Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Best of 2015 Recommended by Editor Recommended by Reviewer Recommended by Reader
Reviewers have found these items notable and have self-selected them for review.
  1-10 of 6642 results Date Reviewed  
  Centralized allocation of human resources: an application to public schools
López-Torres L., Prior D.  Computers and Operations Research 73(C): 104-114, 2016. Type: Article

Workforce planning--the allocation of human resources to available projects/task units--is a problem that has a direct impact on the financial bottom line of an organization. Whether the organization is a small services company with doze...

Mar 23 2017  
  The European Union as guardian of Internet privacy: the story of Art 16 TFEU
Hijmans H.,  Springer International Publishing, New York, NY, 2016. 604 pp. Type: Book (978-3-319340-89-0)

The European Union (EU) treats data protection and personal privacy as fundamental rights, unlike the US. Any business operating in Europe must understand a number of privacy-related treaties and directives, including Article 16. Article 16(1) rea...

Mar 23 2017  
  Fundamentals of computer graphics (4th ed.)
Marschner S., Shirley P.,  A. K. Peters, Ltd., Natick, MA, 2016. 748 pp. Type: Book (978-1-482229-39-4)

Computer graphics describes any use of computers to create images from 3D to 2D and manipulate them. This book (26 chapters) explains the fundamental concepts, mathematics, and theory of computer graphics....

Mar 23 2017  
  Efficient kd-tree construction for ray tracing using ray distribution sampling
Liang X., Yang H., Zhang Y., Yin J., Cao Y.  Multimedia Tools and Applications 75(23): 15881-15899, 2016. Type: Article

Raytracing is one of the main rendering methods used to generate 2D images from 3D scenes. When used with other techniques, like texture mapping and photon mapping, it can produce photorealistic images. While raytracing is relatively easy to imple...

Mar 23 2017  
  Algebra for cryptologists
Meijer A.,  Springer International Publishing, New York, NY, 2016. 301 pp. Type: Book (978-3-319303-95-6)

Cryptography is technically synonymous with information security. Providing security features for data and information is the most important concern in a business requirement. Most undergraduate students of electrical engineering and computer scie...

Mar 20 2017  
  Fuzzy logic in its 50th year: new developments, directions and challenges
Kahraman C., Kaymak U., Yazici A.,  Springer International Publishing, New York, NY, 2016. 404 pp. Type: Book (978-3-319310-91-6)

Lotfi Zadeh published his initial work on fuzzy set theory in 1965. This volume celebrates a half century of progress in the research and applications of fuzzy set theory and fuzzy logic. The 16 contributions in this volume are divided into four p...

Mar 17 2017  
  A new look at the semantic web
Bernstein A., Hendler J., Noy N.  Communications of the ACM 59(9): 35-37, 2016. Type: Article

The numerous demands for prevalent web advertisements and documents call for new smart information dissemination systems. Emerging and future intelligent web systems ought to reflect the current, new, and evolving products at competing websites. B...

Mar 16 2017  
  Fraud analytics using descriptive, predictive, and social network techniques: a guide to data science for fraud detection
Baesens B., Van Vlasselaer V., Verbeke W.,  Wiley Publishing, Hoboken, NJ, 2015. 400 pp. Type: Book (978-1-119133-12-4)

The general scope of fraud analytics comprises a set of both conceptual approaches and appropriate tools for detecting certain anomalies in processes that can be associated with fraud. Fraud can occur in several business domains, spanning from ban...

Mar 15 2017  
  Issues in the use of neural networks in information retrieval
Iatan I.,  Springer International Publishing, New York, NY, 2016. 199 pp. Type: Book (978-3-319438-70-2)

At the beginning of a calendar year that has been declared as the year of artificial intelligence (AI), with the revivals of bad and good experiences as well as fiercely debated topics in the traditional field of AI (which goes back to the Turing ...

Mar 15 2017  
  Discovering different kinds of smartphone users through their application usage behaviors
Zhao S., Ramos J., Tao J., Jiang Z., Li S., Wu Z., Pan G., Dey A.  UbiComp 2016 (Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, Heidelberg, Germany,  Sep 12-16, 2016) 498-509, 2016. Type: Proceedings

With the accelerating adoption of smartphones in the last decade, mobile applications have become increasingly popular as well, with app stores recording billions of downloads. It is of immense interest to phone manufacturers, carriers, and applic...

Mar 15 2017  
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy