Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
January 16, 2019

The Oxford handbook of causal reasoning
A few years ago, Weisberg’s Willful ignorance [1] distinguished two facets of uncertainty: doubt, which is the focus of modern statistics, and ambiguity about the causal structure of the world, which researchers in many domains have not addressed systematically. Statistics formalizes the manipulation of the data obtained from experiments... more
I must begin by admitting, as is scarcely necessary, that I am at least several months away from being able to feed a new piece of French text into a computer and have an English translation... more
- A. F. R. Brown (1957)
Multimedia big data analytics: a survey: ACM Computing Surveys

Big data continues to grow exponentially. One source of that growth--multimedia data--has not received comprehensive study. The authors correct this deficit by presenting the results of a broad multidimensional survey of the literature related to multimedia... more

Introductory & Survey (A.1) | Jan 16 19

A comparison of code similarity analysers: Empirical Software Engineering

Analyzing code similarity in source code is essential to detecting clones, duplicate code, plagiarism, and software copyright violations. Over the years, researchers have proposed various approaches for detecting code similarity, for... more

General (D.2.0) | Jan 11 19

PERSIST: policy-based data management middleware for multi-tenant SaaS leveraging federated cloud storage: Journal of Grid Computing

NoSQL application data stores often combine on-premise and public cloud resources. As a consequence, they may deal with heterogeneous technologies, flexible... more

Cloud Computing (C.2.4...) | Jan 9 19

Modified cuckoo optimization algorithm (MCOA) to solve precedence constrained sequencing problem (PCSP): Applied Intelligence

The precedence constrained sequencing problem is a general problem: Consider a set of jobs where an arbitrary precedence relationship exists among the jobs and a cost is associated with every permutation... more

General (I.2.0) | Jan 7 19

FPT approximation schemes for maximizing submodular functions: Information and Computation

A survey of techniques, this paper presents and analyzes algorithms and constructs fixed parameter tractable approximation schemes. These schemes are “collections of algorithms that run... more

Approximation (G.1.2) | Jan 4 19

Sentence-normalized conditional narrowing modulo in rewriting logic and Maude: Journal of Automated Reasoning

Rewriting logic can naturally express both concurrent computation and logical deduction and is thus applied in system specification and verification. Here, a... more

General (I.1.0) | Jan 3 19

Hammer for Coq: automation for dependent type theory: Journal of Automated Reasoning

Interactive theorem proving is today seeing an explosion of use similar to what computer algebra systems (CASs) saw in the late 1980s. But there is another aspect to mathematics that CASs do not do: reasoning... more

Mathematical Software (G.4) | Jan 3 19

Ultra-strong machine learning: Machine Learning

Recognizing the fact that “most of modern machine learning can be viewed as consistent with Michie’s weak criterion,” the authors of this paper are motivated to work on Michie’s ultra-strong criterion, which “requir[es] the... more

Learning (I.2.6) | Dec 31 18

STORK: a real, heterogeneous, large-scale eID management system: International Journal of Information Security

As the data people commit to the Internet becomes more and more sensitive, user credential management becomes more and more important, and all the... more

Privacy (K.4.1...) | Dec 28 18

The institutional approach for modeling the evolution of human societies: Artificial Life

Powers defines institutions as “political game forms that generate the rules of a group’s economic interactions.” He draws heavily from Leonid Hurwicz’s game theory in developing a model of institutions. Further on in... more

Social & Behavioral Sciences (J.4) | Dec 28 18

Fundamentals of numerical computation

An interesting read, this book is composed of 13 chapters spread over two parts. Chapter 1 covers MATLAB basics, including floating-point numbers, problems and conditioning, and algorithm stability. Chapter 2 explores matrices (including various vector norms, computations... more
Model Development (I.6.5) | Jan 15 19

Carl von Clausewitz, the fog-of-war, and the AI revolution

As artificial intelligence (AI) is increasingly used in many areas, including fully automated vehicle control and military applications, there are concerns about how effectively such systems deal with extreme conditions. Carl von Clausewitz, the 19th century military... more
Applications & Expert Systems (I.2.1) | Jan 14 19

Smart sustainable cities of the future

It is well acknowledged that urban populations will increase exponentially. Global bodies like the International Telecommunication Union (ITU) are quite engaged with this issue, articulating the role of information and communication technologies... more
Applications & Expert Systems (I.2.1) | Jan 14 19

Fuzzy logic augmentation of neural and optimization algorithms

There have been many recent developments related to fuzzy logic applications. This book, volume 749 in Springer’s “Studies in Computational Intelligence” series, contains research papers related to fuzzy... more
Optimization (G.1.6) | Jan 11 19

Exploring ODEs

Right from the introduction it is clear that Exploring ODEs has a strong pedagogical and practical aim. The authors have created an easy-to-remember word, FLASHI. Depending on which letters are capitalized (for example, FlaSHi, flAShI, and so on), the reader... more
Ordinary Differential Equations (G.1.7) | Jan 10 19

Augmented reality and virtual reality

Recent technologies are changing the way we interact with computers and our surroundings, as well as how we perceive information; examples of these technologies include augmented reality (superimposing computer-generated graphics and text onto a real-world... more
Artificial, Aug. & Virtual Realities (H.5.1...) | Jan 8 19

Hypergraph theory in wireless communication networks

This short publication really fits in the “SpringerBriefs” series. Despite the fact that the book could be considered a long paper, it may interest researchers in the applications of mathematics field. The book starts with an overview of hypergraph theory [1,2]... more
Wireless Communication (C.2.1...) | Jan 4 19

Introduction to data mining (2nd ed.)

The first edition of this book, published in 2006 [1], was probably the best introductory textbook on data mining available. A dozen years later, the field has evolved to become mainstream under the commercial denomination of “big data,” or its more... more
Data Mining (H.2.8...) | Jan 2 19

Digital business leadership

Industry 4.0 denotes the fourth industrial evolution: “the interconnection of value creation processes beyond the boundaries of individual companies.” For this to happen, “powerful Internet access must be available.” The corollary then is: “there are no more... more
Business (J.1...) | Dec 28 18

Usability testing for survey research

Understanding user behavior to improve software products is the main purpose of usability testing. Usability testing is an important issue for any interactive application. There are many books on this topic. This book focuses on usability testing for one... more
Evaluation/Methodology (H.5.1...) | Dec 28 18

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy