Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Current Hot Topics
Search
 
  Last Updated
Mobile Health Applications: Designing with the User in Mind
 
Our lives are being changed by the increasing presence of smartphones. In fact, a recent survey found that more than half of US mobile subscribers now own one. As a result of this growth, numerous mobile health (mHealth) applications are becoming ingrained in our everyday lives. These applications focus on a variety of issues, ranging from medication reminders to wellness. - Madhu Reddy

Aug 29 2014
Autonomous Virtual and Artificial Characters: Realistic Inhabitants of Artificial Worlds
 
Virtual characters, also known as virtual actors, have become very popular in the last 15 years, mainly through 3D movies and games. In movies, they now have very realistic physical and emotional characteristics, including their facial expressions, hair, clothes, and motions. - Nadia Magnenat-Thalmann and Daniel Thalmann

Feb 12 2014
The Nonequispaced FFT: An Indispensable Algorithm for Applied Science
 
Fast Fourier transforms (FFTs) are one of the "10 algorithms with the greatest influence on the development and practice of science and engineering in the 20th century" [1]. This is because the FFT is applied in almost every area of modern science, including fields as diverse as acoustics, astronomy, computational biology, fluid dynamics, medicine, physics, and digital signal processing. - Daniel Potts

Apr 9 2013
The Critical Need for Computational Intelligence in Human Genetics
 
An important goal of human genetics is to identify which genes and which specific DNA sequence variations (polymorphisms) play an important role in determining susceptibility to common diseases such as cancer, essential hypertension, and schizophrenia. - Jason H. Moore

Feb 6 2013
Internet Voting: Will We Cast Our Next Votes Online?
 
This simple question is at the crux of many discussions of Internet voting. In short, online banking has checks and balances, visibility, liability, and recourse. If an unauthorized banking transaction occurs, you can see it in your statement. The bank is responsible for losses, and has the ability to reverse an erroneous transaction. And, above all, you and your bank both know that the transaction was on your account, and where to return the money! - Jeremy Epstein

Apr 3 2011
Adversarial Information Retrieval: The Manipulation of Web Content
 
Adversarial information retrieval has become a very active research area in the last few years. As the name indicates, adversarial information retrieval research differs from traditional information retrieval in that the content providers may have an adversarial relationship with the entity (usually a search engine) that consumes their content. - Dennis Fetterly

July 10 2007
Managing the Unmanageable: Putting Cryptography to Work for Digital Rights
 
The advantages of digital content distribution (DCD) include rapid dissemination on a global scale, cost-effectiveness, unparalleled production capabilities, and highly flexible pricing. However, the ease and convenience of storing and transmitting data in digital form is a double-edged sword. - Aggelos Kiayias

Jun 15 2007
Game Theory and the Design of Electronic Markets
 
Game theory is the study of decision making among multiple agents (human or software). In a game, the decisions of all agents jointly determine the outcome. An auction is a classic example of a game: the bids of all participants determine the winner and the winning price. This essay illustrates some of the features and bugs in the design of electronic consumer auctions. - Amy Greenwald

Aug 24 2006
Brain Machine Interfaces: Mind over Matter
 
Our brains use our bodies to interact with the external world. However, emerging technology is poised to challenge this state of affairs and create direct brain machine interfaces (BMIs) to open up a digital channel between the brain and the physical world. - Jose C. Principe

Mar 11 2005
   
  Archived
Open Source: The Dark Horse of Software?
 
In 1983, Richard Stallman created a Unix-like operating system called GNU (a recursive acronym for “GNU is Not Unix”) and released it under a license that provided certain rights for use and redistribution - an open-source license. Eight years later, a graduate student at the University of Helsinki, Linus Torvalds, created another Unix-like operating system, Linux, which he also made available for free. - Phillip A. Laplante

Feb 6 2013
Overlay Networks: Networking on Top of the Network  
During the last six years, overlay networks have become one of the most prominent tools for Internet research and development. Overlays permit designers to implement their own routing and packet management algorithms on top of the Internet. - David G. Andersen Feb 5 2013

 

 
     
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2014 ThinkLoud, Inc.
Terms of Use
| Privacy Policy