Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
August 24, 2019
Search
Highlight

Computational texture and patterns: from textons to deep learning
This slim volume considers the question of representing and matching textures and similar patterns. This question is closely related to recognition--for example, recognizing that something is a picture of a leafless tree--and segmentation, that is, picking out the distinct (leaved) trees in a... more
Quote
When I was asked to make this address I wondered what I had to say to you boys who are graduating. And I think I... more
- John Jay Chapman (1900)
Articles
Fault-tolerant network-on-chip design with flexible spare core placement: ACM Journal on Emerging Technologies in Computing Systems

Swapping a defective core on a reliable network-on-chip (NoC) system requires swift access to an extra core. But how should an efficient fault-tolerant NoC... more

Fault Tolerance (C.4...) | Aug 22 19

In search of a scalable Raft-based replication architecture: PaPoC 19

Since parallel and distributed processing have become key issues of high throughput computer processing, there have been many efforts to find solutions (for example, architectures, communication systems, technologies... more

General (C.0) | Aug 21 19

Rumor blocking through online link deletion on social networks: ACM Trans. on Knowledge Discovery from Data

Today, people often depend on social networking services to get information. It is often observed that rumors spread quickly over social networks, owing to personal relationships. Social networking... more

Network Architecture & Design (C.2.1) | Aug 21 19

Research for practice: troubling trends in machine-learning scholarship: Communications of the ACM

The article reviews the attention paid to an important issue in machine learning research, but the problem raised can be generalized to other fields within computer science and informatics. Machine learning and... more

Learning (I.2.6) | Aug 20 19

Take it or leave it: a survey study on operating system upgrade practices: ACSAC 18

Periodic software updates are a necessary evil to keep computers and other digital devices protected from viruses and other malicious forms of exploitation; still, many users resent reminders from vendors... more

Testing & Debugging (D.2.5) | Aug 19 19

Orchestrating complex application architectures in heterogeneous clouds: Journal of Grid Computing

The authors present INDIGO-DataCloud for deploying cloud applications across multiple cloud management platforms (CMPs) that require complex topologies and operational... more

General (C.2.0) | Aug 19 19

Reliable industrial IoT-based distributed automation: IoTDI 19

This paper shows improved reliability in Industrial Internet of Things (IIoT) distributed automation systems by following along at runtime against expected real-world fault models. This novel idea represents... more

General (C.2.0) | Aug 16 19

Smart city system design: ACM Computing Surveys

As the authors state, “smart city applications in healthcare, transportation, utility, safety, and environmental health” are likely to benefit from machine intelligence and Internet of Things (IoT) technology. In this survey article on smart city system design... more

Security & Protection (C.2.0...) | Aug 16 19

Sentiment analysis for software engineering: ICSE 18

Sentiment analysis continues to be successfully applied to consumer reviews. In other areas, the challenges involved can prove insurmountable. A failed attempt to successfully apply sentiment analysis is reported... more

General (D.2.0) | Aug 15 19

Back to the future: Communications of the ACM

The name of this short article comes from the fact that the dawn of the Internet with the Advanced Research Projects Agency Network (ARPANET) reintroduced the store-and-forward method used for telegraphs, but instead of... more

Public Networks (C.2.3...) | Aug 15 19

Books
Frequency domain techniques for H control of distributed parameter systems

In traditional control theory, the object to be controlled (called a plant) is described by a differential equation (or by a system of such equations) in which the rate of change of the plant’s state depends on the current control value... more
Control Theory (I.2.8...) | Aug 23 19

Edge computing: from hype to reality

Edge computing is a hot topic that deserves a lot of attention, especially in the context of the Internet of Things (IoT) and mobile and autonomous computing. Moreover, the connection between edge computing and cloud computing can lead to interesting... more
Edge & Feature Detection (I.4.6...) | Aug 23 19

World Internet development report 2017: translated by Peng Ping

That the Internet has caused the third biggest revolution in recent civilization is not unknown. However, what’s of importance is the fact that different nations of the world have progressed differently and that many are... more
Internet (C.2.1...) | Aug 22 19

Goal-directed decision making: computations and neural circuits

In the past few years, many disciplines have merged together for an improved understanding of goal-directed decisions. Such disciplines include neuroscience, psychology, cognitive science, and computer... more
Cognitive Simulation (I.2.0...) | Aug 21 19

Randomized algorithms in automatic control and data mining

The book is a good resource for scientists, researchers, and practitioners who have a basic understanding of algorithms, control, and data mining in intelligent systems. It requires some background in these areas in order to grasp the material. Each chapter... more
Process Control Systems (C.3...) | Aug 21 19

Natural language processing for social media (2nd ed.)

As social networks gain widespread popularity, they dominate all other forms of communication, particularly among youth (but of course not only). Perhaps this is because of real-time information and opinion... more
Natural Language Processing (I.2.7) | Aug 19 19

Computational texture and patterns

This slim volume considers the question of representing and matching textures and similar patterns. This question is closely related to recognition--for example, recognizing that something is a picture of a leafless tree--and segmentation, that is, picking out the... more
Vision & Scene Understanding (I.2.10) | Aug 16 19

Location-based gaming

Location-based games, an offshoot of more traditional video games, provide unique opportunities for interaction in shared public spaces, experiments in social dynamics, artistic exploration, and of course fun. In order to more fully understand the uniqueness of location... more
Games (K.8.0...) | Aug 15 19

Contactless 3D fingerprint identification

I am interested in machine learning (ML)-based image classification. Thus, I thought this book may be an interesting read about how ML techniques are applied to fingerprinting. As it turns out, the book is not about ML, but just plain mathematics and algorithms... more
Computer Vision (I.5.4...) | Aug 13 19

Orthogonal waveforms and filter banks for future communication systems

Filter bank multicarrier (FBMC) signaling policy is the subject of this book. To explain its different features and functionalities in different communication interaction scenarios, the authors present a comprehensive... more
Signal Processing Systems (C.3...) | Aug 12 19


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy