Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Best of 2016 Recommended by Editor Recommended by Reviewer Recommended by Reader
Search
Reviewers have found these items notable and have self-selected them for review.
 
Options:
 
  1-10 of 7231 results Date Reviewed  
  Fault-tolerant network-on-chip design with flexible spare core placement
Bhanu P., Kulkarni P., J S.  ACM Journal on Emerging Technologies in Computing Systems 15(1): 1-23, 2019. Type: Article

Swapping a defective core on a reliable network-on-chip (NoC) system requires swift access to an extra core. But how should an efficient fault-tolerant NoC algorithm for flexibly placing a spare core in a mesh network be designed? Bhanu et al. pre...

Aug 22 2019  
  Goal-directed decision making: computations and neural circuits
Morris R., Bornstein A., Shenhav A.,  Academic Press, Inc., San Diego, CA, 2018. 484 pp. Type: Book (978-0-128120-98-9)

In the past few years, many disciplines have merged together for an improved understanding of goal-directed decisions. Such disciplines include neuroscience, psychology, cognitive science, and computer science (CS). This edited book on goal-direct...

Aug 21 2019  
   Research for practice: troubling trends in machine-learning scholarship
Lipton Z., Steinhardt J.  Communications of the ACM 62(6): 45-53, 2019. Type: Article

The article reviews the attention paid to an important issue in machine learning research, but the problem raised can be generalized to other fields within computer science and informatics....

Aug 20 2019  
  Sentiment analysis for software engineering: How far can we go?
Lin B., Zampetti F., Bavota G., Di Penta M., Lanza M., Oliveto R.  ICSE 2018 (Proceedings of the 40th International Conference on Software Engineering, Gothenburg, Sweden,  May 27-Jun 3, 2018) 94-104, 2018. Type: Proceedings

Sentiment analysis continues to be successfully applied to consumer reviews. In other areas, the challenges involved can prove insurmountable. A failed attempt to successfully apply sentiment analysis is reported in this negative results paper.
Aug 15 2019  
  Long short-term memory fuzzy finite state machine for human activity modelling
Mohmed G., Lotfi A., Pourabdollah A.  PETRA 2019 (Proceedings of the 12th ACM International Conference on PErvasive Technologies Related to Assistive Environments, Rhodes, Greece,  Jun 5-7, 2019) 561-567, 2019. Type: Proceedings

As sensors become more ubiquitous in smart homes and work environments, the data they provide can offer information about the locations and actions of any occupants. The authors propose using a combination of deep learning and finite state machine...

Aug 14 2019  
  Algorithm 993: efficient computation with Kronecker products
Fackler P.  ACM Transactions on Mathematical Software 45(2): 1-9, 2019. Type: Article

The Kronecker product of two matrices replaces each element of the first matrix with a multiple of a copy of the second matrix. The history, applications, and properties of the Kronecker and the symmetric products are well known [1,2]. For example...

Aug 14 2019  
  Orthogonal waveforms and filter banks for future communication systems
Renfors M., Mestre X., Kofidis E., Bader F.,  ACADEMIC PRESS, San Diego, CA, 2017. 590 pp. Type: Book (978-0-128103-84-5)

Filter bank multicarrier (FBMC) signaling policy is the subject of this book. To explain its different features and functionalities in different communication interaction scenarios, the authors present a comprehensive discussion on the fundamental...

Aug 12 2019  
  The challenge of crafting intelligible intelligence
Weld D., Bansal G.  Communications of the ACM 62(6): 70-79, 2019. Type: Article, Reviews: (2 of 2)

In the past decade, many algorithms and techniques have been classified as computational intelligence, machine learning, cognitive informatics, or data science, so much so that those approaches now fall under the notion of artificial intelligence ...

Aug 9 2019  
  You’ll see this message when it is too late: the legal and economic aftermath of cybersecurity breaches
Wolff J.,  The MIT Press, Cambridge, MA, 2018. 336 pp. Type: Book (978-0-262038-85-0)

It seems not a day goes by without a media headline of some cybersecurity breach somewhere. Whether espionage, financial attack, or theft of personal data, we see a brief burst of hysteria followed by assurances that the problem is fixed, and then...

Aug 7 2019  
  An architecture for translating sequential code to parallel
Alsubhi K., Alsolami F., Algarni A., Jambi K., Eassa F., Khemakhem M.  ICISDM 2018 (Proceedings of the 2nd International Conference on Information System and Data Mining, Lakeland, FL,  Apr 9-11, 2018) 88-92, 2018. Type: Proceedings

Processor architectures have grown in leaps and bounds over the last couple of decades, but the software systems used for computational purposes have not kept up with these changes. This paper proposes a new approach to modify legacy source code s...

Aug 6 2019  
 
 
 
Display per page
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy