Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
July 20, 2018
Search
Highlight

On the logos: a naïve view on ordinary reasoning and fuzzy logic
There are many books that you read to get answers to questions and doubts, and there are few books that leave you with more questions and doubts than before reading them. Yet, you can still be satisfied with such books because they give you the idea of the exciting... more
Quote
There is a natural and growing interdependence between our industry and academia. On the one hand, scientific discoveries in universities can lead... more
- John F. Akers (1984)
Articles
Decidability and independence of conjugacy problems in finitely presented monoids: Theoretical Computer Science

In a group, two elements a and b are conjugate if there is some g with gag-1 = b. Conjugacy is an equivalence relation and can be used to partition a group into equivalence classes whose elements are... more

Decision Problems (F.4.2...) | Jul 20 18

Dedicated feature descriptor for outdoor augmented reality detection: Pattern Analysis & Applications

Much interest has been devoted to augmented reality (AR) in both academic and enterprise environments, and rightly so. AR enhances interaction with real-world objects by adding... more

Pattern Analysis (I.5.2...) | Jul 19 18

A review on the applications of neuro-fuzzy systems in business: Artificial Intelligence Review

Neuro-fuzzy systems (NFS) combine two artificial intelligence (AI) techniques, namely neural networks and fuzzy logic systems. This approach takes advantage of the strengths of each technique, while... more

Fuzzy Set (I.5.1...) | Jul 19 18

Zero-shot visual recognition via bidirectional latent embedding: International Journal of Computer Vision

Humans are remarkably good at learning to recognize new object categories from just a few examples, a task still unreachable by machines. Unlike... more

Computer Vision (I.5.4...) | Jul 18 18

Maximizing polynomials subject to assignment constraints: ACM Transactions on Algorithms

This paper considers “the q-adic assignment problem.” Fix a number q (originally q=2), and suppose we are given, for some number n, a 2q-dimensional array of costs cu,v where u and v are q-tuples of indices... more

Algorithm Design & Analysis (G.4...) | Jul 13 18

Semantics-based analysis of content security policy deployment: ACM Transactions on the Web

Security is one of the biggest concerns in digital societies. Without reasonable levels of security, people will never really embrace the use of technology for tasks that they consider sensitive... more

Security (K.4.4...) | Jul 11 18

Mechanising and verifying the WebAssembly specification: CPP 18

Formal verification has had many successful applications to industry standards over the last few years, but an important question is whether formal verification can be included in standard design efforts. This paper... more

Semantics of Programming Lang. (F.3.2) | Jul 11 18

Comparative analysis of ellipsoidal methods for distributed data fusion: IMCOM 18

In multisensor systems, the fusion of information from multiple sensors can be done globally or locally in distributed “fusion centers.” The distributed approach has advantages in reliability, fault tolerance... more

Distributed Systems (C.2.4) | Jul 11 18

Seamless virtual network for international business continuity in presence of intentional blocks: ACM Transactions on Internet Technology

It is an accepted fact that international borders are vulnerable and permeable when it comes to information technology. This is why international businesses... more

Network Management (C.2.3...) | Jul 10 18

Unifying computing resources and access interface to support parallel and distributed computing education: Journal of Parallel and Distributed Computing

Parallel and distributed computing is a great solution in the modern systems world. The important issue when teaching parallel and... more

General (K.3.0) | Jul 10 18

Books
Reductionism in art and brain science

Reductionism has been generally understood, roughly speaking, as “nothing-but-ism”--for example, consider “the hyper-rationalist dogma that all mental processes are [nothing but] computations performed in accordance with precise algorithms” [1]. Such an approach clearly has... more
Arts & Humanities (J.5) | Jul 20 18

Attribute-based access control

Due to the increasing distribution and complexity of current applications, attribute-based access control (ABAC) is slowly becoming the only way to control access. This monograph summarizes the accumulated knowledge on this important subject and has a... more
Access Controls (D.4.6...) | Jul 20 18

Advances in soft computing and machine learning in image processing

Both soft computing techniques and machine learning algorithms have very important tasks in image processing applications. With the artificial intelligence (AI)-based applications emerging in the market today, image processing techniques have gained more... more
General (I.4.0) | Jul 19 18

Artificial intelligence and economic theory

Artificial intelligence (AI) is increasingly used in many areas, including language translation, medical diagnosis, and so on. Of interest here are AI applications in stock market activities. Most investors are aware of... more
Economics (J.4...) | Jul 19 18

Endless loop

Ada Lovelace is widely regarded as the world’s first computer programmer. Did you know that her father was the poet Lord Byron, or that he separated from her mother shortly after Ada was born? Her mother then promoted Ada’s interest in mathematics and... more
BASIC (D.3.2...) | Jul 18 18

The EU general data protection regulation (GDPR): a practical guide

Perhaps as a result of the traumatic events of the early 20th century, the people of Europe now consider personal privacy a fundamental human right. As a consequence, the European Union (EU) passed... more
Governmental Issues (K.5.2) | Jul 18 18

Troublemakers

Berlin’s compelling volume is distinguished by an engaging writing style. Her chronological history of the Valley is punctuated by personal insights about the principals. As effective and engaging as the author is, though, it is the nuggets of humor, oddities... more
History of Computing (K.2) | Jul 17 18

Deception in the digital age

We are living in a very digitally connected world. An unwanted consequence is that each one of us who uses a computer, smartphone, tablet, or even smart TV could be targeted by individuals or groups who want to influence our beliefs and behaviors or gain... more
Abuse & Crime Involving Comp. (K.4.1...) | Jul 16 18

Guide to data structures: a concise introduction using Java

Data structures seem to be the bane of every computer science (CS) undergraduate’s education. Thus, a good data structures text aimed at undergraduates is a necessity. Even though relatively few... more
Data Structures (E.1) | Jul 16 18

Deep learning with Python: a hands-on introduction

This book is written specifically for Python programmers who wish to learn how to apply their Python programming skills to machine learning applications. Consequently, a very brief introduction to... more
Learning (I.2.6) | Jul 16 18


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy