Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
June 20, 2018

Dempster’s rule of combination
The rule of combination of belief functions on infinite sets of possibilities is developed in this paper. The author continues his developments on Dempster’s theory on lower probabilities in order to generalize already-obtained results in the framework of “theory of evidence” that are important for approximate reasoning using such a... more
And yet, whether in a philosophic sense (Kant’s sense), or an empirical and evolutionary sense, judgment is the most important faculty we have... more
- Oliver Sacks (1985)
Rivulet: a fault-tolerant platform for smart-home applications: Middleware 17

The paper presents Rivulet, a distributed middleware for smart home applications. The main idea of Rivulet is to move from a state-of-the-art cloud-centric architectural solution, where the whole application logic is... more

Fault Tolerance (C.4...) | Jun 20 18

Symmetric masks for in-fill pixel interpolation on discrete p:q lattices: Journal of Mathematical Imaging and Vision

This paper is an extension of a conference paper presented by the second two authors [1]. The authors consider the problem of how to fill in the blank pixel values that result from an affine... more

Discrete Mathematics (G.2) | Jun 20 18

Social MatchUP: CHI EA 18

As soon as this paper came across my desk, I knew I had to read and review it. What could be better than a virtual teaching environment for children to whom reality presents a struggle? Social skills are... more

Multimedia Information Systems (H.5.1) | Jun 19 18

“Revenge porn”: an analysis of legislative and policy responses: International Journal of Technoethics

In recent years, uploading or sharing images or videos online has become a social norm around the globe. However, when it involves intimate, disturbing, or nude images or video, circulation may take the form... more

Ethics (K.4.1...) | Jun 18 18

The privacy implications of cyber security systems: ACM Computing Surveys

This paper provides an accessible overview of the issues that spring up when looking into the privacy of cybersecurity systems. The paper starts by classifying cybersecurity technologies using four different... more

Privacy (K.4.1...) | Jun 15 18

Personalized app recommendation based on app permissions: World Wide Web

How to recommend apps to a user based on functionality, permissions, and user interests is the subject of this paper. Traditional app recommendation algorithms are based on... more

World Wide Web (WWW) (H.3.4...) | Jun 15 18

Profit maximization with sufficient customer satisfactions: ACM Transactions on Knowledge Discovery from Data

This paper focuses on the prospects of “profit maximization with sufficient customer satisfaction.” The authors present 11 lemmas, nine examples, six... more

Electronic Commerce (K.4.4) | Jun 15 18

Unsupervised feature learning based on deep models for environmental audio tagging: IEEE/ACM Transactions on Audio, Speech and Language Processing

The paper promises tagging--this is just the labeling of audio, which is referred to as “tagging” in the context of audio--of environmental audio using a deep... more

Audio Input/Output (H.5.1...) | Jun 15 18

Architectural principles for cloud software: ACM Transactions on Internet Technology

What comes to mind first with cloud system architectures is the ubiquitous use of microservices, supported by total virtualization from hardware to middleware to applications: virtual machines... more

Cloud Computing (C.2.4...) | Jun 14 18

Sparsification and subexponential approximation: Acta Informatica

A sparsification of a problem maps the problem to a set of similar problems, each of which has its parameters bounded by some fixed number. For example, in the case of a graph-based problem, the degree might be one parameter... more

Approximation (G.1.2) | Jun 14 18

Smart learning in smart cities

Smart learning has been a neglected aspect of smart technology applications, which this work seeks to address. The book addresses the connection between smart cities and smart learning. Then, the second part introduces smart learning in various domains. Finally, Part 3... more
Education (J.1...) | Jun 20 18


I like books about the history of the computing field. Those of us who lived through all of it delight in stories of folks who pioneered all of what we have today. This is a very good example of one of those books. It tells the story of six Silicon Valley principals (it variously... more
History of Computing (K.2) | Jun 15 18

Introduction to software testing (2nd ed.)

Software testing is essential. It doesn’t much matter if you can do something quickly or in minimal memory or with a spiffy web interface if the results are incorrect, though incorrect might include “more or less correct” in many circumstances (this is often explicit in... more
Testing & Debugging (D.2.5) | Jun 15 18


The book proposes a new model of higher education that goes beyond the classical undergraduate/graduate model and should be a better fit for the fabric of a modern technologically driven society. It consists of five chapters. The first chapter serves as motivation... more
Computers & Education (K.3) | Jun 14 18

Trust and reputation management systems: an e-business perspective

This 86-page treatise provides information officers and project managers with a conceptual and computational approach to managing trust and reputation in the e-commerce world. The author is a faculty... more
Electronic Commerce (K.4.4) | Jun 14 18

Secondary liability of Internet service providers

Secondary liability occurs when an entity facilitates, makes material contributions to, or is otherwise responsible for violating a law or the right of another party. In the case of Internet service providers (ISPs), determining liability for the actions of users... more
Governmental Issues (K.5.2) | Jun 14 18

Teaching online (4th ed.)

Advances in technology have created a new type of learner who relies mainly on laptops and mobile devices to access teaching materials. This situation has driven teachers to adopt new strategies that preserve the quality of face-to-face teaching, yet take... more
Distance Learning (K.3.1...) | Jun 8 18

An introduction to distance geometry applied to molecular geometry

The most common way of determining the structures of molecules in a solution is nuclear magnetic resonance (NMR). The signals measured are caused by the flipping of the spins of paramagnetic nuclei in a... more
Geometrical Problems & Comp. (F.2.2...) | Jun 7 18

Programmed inequality

From 1930 to 1980, the transformation from underpaid labor to equal pay for workers can truly be stated as a radical change for British women opting for computing jobs. In Britain, the position of female workers as computer operators or technicians was mainly... more
History of Computing (K.2) | Jun 6 18

Distributed computing in big data analytics: concepts, technologies and applications

Day by day the prominence of big data analytics is increasing. Not only does it impact the way we work, but it is gradually impacting the way we live our lives. Yet it is also an area filled with a myriad of... more
Content Analysis & Indexing (H.3.1) | Jun 6 18

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy