These reviews are the most popular with readers.
All Media Types
For the last:
Mathematical analysis and the mathematics of computation
Römisch W., Zeugmann T., Springer International Publishing, New York, NY, 2016. 703 pp. Type: Book (978-3-319427-53-9), Reviews: (1 of 2)
Even though there are many deep connections between mathematical analysis and the mathematics of computation, these two fields are usually taught completely separately from each other. This traditional approach has the disadvantage that the concep...
Music similarity and retrieval: an introduction to audio- and web-based strategies
Knees P., Schedl M., Springer International Publishing, New York, NY, 2016. 305 pp. Type: Book (978-3-662497-20-3)
Knees and Schedl’s book on
Music similarity and retrieval
differs from other books on the topic in that the authors have focused on music rather than acoustical signal processing, adding several cultural- and listener-centric aspects ...
Introduction to coding theory (2nd ed.)
Bierbrauer J., Chapman & Hall/CRC, Boca Raton, FL, 2016. 538 pp. Type: Book (978-1-482299-80-9)
For the digital age, data encoding and decoding represents a primary request, without which computer science and information systems would not exist. As a main part of discrete mathematics and computer algebra, the theory of error-correcting codes...
DevOps for digital leaders: reignite business with a modern DevOps-enabled software factory
Ravichandran A., Taylor K., Waterhouse P., Apress, New York, NY, 2016. 173 pp. Type: Book (978-1-484218-41-9)
This manager/practitioner-oriented book is a quick, concise introduction to DevOps and offers practical insights into real-world case studies of DevOps adoption. With software technology now fundamental to all parts of an organization, the seamles...
Predicting cyber attacks with Bayesian networks using unconventional signals
Okutan A., Yang S., McConky K. CISRC 2017 (Proceedings of the 12th Annual Cyber and Information Security Research Conference, Oak Ridge, TN, Apr 4-6, 2017) 1-4, 2017. Type: Proceedings
Bayesian networks can be used to predict all kinds of events. In this case, unconventional signals, that is, data from global events and social media, are used to predict whether cyber attacks will happen on companies. The outcome of this applicat...
Estimating the subsystem reliability of bubblesort networks
Kung T., Hung C. Theoretical Computer Science 67045-55, 2017. Type: Article
A bubblesort network consists of nodes labeled with permutations of characters, so that two nodes have a direct connection when their corresponding permutations differ by the interchange of two adjacent characters. A multiprocessor system might be...
Mathematics without apologies: portrait of a problematic vocation
Harris M., Princeton University Press, Princeton, NJ, 2015. 464 pp. Type: Book (978-0-691154-23-7)
A long time ago, a friend and fellow undergraduate math major said of a world-famous professor at our university, “He doesn’t teach you any math; he teaches you what it means to be a mathematician.” The enthralling book under rev...
Melia: a MapReduce framework on OpenCL-based FPGAs
Wang Z., Zhang S., He B., Zhang W. IEEE Transactions on Parallel and Distributed Systems 27(12): 3547-3560, 2016. Type: Article
Many web applications such as search engines and recommendation systems require operations on large datasets. The nature of computation in such applications is complex, which necessitates distributed operations on clusters of general-purpose proce...
Private data analytics on biomedical sensing data via distributed computation
Gong Y., Fang Y., Guo Y. IEEE/ACM Transactions on Computational Biology and Bioinformatics 13(3): 431-444, 2016. Type: Article
Predictive model training systems actually lack positive samples such as biomedical data from healthy people due to data privacy preservation issues that mHealth users face. This paper therefore presents a novel approach that preserves data privac...
A survey on ensemble learning for data stream classification
Gomes H., Barddal J., Enembreck F., Bifet A. ACM Computing Surveys 50(2): 1-36, 2017. Type: Article
The automation of several processes, such as business transactions, smartphones, and various types of sensors, has severely increased the number of data stream generators. In data stream classification, data items are represented by a vector of fe...
Reproduction in whole or in part without permission is prohibited. Copyright © 2000-2017 ThinkLoud, Inc.