Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
June 20, 2018
Search
Highlight

Dempster’s rule of combination
The rule of combination of belief functions on infinite sets of possibilities is developed in this paper. The author continues his developments on Dempster’s theory on lower probabilities in order to generalize already-obtained results in the framework of “theory of evidence” that are important for approximate reasoning using such a... more
Quote
And yet, whether in a philosophic sense (Kant’s sense), or an empirical and evolutionary sense, judgment is the most important faculty we have... more
- Oliver Sacks (1985)
Articles
Social MatchUP: CHI EA 18

As soon as this paper came across my desk, I knew I had to read and review it. What could be better than a virtual teaching environment for children to whom reality presents a struggle? Social skills are difficult to teach to any population. Most social skills are... more

Multimedia Information Systems (H.5.1) | Jun 19 18

“Revenge porn”: an analysis of legislative and policy responses: International Journal of Technoethics

In recent years, uploading or sharing images or videos online has become a social norm around the globe. However, when it involves intimate, disturbing, or nude images or video, circulation... more

Ethics (K.4.1...) | Jun 18 18

The privacy implications of cyber security systems: ACM Computing Surveys

This paper provides an accessible overview of the issues that spring up when looking into the privacy of cybersecurity systems. The paper starts by classifying cybersecurity technologies using four different... more

Privacy (K.4.1...) | Jun 15 18

Unsupervised feature learning based on deep models for environmental audio tagging: IEEE/ACM Transactions on Audio, Speech and Language Processing

The paper promises tagging--this is just the labeling of audio, which is referred to as “tagging” in the context of audio--of environmental audio using a deep... more

Audio Input/Output (H.5.1...) | Jun 15 18

Profit maximization with sufficient customer satisfactions: ACM Transactions on Knowledge Discovery from Data

This paper focuses on the prospects of “profit maximization with sufficient customer satisfaction.” The authors present 11 lemmas, nine examples, six definitions, two challenges, two theorems... more

Electronic Commerce (K.4.4) | Jun 15 18

Personalized app recommendation based on app permissions: World Wide Web

How to recommend apps to a user based on functionality, permissions, and user interests is the subject of this paper. Traditional app recommendation algorithms are based on... more

World Wide Web (WWW) (H.3.4...) | Jun 15 18

Sparsification and subexponential approximation: Acta Informatica

A sparsification of a problem maps the problem to a set of similar problems, each of which has its parameters bounded by some fixed number. For example, in the case of a graph-based problem, the degree... more

Approximation (G.1.2) | Jun 14 18

Architectural principles for cloud software: ACM Transactions on Internet Technology

What comes to mind first with cloud system architectures is the ubiquitous use of microservices, supported by total virtualization from hardware to middleware to applications: virtual machines... more

Cloud Computing (C.2.4...) | Jun 14 18

Conditioning in probabilistic programming: ACM Transactions on Programming Languages and Systems

Machine learning, possibly contrary to popular belief, is not just about endless variations of neural networks. There is also a thriving subculture of probabilistic programming based on Bayesian principles... more

Probabilistic Computation (F.1.2...) | Jun 13 18

Change-aware community detection approach for dynamic social networks: Applied Intelligence

On a walk in the hills above our house the other day, I watched two flocks of birds merge, fly around as one flock for a few minutes, and then separate into two again. While I assume... more

Social Networking (H.3.4...) | Jun 13 18

Books
Troublemakers

I like books about the history of the computing field. Those of us who lived through all of it delight in stories of folks who pioneered all of what we have today. This is a very good example of one of those books. It tells the story of six Silicon Valley principals (it variously... more
History of Computing (K.2) | Jun 15 18

Introduction to software testing (2nd ed.)

Software testing is essential. It doesn’t much matter if you can do something quickly or in minimal memory or with a spiffy web interface if the results are incorrect, though incorrect might include “more or less correct” in many circumstances (this is often explicit in... more
Testing & Debugging (D.2.5) | Jun 15 18

Trust and reputation management systems: an e-business perspective

This 86-page treatise provides information officers and project managers with a conceptual and computational approach to managing trust and reputation in the e-commerce world. The author is a faculty... more
Electronic Commerce (K.4.4) | Jun 14 18

Robot-proof

The book proposes a new model of higher education that goes beyond the classical undergraduate/graduate model and should be a better fit for the fabric of a modern technologically driven society. It consists of five chapters. The first chapter serves as motivation... more
Computers & Education (K.3) | Jun 14 18

Secondary liability of Internet service providers

Secondary liability occurs when an entity facilitates, makes material contributions to, or is otherwise responsible for violating a law or the right of another party. In the case of Internet service providers (ISPs), determining liability for the actions of users... more
Governmental Issues (K.5.2) | Jun 14 18

Teaching online (4th ed.)

Advances in technology have created a new type of learner who relies mainly on laptops and mobile devices to access teaching materials. This situation has driven teachers to adopt new strategies that preserve the quality of face-to-face teaching, yet take... more
Distance Learning (K.3.1...) | Jun 8 18

An introduction to distance geometry applied to molecular geometry

The most common way of determining the structures of molecules in a solution is nuclear magnetic resonance (NMR). The signals measured are caused by the flipping of the spins of paramagnetic nuclei in a... more
Geometrical Problems & Comp. (F.2.2...) | Jun 7 18

Programmed inequality

From 1930 to 1980, the transformation from underpaid labor to equal pay for workers can truly be stated as a radical change for British women opting for computing jobs. In Britain, the position of female workers as computer operators or technicians was mainly in government, public... more
History of Computing (K.2) | Jun 6 18

Distributed computing in big data analytics: concepts, technologies and applications

Day by day the prominence of big data analytics is increasing. Not only does it impact the way we work, but it is gradually impacting the way we live our lives. Yet it is also an area filled with a myriad of... more
Content Analysis & Indexing (H.3.1) | Jun 6 18

The human element of big data

Big data, with various connotations of “big” spanning volume, veracity, velocity, and so on, is a “big” word today. Scores of books exist on various aspects of this field, from the business side to the technical side. The related field of machine learning also has a lot... more
Content Analysis & Indexing (H.3.1) | Jun 4 18


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy