Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
November 23, 2020
Search
Highlight

ELSA: a multilingual document summarization algorithm based on frequent itemsets and latent semantic analysis
“You shall know a word by the company it keeps” is perhaps the most famous quotation attributed to J. R. Firth [1]. Searching for ways to automate natural language understanding (NLU), statistical natural language... more
Quote
Our technology forces us to live mythically, but we continue to think fragmentarily, and on single, separate planes... more
- Marshall McLuhan and Quentin Fiore (1967)
Articles
Intelligent warehousing based on the Internet of Things technology:

Over the past few years, the Internet of Things (IoT) has gained popularity in different industrial applications. IoT has become an integral part of industries such as healthcare, agriculture, manufacturing,... more

Industrial Control (J.7...) | Nov 23 20

Unlocking data to improve public policy: Communications of the ACM

Data-driven decision-making is all the rage these days. Government and public sector organizations, as well as industry and private enterprise, are keen to leverage the flood of data available in the Information Age to... more

Government (J.1...) | Nov 20 20

Adaptive architecture and personal data: ACM Transactions on Computer-Human Interaction

This paper focuses on the implications of sensors embedded in buildings to make the buildings responsive to people. An important issue is privacy. One reason these privacy issues are... more

Architecture (J.5...) | Nov 20 20

Testing extended finite state machines using NSGA-III: A-TEST 19

The goal of the paper is to describe how the non-dominated sorting genetic algorithm III (NSGA-III) algorithm generates test suites from extended finite-state machines (EFSMs). Each generated test... more

General (D.2.0) | Nov 19 20

RML: runtime monitoring language: a system-agnostic DSL for runtime verification: Programming 19

This paper on the runtime monitoring language (RML) is a very brief look at a system-agnostic domain-specific language (DSL) for runtime verification. This language is system agnostic due to its use of JavaScript... more

General (D.2.0) | Nov 18 20

ELSA: a multilingual document summarization algorithm based on frequent itemsets and latent semantic analysis: ACM Transactions on Information Systems

“You shall know a word by the company it keeps” is perhaps the most famous quotation attributed to J. R. Firth [1]. Searching for ways to automate... more

Database Applications (H.2.8) | Nov 16 20

G-CORE: a core for future graph query languages: SIGMOD 18

With a description of the G-CORE language, designed by the Linked Data Benchmark Council (LDBC) Graph Query Language Task Force, this paper presents a standardization proposal of a graph query language for property graphs. In... more

General (H.2.0) | Nov 10 20

BigDL: a distributed deep learning framework for big data: SoCC 19

The sheer complexity of storage and processing methods deployed by big data applications has resulted in a prolonged wait for a deep learning framework that effectively works with big data. This paper... more

Learning (I.2.6) | Nov 5 20

A study examining relationships between micro patterns and security vulnerabilities: Software Quality Journal

Do you have an unlimited budget for code review and testing? Or can you ignore security vulnerabilities in the code? If not, you might be interested in this novel way of allocating code... more

General (D.2.0) | Nov 5 20

Learning programming languages as shortcuts to natural language token replacements: Koli Calling 18

Students learning programming languages initially struggle very much with the relationship between the formal syntax of the language and the intuitive interpretation of its meaning. The program text... more

General (D.3.0) | Nov 3 20

Books
Reverse mathematics: proofs from the inside out

Reverse mathematics “seeks the axioms needed to prove given theorems.” The work of Emil Post and Kurt Gödel, in the 1920s and 1930s, permanently dashed the hope that axiom systems could formally generate all theorems... more
Mathematics & Statistics (J.2...) | Nov 23 20

The future of music: towards a computational musical theory of everything

When I picked this book to review, I had expected a book about formal theories of music: notations, definitions, functions, relations, theorems, and so on. However, when I opened it, I found professional,... more
Music (J.5...) | Nov 23 20

T-minus AI

In order to understand this book in context, consider the following analogy. Birds fly, and airplanes fly. But it isn’t the same “fly.” A flock of birds can take off without running into each other, but if a flock of planes tried that, it would be a disaster. On the other hand... more
General (I.2.0) | Nov 19 20

Natural language processing for social media

Social media platforms are not only a place for individuals to voice their opinions, but have also become very influential in recent democratic elections and geo-politics. The importance of social media, including applications to analyze social media posts, is... more
Natural Language Processing (I.2.7) | Nov 19 20

The hardware hacker

Andrew “bunnie” Huang was Chumby’s lead hardware engineer for its WiFi-equipped embedded computer device, chumby, which premiered in 2006. He was charged with the task of traveling from the US to Shenzhen, and figuring how to build a supply chain for the device. This... more
General (B.0) | Nov 17 20

Graph data management: fundamental issues and recent developments

Graph databases are now key in supporting semantic web and linked open data, as well as in application domains for software engineering, geographical databases, social networks, telecommunication, bioinformatics, chemistry, and datasets like... more
Database Manager (H.2.4...) | Nov 13 20

Genetic programming theory and practice XIV

This book, part of Springer’s “Genetic and Evolutionary Computation” series, contains the proceedings of the “14th meeting of the annual Genetic Programming Theory and Practice Workshop, [held] by the Center for the Study of Complex Systems at the University... more
Biology & Genetics (J.3...) | Nov 12 20

Big data privacy preservation for cyber-physical systems

This monograph gives an introduction to cyber-physical systems (CPS). These are systems that are controlled by computers and influence objects in the physical world. Areas discussed include spectrum trading... more
Security & Protection (C.2.0...) | Nov 11 20

Essential TypeScript: from beginner to pro

TypeScript is a superset of JavaScript, created by Microsoft, that adds type safety to the language. This book does a great job of teaching JavaScript programmers to work effectively with TypeScript. Like all books of its kind, it is likely to be irrelevant... more
Multiparadigm Languages (D.3.2...) | Nov 10 20

Digital forensics basics: a practical guide using Windows OS

Digital forensics, an emerging trend in the field of forensic science, involves electronic media as evidence in the court of law. The term is synonymous with computer forensics or cyber forensics. Digital forensics focuses on the... more
Windows (D.2.2...) | Nov 9 20


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2020 ThinkLoud, Inc.
Terms of Use
| Privacy Policy