Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help


A survey on thread-level speculation techniques : ACM Computing Surveys

The technique called thread-level speculation (TLS) seeks to allow sequential code to be executed in parallel without prior analysis of compile-time dependence. This noteworthy survey paper includes...
Modes of Computation (F.1.2) | Sep 2 16

Computational health informatics in the big data age: a survey : ACM Computing Surveys

Global information and communications technology (ICT) resources have been changing lives; fast networks and mobile devices offer “always-on” services, extending the possibilities of personal...
Data Mining (H.2.8...) | Sep 21 16

Workload characterization: a survey revisited : ACM Computing Surveys

This paper considers the process of characterizing workloads in different kinds of computing services. It starts with a brief discussion of what a workload is and how characterizing workloads leads to better...
Performance of Systems (C.4) | Sep 20 16

Exploiting hierarchical locality in deep parallel architectures : ACM Transactions on Architecture and Code Optimization

Locality awareness in programs can be used to improve their execution performance on parallel computers. Modern parallel computers have many levels of parallelism; many cores on a chip and many...
Processors (D.3.4) | Aug 26 16

Coupling interactions and performance: predicting team performance from thin slices of conflict : ACM Transactions on Computer-Human Interaction

The basic question is whether the performance of a team can be predicted from a 15-minute observation, a “thin slice” of the...
User/Machine Systems (H.1.2) | Sep 21 16

B-trees and cache-oblivious B-trees with different-sized atomic keys : ACM Transactions on Database Systems

The problem of creating B-tree-like dictionaries with small atomic keys from a system containing large, variable-size records is the subject of this paper. These kinds of dictionaries provide guaranteed...
Sorting & Searching (F.2.2...) | Sep 13 16

Diversifying query auto-completion : ACM Transactions on Information Systems

In an era when many aspects of artificial intelligence (AI) and machine learning (ML) are increasing in popularity because of the proliferation of technology via a range of representational state transfer...
Information Storage & Retrieval (H.3) | Sep 14 16

Multiagent resource allocation for dynamic task arrivals with preemption : ACM Transactions on Intelligent Systems and Technology

The authors describe a new approach to multiagent resource allocation problems. A typical problem would be the allocation of resources...
Multiagent Systems (I.2.11...) | Sep 15 16

Prediction of who will be the next speaker and when using gaze behavior in multiparty meetings : ACM Transactions on Interactive Intelligent Systems

The authors study an issue that, as far as I know, has not been studied in the past: predicting the next speaker and the timing of the start of his or her...
User/Machine Systems (H.1.2) | Sep 21 16

Kernelized information-theoretic metric learning for cancer diagnosis using high-dimensional molecular profiling data : ACM Transactions on Knowledge Discovery from Data

The molecular gene expressions of tumor and blood samples are useful for detecting cancers. But the design of algorithms for diagnosing cancer using...
Learning (I.2.6) | Sep 9 16

Agent-based modelling in economics

The social sciences have long been plagued by physics envy. The seductive simplicity of closed-form equations with strong predictive power in dealing with billiard balls, planets, and electrons suggests that we ought to be able to analyze the behavior of people with...
Multiagent Systems (I.2.11...) | Aug 25 16

Application of big data for national security: a practitioner’s guide to emerging technologies

It is a pleasure to review a compilation of current works that address diverse perspectives of the timely topic of big data analytics for national security. The work consists of 18 chapters organized...
Security (K.6.m...) | Sep 8 16

Autonomous driving

One glance at the table of contents of this book and the reader can be assured that autonomous driving (automatic pilot for automobiles, or maybe better, R2D2 is your personal chauffer) is not a “what-if” possibility, but a “when” situation. Virtually every...
Autonomous Vehicles (I.2.9...) | Aug 31 16

Beginning JSON

JSON stands for JavaScript object notation. It is a data-interchange format that has become very popular with web applications. Although important by itself, a data format is better understood inside a context or ecosystem. This is why, before explaining JSON...
JavaScript (D.3.2...) | Aug 26 16

Big data science & analytics

Devoted to the problem of “big data,” which has become an important business in many areas of modern life, this book addresses the state of affairs that is termed the “Fourth Industrial Revolution.” In a simplified way, the big data situation is described as dealing with...
Content Analysis & Indexing (H.3.1) | Sep 12 16

Cognitive infocommunications (CogInfoCom)

There is general agreement that devices (including computers, robots, and other gadgets) and their interconnection will be increasingly more adaptive and--despite the overuse of the term--“intelligent.” Cognitive infocommunications looks at this...
Cognitive Simulation (I.2.0...) | Sep 15 16

Cybersecurity investments: decision support under economic aspects

After the introduction to the book in chapter 1 (five pages), chapter 2 (28 pages) looks at the foundations of cybersecurity in a broad but shallow way. Almost inevitably, this approach leads to imprecise statements, like mixing authorization and access control...
Security & Protection (K.6.5) | Sep 12 16

Data wrangling with Python

“Wrangle” is a new version of an old word that has evolved in some interesting and revealing ways. Originally, wrangle meant to argue or dispute. For example, you might wrangle with your neighbor over a property line. The meaning drifted over time so...
Python (D.3.2...) | Sep 22 16

Databases for small business

Startups can rely on venture capital to become big and bright fast, and above all to have access to all the expertise needed to turn their fancy ideas into revenues. On the contrary, small businesses can rely only on themselves to grow at a more sedate pace, but...
Database Applications (H.2.8) | Aug 19 16

Discrete fourier and wavelet transforms

Fourier and wavelet transforms have proven to be indispensable tools in signal processing. They are taught in many courses, both at the graduate and undergraduate levels. When deciding how to teach these topics, the lecturer can choose from a number of...
Fast Fourier Transforms (FFT) (G.1.2...) | Aug 29 16

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2016 ThinkLoud, Inc.
Terms of Use
| Privacy Policy