Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help


A survey on mobile social signal processing : ACM Computing Surveys

If you want to learn about mobile social signal processing (SSP), a field with the aim of detecting social behavior automatically and in a nonintrusive manner by exploiting the data provided by the...
Sensor Networks (C.2.1...) | Jul 20 16

Music therapy on interactive surfaces to improve sensorimotor problems of children with autism : ACM SIGACCESS Accessibility and Computing

Children with autism have difficulties with eye-hand coordination (visual-motor coordination) and rhythmic coordination of perception and action...
Assistive Tech. for Disabilities (K.4.2...) | Jul 13 16

From repeatability to reproducibility and corroboration : ACM SIGOPS Operating Systems Review

The result of a single experiment is rarely believed. Mistakes might have been made when designing the experiment, conducting the experiment, or analyzing the data. A result becomes an accepted fact...
Performance (D.4.8) | Jul 8 16

Boosting the priority of garbage : ACM Trans. on Architecture and Code Optimization

This well-written paper presents a new algorithm for garbage collection of a Java program running across a heterogeneous set of cores (where some cores execute code significantly faster than others). While it...
Heterogeneous (Hybrid) Systems (C.1.3...) | Jul 12 16

Quadratic maps are hard to sample : ACM Transactions on Computation Theory

A quadratic map is a function of the form f (x) = ax2 + bx + c .... The only simpler polynomials are those of degree 1, omitting the terms aijxixj, and the constants f(x) = c...
Numerical Algorithms & Problems (F.2.1) | Jul 26 16

S-SMART: a unified Bayesian framework for simultaneous semantic mapping, activity recognition, and tracking : ACM Transactions on Intelligent Systems and Technology

Tracking activity via body-attached sensors is aimed at helping people who suffer from neurodegenerative diseases including Alzheimer’s disease and...
User/Machine Systems (H.1.2) | Jul 25 16

Algorithm 958: Lattice Builder: a general software tool for constructing rank-1 lattice rules : ACM Transactions on Mathematical Software

The problem of numerically integrating multidimensional functions arises from function approximation, optimization, and...
Mathematical Software (G.4) | Jul 22 16

Understanding JavaScript event-based interactions with Clematis : ACM Transactions on Software Engineering and Methodology

JavaScript development is not easy. Creating solid and reusable code is a very complex task, even for the skilled developer, due to the unique...
Testing & Debugging (D.2.5) | Jul 14 16

A trustworthy access control model for mobile cloud computing based on reputation and mechanism design : Ad Hoc Networks

The applicability of mobile cloud computing has revolutionized the way large amounts of data can be stored and accessed; however...
Cloud Computing (C.2.4...) | Jul 7 16

Towards a big data system disaster recovery in a private cloud : Ad Hoc Networks

Big data is having more and more of an impact on organizations and has business value so the data dare not be lost. This paper covers the role that disaster recovery (DR) needs to play...
Cloud Computing (C.2.4...) | Jul 11 16

A guide to graph colouring: algorithms and applications

Graph coloring is an active field of research that poses many theoretical challenges and has lots of applications in practice. Numerous problems in graph coloring are quite easy to state, but very...
Graph Algorithms (G.2.2...) | Jun 22 16

Algebraic coding theory: revised edition

Algebraic coding theory has its roots in mathematics and applications in computer science, and its origins in electrical engineering. I was unaware of the area back in 1993, when I joined the PhD program...
Coding & Information Theory (E.4) | Jun 22 16

Algorithms: design techniques and analysis

Techniques for the design and analysis of algorithms are at the heart of computer science. They are essential for solving complex problems, understanding those that are hard to solve, and creating applications that are efficient in their use of both space and time. Algorithms...
Algorithm Design & Analysis (G.4...) | Jul 21 16

Artificial intelligence applications in information and communication technologies

According to analysts, data volumes are expected to grow 44 fold in a decade (2011-2020). The variety of the data, along with the speed with which it is generated in an increasingly connected world...
Multiagent Systems (I.2.11...) | Jul 8 16

Biological signals classification and analysis

Biological signal classification and analysis by Kamran Kiasaleh involves discussion of signal processing approaches for biological signals such as the electrical signals from the brain (electroencephalogram, EEG), heart (electrocardiogram, ECG), and muscles...
Classifier Design & Evaluation (I.5.2...) | Jul 1 16

CSA guide to cloud computing: implementing cloud privacy and security

The Cloud Security Alliance (CSA) is the leading not-for-profit organization in cloud security, which is evident in the body of research they have produced over the years. This book, written by three...
Cloud Computing (C.2.4...) | Jun 20 16

Computational intelligence

This book is composed of selected papers that were submitted and presented at the Fifth International Joint Conference on Computational Intelligence (IJCCI), held in Portugal in 2013. The conference is divided into three categories: evolutionary computation theory...
Deduction & Theorem Proving (I.2.3) | Jul 26 16

Computational music analysis

Understanding the science of music and then exploring the musical meaningfulness of such a scientific study is precisely what excites every scientific music researcher. This book, edited by David...
Sound & Music Computing (H.5.5) | Jun 28 16

Crowdsourced health: how what you do on the Internet will improve medicine

This is an excellent book by a reputed scientist who has worked for several years in the area of analyzing data gathered from people’s web searches of medical questions. Additional material in the form of notes is found...
Health (J.3...) | Jul 20 16

Cultural code

Rarely does a book come along that is truly multidisciplinary, well written, and thoughtful. It is even rarer when it combines discussions of cultural values, technology, role playing, history, politics, and even current affairs. If you are a reader with a wide range of...
Games (K.8.0...) | Jul 13 16

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2016 ThinkLoud, Inc.
Terms of Use
| Privacy Policy