Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
February 13, 2016

Anigrafs: experiments in cooperative cognitive architecture
A perennial challenge in cognitive science is framing an architecture powerful enough to be a credible support for human reasoning, yet simple enough to map to the known machinery of the human brain. Work done in the 1970s on systems such as Soar framed many of the... more
It may sound farfetched, but in the future, your luggage will be searchable. Within two decades, nearly everything of value to someone will be tagged... more
- John Battelle (2005)
Recommender systems in e-learning environments: a survey of the state-of-the-art and possible extensions: Artificial Intelligence Review

In this paper, the authors aim to provide a systematic survey of recommender systems in e-learning environments. They cite more than 150 papers published between the years 2001 and 2015... more

Computer Uses in Education (K.3.1) | Feb 11 16

Program equivalence in linear contexts: Theoretical Computer Science

It is not too much of a stretch of the imagination to say that mathematics boils down to the study of the question: When are two terms equal? (along with all of the consequences of the various answers to this... more

Mathematical Logic (F.4.1) | Feb 11 16

Artefact-based requirements engineering: the AMDiRE approach: Requirements Engineering

Artifact-oriented or artifact-based requirements engineering (RE) is a relatively new practice in the field of RE. The authors contrast artifact-oriented RE with the more common... more

Requirements/Specifications (D.2.1) | Feb 10 16

Between insanity and love: ACM SIGCAS Computers and Society

The premise of this paper is that humans can have legitimate feelings of love or sexual desire for nonorganic objects, specifically robots or graphical constructions such as avatars. This claim... more

Ethics (K.4.1...) | Feb 9 16

Spreading alerts quietly and the subgroup escape problem: Journal of Cryptology

In intrusion detection, how to send alert messages without scaring the attacker in the very early state is a practical issue. The solutions for this problem vary. Sentinel nodes can send encrypted... more

Coding & Information Theory (E.4) | Feb 9 16

Face and palmprint multimodal biometric systems using Gabor-Wigner transform as feature extraction: Pattern Analysis & Applications

Biometric identification of humans has many compelling advantages, but some challenges must be overcome. Each biometric... more

Feature Evaluation & Selection (I.5.2...) | Feb 9 16

Fundamentals of data analytics in Python LiveLessons: InformIT

Python is a dynamically typed interpretive programming language created by Guido van Rossum in the late 1980s. It has been in extensive use for scientific computing, but is now gaining popularity among big data enthusiasts for its powerful... more

Python (D.3.2...) | Feb 8 16

A third-order multistep time discretization for a Chebyshev tau spectral method: Journal of Computational Physics

The authors, in a previous paper [1], noticed large errors in turbulence dissipation rate and enstrophy near the wall of a channel when solving... more

Chebyshev Approx. & Theory (G.1.2...) | Feb 4 16

A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks: ACM Computing Surveys

Social engineering attacks include a large variety of ways to manipulate and deceive users. A specific type is semantic attacks that deceive rather than... more

Security & Protection (D.4.6) | Feb 3 16

Health smart home services incorporating a MAR-based energy consumption awareness system: Journal of Intelligent and Robotic Systems

Along with the emergence of health smart home services for elderly people, it becomes crucial to study their energy... more

Medical Information Systems (J.3...) | Feb 3 16

Parameterized algorithms

The topic of parameterized algorithms is one of the main subjects in modern computer science. In this type of algorithm analysis, the running time is a function of the size of the input data and of a set of one or more parameters. The theory of parameterized... more
Nonnumerical Alg. & Prob. (F.2.2) | Feb 12 16

Control: digitality as cultural logic

The advent and growth of digital technology has radically changed our society, and the title of this volume leads the reader to anticipate a reasoned, documented account of this important cultural influence. Instead, the volume is a tract for Luddite Marxist ideology... more
Social Issues (K.4.2) | Feb 10 16

Java I/O, NIO and NIO.2

The knowledge needed to write modern input/output (I/O) in Java is contained in this book, which is addressed to advanced Java developers. The book has two parts: the I/O and the non-blocking... more
Java (D.3.2...) | Feb 10 16

Visual cryptography for image processing and security: theory, methods, and applications (2nd ed.)

In this slim but overly packed volume, visual cryptography is reviewed along with its fundamental concepts in theory and practice. The area is absolutely critical at this time for counter-terrorism... more
Data Encryption (E.3) | Feb 10 16

Machine learning models and algorithms for big data classification

Machine learning models have been around for a while. It is not surprising that machine learning has come to play an important role in data science. Machine learning contributes to algorithms that can learn from... more
Learning (I.2.6) | Feb 9 16

Biomedical engineering: frontier research and converging technologies

Biomedical engineering is a maturing field characterized by a new generation of researchers capable of readily spanning engineering, medicine, and biology. This edited collection of timely review... more
Biology & Genetics (J.3...) | Feb 5 16

Business process transformation: the Process Tangram framework

In this book, the phrase “business process transformation” is used to connote a collection of tools and techniques, unified by a methodology, for redesigning today’s business processes. One aspect that distinguishes today’s redesign of business... more
Organizational Impacts (K.4.3) | Feb 3 16

Discovering computer science

Havill’s book introduces computer science in a very unique and effective way. The book discusses fundamental computer science concepts such as abstraction, repetition, condition, and recursion through real-world problems such as personal finance, population growth... more
General (D.1.0) | Feb 3 16

Design science research methods and patterns: innovating information and communication technology (2nd ed.)

Research methods for design science are presented in this book. It has adapted techniques from traditional disciplines to design science. For instance, iterative prototyping is a method used in software... more
General (H.0) | Feb 3 16

Digital representations of the real world

Developing computer graphic models based on representations of reality can be challenging. For example, rendering a 3D scene containing an educational model of a human skeleton would need a high level of accuracy. Before starting the... more
3D Graphics & Realism (I.3.7) | Feb 2 16

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2016 ThinkLoud, Inc.
Terms of Use
| Privacy Policy