Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help


Restart: the resurgence of computer science in UK schools : ACM Transactions on Computing Education

Information technology (IT) is a big challenge to education due to its ever-changing nature. The authors were confronted with this issue when...
Computer Science Education (K.3.2...) | Mar 26 15

A stimulus-response framework for robot control : ACM Transactions on Interactive Intelligent Systems

This paper offers a new view of stimuli in robot control. The robot is viewed as controlled by a set of processes, only some of which are active at a...
Robotics (I.2.9) | Mar 18 15

Global sparse analysis framework : ACM Transactions on Programming Languages and Systems

High-profile bugs have increased the urgency of designing good program analysis frameworks that can detect such bugs before the programs are...
Semantics of Prog. Lang. (F.3.2) | Mar 11 15

Dynamic partition search algorithm for global numerical optimization : Applied Intelligence

A novel evolutionary algorithm for global optimization for which derivative information is not required, that rather deals with function value information only, is addressed...
Mathematical Software (G.4) | Mar 18 15

An emotion understanding framework for intelligent agents based on episodic and semantic memories : Autonomous Agents & Multi-Agent Systems

A computational model that aims to endow intelligent software agents with the capability to understand emotions is the focus...
Intelligent Agents (I.2.11...) | Mar 26 15

A smartphone-centric approach for integrating heterogeneous sensor networks : BodyNets 14

Special-purpose sensor devices--health, medical, mapping, and smart home--are exploding as the Internet of Things (IoT) starts to bloom. This paper presents and defends a unified communication...
General (C.2.0...) | Mar 23 15

Real-time feedback for improving medication taking : CHI 14

Elderly patients with multiple lingering medical conditions habitually take several pills every day. How should effective real-time feedback sensor...
Medical Info. Systems (J.3...) | Feb 26 15

Online privacy: regional differences : Communications of the ACM

The topic of privacy is important. With the recent media coverage on data breaches and different privacy “standards” (for example, Google in Spain), this article is...
Public Policy Issues (K.4.1) | Mar 10 15

Short lists for shortest descriptions in short time : Computational Complexity

Compressing a string to its shortest description (in the sense of Kolmogorov complexity) cannot be done effectively. This paper belongs to a recent research line that investigates the list approximability...
Complexity Measures (D.2.8...) | Mar 3 15

An experimental power profile of energy efficient Ethernet switches : Computer Communications

In what is described as “the first detailed experimental evaluation of power consumption of [energy efficient Ethernet...
Ethernet (C.2.1...) | Mar 24 15

10 don’ts on your digital devices

This book is an introduction to cyber security and privacy for nontechnical readers. Increasingly, the media has shown us examples of highly connected individuals who have focused more on the features of the application than the possible risks of using...
Portable Devices (C.5.3...) | Mar 23 15

Alan Turing: the enigma

Rereading and reviewing a biography more than 30 years after its first publication subjects the work to the added scrutiny of evaluating it on its own terms and in relation to all that has happened...
Alan Turing (K.2...) | Mar 10 15

Algorithmic learning theory (LNAI 8776)

The volume gathers papers in an exciting, novel area of research that started the field of artificial intelligence (AI) with the work of Ray Solomonoff in the 1960s. However, AI research soon forgot...
Learning (I.2.6) | Feb 19 15

An introduction to mathematical cryptography (2nd ed.)

In a 2009 review of the first edition of this book [1], reviewer Burkhard Englert wrote: “As an undergraduate mathematical textbook, the book is excellent from start to finish. The authors don’t just run from proof to proof; they also take the...
Data Encryption (E.3) | Mar 10 15

Android apps for absolute beginners (3rd ed.)

This book is a great choice for those who really do not know anything about Android application development and are willing to learn the basics. Throughout the 16 chapters, the author leads the reader...
General (D.1.0) | Mar 26 15

Audio watermark: a comprehensive foundation using MATLAB

This is how a practical technical book should be written. Short and to the point from page one. It is reminiscent of some long-forgotten manner of writing, for example, the “how it works” sections in...
Sound & Music Computing (H.5.5) | Feb 26 15

C++ 2013 for C# developers

As the title says, the book is addressed to advanced software designers specializing in C# coding, as the author shares his 20 years of experience with the C programming languages. The first question a computer programmer usually asks is what kind of...
Object-Oriented Programming (D.1.5) | Mar 11 15

Challenges and opportunities in health care management

This multi-authored collection of short chapters discusses the impact and potential of current information technology on the delivery of healthcare and on doctor-patient relations. Unlike many...
Medical Information Systems (J.3...) | Mar 18 15

Complex networks: an algorithmic perspective

Given the recent proliferation of books on networks, a skeptical reader might wonder whether yet another book on complex networks, also known as network science, deserves space on his or her shelf....
Network Problems (G.2.2...) | Mar 25 15

Computer vision metrics: survey, taxonomy, and analysis

Computer vision technologies are continually reaching greater heights, incorporating imaging systems and their applications. These applications are available in fields like medicine, engineering, space, material science, and many...
Vision & Scene Understanding (I.2.10) | Mar 25 15

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2015 ThinkLoud, Inc.
Terms of Use
| Privacy Policy