Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
April 27, 2018

The incomputable: journeys beyond the Turing barrier
Computer science is composed of two major areas. One is strongly related to engineering: the architecture and design of computing systems and the development of tools to employ such systems. The other is more related to scientific inquiry, although to those outside the field it may... more

Does a field make progress because it is a science, or is it a science because it makes progress... more
- Thomas S. Kuhn (1962)
Repairing sequential consistency in C/C++11: PLDI 17

The standards committee of the C++ programming language defined the C11 memory model. This model provides several notions of consistency for memory reads and writes, with sequentially consistent (SC) being the strongest and most expensive. This... more

Semantics of Prog. Languages (F.3.2) | Apr 26 18

A tutorial on canonical correlation methods: ACM Computing Surveys

Canonical correlation analysis (CCA) is used to discover relations between two or more multivariate sets of variables, called views. Data to be processed are collected for a population of individuals, and for one individual its state is... more

Correlation & Regression Analysis (G.3...) | Apr 26 18

Designing cyber insurance policies in the presence of security interdependence: NetEcon 17

With the cyber security landscape changing drastically, security executives and actuaries have for the last few years been trying to figure out if there is a viable business model in which, given the right... more

Insurance (K.6.5...) | Apr 25 18

A filter attribute selection method based on local reliable information: Applied Intelligence

In classification algorithms, the core problem is selecting the right attributes and assigning them the right weight for each item being processed, in order to achieve reliable results; all the more so if machine... more

Feature Evaluation & Selection (I.5.2...) | Apr 25 18

Industry 4.0 & Internet of Things in supply chain: CLIHC 17

This paper intends to report the first results of ongoing research on the topic of the Internet of Things (IoT) in supply in the context of Industry 4.0. The terms “Industrial Internet of Things (IIoT)” and... more

Miscellaneous (H.5.m) | Apr 23 18

User preference learning for online social recommendation: IEEE Transactions on Knowledge and Data Engineering

Social recommendation models are attaining more and more attention and relevance in the fast-growing world of social media and social relations. Matrix factorization-based methods... more

Data Mining (H.2.8...) | Apr 23 18

Evaluating and improving fault localization: ICSE 17

We rarely see a software engineering paper that aims to prove a point from multiple views. Even better, this study not only refutes prior finds in the fault localization research field, but also proposes a combination... more

General (D.2.0) | Apr 20 18

Beyond the words: predicting user personality from heterogeneous information: WSDM 17

In contemporary digital culture, everyday life is permeated by computer-mediated activities. As a byproduct, a reservoir of digital trace data is generated. Can this data be leveraged to infer one’s... more

General (H.2.0) | Apr 19 18

Surveying stylometry techniques and applications: ACM Computing Surveys

Stylometry is analysis of textual data to find hidden patterns. This paper provides a comprehensive survey on this topic. The paper contains three main parts. In the first part, the authors consider five... more

Natural Language Processing (I.2.7) | Apr 19 18

Mining top-k high-utility itemsets from a data stream under sliding window model: Applied Intelligence

Nowadays most areas of commerce, science, or business generate data in such copious ways that they just cannot be organized in traditional databases anymore; instead, they... more

Data Mining (H.2.8...) | Apr 19 18

Building the network of the future

Software-defined networking (SDN) and network function virtualization (NFV) have been at the forefront of the R&D networking world since the last decade [1]. However, these new paradigms may not be well understood by many IT professionals. The book is easy to... more
Network Architecture & Design (C.2.1) | Apr 26 18

Recent developments in metaheuristics

A metaheuristic is a procedure or heuristic used to discover, yield, or choose a heuristic that may furnish a decent solution to an optimization problem. This book on recent developments in metaheuristics has been published as volume 62 of the “Operations... more
Heuristic Methods (I.2.8...) | Apr 26 18

Raspberry Pi supercomputing and scientific programming: MPI4PY, NumPy, and SciPy for enthusiasts

Raspberry Pi is a single-board computer developed by a British charity to promote a different way of teaching computer science in schools, away from applications and web design and geared toward programming... more
Distributed Programming (D.1.3...) | Apr 26 18

Anomaly detection as a service

Written by a team of well-known academic researchers and authors of landmark papers in the area of system and network security, this book is a distilled and concise overview of academic and industrial approaches for anomaly detection in the context of information security... more
Security & Protection (K.6.5) | Apr 25 18

Programming in HTML and PHP: coding for scientists and engineers

I recently wrote a Perl common gateway interface (CGI) program to display system status on a server running Nginx. This necessitated the installation of an fcgiwrap program to actually call the program, and it was... more
HTML (I.7.2...) | Apr 25 18

Grid generation methods

Many software systems in the field of scientific computing, in particular in the area of computational simulations, require the user to provide a decomposition of the geometrical domain of interest into a (typically very large) set of small subregions, the... more
Partial Differential Equations (G.1.8) | Apr 25 18

Python for scientists (2nd ed.)

This volume provides an important update to the resources available to physicists and other scientists who manipulate quantitative data for one of their most common tasks: computation. Historically, highly interactive resources like the slide rule and the... more
Python (D.3.2...) | Apr 24 18

The data journalist: getting the story

Contemporary data journalism goes far beyond the old-time beat reporter who would review the daily police reports. Technology is obviously transforming the retrieval and analysis of information. The authors, journalists and professors at a Canadian university, provide an... more
General (H.0) | Apr 24 18

Understanding information: from the big bang to big data

This is a very good book! It’s a thought piece about a range of ideas that couples information across several disciplines and across large timeframes. As the title suggests, it’s illustrations range from the big... more
General (H.0) | Apr 24 18

Digital preservation: putting it to work

I could walk into the British Library in London tomorrow and (assuming that my Latin was up to the task) read the Magna Carta, written in 1215, that is stored there. Today, however, important documents tend to be stored only in digital format and the trauma of a... more
Data Warehouse & Repository (H.2.7...) | Apr 24 18

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy