Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
April 27, 2017
Search
Highlight

Designing software architectures
It is often forgotten that common sense is the least common of the senses. Sensible design advice, guidelines, and heuristics are often no more than just that: plain old common sense. However, rational reminders of our own fallibility and cognitive biases in the form of design methods and methodologies help us improve our chances... more
Quote
The chip can execute functions within nanoseconds. Speed and power are goals in its development. Our clients barrage us with the product of the electronic, information age--words... more
- Aura Oslapas (2003)
Articles
Resource and performance prediction at high utilization for n-tier cloud-based service systems: ACSW 17

Cloud provision providers offer pertinent services such as software-as-a-service (SaaS), platform-as-a-service (PaaS), and infrastructure-as-a-service (IaaS) that require users to sign service-level... more

Metrics (D.2.8) | Apr 27 17

SITAR: GUI test script repair: IEEE Transactions on Software Engineering

The testing of a graphical user interface (GUI) often requires extensive human interactions with the system, which is tedious, time consuming, and costly. Even if... more

Testing & Debugging (D.2.5) | Apr 27 17

Joint modeling of user check-in behaviors for real-time point-of-interest recommendation: ACM Transactions on Information Systems

In order to predict and recommend the points of interest (POIs) for a given combination of user, current location, and time, a joint probabilistic generative model... more

Information Search & Retrieval (H.3.3) | Apr 26 17

Computing and restoring global inverse consistency in interactive constraint satisfaction: Artificial Intelligence

When a constraint satisfaction problem requires or allows user interaction in the course of the solution, it is important that the solver prevent the user from selecting values for... more

Software Configuration Mgmt. (D.2.9...) | Apr 26 17

Inferring directions of undirected social ties: IEEE Transactions on Knowledge and Data Engineering

With the advent of social networks, there are many opportunities available for researchers to research and analyze social ties. This is especially true... more

Social Networking (H.3.4...) | Apr 26 17

BKViz: a basketball visual analysis tool: IEEE Computer Graphics and Applications

Would you like to know how visual analytics could help basketball teams improve their performance? This paper provides the answer. A tool, BKViz, is presented... more

Physically Based Modeling (I.3.5...) | Apr 25 17

Interactive web-based visualization for accessibility mapping of transportation networks: EuroVis 16

This work deals with the web-based visualization of transportation network data, with a focus on accessibility maps. The complexity of such networks requires scalable and flexible solutions... more

Graph Theory (G.2.2) | Apr 24 17

Computer vision & natural language processing: recent approaches in multimedia & robotics: ACM Computing Surveys

Robot learning operates at the crossroads of disciplines such as machine learning, robotics engineering, and developmental robotics for... more

General (I.2.0) | Apr 21 17

Digital wellness services for young elderly: a missed opportunity for mobile services: Journal of Theoretical and Applied Electronic Commerce Research

This is a preliminary report/proposal about using mobile digital services to help the “young elderly,” that is, people between 60 and 75 years old... more

Electronic Commerce (K.4.4) | Apr 20 17

Context-based unsupervised ensemble learning and feature ranking: Machine Learning

An unsupervised ensemble learning and feature ranking method in which the combiner has no information about the expert’s performance, methods, and the... more

Feature Evaluation & Selection (I.5.2...) | Apr 20 17

Books
Introduction to text visualization

Published by Atlantis Press, a publishing company established in 2006, with offices in Amsterdam, Beijing, and Paris, this book is written in English, but it would certainly benefit from a more thorough... more
Content Analysis & Indexing (H.3.1) | Apr 27 17

Digital logic design using Verilog: coding and RTL synthesis

Anyone who wants to read this book must have a sound background in the theoretical aspects of digital logic design. This book presents digital logic design using the hardware description language known... more
Automatic Synthesis (B.6.3...) | Apr 27 17

Tamed agility: pragmatic contracting and collaboration in agile software projects

Agile development is now mainstream, and there are hundreds of books out there about the subject. However, none has faced as big a challenge in agile projects as Tamed agility regarding the... more
Project & People Mgmt. (K.6.1) | Apr 27 17

Big data analytics: a management perspective

The big data concept started to form in the early 2000s; since then, organizations have been challenged with increasing, even alarming amounts of various types of data, generated by multiple sources... more
Content Analysis & Indexing (H.3.1) | Apr 27 17

Open education: from OERs to MOOCs

In chapter 7 of the book, the author (Spector) asks several questions: "What are massive open online courses (MOOCs) intended to accomplish [in the domain of learning]? Why have [open... more
Computer Uses in Education (K.3.1) | Apr 27 17

Deep learning neural networks: design and case studies

Deep learning is a field of study that is gaining much attention both in academia and industry; hence, textbooks and monographs on this subject are increasingly in demand. At first glance, this book by D. Graupe seems... more
Learning (I.2.6) | Apr 26 17

Optimizing transport logistics processes with multiagent planning and control

Modern logistics brings various challenging and complex problems to researchers’ attention. Among them, planning and control problems need efficient problem-solving approaches; multiagent systems... more
Multiagent Systems (I.2.11...) | Apr 26 17

Big data analytics: methods and applications

Big data analytics has generated much research attention in the past decade, focusing on the architectural and methodological challenges of processing enormous datasets and extreme rates of data generation and collection (two... more
Content Analysis & Indexing (H.3.1) | Apr 26 17

Quantum computational number theory

The idea of quantum computing including the quantum Turing machine originated in the last century. However, real interest in quantum computing developed after the seminal paper by Peter Shor [1], where he gave polynomial-time algorithms for... more
Number-Theoretic Computations (F.2.1...) | Apr 26 17

Becoming a global chief security executive officer: a how to guide for next generation security leaders

For many years, a recurring topic in security conference talks and articles has been how to sell security to businesses. There are parallels with the earlier business-IT alignment... more
Security & Protection (K.6.5) | Apr 25 17


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy