







The Oxford handbook of causal reasoning A few years ago, Weisberg’s Willful ignorance [1] distinguished two facets of uncertainty: doubt, which is the focus of modern statistics, and ambiguity about the causal structure of the world, which researchers in many domains have not addressed systematically. Statistics formalizes the manipulation of the data obtained from experiments... more









ELECTRONIC DATA PROCESSING INDUSTRY
Nanoseconds, megabytes, and sophisticated submarket control…Here is the... more 

 J. A. Sherman Christensen (1973) 









Triclustering algorithms for threedimensional data analysis: a comprehensive survey: ACM Computing Surveys
The rapid increase in data streams poses significant challenges to their interpretation. Algorithms increasingly target 3D datasets, which plot observations, attributes, and contexts, to capture patterns... more
Clustering (H.3.3...)  Jan 18 19
Mending the patchwork of requirements from multiple standards using participative goal modelling: Requirements Engineering
It is a truth, especially in Europe and the US, that with the emergence of new regulations such as eIDAS (EU 910/2014), the General Data... more
Requirements/Specifications (D.2.1)  Jan 18 19
Website replica detection with distant supervision: Information Retrieval
Detecting duplicate web pages is of great importance for search engines. This is because duplicates are very costly to index. The work of Carvalho et al. advances the technology for detecting web page duplicates... more
World Wide Web (WWW) (H.3.4...)  Jan 18 19
Safe autonomy under perception uncertainty using chanceconstrained temporal logic: Journal of Automated Reasoning
The topic of selfdriving cars is receiving a lot of press lately. This paper on safe autonomy is an interesting read for people researching... more
Temporal Logic (F.4.1...)  Jan 17 19
STADS: software testing as species discovery: ACM Transactions on Software Engineering and Methodology
Software testing is an exercise in extrapolationwe attempt to infer the correctness of software by exercising it using test cases. However, as Dijkstra famously observed, testing demonstrates... more
Testing & Debugging (D.2.5)  Jan 17 19
Multimedia big data analytics: a survey: ACM Computing Surveys
Big data continues to grow exponentially. One source of that growthmultimedia datahas not received comprehensive study. The authors correct this deficit by presenting the results of a broad multidimensional survey of the literature related to multimedia... more
Introductory & Survey (A.1)  Jan 16 19
A comparison of code similarity analysers: Empirical Software Engineering
Analyzing code similarity in source code is essential to detecting clones, duplicate code, plagiarism, and software copyright violations. Over the years, researchers have proposed various approaches... more
General (D.2.0)  Jan 11 19
PERSIST: Journal of Grid Computing
NoSQL application data stores often combine onpremise and public cloud resources. As a consequence, they may deal with heterogeneous technologies, flexible but less structured storage architectures, and dynamic changes. In this paper, the authors propose PERSIST... more
Cloud Computing (C.2.4...)  Jan 9 19
Modified cuckoo optimization algorithm (MCOA) to solve precedence constrained sequencing problem (PCSP): Applied Intelligence
The precedence constrained sequencing problem is a general problem:
Consider a set of jobs where an arbitrary precedence relationship exists among the jobs and a cost is associated with every permutation... more
General (I.2.0)  Jan 7 19
FPT approximation schemes for maximizing submodular functions: Information and Computation
A survey of techniques, this paper presents and analyzes algorithms and constructs fixed parameter tractable approximation schemes. These schemes are “collections of algorithms that run in [fixed... more
Approximation (G.1.2)  Jan 4 19









Knowledge management in theory and practice (3rd ed.)
When building software, whether we realize it or not, we embed various kinds of knowledge into it. Software engineers doing requirements gathering and domain analysis have realized this, as have programming... more
KR Formalisms & Methods (I.2.4)  Jan 18 19
Engineering dynamics
This volume condenses the material usually covered in a onesemester undergraduate course on kinematics and dynamics. Dr. To provides an introduction to the topics by listing some relevant formulas along with easytofollow examples of how to apply them.
The book... more
Kinematics & Dynamics (I.2.9...)  Jan 17 19
Fundamentals of numerical computation
An interesting read, this book is composed of 13 chapters spread over two parts.
Chapter 1 covers MATLAB basics, including floatingpoint numbers, problems and conditioning, and algorithm stability. Chapter 2 explores matrices (including various... more
Model Development (I.6.5)  Jan 15 19
Carl von Clausewitz, the fogofwar, and the AI revolution
As artificial intelligence (AI) is increasingly used in many areas, including fully automated vehicle control and military applications, there are concerns about how effectively such systems deal with extreme conditions. Carl von Clausewitz, the 19th century military... more
Applications & Expert Systems (I.2.1)  Jan 14 19
Smart sustainable cities of the future
It is well acknowledged that urban populations will increase exponentially. Global bodies like the International Telecommunication Union (ITU) are quite engaged with this issue, articulating the role of information and communication technologies... more
Applications & Expert Systems (I.2.1)  Jan 14 19
Fuzzy logic augmentation of neural and optimization algorithms
There have been many recent developments related to fuzzy logic applications. This book, volume 749 in Springer’s “Studies in Computational Intelligence” series, contains research papers related to fuzzy logic, neural... more
Optimization (G.1.6)  Jan 11 19
Exploring ODEs
Right from the introduction it is clear that Exploring ODEs has a strong pedagogical and practical aim. The authors have created an easytoremember word, FLASHI. Depending on which letters are capitalized (for example, FlaSHi, flAShI, and so on), the reader... more
Ordinary Differential Equations (G.1.7)  Jan 10 19
Augmented reality and virtual reality
Recent technologies are changing the way we interact with computers and our surroundings, as well as how we perceive information; examples of these technologies include augmented reality (superimposing computergenerated graphics and text onto a realworld... more
Artificial, Aug. & Virtual Realities (H.5.1...)  Jan 8 19
Hypergraph theory in wireless communication networks
This short publication really fits in the “SpringerBriefs” series. Despite the fact that the book could be considered a long paper, it may interest researchers in the applications of mathematics field. The book starts with an overview of hypergraph theory [1,2]... more
Wireless Communication (C.2.1...)  Jan 4 19
Introduction to data mining (2nd ed.)
The first edition of this book, published in 2006 [1], was probably the best introductory textbook on data mining available. A dozen years later, the field has evolved to become mainstream under the commercial denomination of “big data,” or its more academic appellative... more
Data Mining (H.2.8...)  Jan 2 19





