Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
April 26, 2017

Designing software architectures
It is often forgotten that common sense is the least common of the senses. Sensible design advice, guidelines, and heuristics are often no more than just that: plain old common sense. However, rational reminders of our own fallibility and cognitive biases in the form of design methods and methodologies help us improve our chances... more
Say not of a thing which cannot be understood that in the end it will be understood... more
- Hillel (54)
BKViz: a basketball visual analysis tool: IEEE Computer Graphics and Applications

Would you like to know how visual analytics could help basketball teams improve their performance? This paper provides the answer. A tool, BKViz, is presented that combines multiple interactive... more

Physically Based Modeling (I.3.5...) | Apr 25 17

Interactive web-based visualization for accessibility mapping of transportation networks: EuroVis 16

This work deals with the web-based visualization of transportation network data, with a focus on accessibility maps. The complexity of such networks requires scalable and flexible solutions... more

Graph Theory (G.2.2) | Apr 24 17

Computer vision & natural language processing: recent approaches in multimedia & robotics: ACM Computing Surveys

Robot learning operates at the crossroads of disciplines such as machine learning, robotics engineering, and developmental robotics for... more

General (I.2.0) | Apr 21 17

Digital wellness services for young elderly: a missed opportunity for mobile services: Journal of Theoretical and Applied Electronic Commerce Research

This is a preliminary report/proposal about using mobile digital services to help the “young elderly,” that is, people between 60 and 75 years old... more

Electronic Commerce (K.4.4) | Apr 20 17

Context-based unsupervised ensemble learning and feature ranking: Machine Learning

An unsupervised ensemble learning and feature ranking method in which the combiner has no information about the expert’s performance, methods, and the data with... more

Feature Evaluation & Selection (I.5.2...) | Apr 20 17

Crowdsourced data management: a survey: IEEE Transactions on Knowledge and Data Engineering

Many data management and analytics tasks, notably entity resolution, sentiment analysis, and image recognition, cannot always be fulfilled through automated software processes alone, but also... more

Data Models (H.2.1...) | Apr 18 17

Optimizing data placement on GPU memory: a portable approach: IEEE Transactions on Computers

We say that a computational artifact is “portable” if it can be implemented on a variety of targets. In this paper, the portable artifact is a strategy for the... more

Performance Analysis & Design Aids (B.3.3) | Apr 17 17

Usage, costs, and benefits of continuous integration in open-source projects: ASE 16

A profound revolution has been taking place throughout software engineering, led again by the software industry. Continuous integration (CI) was first discussed in 1991, but until recently only a handful... more

General (D.2.0) | Apr 12 17

A mathematical theory of resources: Information and Computation

Many of the physical sciences ultimately deal with resources. The important questions are: Can a given resource be converted into another? And if so... more

Math. Logic & Formal Languages (F.4) | Apr 12 17

Foundations for using linear temporal logic in Event-B refinement: Formal Aspects of Computing

Event-B is a formal method for system-level modeling and analysis. In the last decade, Event-B refinement has generated a lot of... more

Mechanical Verification (F.3.1...) | Apr 12 17

Becoming a global chief security executive officer: a how to guide for next generation security leaders

For many years, a recurring topic in security conference talks and articles has been how to sell security to businesses. There are parallels with the earlier business-IT alignment... more
Security & Protection (K.6.5) | Apr 25 17

Data deduplication for data optimization for storage and network systems

I have always thought of data deduplication as something I might use on a Windows server to reduce the space taken up by library files. Of course, it is much more than that. Storage deduplication has... more
Network Operations (C.2.3) | Apr 25 17

Google it: total information awareness

This collection of papers by authors in different areas discusses how Google affects all aspects of our lives, our society, and possibly our future. The book contains 31 chapters, divided into seven... more
Web-Based Interaction (H.5.3...) | Apr 25 17

Introduction to cyberdeception

Cyberdeception represents an important issue of cybersecurity and a growing concern that affects more and more activity sectors in the present digital age. Cyberdeception aims to transmit false or counterfeit information on the Internet. On the negative side, criminals... more
Security & Protection (K.6.5) | Apr 24 17

Bayesian methods in the search for MH370

One can seldom consider mathematics-heavy books as exciting page-turners. Yet, Bayesian methods in the search for MH370 is so far the best one I have encountered that could stand up to such... more
Prob. Algorithms (Inc. Monte Carlo) (G.3...) | Apr 21 17

The fundamentals of computational intelligence: system approach

Not for the faint-hearted or those without mathematical knowledge, the rhythm of this book is as follows: first, it provides a profound formal description grounded in mathematics in some sections of... more
Uncertainty, Fuzzy & Prob. Reas. (I.2.3...) | Apr 21 17

J. Michael Dunn on information based logics

Apart from introductory material and an “autobio,” these articles on Dunn’s work can be divided into three areas: Relevance logic (which Australians call “relevant” logic), the area in which Dunn did his doctoral thesis... more
Knowledge Rep. Formalisms & Meth. (I.2.4) | Apr 20 17

Designing with Xilinx FPGAs: using Vivado

This highly practical compendium of articles from different authors covers topics about, as the title of the book says, design methods using field-programmable gate array (FPGA) devices from the vendor Xilinx. FPGA devices are among the most... more
Gate Arrays (B.7.1...) | Apr 20 17

Managing software process evolution

Building a software artifact necessarily involves a methodology, commonly referred to as a software development process. Evolving this process is necessary to cope with new requirements and new technologies. User expectations are evolving... more
Software Process (K.6.3...) | Apr 19 17

Cyber-security of SCADA and other industrial control systems

Industrial control systems (ICSs) are systems comprising computers and devices that may be electrical and/or mechanical in nature. They are widely used to partially or totally control equipment in... more
Security & Protection (K.6.5) | Apr 17 17

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy