Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
March 25, 2017
Search
Highlight

A smartphone-based system for detecting hand tremors in unconstrained environments
García-Magariño et al. use smartphones in their research as tools to support the diagnosis of Parkinson’s disease. Smartphones are used in several studies with clinical assessments based on the Unified Parkinson’s Disease Rating Scale due to their capabilities to collect... more
Quote
A decision must be made as to which operations shall be built in and which are to be coded into the instructions. Reference has already been made to the uncertain... more
- J. W. Mauchly (1947)
Articles
Aspect extraction in sentiment analysis: comparative analysis and survey: Artificial Intelligence Review

This paper covers a considerable volume of research work in the area of sentiment analysis. The authors define sentiment analysis as the... more

Text Analysis (I.2.7...) | Mar 23 17

Efficient kd-tree construction for ray tracing using ray distribution sampling: Multimedia Tools and Applications

Raytracing is one of the main rendering methods used to generate 2D images from 3D scenes. When used with other techniques... more

Raytracing (I.3.7...) | Mar 23 17

A constraint programming scheduler for heterogeneous high-performance computing machines: IEEE Transactions on Parallel and Distributed Systems

If you have managed high-performance computing (HPC) facilities, you will be aware of the difficulties that can arise in job scheduling. Nineteen nodes... more

Scheduling (D.4.1...) | Mar 23 17

Centralized allocation of human resources: an application to public schools: Computers and Operations Research

Workforce planning--the allocation of human resources to available projects/task units--is a problem that has a direct impact on the financial bottom line... more

Project & People Mgmt. (K.6.1) | Mar 23 17

Efficient discovery of longest-lasting correlation in sequence databases: The VLDB Journal

Large quantities of data are stored every day in databases, but sooner or later these data must be extracted according to different criteria: these extractions constitute data sequences. One... more

Time Series Analysis (G.3...) | Mar 22 17

Pedagogy of game design: YouTube

Should video game design, or for that matter any sort of software design, be taught by a practitioner or an academic? The academic will have an organized and abstract understanding of the design process... more

Games (I.2.1...) | Mar 21 17

Autonomic performance and power control for co-located web applications in virtualized datacenters: IEEE Transactions on Parallel and Distributed Systems

The proliferation of cloud computing and virtualized environments raises several performance issues regarding load balancing and power... more

Cloud Computing (C.2.4...) | Mar 21 17

Diverse and proportional size-l object summaries using pairwise relevance: The VLDB Journal

When we search the web, we usually enter one or more keywords; in (almost) no time, we receive back a list of websites that bear some relation to those keywords. Behind the scenes, a search engine... more

Information Search & Retrieval (H.3.3) | Mar 21 17

WebAL comes of age: a review of the first 21 years of artificial life on the web: Artificial Life

Soon after computers became available to researchers, they were used to explore concepts like cellular automata or self-replicating machines and organisms, the most... more

Artificial Intelligence (I.2) | Mar 21 17

A new look at the semantic web: CACM

The numerous demands for prevalent web advertisements and documents call for new smart information dissemination systems. Emerging and future intelligent web systems ought to reflect the... more

Semantic Web (H.3.4...) | Mar 16 17

Books
Process mining: data science in action

In process mining, event logs of processes are analyzed in order to extract information about the organization, processes, and products. For example, a business process workflow for giving credit to... more
Data Mining (H.2.8...) | Mar 24 17

Data mining for social robotics: toward autonomously social robots

This comprehensive work focuses on human-robot interaction (HRI) using data mining and time series analysis. There are two major objects in this vast field: autonomy and sociality. The author provides... more
Data Mining (H.2.8...) | Mar 24 17

Security challenges and approaches in Internet of Things

The Internet of Things (IoT) is a tremendously growing network that will affect our daily lives in every aspect. Therefore, the security of IoT needs to be carefully considered due to the size of the... more
Security & Protection (K.6.5) | Mar 23 17

Fundamentals of computer graphics (4th ed.)

Computer graphics describes any use of computers to create images from 3D to 2D and manipulate them. This book (26 chapters) explains the fundamental concepts, mathematics, and theory of computer graphics... more
General (I.3.0) | Mar 23 17

The European Union as guardian of Internet privacy: the story of Art 16 TFEU

The European Union (EU) treats data protection and personal privacy as fundamental rights, unlike the US. Any business operating in Europe must understand a number of privacy-related treaties and directives... more
Governmental Issues (K.5.2) | Mar 23 17

Wicked cool shell scripts: 101 scripts for Linux, OS X, and UNIX systems (2nd ed.)

This is the second edition of a book originally published in 2004, and some new material has been added to address needs (like cloud storage access) that have emerged since that time. The authors observe... more
Scripting Languages (I.7.2...) | Mar 23 17

Algebra for cryptologists

Cryptography is technically synonymous with information security. Providing security features for data and information is the most important concern in a business requirement. Most undergraduate... more
Data Encryption (E.3) | Mar 20 17

Evidence-based software engineering and systematic reviews

I reviewed a hard cover 399-page book composed of three parts and an appendix. The first part is titled “Evidence-Based Practices in Software Engineering,” which constitutes almost half of the book. The... more
Design Tools & Techniques (D.2.2) | Mar 17 17

Fuzzy logic in its 50th year: new developments, directions and challenges

Lotfi Zadeh published his initial work on fuzzy set theory in 1965. This volume celebrates a half century of progress in the research and applications of fuzzy set theory and fuzzy logic. The 16 contributions... more
Uncertainty, Fuzzy & Prob. Reas. (I.2.3...) | Mar 17 17

Issues in the use of neural networks in information retrieval

At the beginning of a calendar year that has been declared as the year of artificial intelligence (AI), with the revivals of bad and good experiences as well as fiercely debated topics in the traditional... more
Information Search & Retrieval (H.3.3) | Mar 15 17


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy