Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
February 21, 2018

Deep learning for mobile multimedia
Deep learning architectures, tools, and algorithms are, in general, not adapted to the storage and computation resources of a mobile device. Thus, one needs better hardware for mobile devices and smaller footprints for learning and inference algorithms. This survey paper giving an overview of various technologies and... more
Not so very many years ago there was quite a bit of discussion as to whether general purpose operating systems should be designed and and supplied by the... more
- Saul Rosen (1964)
Millimeter-wave wireless communications for IoT-cloud supported autonomous vehicles: overview, design, and challenges: IEEE Communications Magazine

The autonomous vehicle is being considered as the technology of the future. Many companies and researchers are working toward making this a... more

Autonomous Vehicles (I.2.9...) | Feb 20 18

Collaborative agile learning in online environments: Computers & Education

Perhaps online training will continue to survive the competition from traditional classrooms. What changes should online academic institutions make with regard to instruction in order to satisfy both students and industry?... more

Collaborative Learning (K.3.1...) | Feb 20 18

Plane formation by synchronous mobile robots in the three-dimensional Euclidean space: Journal of the ACM

This is an interesting and thorough investigation of the plane formation problem. This problem addresses how a large group of robots moving in 3D Euclidean... more

Robotics (I.2.9) | Feb 16 18

Scalable computational techniques for centrality metrics on temporally detailed social network: Machine Learning

To analyze social networks, where social interactions change over time, special graphs and methods are needed. In this paper, social networks are... more

Dynamic Programming (I.2.8...) | Feb 15 18

Asymptotic medians of random permutations sampled from reversal random walks: Theoretical Computer Science

The area of application of this interesting, and quite advanced, five-page paper is in the study of genomics and chromosomal... more

Permutations & Combinations (G.2.1...) | Feb 15 18

Shape classification using spectral graph wavelets: Applied Intelligence

Spectral analysis on a triangle mesh gained its popularity in shape retrieval due to the success of shape-DNA, which is easy to compute yet can achieve an accuracy of over 90 percent in some tests... more

Graph & Tree Search Strategies (I.2.8...) | Feb 15 18

A technique to automatically determine ad-hoc communication patterns at runtime: Parallel Computing

Moreton-Fernandez et al. present an approach to automatically determine communication patterns at runtime for programs that run on distributed... more

Parallel Programming (D.1.3...) | Feb 14 18

A survey of attacks and detection mechanisms on intelligent transportation systems: Ad Hoc Networks

A vehicle ad hoc network (VANET) is a mobile ad-hoc network (MANET) consisting of vehicles and roadside units (RSUs). VANETs are a key technology for future smart car services such as accident alerting... more

Wireless Communication (C.2.1...) | Feb 14 18

Recovery from simultaneous failures in a large scale wireless sensor network: Ad Hoc Networks

Wireless sensor networks (WSNs) are an appealing choice for applications such as environmental monitoring due to the capability to deploy massive amounts of cheaper sensor nodes and... more

Sensor Networks (C.2.1...) | Feb 14 18

Data-driven synchronization for Internet-of-Things systems: ACM Transactions on Embedded Computing Systems

Time synchronization has been an active issue for decades. Stricter timing, energy considerations, external influences, and so on have spurred new studies. Two variants can be found: synchronize the clocks... more

Real-Time & Embedded Systems (C.3...) | Feb 13 18

A practical approach to compiler construction

Several comprehensive books have been written about compiler construction. Any new book on this topic is inevitably going to be compared against those works. However, by taking a different approach, a new book can set... more
Compilers (D.3.4...) | Feb 16 18

Software failure investigation: a near-miss analysis approach

This book bothered me. There were profound positives and profound negatives that I discovered as I proceeded through the (very short, barely 100-meaty-page) book. First, the positives. There is a great need for this book. It attacks its title topic, software failure... more
Testing & Debugging (D.2.5) | Feb 15 18

Scientific programming and computer architecture

You can find books that teach you how to write efficient code in a specific language. The efficiency here comes from using good algorithms and making the best use of the language capability. You can also find books that... more
General (C.1.0) | Feb 14 18

Researching complex information infrastructures

This volume is the PhD dissertation of the author at the University of Siegen, and it falls into the broad thread of organizational aspects in computer-supported cooperative work from the 1980s. It refers also largely, in nontechnical terms, to the concept of shared... more
General (H.3.0) | Feb 12 18

Advances in user authentication

Authentication involves validating the authenticity of something or someone. This book is on advances in user authentication. It is authored by Dipankar Dasgupta, a faculty member at the University of Memphis, along with his former students Arunava Roy and Abhijit... more
Authentication (K.6.5...) | Feb 9 18

Ethics, law and the politics of information: a guide to the philosophy of Luciano Floridi

The premise of this book is that information and communication technologies (ICT) are “altering our representation and understanding of reality and of ourselves.” A typical assertion, giving... more
General (K.5.0) | Feb 9 18

Understanding the digital world

The digital world is changing very rapidly with advancements in the embedded hardware and software on which it depends. Both the hardware and software changes inflict concerns about privacy and security over the Internet and for its users around the world... more
Web-Based Interaction (H.5.3...) | Feb 9 18

Architectural and operating system support for virtual memory

Are you a memory management unit (MMU) hardware designer, an operating system kernel programmer, or a student/researcher of modern computer architectures or operating systems? Abhishek Bhattacharjee... more
Virtual Memory (D.4.2...) | Feb 9 18

Introduction to middleware

Middleware, as necessary pervasive software aimed at supporting distributed applications in a heterogeneous environment, played and still plays an important role in the advance of Internet technologies and the development of new applications. Remote... more
Web-Based Services (H.3.5...) | Feb 8 18

Springer handbook of model-based science

The handbook is a compilation of chapters on models and model-based reasoning applied to various science and engineering topics. The sciences include earth sciences, life sciences, and social sciences. The discussions on models and model-based... more
Model Development (I.6.5) | Feb 8 18

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy