Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
Misc

View:



Toward engineering a secure Android ecosystem: a survey of existing techniques : ACM Computing Surveys

Android has clearly surpassed every other mobile operating system in terms of popularity, adoption rates, and alternative uses (Internet of Things, IoT)...
Security & Protection (D.4.6) | Mar 9 17

Structural analysis of user choices for mobile app recommendation : ACM Transactions on Knowledge Discovery from Data

Mobile apps are rapidly evolving due to ongoing improvements in smartphone technology. However, the use of mobile devices introduces...
Data Mining (H.2.8...) | Mar 14 17

Generalized deep transfer networks for knowledge propagation in heterogeneous domains : ACM Transactions on Multimedia Computing, Communications, and Applications

This paper is about the transfer of learning knowledge from one domain to another domain. Specifically, the paper considers knowledge transfer from textual...
Learning (I.2.6) | Mar 7 17

Aspect extraction in sentiment analysis: comparative analysis and survey : Artificial Intelligence Review

This paper covers a considerable volume of research work in the area of sentiment analysis. The authors define sentiment analysis as the...
Text Analysis (I.2.7...) | Mar 23 17

Evolution of swarming behavior is shaped by how predators attack : Artificial Life

The authors investigate the evolution of individual behavior in dynamic distributed systems populated by two sorts of individuals, P and Q, linked by read-only (that is, as opposed to...
Distributed Artificial Intelligence (I.2.11) | Mar 2 17

WebAL comes of age: a review of the first 21 years of artificial life on the web : Artificial Life

Soon after computers became available to researchers, they were used to explore concepts like cellular automata or self-replicating machines and organisms, the most...
Artificial Intelligence (I.2) | Mar 21 17

A new look at the semantic web : CACM

The numerous demands for prevalent web advertisements and documents call for new smart information dissemination systems. Emerging and future intelligent web systems ought to reflect the...
Semantic Web (H.3.4...) | Mar 16 17

Modeling and understanding human routine behavior : CHI 16

The study of human routines is expanding the scope of behavioral sciences in light of actions performed by humans. Such studies help in improving...
Miscellaneous (H.5.m) | Feb 23 17

Centralized allocation of human resources: an application to public schools : Computers and Operations Research

Workforce planning--the allocation of human resources to available projects/task units--is a problem that has a direct impact on the financial bottom line...
Project & People Mgmt. (K.6.1) | Mar 23 17

Antecedents and consequences of game addiction : Computers in Human Behavior

The authors provide a detailed study of 11 statistical hypotheses that are related to antecedents and consequences of game addiction. These hypotheses are: (H1) Higher...
Social Issues (K.4.2) | Mar 1 17



Actual causality

There are two types of causality according to Halpern: type causality (“Smoking causes cancer”) and actual causality (“Were the faulty brakes responsible for the accident?”). According to the author, “Type causality...
Deduction & Theorem Proving (I.2.3) | Feb 28 17

Algebra for cryptologists

Cryptography is technically synonymous with information security. Providing security features for data and information is the most important concern in a business requirement. Most undergraduate...
Data Encryption (E.3) | Mar 20 17

Android Studio game development: concepts and design

Total application revenue from the Google Play Store was $3.3B in Q4 2016, an 82 percent increase with respect to 2015 [1]. Moreover, 90 percent of that revenue is from game applications [2]. Thus...
General (D.1.0) | Mar 1 17

Behavioural models: from modelling finite automata to analysing business processes

Like a typical industrial automation system, modern business systems are (near) real time, concurrent, and distributed. However, before established techniques of automation such as finite automata...
Model Development (I.6.5) | Feb 28 17

Bitcoin and cryptocurrency technologies: a comprehensive introduction

Bitcoin is a distributed, consensus-based cryptocurrency. Most currencies are backed by nation states (or, as the Euro, groups of nation states), but other kinds of currencies exist: gold, silver, and diamonds...
Data Encryption (E.3) | Mar 7 17

Cloud computing

Cloud computing is no longer cutting edge, but has moved into the mainstream and become just one more option available for the delivery of information technology (IT) services. Once service providers...
Cloud Computing (C.2.4...) | Mar 1 17

Computational personality analysis: introduction, practical applications and novel directions

Reading this book reminded me of an old joke. A man goes to see a fortuneteller on his 30th birthday to learn about his fate and future. After some analysis and contemplation, she says, “You...
Natural Language Processing (I.2.7) | Mar 9 17

Data mining for social robotics: toward autonomously social robots

This comprehensive work focuses on human-robot interaction (HRI) using data mining and time series analysis. There are two major objects in this vast field: autonomy and sociality. The author provides...
Data Mining (H.2.8...) | Mar 24 17

Designing software architectures: a practical approach

It is often forgotten that common sense is the least common of the senses. Sensible design advice, guidelines, and heuristics are often no more than just that: plain old common sense. However, rational...
Software Architectures (D.2.11) | Mar 15 17

Elements of mathematics: from Euclid to Gödel

Stillwell, the author of this exceptional work, states: “This book grew from an article I wrote in 2008 for the centenary of Felix Klein’s Elementary mathematics from an advanced standpoint” [1], and that “what...
Mathematics & Statistics (J.2...) | Feb 28 17


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy