Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
Misc

View:



On effectiveness of mesh-based protocols for smart grid communication networks : ACM SIGAPP Applied Computing Review

The smart grid relies on communication networks among millions of measuring devices, including remote terminal units (RTUs) and phasor measurement...
Protocol Verification (C.2.2...) | May 13 15

Outage-capacity tradeoff for smart grid with renewables : ACM SIGMETRICS Performance Evaluation Review

As the role of renewable energy sources such as photovoltaic systems and wind turbines increases in smart grids, it is essential to...
Performance of Systems (C.4) | Apr 30 15

Selecting the right correlation measure for binary data : ACM Trans. on Knowledge Discovery from Data

Intelligent data mining algorithms call for reliable indicators of relationships in massive datasets. How should correlations be selected...
Data Mining (H.2.8...) | May 1 15

Strategic information disclosure to people with multiple alternatives : ACM Transactions on Intelligent Systems and Technology

The issue of persuasion games, where one player, the agent, tries to influence the behavior of the other, the user, is considered in this paper...
Computing Methodologies (I) | Apr 29 15

How much do you read?: Counting the number of words a user reads using electrooculography : AH 15

Reading improves the reader’s vocabulary usage and understanding of the subject, which further enhances thinking power. The reading proficiency of...
Signal Processing (I.5.4...) | May 26 15

Monotonic qualitative logic programs: computation and applications : AI Communications

If we are reasoning with rules that are guidelines rather than absolute statements of truth, we need a mechanism for selecting the most plausible conclusion. There may be a choice of rules that can...
Uncertainty/Fuzzy/Prob. Reas. (I.2.3...) | May 5 15

SVD-based feature extraction from time-series motion data and its application to gesture recognition : BICT 14

Hayashi et al. describe an innovative use of singular value decomposition (SVD) techniques to explore feature extraction and gesture recognition...
Feature Evaluation & Selection (I.5.2...) | May 26 15

SVD-based feature extraction from time-series motion data and its application to gesture recognition : BICT 14

Linear algebra holds immense promise of throwing up new surprises in recognizing patterns. The emergence of principal component analysis, which relies heavily on singular value decomposition (SVD)...
Feature Evaluation & Selection (I.5.2...) | May 5 15

Towards big data Bayesian network learning -- an ensemble learning based approach : BigData Congress

A Bayesian network (BN) is a directed probabilistic graph model that is used to model variable dependency relationships. Over 50 learning algorithms...
Know. Rep. Formalisms & Meth. (I.2.4) | May 6 15

Competing in emerging markets : CACM

Emerging markets are important because their economic growth will be faster than developed economies; the cost to do business is lower and local...
Organizational Impacts (K.4.3) | May 19 15



12 more essential skills for software architects

The “more” in the title is a sure sign that this book by Dave Hendricksen is a sequel. And indeed this book builds on his previous work [1]. The goal of this sequel is the same as its predecessor: to enable excellence in software architecture through...
Software Architectures (D.2.11) | May 6 15

15 fundamentals for higher performance in software development: includes discussions on CMMI, lean Six Sigma, agile and SEMAT’s essence framework

Readers will find a good bridge between real-world practice and theoretical guidelines and measures for software process improvements for practicing professionals in this book. It begins by...
Software Management (K.6.3) | May 8 15

Advanced Excel essentials

Spreadsheets have been the workhorse of computational engines for over 30 years. They allow users to perform demanding calculations without requiring learning or using a higher-order programming language like C++ or Fortran. Excel is found...
Excel (H.4.1...) | Apr 28 15

Advances in knowledge discovery in databases

Several advances in techniques for obtaining nonexplicit information that is present in database systems are described in this book. It discusses a good number of problems and techniques from the point...
Knowledge Acquisition (I.2.6...) | May 27 15

Apache Hadoop YARN

MapReduce from Apache Hadoop 1 (MapReduce MRv1) has in the next-generation MapReduce (MRv2, or YARN) been divided into two components, where the cluster resource management capabilities have become YARN (Yet Another Resource Negotiator)...
Distributed Systems (C.2.4) | May 15 15

Big data: related technologies, challenges and future prospects

In recent years, big data has been a very active research field and its related technologies have been in practical use. In particular, scientists have adopted relevant technologies to conduct advanced...
Database Applications (H.2.8) | Jun 1 15

Brain-computer-interfaces in their ethical, social and cultural contexts

Given recent advances in neuroimaging, there is a groundswell of interest in how emerging systems can be used to interface with computers. The field is admittedly still nascent, yet the markers of...
General (H.5.0) | May 8 15

C# deconstructed: discover how C# works on the .NET framework

Rather than being an introduction to C# as a programming language text, this book is a very brief and concise text, to be used as a supplemental resource for a lower-level undergraduate class on compiler design. Specifically, it summarizes how C#...
Object-Oriented Programming (D.1.5) | May 13 15

Citation-based plagiarism detection: detecting disguised and cross-language plagiarism using citation pattern analysis

Gipp has published his doctoral dissertation in book form with a change in the original subtitle, “Citation-based Plagiarism Detection [CbPD]: Applying Citation Pattern Analysis to Identify Currently...
Pattern Analysis (I.5.2...) | Apr 29 15

Cloud computing for logistics

Cloud computing is the latest computer industry buzzword that has spread into nearly every facet of life. In a nutshell, cloud computing borrows from the power industry or water utilities the concept that computing power can be supplied just as...
Logistics (H.4.2...) | May 26 15


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2015 ThinkLoud, Inc.
Terms of Use
| Privacy Policy