Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help


Designing for intuitive use for non-human users : ACE 15

When I read this paper, I couldn’t help but think of the infinite monkey theorem: an army of monkeys hunched over typewriters. But the question the authors investigate is not the probability of a...
Input Devices & Strategies (H.5.2...) | Sep 28 16

Computational health informatics in the big data age: a survey : ACM Computing Surveys

Global information and communications technology (ICT) resources have been changing lives; fast networks and mobile devices offer “always-on” services, extending the possibilities of personal...
Data Mining (H.2.8...) | Sep 21 16

Discrete Bayesian network classifiers: a survey : ACM Computing Surveys

Bayesian networks (BN) are used to estimate the value of one of the attributes (termed as the predicted or class attribute) of the dataset utilizing the remaining attributes (termed as predictor attribute(s)). The naive Bayes (NB)...
Models (I.5.1) | Sep 28 16

Out-of-band covert channels—a survey : ACM Computing Surveys

In recent years, covert channels were shifted back into the focus of research. These channels can be used to communicate in a stealthy way not recognizable by third parties. Typical application scenarios...
General (C.2.0) | Sep 30 16

Survey: Live migration and disaster recovery over long-distance networks : ACM Computing Surveys

Live migration (LM) is dealt with in this paper as a one-time task or function, performed by moving a virtual machine from one physical machine to another, located in the same or a different...
Distributed Systems (C.2.4) | Oct 12 16

The six pillars for building big data analytics ecosystems : ACM Computing Surveys

Big data analytics (BDA) encompasses a set of activities oriented toward the transformation of enormous amounts of raw data into meaningful insights, the discovery of hidden patterns, and the prediction...
Introductory & Survey (A.1) | Oct 5 16

Workload characterization: a survey revisited : ACM Computing Surveys

This paper considers the process of characterizing workloads in different kinds of computing services. It starts with a brief discussion of what a workload is and how characterizing workloads leads to better...
Performance of Systems (C.4) | Sep 20 16

Coupling interactions and performance: predicting team performance from thin slices of conflict : ACM Transactions on Computer-Human Interaction

The basic question is whether the performance of a team can be predicted from a 15-minute observation, a “thin slice” of the...
User/Machine Systems (H.1.2) | Sep 21 16

B-trees and cache-oblivious B-trees with different-sized atomic keys : ACM Transactions on Database Systems

The problem of creating B-tree-like dictionaries with small atomic keys from a system containing large, variable-size records is the subject of this paper. These kinds of dictionaries provide guaranteed...
Sorting & Searching (F.2.2...) | Sep 13 16

Diversifying query auto-completion : ACM Transactions on Information Systems

In an era when many aspects of artificial intelligence (AI) and machine learning (ML) are increasing in popularity because of the proliferation of technology via a range of representational state transfer...
Information Storage & Retrieval (H.3) | Sep 14 16

Building Arduino projects for the Internet of Things: experiments with real-world applications

Arduino Uno or Yun platforms are fun, inexpensive, and great projects for the newbie maker. The question is often how to get started on something relatively simple, but that is also interesting and...
Real-Time & Embedded Systems (C.3...) | Oct 4 16

Cognitive robotics

This collection of ten chapters written by different authors provides fairly good coverage of the field of cognitive robotics. The chapters focus on ethical, philosophical, cultural, social, psychological, human interaction, and artificial intelligence (AI) aspects...
Robotics (I.2.9) | Oct 18 16

Combatting cybercrime and cyberterrorism: challenges, trends and priorities

Cybercrime investigations are different from traditional crime investigation, requiring in-depth technical expertise and large-scale cross-jurisdictional effort. In May 2016, a well-organized group...
Abuse & Crime Involving Comp. (K.4.1...) | Oct 13 16

Computer networks and Internets (6th ed.)

For many years, Comer’s book has been an excellent source for those who want to learn about or teach the fundamentals of networking. Obviously, this has not changed with the new updated edition. Being an overview of all the related techniques, from the...
Internet (C.2.1...) | Sep 29 16

Computer science: an interdisciplinary approach

Sedgewick and Wayne’s book is a systematic treatise on the fundamentals of computer science. At a high level, the book covers the basics, object-oriented programming, algorithms, and plenty of theory. It is geared...
Object-Oriented Programming (D.1.5) | Oct 20 16

Cryptography made simple

The goal of cryptography is to obfuscate data for unintended recipients. It is thus an important discipline in the digital age, and the foundation for information security in many applications, like...
Data Encryption (E.3) | Oct 19 16

Data and information quality: dimensions, principles and techniques

Quality of data and information is relevant to both decisional and operational processes. Poor quality can have serious impacts on the efficiency and effectiveness of organizations and enterprises....
Content Analysis & Indexing (H.3.1) | Oct 13 16

Data wrangling with Python

“Wrangle” is a new version of an old word that has evolved in some interesting and revealing ways. Originally, wrangle meant to argue or dispute. For example, you might wrangle with your neighbor over a property line. The meaning drifted over time so...
Python (D.3.2...) | Sep 22 16

Debugging game history

Game history has not, according to the editors of this book, emerged from the era of chronicles. This is not necessarily a bad thing. The editors go on to say: “Chronicles have many good qualities. They establish essential chronologies, and their writers often uncover...
Games (K.8.0...) | Oct 21 16

Discovering modern C++: an intensive course for scientists, engineers, and programmers

This is not a conventional book teaching C++ programming. The author targets scientists and engineers, and teaches them the utilization of advanced C++ for scientific studies. There are a number...
C++ (D.3.2...) | Sep 28 16

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2016 ThinkLoud, Inc.
Terms of Use
| Privacy Policy