







Big data is (at least) four different problems This video is an hourlong talk by Michael Stonebraker on potential disruptions in the world of big data. “Wait, a minute!” you might say, “I thought big data was the disrupter. How can it be disrupted as well?” Well, it can. And in this extremely informative talk, Stonebraker lays out the case for disruption in big data clearly... more









The growth of computational facilities in the period since World War I has already been phenomenal, and the possibilities in the near future are beyond... more 

 William Edmund Milne (1949) 









Modeling and understanding human routine behavior: CHI 16
The study of human routines is expanding the scope of behavioral sciences in light of actions performed by humans. Such studies help in improving bad habits, inexpert behaviors, and suboptimal routines... more
Miscellaneous (H.5.m)  Feb 23 17
Bayesian multitensor factorization: Machine Learning
Data mining is increasingly facing the problem of extracting new knowledge from experimental data collected from complex phenomena. To extract hidden information... more
Matrix Inversion (G.1.3...)  Feb 23 17
Dempster’s rule of combination: International Journal of Approximate Reasoning
The rule of combination of belief functions on infinite sets of possibilities is developed in this paper. The author continues his developments on Dempster’s theory on lower probabilities in... more
Approximation (G.1.2)  Feb 22 17
Estimating the number of tetrahedra determined by volume, circumradius and four face areas using Groebner basis: Journal of Symbolic Computation
Given a tetrahedron, we can compute its volume, its circumradius (radius of the sphere going through the four vertices), and the... more
Symbolic & Algebraic Manipulation (I.1)  Feb 22 17
Dimensional enrichment of statistical linked open data: Web Semantics: Science, Services and Agents on the World Wide Web
As with most consolidated analysis techniques, online analytical processing (OLAP) usually assumes a local data environment (for example, analysis... more
Data Models (H.2.1...)  Feb 16 17
Interacting multiview tracker: IEEE Transactions on Pattern Analysis and Machine Intelligence
Tracking objects in image sequences, in the presence of blurring, occlusion, and variations in illumination and object pose, is an important and challenging... more
Tracking (I.4.8...)  Feb 15 17
Parameterized complexity of critical node cuts: Theoretical Computer Science
The critical node cut (CNC) problem is defined as follows: given an (undirected) graph G and two integers k and x, decide if k nodes can be removed from G such that... more
Graph Algorithms (G.2.2...)  Feb 13 17
Efficient largescale trace checking using MapReduce: ICSE 16
In software engineering, software verification and validation has always been a challenging task. On the other hand, the emergence of big data and cloud computing has opened a new horizon... more
Software Engineering (D.2)  Feb 13 17
Spaceefficient pathreporting approximate distance oracles: Theoretical Computer Science
Graph spanners are sparse subgraphs that preserve distances between nodes of the original graph to an approximation that is bounded, usually given in the form of a multiplication factor known as stretch... more
Routing & Layout (F.2.2...)  Feb 10 17
A survey on context learning: IEEE Transactions on Knowledge and Data Engineering
This paper provides a structured and extensive survey on context learning methods. It groups context learning methods into four categories, in order of complexity: explicit analysis, implicit analysis... more
Learning (I.2.6)  Feb 9 17









Topics in numerical partial differential equations and scientific computing
The Association for Women in Mathematics (AWM) was founded in 1971, to encourage women to have careers in mathematical sciences. They held a research collaboration workshop in August 2014, hosted by... more
Partial Differential Equations (G.1.8)  Feb 24 17
Numerical methods and modelling for engineering
I always appreciated numerical methods courses, possibly because I found the field a simpler and more versatile alternative to learning the analytic solutions across many application domains. Although... more
Numerical Algorithms (G.1.0...)  Feb 23 17
Handbook of genetic programming applications
Over the years, researchers have attempted to solve tough scientific problems using techniques from the field of artificial intelligence. One such collection of techniques is genetic programming... more
Optimization (G.1.6)  Feb 23 17
Programming for computations  MATLAB/Octave
The title suggests the book is about MATLAB programming, and it is. It’s also about numerical analysis. It’s a textbook for a numerical analysis course that integrates MATLAB programming as its... more
MATLAB (G.4...)  Feb 22 17
IsoGeometric analysis: a new paradigm in the numerical approximation of PDEs
For their daily work, computational engineers in many technical disciplines rely heavily on the use of finite element software systems. However, certain features of the traditional mathematical approaches... more
Partial Differential Equations (G.1.8)  Feb 22 17
How to use objects: code and concepts
Object orientation was developed and has evolved as an effective software development methodology to model the complexities of reallife phenomena and outperform other legacy methods, which were lagging... more
ObjectOriented Programming (D.1.5)  Feb 21 17
Springer handbook of robotics (2nd ed.)
This handbook describes a very large number of topics on robotics. It describes robots with individual functional, control, programming, social, application, and historical aspects. It provides necessary... more
Robotics (I.2.9)  Feb 17 17
User interface design of digital textbooks: how screens affect learning
One of the recent major changes in educational technology has been learning using digital books, or ebooks. Some of their benefits include portability, affordability, interactivity, and an enhanced... more
User Interfaces (H.5.2)  Feb 17 17
The world made meme: public conversations and participatory media
Round up the usual suspects: Black is beautiful; I’ll have what she’s having; We are the 99 percent; We’ll always have Paris; Read my lipsmemes that have survived over time. They are cultural carriers transmitting... more
WebBased Interaction (H.5.3...)  Feb 17 17
The tyranny of uncertainty: a new framework to predict, remediate and monitor risk
What is risk? For our purposes, risk is some event or set of events that interferes with a planned process or activity. Generally, in the business world, organizations seek to mitigate risks, to balance... more
Simulation & Modeling (I.6)  Feb 16 17





