Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
January 21, 2018

From neuron to cognition via computational neuroscience
An old aphorism says that, if our brains were simple enough to be understood, we wouldn’t be smart enough to understand them. Fortunately, many scientists are not so pessimistic, and they are unrelentingly trying to decipher it. As 3D bodies, we find it much easier to comprehend... more
Kempelen announced that the automaton was ready to play chess against anyone prepared to challenge it, and recuited a volunteer--a courtier... more
- Tom Standage (2002)
A hybrid framework for mining high-utility itemsets in a sparse transaction database: Applied Intelligence

Brain tumor detection poses serious challenges not only because the brain is a complex structure, but also because tumors can be serious and often fatal. Of course methods already exist to scan the... more

Data Mining (H.2.8...) | Jan 19 18

A collaborative digital pen learning approach to improving students’ learning achievement and motivation in mathematics courses: Computers & Education

Can cooperative problem-solving strategies with a digital pen system enhance learning accomplishment, mindset, and inspiration in mathematics? Huang and... more

Computer Uses in Education (K.3.1) | Jan 19 18

Accurate and energy-efficient GPS-less outdoor localization: ACM Transactions on Spatial Algorithms and Systems

Location identification has become a central issue within the fields that are related to autonomous driving and autonomous vehicles. Smartphones (and maybe other mobile devices) offer the chance to create an... more

Spatial Databases & GIS (H.2.8...) | Jan 19 18

Validation of formal specifications through transformation and animation: Requirements Engineering

A validation check between a design and its implementation is usually done in order to validate the correctness of the requirements for any system. It is crucial to check that the requirements are... more

Formal Methods (D.2.4...) | Jan 18 18

Popularity-aware spatial keyword search on activity trajectories: World Wide Web

In the old days, futuristic beeping devices allowed James Bond to track the villain and come in just in time to save the world (and flee with the girl kept prisoner, of course!). Nowadays things... more

Spatial Databases And GIS (H.2.8...) | Jan 18 18

Analysis of the relation between computational thinking skills and various variables with the structural equation model: Computers & Education

The task of detecting the attributes of computational thinking skills in students remains a major challenge for educational researchers. What are the most... more

Computer Uses in Education (K.3.1) | Jan 18 18

Analyzing sentiments in one go: a supervised joint topic modeling approach: IEEE Transactions on Knowledge and Data Engineering

The so-called “crowd wisdom” phenomenon took on a whole new dimension with the advent of the web and the emergence of myriads of online product... more

Data Models (H.2.1...) | Jan 17 18

Reducing write amplification of flash storage through cooperative data management with NVM: ACM Transactions on Storage

Flash memory continues to increase in popularity as the storage media of choice for business storage systems. Now “flash memory is an erase-before-write... more

Storage Management (D.4.2) | Jan 17 18

Low-rank decomposition meets kernel learning: Artificial Intelligence

This paper describes how low-rank kernel learning can be modified to make use of side information such as class labels on some of the data. In low-rank kernel learning, the kernel... more

Learning (I.2.6) | Jan 17 18

A survey on software defined networking: architecture for next generation network: Journal of Network and Systems Management

Over the years, data communication networks have seen a constant rise in network traffic, and this trend is expected to continue eternally. This constant... more

Data Communications (C.2.0...) | Jan 16 18

Foundations of quantum programming

The idea of programming in the modern sense first appeared in the textile industry for creating complex patterns on clothes using the Jacquard loom in the early 1800s. Since the development of silicon-based computers in the last century, a lot of progress has been made in... more
Physics (J.2...) | Jan 19 18

Classical Fortran: programming for engineering and scientific applications (2nd ed.)

My immediate question was: “What is Classical Fortran?” The author notes that most Fortran programmers use a rather small working Fortran vocabulary, and most of them use the same subset of statements. Based on my own background, I would probably have said... more
Fortran (D.3.2...) | Jan 19 18

Computer programming with C++

I cannot recommend this book under any circumstances--not as a textbook for classroom instruction, not as a reference in a university library, and not for self-study. The book has many faults, which I will summarize under three overlapping groups... more
C++ (D.3.2...) | Jan 19 18

Minitel: welcome to the Internet

What country is the most wired? It is perhaps surprising to discover that, at least in the 1980s, it was France. The French welcomed the Internet by wiring Minitel. Minitel anticipated transmission control protocol/Internet protocol (TCP/IP), online banking, e-commerce... more
History of Computing (K.2) | Jan 18 18

Boolean differential calculus

Boolean algebra is the study and use of system representations where each quantity has only two possible values. Because they represent many real-world variables, especially in computing machinery, Boolean systems are widely used but are not... more
Ordinary Differential Equations (G.1.7) | Jan 18 18

Information theory and coding: solved problems

This book differs from the many other textbooks on information and coding theory in that it provides a plentitude of examples, presented in the form of solved problems. Whereas other books may offer a more rigorous mathematical treatment, this book... more
Coding & Information Theory (E.4) | Jan 18 18

Advanced persistent training

How does one bridge the gap between security training best practices and actual daily compromising actions? How does one break shortcut security bad habits? Are training seminars just something to be endured without having any meaningful impact? If you face these... more
Security & Protection (K.6.5) | Jan 18 18

Introduction to machine learning with applications in information security

Machine learning and information security are well-established disciplines that benefit mutually from their interaction because many modern network and system intrusion and prevention systems rely on advanced... more
Learning (I.2.6) | Jan 17 18

Control of multiple robots using vision sensors

From the early days of mobile robotics, back in the 1960s, vision has always been one of the key sensors for controlling a robot. Traditionally, vision is thought of as a camera on board a single robot; this book contributes in a slightly different area... more
Robotics (I.2.9) | Jan 17 18

Human dignity: establishing worth and seeking solutions

The philosopher Immanuel Kant developed the principle of rights theory that essentially states that each individual human has a unique dignity and worth that must be respected. The current collection of essays discusses human rights and dignity from a... more
Social & Behavioral Sciences (J.4) | Jan 17 18

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy