Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
October 23, 2014
Search
Highlight

Constraints meet concurrency
Constraint-based execution and concurrency are valuable allies, but they are not natural ones. This book examines ways in which constraints and concurrency can be brought into harmony. The results reported show how constraints can be trimmed for potentially better concurrent execution, and how concurrency can be exploited... more
Quote
The race to build the hydrogen bomb was accelerated by von Neumann’s desire to build a computer, and the push to build von Neumann’s computer was accelerated by the race to build a hydrogen bomb... more
- George Dyson (2012)
Articles
A method and tool for tracing requirements into specifications: Science of Computer Programming

Formalizing informal specifications requires traceability. System descriptions are rarely fully formalized right from the start. Assumptions on the environment and requirements of the... more

Tracing (D.2.5...) | Oct 22 14

Numerical integration on GPUs for higher order finite elements: Computers & Mathematics with Applications

Finite element methods (FEMs) are numerical methods for finding approximate solutions to partial differential equations. When a problem is presented, a mesh and a finite element space are required... more

Finite Element Methods (G.1.8...) | Oct 22 14

Fast communication: face-image retrieval based on singular values and potential-field representation: Signal Processing

The importance of face-image retrieval cannot be overemphasized. This paper presents a method for retrieving face images from a database... more

Image Representation (I.4.10) | Oct 20 14

Using brain signals patterns for biometric identity verification systems: Computers in Human Behavior

Human identity verification and authentication relies strongly on biometric signals: we recognize familiar people by their faces, their voices, or the way they walk, and are... more

User/Machine Systems (H.1.2) | Oct 16 14

Computing petaflops over terabytes of data: the case of genome-wide association studies: ACM Transactions on Mathematical Software

With its catchy but somewhat misleading title, this paper proposes a method for efficiently solving multiple instances of the same problem when... more

Algorithm Design & Analysis (G.4...) | Oct 16 14

GUITAR: an innovative tool for automated testing of GUI-driven software: Automated Software Engineering

This paper presents research about the automated testing of graphical user interfaces (GUIs). Although it is addressed to the designers of such tools, it can be useful to anyone who wishes to understand... more

Testing & Debugging (D.2.5) | Oct 16 14

An empirically based terminology and taxonomy for global software engineering: Empirical Software Engineering

The authors of this paper found that the terms used in the outsourcing strategy literature to differentiate various client/vendor relationships in global software work are sometimes undefined and sometimes... more

General (D.2.0) | Oct 16 14

Techniques for testing scientific programs without an oracle: SE-CSE 13

Scientists often write programs for which no traditional oracle exists. Over the years, techniques have emerged that can be used to test such programs. This paper provides detailed explanations of... more

Software/Program Verification (D.2.4) | Oct 16 14

Unsupervised methods for the classification of hyperspectral images with low spatial resolution: Pattern Recognition

Spectral imaging constitutes a fascinating type of data. Organized as a set of grayscale images, with each image recording the reflected light of the same scene under a... more

Classifier Design & Evaluation (I.5.2...) | Oct 15 14

On one integral Volterra model of developing dynamical systems: Automation and Remote Control

Volterra integral equations of the first kind arise naturally in the description of problems in electrical engineering, the modeling of dynamic impulse systems, nonlinear dynamic systems... more

Volterra Equations (G.1.9...) | Oct 15 14

Books
Permissionless innovation: the continuing case for comprehensive technological freedom

Nineteenth century impressionism found its way through all of the arts with enormous and lasting success despite the objections of the conventional community. Will Adam Thierer’s belief in... more
Governmental Issues (K.5.2) | Oct 21 14

Multilinear subspace learning: dimensionality reduction of multidimensional data

This book provides the background to approach tensor-based dimensionality reduction of large datasets and gives an overview of current research in this area of... more
Learning (I.2.6) | Oct 20 14

Healthcare information privacy and security: regulatory compliance and data security in the age of electronic health records

Security and information privacy have been in the limelight for quite a while with no clear solutions in sight. In the US, information privacy and data protection laws have been limited to some... more
Medical Information Systems (J.3...) | Oct 20 14

Agile risk management

In this book, the author introduces a methodology for agile risk management in software development. Risk management for information technology (IT) projects is not new and has always been an integral part of various software engineering and IT project... more
Project & People Management (K.6.1) | Oct 17 14

Exercises in programming style

This is a very good book on programming styles, a crucial aspect of programming that is not given enough importance. The author has taken her inspiration from the book by French writer Raymond Queneau. In his book, Queneau writes the same story in different... more
General (D.1.0) | Oct 17 14

Computational intelligence for decision support in cyber-physical systems

Cyber-physical systems (CPSs) consist of cyber components that implement the control of a physical system. They are usually designed as networks of sensors, actuators, and processing devices, so as to help humans and machines to interact and... more
Real-Time & Embedded Systems (C.3...) | Oct 17 14

The CERT C coding standard (2nd ed.)

The CERT C coding standard is intended to help create safe, reliable, and secure systems in C that are fully compliant with C99 and C11 standards. It lays out rules for coding that avoid exploitable... more
Coding Tools & Techniques (D.2.3) | Oct 16 14

Serviceology for services: selected papers of the 1st International Conference of Serviceology

For the past two decades, managing service processes has been an important area of research and practice. Since modern service processes are embedded and/or supported by global information technology... more
Online Information Services (H.3.5) | Oct 16 14

Exercises in programming style

“How do I program thee? Let me count the ways.” So might Lopes paraphrase the well-known poet Elizabeth Barrett Browning. In this book, she writes the same program in 33 different programming styles. The idea is borrowed from a book by a French author... more
General (D.1.0) | Oct 16 14

Human-computer systems interaction: backgrounds and applications 3

Human-computer interaction (HCI) is one of the most promising topics in modern computational engineering. Human-human communication is natural, effective, and simple. Researchers have sought to mimic... more
Applications & Expert Systems (I.2.1) | Oct 15 14


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2014 ThinkLoud, Inc.
Terms of Use
| Privacy Policy