Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
September 2, 2014

Data just right: introduction to large-scale data & analytics
Handling large-scale data, or big data, is among the current great trends in information and communications technology (ICT). Other trends (mobility, virtual market places, social networks, and the Internet of Things (IoT) and humans) produce enormous amounts of fast-growing... more
The paradox of science is that every answer breeds at least two new questions. More answers mean even more questions, expanding not only what we know...... more
- Kevin Kelly (2007)
Semantics for knowledge and change of awareness: Journal of Logic, Language & Information

In multiagent systems, the knowledge available to individual agents is subject to perpetual change: first, the truth of propositions may vary from one state of an agent to the next; second, the propositions... more

Knowledge Rep. Formal. & Meth. (I.2.4) | Aug 29 14

Blended interaction: understanding natural human-computer interaction in post-WIMP interactive spaces: Personal and Ubiquitous Computing

As new computational technologies and methods become available, the nature of the interaction between users and computers... more

User-Centered Design (H.5.2...) | Aug 28 14

Space-time matching algorithms for interest management in distributed virtual environments: ACM Transactions on Modeling and Computer Simulation

The scalability of distributed virtual environments (DVEs) requires an approach for filtering and disseminating relevant data to participating... more

Types of Simulation (I.6.8) | Aug 28 14

My self and you: tension in bodily sharing of experience: ACM Transactions on Computer-Human Interaction

The “support of bodily expression of experience between people” presents a significant research challenge in the design of... more

User Interfaces (H.5.2) | Aug 27 14

Acceptance of socially assistive humanoid robot by preschool and elementary school teachers: Computers in Human Behavior

Socially assistive robotics (SAR) has been making inroads in education since its inception. Robots of various shapes, forms, and functions have... more

General (H.5.0) | Aug 27 14

Development and validation of a disaster management metamodel (DMM): Information Processing and Management: an International Journal

In recognition of the fact that many features of a disaster are independent of the type of event, a generic disaster management metamodel has... more

Model Validation & Analysis (I.6.4) | Aug 27 14

A characteristic study on failures of production distributed data-parallel programs: ICSE 13

Soft failure is the unsuccessful premature termination of a data parallel program, as opposed, for instance, to any kind of hardware failure. This paper, the first of its kind, undertakes a systematic evaluation of... more

Metrics (D.2.8) | Aug 27 14

Matrix code: Science of Computer Programming

Imperative programming verification is a serious problem! Parallel development of proof and code for imperative programming is the proposed solution. A new language is... more

Program Verification (I.2.2...) | Aug 27 14

XSPath: navigation on XML schemas made easy: IEEE Transactions on Knowledge and Data Engineering

Schemas for Extensible Markup Language (XML), in which document structure is large and complex, seem like the result of a black art, practiced by... more

Query Languages (H.2.3...) | Aug 26 14

Using SPIN for automated debugging of infinite executions of Java programs: Journal of Systems and Software

Traditionally, debugging has been guided by heuristics and intuition, but the complexity of contemporary software, which is especially evident in... more

Testing & Debugging (D.2.5) | Aug 26 14

Distributed systems and applications of information filtering and retrieval

This book is a collection of eight research papers that have been revised and extended from the original invited presentations at the special session on Information Filtering & Retrieval: Novel Distributed Systems and... more
Information Search & Retrieval (H.3.3) | Aug 29 14

Designing with the mind in mind: simple guide to understanding user interface design guidelines (2nd ed.)

As is well known, human beings have many inherent frailties and failings. Our eyesight is imperfect, and is subject to shortcomings like sensitivity to... more
User Interfaces (H.5.2) | Aug 28 14

Technologies of inclusive well-being: serious games, alternative realities, and play therapy

“Let’s play house!” one child screams. “Who do you want to be?” another answers. Play for children has always had a serious component, as it... more
Artificial, Aug. & Virtual Realities (H.5.1...) | Aug 28 14

The human hand as an inspiration for robot hand development

This thick book in advanced robotics has two parts: Part 1 is about the human hand, its structure and its control, while Part 2 is about designing robotic hands inspired by the human hand. It contains... more
Robotics (I.2.9) | Aug 28 14

Protection of information and the right to privacy - A new equilibrium?

This slim volume arose from a 2013 international workshop on the “Protection of Information and the Right to Privacy.” The editor maintains that digital communication has complicated the... more
Privacy (K.4.1...) | Aug 28 14

Promise theory: principles and applications

Today, computers routinely do many jobs that people used to do, and thus need to interact with human stakeholders. To facilitate these interactions, researchers have devoted considerable attention... more
Multiagent Systems (I.2.11...) | Aug 28 14

Beginning COBOL for programmers

A new book on common business-oriented language (COBOL) programming? You’re kidding, right? Pundits, particularly academics, have been heralding the death of COBOL for at least 30 years now... more
COBOL (D.3.2...) | Aug 28 14

Foundations for designing user-centered systems: what system designers need to know about people

This book is about understanding people in order to design better interactive devices. It is addressed to designers of modern technological systems. The book covers aspects of computer... more
Theory & Methods (H.5.2...) | Aug 28 14

Cryptography in constant parallel time

Cryptography enables secure communication and computation even when those interested in infiltrating data are present. Today the application of cryptography has become indispensable for individuals and organizations, and cryptographic tools are... more
Data Encryption (E.3) | Aug 27 14

Simulating innovation: computer-based tools for rethinking innovation

Classically, science has relied on two main approaches: experimental (focusing on the observation and analysis of data) and theoretical (emphasizing mathematical analysis of the logical consequences of basic... more
Model Development (I.6.5) | Aug 27 14

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2014 ThinkLoud, Inc.
Terms of Use
| Privacy Policy