Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
Misc

View:



Computer vision & natural language processing: recent approaches in multimedia & robotics : ACM Computing Surveys

Robot learning operates at the crossroads of disciplines such as machine learning, robotics engineering, and developmental robotics for...
General (I.2.0) | Apr 21 17

Toward engineering a secure Android ecosystem: a survey of existing techniques : ACM Computing Surveys

Android has clearly surpassed every other mobile operating system in terms of popularity, adoption rates, and alternative uses (Internet of Things, IoT)...
Security & Protection (D.4.6) | Mar 9 17

Internet of Things (IoT): smart and secure service delivery : ACM Transactions on Internet Technology

The coverage of the Internet of Things (IoT), especially on security, is critical. As the paper and other sources on the Internet say, there are...
Network Protocols (C.2.2) | Mar 31 17

Structural analysis of user choices for mobile app recommendation : ACM Transactions on Knowledge Discovery from Data

Mobile apps are rapidly evolving due to ongoing improvements in smartphone technology. However, the use of mobile devices introduces...
Data Mining (H.2.8...) | Mar 14 17

Usage, costs, and benefits of continuous integration in open-source projects : ASE 16

A profound revolution has been taking place throughout software engineering, led again by the software industry. Continuous integration (CI) was first discussed in 1991, but until recently only a handful...
General (D.2.0) | Apr 12 17

Computational hardness of IFP and ECDLP : Applicable Algebra in Engineering, Communication and Computing

It is generally recognized that elliptic curve cryptography (ECC) can attain the same level of security as RSA with a shorter key length. This paper offers practical evidence of this claim. For both...
Public Key Cryptosystems (E.3...) | Apr 6 17

Aspect extraction in sentiment analysis: comparative analysis and survey : Artificial Intelligence Review

This paper covers a considerable volume of research work in the area of sentiment analysis. The authors define sentiment analysis as the...
Text Analysis (I.2.7...) | Mar 23 17

Brain storm optimization algorithm: a review : Artificial Intelligence Review

This paper is a review of research in the area of brain storm optimization (BSO) algorithms that examines the “more effective algorithms and search strategies.” This type of technique...
Artificial Intelligence (I.2) | Apr 6 17

Open-ended evolution: perspectives from the OEE workshop in York : Artificial Life

An open-ended evolutionary (OEE) system, conceived to be part of artificially intelligent systems (biological or otherwise), has been vaguely defined as one capable of producing a continual...
Artificial Intelligence (I.2) | Apr 11 17

WebAL comes of age: a review of the first 21 years of artificial life on the web : Artificial Life

Soon after computers became available to researchers, they were used to explore concepts like cellular automata or self-replicating machines and organisms, the most...
Artificial Intelligence (I.2) | Mar 21 17



A course in mathematical statistics and large sample theory

Researchers, mathematicians, and statisticians at the University of Arizona, the University of Notre Dame, and Florida State University are the authors of this book. It is clearly the result of the long-term collection of rich educational material containing both...
Probability & Statistics (G.3) | Mar 28 17

Algebra for cryptologists

Cryptography is technically synonymous with information security. Providing security features for data and information is the most important concern in a business requirement. Most undergraduate...
Data Encryption (E.3) | Mar 20 17

Algorithms (4th ed.)

Sedgewick and Wayne’s Algorithms for many years has been the first book of an undergraduate course in programming, yet each of the editions seems to be written as a fresh book. The novelty of this edition is especially noticeable while looking...
Nonnumerical Alg. & Prob. (F.2.2) | Mar 29 17

Android how to program (3rd ed.)

There are many “learn Android” books on the market. What distinguishes this book from the rest is how it guides readers in creating complete apps that can be run on phones and tablets. The sample apps include a...
General (D.0) | Apr 11 17

Anthropology-based computing: putting the human in human-computer interaction

Human-computer interaction is perhaps built on basic tenets of software engineering principles in which the user is the central character. Various models have evolved and in every endeavor there...
User Interfaces (H.5.2) | Apr 10 17

Anti-fragile ICT systems

Large, complex information and communications technology (ICT) systems need to have been designed so that unexpected stressors and events do not cause the systems to fail. This is particularly...
Reliability, Availability & Serv. (C.4...) | Mar 31 17

Artificial neural networks: a practical course

The topic of artificial neural networks is one of the areas within the computing discipline of soft computing. Their architecture and use are based on the operation of a biological neural system. As such, there is an...
Self-Modifying Machines (F.1.1...) | Apr 13 17

Atari to Zelda: Japan’s videogames in global contexts

It is becoming increasingly important for researchers to critically engage with video games since they are widely believed to be the fastest-growing form of media over the coming years. One facet of this engagement...
Games (K.8.0...) | Apr 13 17

Bayesian methods in the search for MH370

One can seldom consider mathematics-heavy books as exciting page-turners. Yet, Bayesian methods in the search for MH370 is so far the best one I have encountered that could stand up to such...
Prob. Algorithms (Inc. Monte Carlo) (G.3...) | Apr 21 17

Becoming a global chief security executive officer: a how to guide for next generation security leaders

For many years, a recurring topic in security conference talks and articles has been how to sell security to businesses. There are parallels with the earlier business-IT alignment...
Security & Protection (K.6.5) | Apr 25 17


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy