Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
June 25, 2017

Mathematical analysis and the mathematics of computation
Even though there are many deep connections between mathematical analysis and the mathematics of computation, these two fields are usually taught completely separately from each other. This traditional approach has the disadvantage that the concepts from analysis... more
Computing Reviews Announces 21st Annual Best of Computing
Best Reviews
Notable Books and Articles

... more
Performance monitoring in SAP HANA’s continuous integration process: ACM SIGMETRICS Performance Evaluation Review

Setting up a performance test and validation environment for every source code change is known to be prohibitively expensive. Conversely, SAP HANA’s continuous integration (CI) case suggests... more

Metrics (D.2.8) | Jun 23 17

Combating cancer with data: Communications of the ACM

This short note describes how data and computing could help find cancer cures. It discusses three projects supported by the National Cancer Institute (NCI) and the Department of Energy (DOE); each uses machine learning to... more

Health (J.3...) | Jun 23 17

Dependence guided symbolic execution: IEEE Transactions on Software Engineering

To make the developer’s life easier, many tools have been created for analyzing source code. Such analysis can be used, for example, to detect bugs, to check the coverage of a set of tests, or... more

Symbolic Execution (D.2.5...) | Jun 23 17

How many crowdsourced workers should a requester hire?: Annals of Mathematics and Artificial Intelligence

How many crowdsourced workers do you optimally need to ensure an acceptable quality in the (averaged) results of outsourced tasks? The surprising answer is ten to 11, as this paper proves in a lucid... more

The Computer Industry (K.1) | Jun 22 17

Autonomous human-robot proxemics: Autonomous Robots

When humans interact, the interaction partners are expected to respect culture-defined interaction spaces, ranging from intimate over personal and social to public space. Social robots that interact with humans should be... more

Robotics (I.2.9) | Jun 21 17

Information-theoretic caching: sequential coding for computing: IEEE Transactions on Information Theory

Streaming video sequences can be encoded in real time by applying a variable of some average rate of bits per symbol. Such a technique stores both the data sequence and the request sequence simultaneously... more

Data Models (H.2.1...) | Jun 21 17

A survey on ensemble learning for data stream classification: ACM Computing Surveys

The automation of several processes, such as business transactions, smartphones, and various types of sensors, has severely increased the number... more

Classifier Design & Evaluation (I.5.2...) | Jun 16 17

Supervisory routing control for dynamic load balancing in low data rate wireless sensor networks: Wireless Networks

Penetration of wireless sensor networking (WSN) technology in different aspects of human life has made its problems more salient than ever. Routing... more

Sensor Networks (C.2.1...) | Jun 16 17

Tied factors analysis for high-dimensional image feature extraction and recognition application: Pattern Analysis & Applications

Face recognition is one of those unstructured tasks that the human brain excels at, but that is difficult for computers to perform. But... more

Feature Evaluation & Selection (I.5.2...) | Jun 15 17

On the geometry and algebra of networks with state: Theoretical Computer Science

Several models have been proposed for the modeling of and reasoning about concurrent networks, the most widely known being the several variants of Petri nets. One interesting problem is the dichotomy... more

Petri Nets (D.2.2...) | Jun 14 17

Parachuting cats into Borneo

This book is an instruction manual. It describes effective strategies for changing the world. It consists of 16 short, easy-to-read chapters. Chapters 1 and 2 get the reader off to a good start. Chapter 1, “Thinking About the Way We Think About Change,” hints at... more
Business (J.1...) | Jun 23 17

Mathematical analysis and the mathematics of computation

Römisch and Zeugmann’s Mathematical analysis and the mathematics of computation is a lucid introductory textbook that unites mathematical analysis with the mathematics of computation in a single volume. The strength of the book lies in building the... more
General (G.0) | Jun 23 17

Architectural design: conception and specification of interactive systems

Software architecture emerged as a subfield of software engineering in the 1990s with its focus on the study of concepts, techniques, and methods related to design that have a strong influence on the... more
Software Architectures (D.2.11) | Jun 23 17

Financial analytics with R

Billed as “a training resource for ... students and professionals,” this title is a sophisticated manual on financial data manipulation, statistics, and R programming. It is by no means for the beginner or the faint of heart--a decent background in statistics and financial analysis is... more
Statistical Computing (G.3...) | Jun 23 17

Trends in software testing

Testing is an interesting subject; perhaps more so than any software engineering subject, how the authors (editors) of a book treat it is heavily dependent on the academe/practitioner focus of those... more
Testing & Debugging (D.2.5) | Jun 23 17

Smart learning objects for smart education in computer science: theory, methodology and robot-based implementation

Explaining the motivation for this book, the author states in the preface that there is a shift observed in education from teacher-centered learning to student-centered learning. Among several signs... more
Computer Science Education (K.3.2...) | Jun 22 17

Computational models of motivation for game-playing agents

One of the major dimensions in which current computer models of players in a gaming system differ from actual human players is affective aspects. Creating a computational model of motivation that can... more
Multiagent Systems (I.2.11...) | Jun 22 17

Handbook of biometrics for forensic science

Biometric samples have been used in forensic examinations for decades. However, this book is a compilation of efforts by several groups to systematize the union of the two sciences into a body of knowledge to be used, in... more
Abuse & Crime Inv. Computers (K.4.1...) | Jun 22 17

Deep learning

Neural net technology, like some teenagers, has grown by fits and starts. Originating as a biological model [1], it was first promoted as a computational tool, the “perceptron,” by Frank Rosenblatt [2]. Minsky and Papert vigorously opposed the model [3] in... more
Learning (I.2.6) | Jun 21 17

Simulation modeling and analysis (5th ed.)

Simulation models imitate the behavior of complex systems, including manufacturing processes and real-world service facilities. They are designed to gain some understanding of how the actual system behaves under different circumstances, to evaluate the... more
Modeling & Prediction (D.4.8...) | Jun 21 17

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy