Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
October 21, 2017

#Indigenous: tracking the connective actions of Native American advocates on Twitter
Today, social movements are more prevalent than ever. Individuals use multiple social media platforms to organize their voices, which turn into political actions. In some ways, these online social movements are more powerful than face-to-face interactions. Where society once... more
There is an enormous difference between one who is monolingual and someone who at least knows a second language well, because it makes you much more conscious about the phenomenon... more
- Edsger W. Dijkstra (2001)
Decoding the representation of code in the brain: an fMRI study of code review and expertise: ICSE 17

This paper presents an excellent example of an inter-disciplinary study to understand how the human brain processes common software engineering tasks by using medical imaging. Subjectivity is an inherent... more

Coding Tools & Techniques (D.2.3) | Oct 20 17

Uniform continuity of relations and nondeterministic cellular automata: Theoretical Computer Science

Cellular automata are computational structures that can be applied for modeling a wide range of systems in different areas of science. Usually they are characterized by local rules... more

Automata (F.1.1...) | Oct 19 17

High-probability minimax probability machines: Machine Learning

To address the challenges of minimizing the future misclassification rate of a predictor, Lanckriet et al. [1] proposed minimax probability machines (MPMs) based on the minimax approach to build binary... more

Minimax Approx. & Algorithms (G.1.2...) | Oct 18 17

Performance estimation of fault-prone infrastructure-as-a-service cloud computing systems and their cost-aware optimal performance determination: Mobile Networks and Applications

Cloud computing has gradually spread throughout the global computing environment; speed, reliability, quality of service, security, and standardization of... more

Performance Attributes (C.4...) | Oct 18 17

Class confessions: restorative properties in online experiences of socioeconomic stigma: CHI 17

Since modern society provides more opportunities for those with college and university degrees, the number of applications to most prestigious colleges... more

Group & Organization Interfaces (H.5.3) | Oct 16 17

An efficient schedulability analysis for optimizing systems with adaptive mixed-criticality scheduling: Real-Time Systems

Mixed-criticality (MC) systems are of particular interest today. The adaptive scheduling of tasks on such systems attracts a lot of attention because of the complexity of the... more

Optimization (G.1.6) | Oct 16 17

Fast rendezvous on a cycle by agents with different speeds: Theoretical Computer Science

Feinerman et al. provide illustrations concerned with the usefulness of different processing speeds and asynchrony of tasks of the operating agents in... more

Heterogeneous (Hybrid) Systems (C.1.3...) | Oct 16 17

Spatiotemporal-MIMO channel estimator and beamformer for 5G: IEEE Transactions on Wireless Communications

The foundation of the ideas in this paper dates back to the 1980s, with investigations about the locus and properties of sensor array manifolds to find... more

Wireless Communication (C.2.1...) | Oct 13 17

What technological features are used in smartphone apps that promote physical activity? A review and content analysis: Personal and Ubiquitous Computing

A systematic review of the use of mobile technology to promote physical activity is proposed in this paper. The number of apps aimed at healthcare available in commercial stores is strongly and constantly... more

Social Networking (H.3.4...) | Oct 12 17

Knowledge graph for TCM health preservation: Artificial Intelligence in Medicine

This paper introduces a knowledge graph for traditional Chinese medicine (TCM) health preservation. TCM plays a vital role in Chinese culture. With the development of information technology... more

Graph & Tree Search Strategies (I.2.8...) | Oct 12 17

Perturbations, optimization, and statistics

The latest research in machine learning shows that the injection of perturbations into both learning and inference procedures may result in increased predictive accuracy. In almost every machine learning problem... more
Learning (I.2.6) | Oct 19 17

Mastering machine learning with Python in six steps: a practical implementation guide to predictive data analytics using Python

In 1969, there was a humorous film in theaters called If It’s Tuesday, This Must Be Belgium. It was about a group of American tourists taking an 18-day guided tour of nine European countries. The premise was so... more
Learning (I.2.6) | Oct 18 17

Intellectual property and access to im/material goods

Reciting once-famous cases, strange doctrines expose ongoing adventures of IP rights. For example, Charles Dickens bequeathed one of his manuscripts to a female relative, and concurrently (1870) left all... more
Intellectual Property Rights (K.4.1...) | Oct 18 17

Incidental exposure to online news

This is a very short book--really more of a monograph at less than 90 pages, including front pieces, table of contents, bibliography, and index. It aims to examine the patterns of how people stumble upon news while engaged in other online activities (for example, browsing... more
Multimedia Information Systems (H.5.1) | Oct 17 17

Complex systems: relationships between control, communications and computing

This collection of papers primarily discusses the complexities of control systems; communication and computing are discussed as more minor topics. It includes five loosely coupled parts. Prior to Part 1, it starts with a comprehensive introduction... more
Network Architecture & Design (C.2.1) | Oct 16 17

Security-aware design for cyber-physical systems: a platform-based approach

Our daily life and the objects that surround us are becoming more and more intertwined in networks of computers and algorithms, in a manner so pervasive that often we fail to appreciate how much we... more
Security & Protection (C.2.0...) | Oct 13 17

4G: LTE-Advanced Pro and the road to 5G (3rd ed.)

Long-term evolution (LTE) and 4G are the state of the art in mobile telecommunications, and the latest in a three-decade journey of technological innovation and development. We have moved from voice-centric systems with 1G and 2G, to mobile broadband... more
Wireless Communication (C.2.1...) | Oct 12 17

Advanced persistent security

Winkler and Gomes define “advanced persistent security” as “defense in depth” (multilayered attack protection) that is enhanced by a comprehensive methodology for integrating attack detection capabilities and proactively implementing and executing an... more
Security & Protection (K.6.5) | Oct 12 17

Introduction to computer networking

Gigabit Ethernet? That’s the same as fast Ethernet, with faster clock speeds, isn’t it? Actually it’s not; depending on the physical media, there may be differences in encoding schemes and signaling logic levels. This book is full of interesting information like that, with concise details about each variant of the technology... more
General (C.2.0) | Oct 12 17

Simulating prehistoric and ancient worlds

Regardless of location of archaeological finds--royal tombs to refuse dumps--questions of how the people who left objects lived persist among both professionals and interested laypeople. If written records have been preserved, much of the guesswork is eliminated... more
Simulation Support Systems (I.6.7) | Oct 11 17

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy