Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
April 20, 2014 | University of Calgary Library

Pattern recognition of big nutritional data in RCT
Categorized broadly as unsupervised learning algorithms, clustering techniques are often used to help reveal underlying patterns, particularly in large datasets. This paper describes research to analyze the effectiveness of different dietary prescriptions on a limited set of patients of different races and genders. The authors chose... more
Even in the field of programming languages and compilers, there is too much concern with form. I say “even” because one might feel that this is one area in which form ought to be the chief concern. But... more
- Marvin Minsky (2003)
The design and implementation of heterogeneous multicore systems for energy-efficient speculative thread execution: ACM Transactions on Architecture and Code Optimization (TACO)

Without a good background in computer architecture, this paper will be hard to follow. It revolves around four concepts: parallelism, reconfiguration... more

MIMD processors (C.1.2...) | Apr 18 14

ParallelJS: an execution framework for JavaScript on heterogeneous systems: GPGPU 7

The authors created a library, ParallelJS, which runs JavaScript functions in parallel on heterogeneous systems of standard central processing units (CPUs) and NVIDIA graphics... more

Language Classifications (D.3.2) | Apr 17 14

Performance and energy-efficiency of Scala on mobile devices: NGMAST 13

The topic of this paper is performance on a Dalvik virtual machine (VM) for equivalent benchmark apps generated from Scala sources by a Scala compiler or from Java sources by a Java compiler. The... more

General (D.3.0) | Apr 17 14

Biocharts: unifying biological hypotheses with models and experiments: e-Science 13

An often-cited quote by the statistician George Box is that, “Essentially all models are wrong, but some are useful” [1]. Many modeling approaches for biology have been and are being developed... more

Biology & Genetics (J.3...) | Apr 17 14

Privacy-centric access control for distributed heterogeneous medical information systems: ICHI 13

Empowering patients in heterogeneous medical information systems is technically and contextually challenging. While role-based access control protocols are making significant impact [1,2], this... more

Medical Information Systems (J.3...) | Apr 16 14

SeaDoc: a self-adaptive document link provision system for framework extension tasks: Computing

The use of object-oriented frameworks is often hampered by the complex interrelations among the individual components. Developers... more

Frameworks (D.3.3...) | Apr 16 14

On kinetic Delaunay triangulations: a near quadratic bound for unit speed motions: FOCS 13

Robotics, video games, simulations, virtual reality, and many other domains that involve motion planning rely on kinetic triangulation data structures of a set... more

Geo. Problems & Computations (F.2.2...) | Apr 16 14

Security and protection of SCADA: a bigdata algorithmic approach: SIN 13

Embedded systems work between hardware and software to perform a specific function. These systems are usually part of a larger system, and wireless communication among the components of the... more

Security & Protection (C.2.0...) | Apr 16 14

Energy-efficient and reliable data delivery in wireless sensor networks: Wireless Networks

This paper explores the clustering of transmitting devices for data routing in wireless sensor networks from an energy consumption viewpoint. The failure of a base station results in considerably... more

Sensor networks (C.2.1...) | Apr 16 14

Efficient semantic image segmentation with multi-class ranking prior: Computer Vision & Image Understanding

Image segmentation is the process of separating an image into object and nonobject components. Computer vision... more

Segmentation (I.4.6) | Apr 15 14

Handbook of strategic e-business management

The sustainable era of e-commerce growth has commenced. With 40 essays spanning over 100 pages, this handbook lays out theoretical and practical findings aimed at helping organizations poise for strategic... more
Electronic Commerce (K.4.4) | Apr 18 14

Three views of logic: mathematics, philosophy, and computer science

Mathematical logic historically had its roots in mathematics and philosophy, and is one of the foundations of computer science (CS). All three disciplines continue to contribute to the... more
Mathematical Logic (F.4.1) | Apr 17 14

Dynamic secrets in communication security

In today’s world, the security of communication is paramount. Researchers have proposed many techniques for ensuring this. This book is one such effort. It is based on the doctoral dissertation... more
Data Encryption (E.3) | Apr 17 14

Beginning sensor networks with Arduino and Raspberry Pi

Some books teach you how to use a tool and some teach you how to approach a domain or solve a particular problem. It is, however, a smaller subset of books... more
Signal Proc. Systems (C.3...) | Apr 17 14

Multilayer neural networks: a generalized net perspective

While many books have been published on multilayer neural networks, this book distinguishes itself with new insights on the structure and functioning of... more
Self-Modifying Machines (F.1.1...) | Apr 16 14

Brainstorming and beyond: a user-centered design method

Brainstorming may be a fun and helpful way to weed out crazy ideas from viable ones, or to bring discipline into a rowdy bunch of debating people. At first, brainstorming may seem like one of the most... more
Social & Behavioral Sciences (J.4) | Apr 15 14

Quantum computing since Democritus

With this book, Scott Aaronson has produced a wonderful, personal exploration of topics in theory of computation, complexity theory, physics, and philosophy. His witty, informal writing style... more
Complexity Measures & Classes (F.1.3) | Apr 15 14

It began with Babbage: the genesis of computer science

More than just a survey of the main developments that led to the discipline of computer science (CS), this book embeds the historical milestones in an intellectual context. In the prologue, CS (of the “ought”) is... more
History of Computing (K.2) | Apr 15 14

Patently contestable: electrical technologies and inventor identities on trial in Britain

The UK patenting system is based on a concept of first inventor to file, similar to many other industrialized nations. The passage of the Leahy-Smith America Invents Act, signed into law on September... more
Intellectual Property Rights (K.4.1...) | Apr 14 14

Beginning Android C++ game development

As the title suggests, this is a beginner-level book on game development. It gives a quick introduction to setting up the Android development environment, designing a game, creating a game engine... more
Games (K.8.0...) | Apr 14 14

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2014 ThinkLoud, Inc.
Terms of Use
| Privacy Policy