Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Current Hot Topics
  Last Updated
Adversarial Learning: Mind Games with the Opponent  
Machine learning algorithms have created the sensation of working with experts in an endless list of fields--advertisers, detectives, doctors, chess masters, soccer players, loan creditors, salespeople, entertainment critics, drivers, and even matchmakers. Machines with intelligence have dazzled - Murat Kantarcioglu and Bowei Xi and Yan Zhou

Aug 7 2017
Internet Voting: Will We Cast Our Next Votes Online?  
This simple question is at the crux of many discussions of Internet voting. In short, online banking has checks and balances, visibility, liability, and recourse. If an unauthorized banking transaction occurs, you can see it in your statement. The bank is responsible for losses, and has the ability to reverse an erroneous transaction. And, above all, you and your bank both know that the transaction was on your account, and where to return the money! - Jeremy Epstein

Sep 15 2016
Thinking in Sync: The Bulk-Synchronous Parallel Approach to Large-Scale Computing  
The bulk-synchronous parallel (BSP) paradigm provides an abstract model that separates the concerns of hardware architects and software designers, thereby bridging the two. Leslie Valiant, winner of the 2010 ACM Turing Award, presented BSP as such a bridging model [1]. - Rob H. Bisseling and Albert-Jan N. Yzelman

Apr 10 2016
Enhancing Anonymity: Cryptographic and Statistical Approaches for Shredding Our Digital Dossiers  
Never one to shy away from mixing humor with politics, fashion designer Kenneth Cole years ago ran an iconic ad that glibly declared, “You are on a video camera an average of ten times a day. Are you dressed for it?” While the statistic has been rendered a vast understatement, the sentiment still rings true: we all leave traces of ourselves when we interact in the world, and are generally oblivious to how often and how they will be spliced, recombined, processed, and shared. - Jeremy Clark

Dec 15 2014
Mobile Health Applications: Designing with the User in Mind  
Our lives are being changed by the increasing presence of smartphones. In fact, a recent survey found that more than half of US mobile subscribers now own one. As a result of this growth, numerous mobile health (mHealth) applications are becoming ingrained in our everyday lives. These applications focus on a variety of issues, ranging from medication reminders to wellness. - Madhu Reddy

Aug 29 2014
Autonomous Virtual and Artificial Characters: Realistic Inhabitants of Artificial Worlds  
Virtual characters, also known as virtual actors, have become very popular in the last 15 years, mainly through 3D movies and games. In movies, they now have very realistic physical and emotional characteristics, including their facial expressions, hair, clothes, and motions. - Nadia Magnenat-Thalmann and Daniel Thalmann

Feb 12 2014
The Nonequispaced FFT: An Indispensable Algorithm for Applied Science  
Fast Fourier transforms (FFTs) are one of the "10 algorithms with the greatest influence on the development and practice of science and engineering in the 20th century" [1]. This is because the FFT is applied in almost every area of modern science, including fields as diverse as acoustics, astronomy, computational biology, fluid dynamics, medicine, physics, and digital signal processing. - Daniel Potts

Apr 9 2013
The Critical Need for Computational Intelligence in Human Genetics  
An important goal of human genetics is to identify which genes and which specific DNA sequence variations (polymorphisms) play an important role in determining susceptibility to common diseases such as cancer, essential hypertension, and schizophrenia. - Jason H. Moore

Feb 6 2013
Adversarial Information Retrieval: The Manipulation of Web Content  
Adversarial information retrieval has become a very active research area in the last few years. As the name indicates, adversarial information retrieval research differs from traditional information retrieval in that the content providers may have an adversarial relationship with the entity (usually a search engine) that consumes their content. - Dennis Fetterly

Jul 10 2007
Managing the Unmanageable: Putting Cryptography to Work for Digital Rights  
The advantages of digital content distribution (DCD) include rapid dissemination on a global scale, cost-effectiveness, unparalleled production capabilities, and highly flexible pricing. However, the ease and convenience of storing and transmitting data in digital form is a double-edged sword. - Aggelos Kiayias

Jun 15 2007
Game Theory and the Design of Electronic Markets  
Game theory is the study of decision making among multiple agents (human or software). In a game, the decisions of all agents jointly determine the outcome. An auction is a classic example of a game: the bids of all participants determine the winner and the winning price. This essay illustrates some of the features and bugs in the design of electronic consumer auctions. - Amy Greenwald

Aug 24 2006
Brain Machine Interfaces: Mind over Matter  
Our brains use our bodies to interact with the external world. However, emerging technology is poised to challenge this state of affairs and create direct brain machine interfaces (BMIs) to open up a digital channel between the brain and the physical world. - José C. Principe

Mar 11 2005
Open Source: The Dark Horse of Software?  
In 1983, Richard Stallman created a Unix-like operating system called GNU (a recursive acronym for “GNU is Not Unix”) and released it under a license that provided certain rights for use and redistribution - an open-source license. Eight years later, a graduate student at the University of Helsinki, Linus Torvalds, created another Unix-like operating system, Linux, which he also made available for free. - Phillip A. Laplante

Feb 6 2013
Overlay Networks: Networking on Top of the Network  
During the last six years, overlay networks have become one of the most prominent tools for Internet research and development. Overlays permit designers to implement their own routing and packet management algorithms on top of the Internet. - David G. Andersen

Feb 5 2013


Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy