Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
July 18, 2018

On the logos: a naïve view on ordinary reasoning and fuzzy logic
There are many books that you read to get answers to questions and doubts, and there are few books that leave you with more questions and doubts than before reading them. Yet, you can still be satisfied with such books because they give you the idea of the exciting... more
The Syllogism Consists of propositions, propositions consists of words, words are symbols of notions. Therefore if the notions themselves (which is the... more
- Francis Bacon (1625)
Zero-shot visual recognition via bidirectional latent embedding: International Journal of Computer Vision

Humans are remarkably good at learning to recognize new object categories from just a few examples, a task still unreachable by machines. Unlike... more

Computer Vision (I.5.4...) | Jul 18 18

Maximizing polynomials subject to assignment constraints: ACM Transactions on Algorithms

This paper considers “the q-adic assignment problem.” Fix a number q (originally q=2), and suppose we are given, for some number n, a 2q-dimensional array of costs cu,v where u and v... more

Algorithm Design & Analysis (G.4...) | Jul 13 18

Semantics-based analysis of content security policy deployment: ACM Transactions on the Web

Security is one of the biggest concerns in digital societies. Without reasonable levels of security, people will never really embrace the use of technology for tasks that they consider sensitive or risky. Only with a... more

Security (K.4.4...) | Jul 11 18

Mechanising and verifying the WebAssembly specification: CPP 18

Formal verification has had many successful applications to industry standards over the last few years, but an important question is whether formal verification can be included in standard design efforts. This paper... more

Semantics of Programming Lang. (F.3.2) | Jul 11 18

Comparative analysis of ellipsoidal methods for distributed data fusion: IMCOM 18

In multisensor systems, the fusion of information from multiple sensors can be done globally or locally in distributed “fusion centers.” The distributed approach has advantages in reliability, fault tolerance... more

Distributed Systems (C.2.4) | Jul 11 18

Unifying computing resources and access interface to support parallel and distributed computing education: Journal of Parallel and Distributed Computing

Parallel and distributed computing is a great solution in the modern systems world. The important issue when teaching parallel and... more

General (K.3.0) | Jul 10 18

Seamless virtual network for international business continuity in presence of intentional blocks: ACM Transactions on Internet Technology

It is an accepted fact that international borders are vulnerable and permeable when it comes to information technology. This is why international businesses... more

Network Management (C.2.3...) | Jul 10 18

Event summarization for sports games using Twitter streams: World Wide Web

The Wall Street Journal recently published an article by Jason Gay titled “How Twitter Rules the NBA” [1]. It contends that the National Basketball Association (NBA) is heavily linked to social media, especially Twitter. This newspaper article... more

World Wide Web (WWW) (H.3.4...) | Jul 9 18

Computing semantic similarity of concepts in knowledge graphs: IEEE Transactions on Knowledge and Data Engineering

Semantic similarity expresses the commonality among concepts; therefore, it may play a critical role in a wide range of computational applications. The... more

Measurements (D.4.8...) | Jul 9 18

An effective characterization of the alternation hierarchy in two-variable logic: ACM Transactions on Computational Logic

Many interesting properties of words can be described in a first-order language with variables (x, y, ...) for positions and two basic properties: x < y (meaning that x is to the left of y) and Qax (meaning that letter... more

Formal Languages (F.4.3) | Jul 6 18

Endless loop

Ada Lovelace is widely regarded as the world’s first computer programmer. Did you know that her father was the poet Lord Byron, or that he separated from her mother shortly after Ada was born? Her mother then promoted Ada’s interest in mathematics and logic in an... more
BASIC (D.3.2...) | Jul 18 18

The EU general data protection regulation (GDPR): a practical guide

Perhaps as a result of the traumatic events of the early 20th century, the people of Europe now consider personal privacy a fundamental human right. As a consequence, the European Union (EU) passed... more
Governmental Issues (K.5.2) | Jul 18 18


Berlin’s compelling volume is distinguished by an engaging writing style. Her chronological history of the Valley is punctuated by personal insights about the principals. As effective and engaging as the author is, though, it is the nuggets of humor, oddities... more
History of Computing (K.2) | Jul 17 18

Deception in the digital age

We are living in a very digitally connected world. An unwanted consequence is that each one of us who uses a computer, smartphone, tablet, or even smart TV could be targeted by individuals or groups who want to influence our beliefs and behaviors or gain... more
Abuse & Crime Involving Comp. (K.4.1...) | Jul 16 18

Deep learning with Python: a hands-on introduction

This book is written specifically for Python programmers who wish to learn how to apply their Python programming skills to machine learning applications. Consequently, a very brief introduction to... more
Learning (I.2.6) | Jul 16 18

Guide to data structures: a concise introduction using Java

Data structures seem to be the bane of every computer science (CS) undergraduate’s education. Thus, a good data structures text aimed at undergraduates is a necessity. Even though relatively few programmers actually implement data structures (as... more
Data Structures (E.1) | Jul 16 18

Nim in action

Among the newer programming languages, Nim has managed to distinguish itself on its own merits without any corporate support. Andreas Rumpf released the first Nim compiler written in Nim (then known as Nimrod) in 2008. Nim is open source; both development... more
General (D.1.0) | Jul 16 18

Mathematical grammar of biology

It is common knowledge that the code of life is represented by strings consisting of four letters (A, T, C, and G), and the names of Watson and Crick are often referenced to represent the scientific efforts that made understanding the genetic code possible... more
Biology & Genetics (J.3...) | Jul 13 18

Models of computation

Any formal definition of a language has to clearly specify its syntax (a grammatical specification that in some way fixes the structure of well-formed statements) and semantics (the manner in which meaning is assigned to well-formed statements). To these one may also... more
Models of Computation (F.1.1) | Jul 13 18

The Python 3 standard library by example (2nd ed.)

The power and capabilities of a modern computer programming language are often found in the libraries associated with the language. Python is no exception. Python’s standard library is a large body of modules and... more
Python (D.3.2...) | Jul 12 18

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy