Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
November 24, 2017
Search
Highlight

A general approximation method for bicriteria minimization problems
Many applications in operations research require the simultaneous optimization of multiple (typically mutually opposing) objective functions. Since the general problem is usually computationally intractable, bicriteria optimization restricts itself to two objectives while approximate... more
Quote
Educators don’t necessarily have to teach. Instead, they can provide an environment and resources that tease out your natural ability to learn on your own. Self-study... more
- Shimon Schocken (2012)
Articles
Effective usage of redundancy to aid neutralization of hardware Trojans in integrated circuits: Integration, the VLSI Journal

Hardware Trojans (HTs) are a major concern in cyber-physical systems security. Outsourcing activities related to the design and implementation of digital... more

Invasive Software (D.4.6...) | Nov 22 17

Performance improvements for search systems using an integrated cache of lists + intersections: Information Retrieval

This work’s title should more aptly start with “Performance improvement for full-text search systems” because it focuses on that area of application. The lengthy paper (25... more

Retrieval Models (H.3.3...) | Nov 21 17

ARIADNE: a research infrastructure for archaeology: Journal on Computing and Cultural Heritage

Digital initiatives have revolutionized archaeological research. The entire research workflow, from acquiring data to analysis, visualization, and publication, has gone digital. This has led to the development of large... more

Information Systems Applications (H.4) | Nov 21 17

A survey of imperatives and action representation formalisms: Artificial Intelligence Review

What is an action? The agent observes two states at different times; if there is a change, then an action occurred. This implicit definition of action is adopted in this paper. At the beginning of artificial... more

KR Formalisms & Methods (I.2.4) | Nov 20 17

The logical view on continuous Petri nets: ACM Transactions on Computational Logic

The reachability problem for standard Petri nets is EXPSPACE hard, and the coverability problem is EXPSPACE complete. However, more efficient algorithms exist for variants of the standard nets... more

Automata (F.1.1...) | Nov 17 17

The Ulam programming language for artificial life: Artificial Life

The most amazing information processing imaginable can be seen in biology: a fertilized egg grows into an adult, a seed to a tree. Biological information processing can be thermodynamic (1010b/sec to 1015b/sec per... more

Programming Languages (D.3) | Nov 17 17

Numerically aware orderings for sparse symmetric indefinite linear systems: ACM Transactions on Mathematical Software

The LDLT decomposition of a real symmetric matrix where L is lower triangular with unit diagonal and D diagonal except for 2x2 blocks is a challenge... more

Numerical Linear Algebra (G.1.3) | Nov 16 17

I need your encouragement!: CHI 17

Exam anxiety can make students seriously underperform. Can supportive comments through social media help release exam anxiety? In this paper, Deloatch et al. try to answer this question. Their experiment investigates how supportive... more

Social Networking (H.3.4...) | Nov 15 17

A low-cost and high-performance architecture for robust human detection using histogram of edge oriented gradients: Microprocessors & Microsystems

Due to their programmability and hardware parallelism, field-programmable gate arrays (FPGAs) will be widely used to speed up edge/cloud computation on... more

Microprocessors & computers (B.7.1...) | Nov 13 17

Discovering user behavioral features to enhance information search on big data: ACM Transactions on Interactive Intelligent Systems

Cassavia et al. reduce theory into practice in this paper. All too often, the disciplines we live in exist abstractly with theories or dense algorithms... more

Management (D.2.9) | Nov 10 17

Books
Making beautiful deep-sky images

Many of us look at the night sky with wonder and amazement at its sheer immensity, an immensity that only grows as we use telescopic instruments to gather more light than we can see with the naked eye. A step beyond simple observing by peering through an... more
Digitization & Image Capture (I.4.1) | Nov 22 17

Moving to responsive web design: bring existing static sites into today’s multi-device world with responsive web design

Responsive websites are the new norm in web design. Being responsive means that a website can adapt its layout and content so that its web pages can be displayed nicely on computers or mobile devices... more
World Wide Web (WWW) (H.3.4...) | Nov 21 17

Service-oriented architecture (2nd ed.)

The study of software architecture has evolved immensely over the years, attracting the attention of architects, designers, and developers handling projects. Software architecture and its underlying philosophy suggest longer life cycles of software, reuse of... more
Web-Based Services (H.3.5...) | Nov 21 17

The habit-forming guide to becoming a systems thinker

This is a new and fresh publication from the Waters Foundation that pulls back the curtain on the wizards of systems thinking, so to speak, to eliminate the mystery of this important, but often obtuse, body of knowledge... more
General (D.0) | Nov 20 17

Mobile sensors and context-aware computing

I am disappointed in this book. I’m an engineer designing distributed Internet of Things (IoT) systems as well as a part-time college instructor, and I was hoping for a future-oriented discussion of the... more
Real-Time & Embedded Systems (C.3...) | Nov 16 17

From neuron to cognition via computational neuroscience

An old aphorism says that, if our brains were simple enough to be understood, we wouldn’t be smart enough to understand them. Fortunately, many scientists are not so pessimistic, and they are unrelentingly... more
Applications & Expert Systems (I.2.1) | Nov 15 17

Fundamentals of IP and SoC security: design, verification, and debug

The ubiquity of connected devices (smartphones, home assistants, health trackers, and emerging autonomous cars) can be attributed to the advancement of shrinking semiconductor technology. Apart from the... more
General (B.7.0) | Nov 14 17

Fundamentals of computer graphics (4th ed.)

Computer graphics is an area of computer science that studies methods to generate and manipulate images using computers. One of the most popular books for teaching and learning computer graphics is this book, also... more
General (I.3.0) | Nov 14 17

Encyclopedia of applied and computational mathematics

Encyclopedia of applied and computational mathematics (EACM) is a comprehensive reference work covering the vast field of applied and computational mathematics. The emphasis on computation reflects growing... more
General (G.0) | Nov 13 17

Reactive programming with Angular and ngrx

Many programmers may not be aware of the fact that JavaScript has a powerful functional programming subset. The use of callbacks is very common, but is only a small part of how functional techniques can improve the conciseness, readability, and maintainability... more
Object-Oriented Programming (D.1.5) | Nov 9 17


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy