The authors...
Learning (I.2.6) | Jul 5 18

Mining urban events from the tweet stream through a probabilistic mixture model: Data Mining and Knowledge Discovery
If you are curious about how probabilistic models can be used to analyze tweets for local event detection, this paper is a good start. In order to overcome the...
Data Mining (H.2.8...) | Jul 5 18

An effective characterization of the alternation hierarchy in two-variable logic: ACM Transactions on Computational Logic
Many interesting properties of words can be described in a first-order language with variables (x, y, ...) for positions and two basic properties: x < y (meaning that x is to the left of y) and Qax (meaning that letter...
Formal Languages (F.4.3) | Jul 6 18

Discovering and understanding Android sensor usage behaviors with data flow analysis: World Wide Web
From 2008 to 2018, the use of mobile apps has grown exponentially, reaching more than 3.8 million apps in Google’s Play Store and two million apps in...
World Wide Web (WWW) (H.3.4...) | Jul 6 18

Computing semantic similarity of concepts in knowledge graphs: IEEE Transactions on Knowledge and Data Engineering
Semantic similarity expresses the commonality among concepts; therefore, it may play a critical role in a wide range of computational applications. The...
Measurements (D.4.8...) | Jul 9 18

Event summarization for sports games using Twitter streams: World Wide Web
The Wall Street Journal recently published an article by Jason Gay titled “How Twitter Rules the NBA” [1]. It contends that the National Basketball Association (NBA) is heavily linked to social media, especially Twitter. This newspaper...
World Wide Web (WWW) (H.3.4...) | Jul 9 18

Mathematics for computer graphics (5th ed.)

If there is a student guide for understanding the mathematics for computer science, this is it. Mathematics for computer graphics is a gem of a book for this purpose. The readers not only get knowledge of prerequisites and depth, but also pedagogical...
General (I.3.0) | Jul 6 18

Reactive with ClojureScript recipes

This book offers a cookbook of recipes using ClojureScript and its libraries for reactive web programming. According to the back cover, the intended readership level is beginning to intermediate. I had high hopes for this book...
Applicative (Functional) Programming (D.1.1) | Jul 6 18

Coding literacy

Like reading and writing, programming has become an essential fundamental tool to organize information. A few centuries ago, being able to write and read, whether in Spanish, English, or French, was a way to be...
General (D.1.0) | Jul 9 18

Probability and computing: randomization and probabilistic techniques in algorithms and data analysis (2nd ed.)

Probability in computer science plays the same role as in physics: while there is a large corpus of theories and methodologies based on a purely deterministic underpinning, the introduction of probability opens the door to a vast field of new theories, methods, and related...
Probabilistic Algorithms (Including Monte Carlo) (G.3...) | Jul 10 18

Computing highly oscillatory integrals

Even though the numerical computation of integrals is a topic that has been investigated for many centuries, current textbooks have failed to describe certain facets in detail. One of these missing areas is the special case of when the integrand oscillates rapidly. Deaño...
Quadrature And Numerical Differentiation (G.1.4) | Jul 10 18

Introduction to deep learning using R

This is the era of machine intelligence. The domain of machine learning, and in particular deep learning, has evolved rapidly, and we have started to develop and use real-life applications from this evolution. The...
Statistical Computing (G.3...) | Jul 11 18

Deception in the digital age

Psychology and sociology may be surpassing technology as the key to online deception. This book reminds me of the old adage that access through personal interaction is often more effective than other techniques in espionage. While not always true, there is a strong...
Abuse And Crime Involving Computers (K.4.1...) | Jul 11 18

Introduction to learning classifier systems

In the preface, Introduction to learning classifier systems presents itself as an introductory textbook for undergraduate or graduate students, as well as for practitioners. The scope of the is encompassing, and its brevity splendid. Learning classifier systems...
Learning (I.2.6) | Jul 11 18

Deception in the digital age

The book’s ten chapters provide background on deception techniques and then examples linked to cyber deception. The introduction, “Cyberanthropology of Deception,” shows that deception is an old tactic, with evidence dating back to 2500 BCE. Examples...
Abuse And Crime Involving Computers (K.4.1...) | Jul 12 18

Business process management cases

As the title promises, this book contains case descriptions and case studies. The introductory chapter tries to provide a framework and editorial guidelines for describing cases from business process...
Business (J.1...) | Jul 12 18

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy