Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
December 2, 2016

Digital image processing: an algorithmic introduction using Java (2nd ed.)
This textbook is an excellent introduction to the fundamentals of digital image processing. It thoroughly blends basic theory and practical algorithms expressed in Java and ImageJ. It also provides a set of accessible exercises at the end of each chapter. It is... more
There is no claim that [the Torres y Quevedo chess playing machine] will think or accomplish things where thought is necessary... more
- David Levy (1976)
Planar graphs without 4-cycles adjacent to triangles are 4-choosable: Discrete Mathematics

Let G be a finite simple graph. A list assignment is a function on the vertices that associates a list of colors with each vertex. An L-coloring is a function that colors each vertex with one of the colors in... more

Graph Theory (G.2.2) | Nov 30 16

Shasta: interactive reporting at scale: SIGMOD 16

The evolution of technology is like a slow dance in which most steps are in place, but a few move forward. Motivated by increases of scale and efficiency, applications push the limits of technology and contribute to its advance. This paper... more

Query Processing (H.2.4...) | Nov 30 16

SKETCH’NDO: Journal of Visual Languages and Computing

SKETCH’NDO is a game design framework targeting educators with no programming experience who want to provide serious game-based training and educational material... more

Visual Programming (D.1.7) | Nov 29 16

Fault tolerance with aspects: a feasibility study: MODULARITY 16

Writing programs to manage and mitigate faults is a complex and usually custom process. Are there approaches to help one easily create a correct and reliable program when running on... more

Reliability (D.4.5) | Nov 29 16

What children ask about computers, the Internet, robots, mobiles, games etc.: WiPSCE 16

The questions children in elementary school have about computers and such is the motivation for this short and interesting, but dated, paper. The idea is that children’s interests can guide teachers... more

Computer & Info. Science Ed. (K.3.2) | Nov 28 16

Open issues in evolutionary robotics: Evolutionary Computation

Evolutionary methods can be adopted for developing controllers for task-oriented robots without the need to fully write models and programs. Initially, the considered task was the navigation of wheeled mobile robots; today... more

Robotics (I.2.9) | Nov 28 16

Optimal error estimates of linearized Crank-Nicolson Galerkin method for Landau-Lifshitz equation: Journal of Scientific Computing

The Landau–Lifshitz equation is a well-known mathematical model for describing the evolution of magnetization in ferromagnets. It is a partial... more

Partial Differential Equations (G.1.8) | Nov 23 16

Using regression makes extraction of shared variation in multiple datasets easy: Data Mining and Knowledge Discovery

This interesting paper presents an application that could be of value to individuals working in data analysis of sets, trying to find commonalities among... more

Correlation & Regression Analysis (G.3...) | Nov 23 16

Numerical P systems with migrating variables: Theoretical Computer Science

P systems are a model of computation inspired by biology. A P system is a theory of cells and their biochemistry. It has simple programs distributed over a hierarchical set... more

General (G.0) | Nov 23 16

Location-based address configuration for 6LoWPAN wireless sensor networks: Wireless Networks

Connecting wireless sensor networks (WSNs) to the Internet is a very interesting topic. As useful as WSNs are, they used to be constrained in a separate compartment of the network. The... more

Sensor Networks (C.2.1...) | Nov 22 16

Computer science: an interdisciplinary approach

I’ve decided to say here at the beginning that this book is outstanding and that it has my highest recommendation, both for self-study and as a text for undergraduate students who... more
Object-Oriented Programming (D.1.5) | Dec 2 16

Intelligent computing systems: emerging application areas

A kaleidoscope of topics, approaches, and writing styles, Intelligent computing systems: emerging application areas presents a rare variety of content. The book contains 16 chapters--independent papers... more
Uncertainty, Fuzzy & Prob. Reas. (I.2.3...) | Dec 1 16

E-learning systems: intelligent techniques for personalization

This is a collection of chapters that link together to form a comprehensive examination of how to personalize an e-learning experience. There are five parts; each part is self-contained and leads the... more
Computer Uses in Education (K.3.1) | Nov 30 16

MySQL for the Internet of Things

This book would be of interest to researchers and practitioners in the field of the Internet of Things (IoT). It examines the nature of IoT, hardware for IoT systems, how IoT data is stored and transmitted, and how MySQL can be used in IoT systems. In... more
Query Languages (H.2.3...) | Nov 29 16

Risk terrain modeling: crime prediction and risk reduction

Geospatial forecasting (predicting where and when in the future to find entities and events of interest) is a rich area of research with numerous important applications, including environmental management, antiterrorism, and... more
Model Development (I.6.5) | Nov 29 16

Digital fonts and reading

This anthology of 14 papers by 21 authors, including the two editors, focuses on the interaction of vision and type design. The first section features the problem of designing type for visually... more
Applications & Expert Systems (I.2.1) | Nov 28 16

Introduction to the history of computing: a computing history primer

In order to understand the author’s focus, this brief history of computing begins with describing what a computer is; as a result, he includes analog historical computers before surveying what often... more
History of Computing (K.2) | Nov 23 16

Cryptology transmitted message protection: from deterministic chaos up to optical vortices

"In the book now presented, the authors describe their experience of the theoretical investigation of the properties of the deterministic chaos generators in radio and optical range for the protected... more
Data Encryption (E.3) | Nov 23 16

Python parallel programming cookbook

Devoted to parallel programming in Python, this book is aimed at Python programmers who wish to become more proficient at writing efficient parallel code to realize performance gains. All of the example code in the book is available and allows... more
Python (D.3.2...) | Nov 21 16

Reactive messaging patterns with the actor model: applications and integration in Scala and Akka

In the 1980s, when my academic career started as a researcher into functional and actor programming languages, we were confident that by the turn of the millennium these would... more
Concurrent Prog. Structures (D.3.3...) | Nov 21 16

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2016 ThinkLoud, Inc.
Terms of Use
| Privacy Policy