Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
January 22, 2019

Teaching computing: a practitioner’s perspective
Computing is a very popular option among undergraduates and graduates because it relates to many other disciplines, including finance, graphic design, game development, and biology, among others. The teaching of computing requires up-to-date knowledge of information technology (IT). It also differs from other disciplines because it relies... more
Edinburgh (Reuter)A robot dressed in a black hat and bow tie appeared in court Tuesday after running amok in a restaurant where it was employed to serve wine. Within its first hour... more
- (1985)
Topology synthesis and optimal design of an adaptive compliant gripper to maximize output displacement: Journal of Intelligent and Robotic Systems

This interesting paper is well written and technically sound. Its purpose is well stated and the background research is sufficient. The methodology is... more

Robotics (I.2.9) | Jan 21 19

Mending the patchwork of requirements from multiple standards using participative goal modelling: Requirements Engineering

It is a truth, especially in Europe and the US, that with the emergence of new regulations such as eIDAS (EU 910/2014), the General Data... more

Requirements/Specifications (D.2.1) | Jan 18 19

Triclustering algorithms for three-dimensional data analysis: a comprehensive survey: ACM Computing Surveys

The rapid increase in data streams poses significant challenges to their interpretation. Algorithms increasingly target 3D datasets, which plot observations, attributes, and contexts, to capture patterns... more

Clustering (H.3.3...) | Jan 18 19

Website replica detection with distant supervision: Information Retrieval

Detecting duplicate web pages is of great importance for search engines. This is because duplicates are very costly to index. The work of Carvalho et al. advances the technology for detecting web page duplicates, with the... more

World Wide Web (WWW) (H.3.4...) | Jan 18 19

Safe autonomy under perception uncertainty using chance-constrained temporal logic: Journal of Automated Reasoning

The topic of self-driving cars is receiving a lot of press lately. This paper on safe autonomy is an interesting read for people researching autonomous... more

Temporal Logic (F.4.1...) | Jan 17 19

STADS: software testing as species discovery: ACM Transactions on Software Engineering and Methodology

Software testing is an exercise in extrapolation--we attempt to infer the correctness of software by exercising it using test cases. However, as Dijkstra famously observed, testing demonstrates... more

Testing & Debugging (D.2.5) | Jan 17 19

Multimedia big data analytics: a survey: ACM Computing Surveys

Big data continues to grow exponentially. One source of that growth--multimedia data--has not received comprehensive study. The authors correct this deficit by presenting the results of a broad multidimensional survey of the literature related to multimedia... more

Introductory & Survey (A.1) | Jan 16 19

A comparison of code similarity analysers: Empirical Software Engineering

Analyzing code similarity in source code is essential to detecting clones, duplicate code, plagiarism, and software copyright violations. Over the years, researchers have proposed various approaches... more

General (D.2.0) | Jan 11 19

PERSIST: Journal of Grid Computing

NoSQL application data stores often combine on-premise and public cloud resources. As a consequence, they may deal with heterogeneous technologies, flexible but less structured storage architectures, and dynamic changes. In this paper, the authors propose PERSIST... more

Cloud Computing (C.2.4...) | Jan 9 19

Modified cuckoo optimization algorithm (MCOA) to solve precedence constrained sequencing problem (PCSP): Applied Intelligence

The precedence constrained sequencing problem is a general problem: Consider a set of jobs where an arbitrary precedence relationship exists among the jobs and a cost is associated with... more

General (I.2.0) | Jan 7 19

Asset attack vectors

Haber and Hibbert give readers a grand tour of the vulnerability management landscape in 24 chapters. Three somewhat longer chapters are noteworthy. Chapter 2, “The Vulnerability Landscape,” contains the usual suspects, with the biggest focus on social engineering... more
Security & Protection (K.6.5) | Jan 22 19

Guide to graph algorithms

This comprehensive text focuses on graph data structures and consequent graph algorithms as fundamental to the analysis of various types of networks, from social to biological ones. The book consists of three parts, with 15 chapters... more
Graph Algorithms (G.2.2...) | Jan 22 19

Plato and the nerd

The preface to this book states that it is the author’s “attempt to explain why the process of creating technology, a process that we call engineering, is a deeply creative process, and how this explains why it has become so hot and competitive, making... more
Philosophical Foundations (I.2.0...) | Jan 21 19

Knowledge management in theory and practice (3rd ed.)

When building software, whether we realize it or not, we embed various kinds of knowledge into it. Software engineers doing requirements gathering and domain analysis have realized this, as have programming language researchers when they advocate for... more
KR Formalisms & Methods (I.2.4) | Jan 18 19

Engineering dynamics

This volume condenses the material usually covered in a one-semester undergraduate course on kinematics and dynamics. Dr. To provides an introduction to the topics by listing some relevant formulas along with easy-to-follow examples of how to apply them. The book... more
Kinematics & Dynamics (I.2.9...) | Jan 17 19

Fundamentals of numerical computation

An interesting read, this book is composed of 13 chapters spread over two parts. Chapter 1 covers MATLAB basics, including floating-point numbers, problems and conditioning, and algorithm stability. Chapter 2 explores matrices (including various vector norms, computations... more
Model Development (I.6.5) | Jan 15 19

Carl von Clausewitz, the fog-of-war, and the AI revolution

As artificial intelligence (AI) is increasingly used in many areas, including fully automated vehicle control and military applications, there are concerns about how effectively such systems deal with extreme conditions. Carl von Clausewitz, the 19th century military... more
Applications & Expert Systems (I.2.1) | Jan 14 19

Smart sustainable cities of the future

It is well acknowledged that urban populations will increase exponentially. Global bodies like the International Telecommunication Union (ITU) are quite engaged with this issue, articulating the role of information and communication technologies... more
Applications & Expert Systems (I.2.1) | Jan 14 19

Fuzzy logic augmentation of neural and optimization algorithms

There have been many recent developments related to fuzzy logic applications. This book, volume 749 in Springer’s “Studies in Computational Intelligence” series, contains research papers related to fuzzy logic, neural networks, and metaheuristics for... more
Optimization (G.1.6) | Jan 11 19

Exploring ODEs

Right from the introduction it is clear that Exploring ODEs has a strong pedagogical and practical aim. The authors have created an easy-to-remember word, FLASHI. Depending on which letters are capitalized (for example, FlaSHi, flAShI, and so on), the reader... more
Ordinary Differential Equations (G.1.7) | Jan 10 19

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy