Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
September 19, 2017

Photo forensics
From a number of perspectives, Photo forensics is a wonderful book. From the most material point of view, it is simply beautiful. You may even see it on coffee tables. The cover is smartly designed, the paper is of high quality, and the images included are enriched color plates, which incorporate shades and effects. Second, the book is... more
Is it a fact--or have I dreamt it--that, by means of electricity, the world of matter has become a great nerve, vibrating thousands of miles... more
- Nathaniel Hawthorne (1851)
Hybrid method for minimizing service delay in edge cloud computing through VM migration and transmission power control: IEEE Transactions on Computers

One of the most important requirements for an edge/cloud computing system is task latency, especially for some specific applications such as security... more

Cloud Computing (C.2.4...) | Sep 19 17

E-coaching systems: Personal and Ubiquitous Computing

The digitalization of coaching practices is rapidly changing traditional coaching and self-improvement efforts. These e-coaching systems deliver personalized, timely, and just-in-time coaching. Simultaneously, they raise practical... more

Social & Behavioral Sciences (J.4) | Sep 19 17

Placenta maps: in utero placental health assessment of the human fetus: IEEE Transactions on Visualization and Computer Graphics

Miao et al. describe an in utero procedure for generating placenta maps. Typically, the placenta is evaluated ex vivo by placing it on a flat table and assessing... more

Segmentation (I.4.6) | Sep 19 17

User behaviour and task characteristics: a field study of daily information behaviour: CHIIR 17

Daily search and browsing activity logs of users, when self-annotated (in contrast to third-party annotations), can give us insights about the users’... more

Social & Behavioral Sciences (J.4) | Sep 19 17

Robust planning with incomplete domain models: Artificial Intelligence

To develop a plan, a model is constructed. In the model, it is necessary to have complete knowledge about the states, functionalities, and dynamics of the agents in the domain, system, or scenario. These necessities... more

Artificial Intelligence (I.2) | Sep 15 17

Labeling data and developing supervised framework for Hindi music mood analysis: Journal of Intelligent Information Systems

The fundamental difference between speech and music is that the content of a speech is essentially a message while musical content is... more

Sound & Music Computing (H.5.5) | Sep 14 17

#Indigenous: tracking the connective actions of Native American advocates on Twitter: CSCW 17

Today, social movements are more prevalent than ever. Individuals use multiple social media platforms to organize their voices, which turn into political actions. In some ways, these online social movements are... more

Group & Organization Interfaces (H.5.3) | Sep 13 17

Transforming Boolean equalities into constraints: Formal Aspects of Computing

In declarative programming languages, a variable is a symbol representing a value determined by computational rules rather than a space in memory. The two main forms of declarative languages are... more

Functional Programming (D.1.1) | Sep 13 17

Temporal probabilistic measure for link prediction in collaborative networks: Applied Intelligence

Research on social networks is a fashionable field, along with forecasting the behaviors of entities that are represented as nodes in a graph describing the... more

Social Networking (H.3.4...) | Sep 12 17

Unveiling correlations via mining human-thing interactions in the Web of Things: ACM Transactions on Intelligent Systems and Technology

Today we find ourselves in a situation where there is an overabundance of data in information networks. This being the case, there... more

Online Information Services (H.3.5) | Sep 11 17

Learning the art of electronics

The book is exactly what the title promises: a very hands-on approach to electronics design, assembly, and testing. It began as the handbook for a long-running Harvard class taught by the authors. They have used it in various formats: a one-semester undergraduate class, a... more
Electronics (J.2...) | Sep 19 17

Software defined networks (2nd ed.)

In the networking model of old, many users (clients) talk to a central server; this client-server model dominates network traffic. Nowadays, everyone has networked devices (smartphones, tablets, and so on) communicating with each other. A peer-to-peer... more
Network Architecture & Design (C.2.1) | Sep 19 17

Computation and the humanities: towards an oral history of digital humanities

To learn about an emerging research area such as digital humanities (DH), why not get the people embedded at the heart of that research and its development to tell you about it? With this oral history of DH... more
Arts & Humanities (J.5) | Sep 19 17

Migrating large-scale services to the cloud

Are you moving large-scale workloads that cannot scale well to Microsoft Azure? Then you might want to take a look at this book, which discusses lessons learned from large-scale migration to the public cloud (Azure)... more
System Management (K.6.4) | Sep 18 17

Self-aware computing systems: an engineering approach

Self-aware computing systems are systems that are sensitive to their operating environments and adapt their actions and reactions interactively with that environment, as per ways in which the... more
Applications & Expert Systems (I.2.1) | Sep 18 17


This book is about the questions that arise in a society where robotics is increasingly important. Robotics is developing at such a fast rate that we do not stop to think about the questions that this raises. This book tries to uncover the fundamental questions that... more
Robotics (I.2.9) | Sep 15 17

Software reading techniques: twenty techniques for more effective software review and inspection

Software professionals are trained to create software artifacts of all kinds. Surprisingly, they are not taught how to read and analyze the resulting requirements, designs, test cases, and code. Yang-Ming... more
Code Inspections (D.2.5...) | Sep 14 17

Speed, data, and ecosystems

This book is a masterful exposition of how to develop large software programs, aimed at business leaders but useful to others. “Speed” refers to shortening the time required to get new software to the customer. “Data” refers to maximizing the usefulness of data... more
General (D.2.0) | Sep 14 17

Self-aware computing systems

Self-aware computing systems are covered in this book, which is an expanded collection of papers (each chapter by a group of authors). Organized under five parts, the book is an attempt to bring together researchers... more
General (D.2.0) | Sep 14 17

Managing the Web of Things: linking the real world to the web

This volume is a collection of 15 standalone papers, assembled into four sections, covering selected aspects of an emerging and fast-moving field generically described as the Internet of Things (IoT)... more
World Wide Web (WWW) (H.3.4...) | Sep 13 17

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy