Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
Misc

View:



Bribery in multiple-adversary path-disruption games is hard for the second level of the polynomial hierarchy : AAMAS 14

Nondeterministic polynomial time (NP) and NP-completeness are by now widely familiar notions within the general computer science (CS) community. Every CS undergraduate knows...
Multiagent Systems (I.2.11...) | Jun 25 15

Voter dissatisfaction in committee elections : AAMAS 15

Much of the research on elections focuses on selecting a single winner or having a tied set of winners to be thinned to a single winner by some tie-breaking procedure. There is also substantial research...
Multiagent Systems (I.2.11...) | Jun 30 15

Motivation as a lens to understand online learners: toward data-driven design with the OLEI scale : ACM Trans. on Computer-Human Interaction

Massive open online courses (MOOCs) pose fresh challenges in e-learning. They report very large and global enrollments--across...
Computer Uses in Education (K.3.1) | Jun 29 15

Two-variable separation logic and its inner circle : ACM Transactions on Computational Logic

Separation logic, an extension of Hoare logic, is currently a very active area of research. This paper investigates the...
Spec., Verify. & Reas. about Prog. (F.3.1) | Jun 23 15

A cost effective and preventive approach to avoid integration faults caused by mistakes in distribution of software components : Advances in Software Engineering

Failures in distributed software systems are frequently caused by configuration errors. Diagnosing such errors is difficult, and solutions are usually urgently...
Error Handling & Recovery (D.2.5...) | Jun 24 15

SPOT: a DSL for extending Fortran programs with metaprogramming : Advances in Software Engineering

The Fortran language, a first language for many older computer science (CS) architects, is still used extensively in high-performance computing (HPC). Lots of very functional legacy code is still running...
Domain-Specific Architectures (D.2.11...) | Jun 18 15

Computing in context: teaching intelligence and security informatics in computer science courses : CIC 15

Plante proposes a methodology to enhance teaching intelligence and security informatics in the context of existing computer science courses. The paper...
Computer & Info. Science Ed. (K.3.2) | Jun 19 15

Beautiful JavaScript: how to guide students to create good and elegant code : CSERC 2014

The authors use this paper to propose procedural guidelines to help students develop “elegant” JavaScript code. The target audience is students learning to program in JavaScript who have...
JavaScript (D.3.2...) | Jun 17 15

Using priced timed automaton to analyse the energy consumption in cloud computing environment : Cluster Computing

By accounting for the mismatch in energy consumption by different cloud servers to process the same task, this paper proposes a...
Cloud Computing (C.2.4...) | Jun 8 15

Go static or go home : Communications of the ACM

Computer and network administrators must continue to prevent ongoing security threats to enterprise hardware and software systems. What are the attacks on computers and networks that stand out...
General (C.2.0) | Jun 9 15



4G: deployment strategies and operational implications

For most people, 4G (or 4th generation) evokes the latest commercially available public wireless communications technology with associated services. But in technical terms, a more precise...
General (C.2.0) | Jun 11 15

An introduction to MATLAB programming and numerical methods for engineers

There are two main objectives addressed by this book about MATLAB programming: to provide a smooth introduction to MATLAB programming and to describe mathematical tools that are useful for solving basic...
Matlab (G.4...) | Jun 5 15

An introduction to agent-based modeling: modeling natural, social, and engineered complex systems with NetLogo

Readers who are already familiar with agent-based modeling are probably already aware of this book and would certainly recognize the name of the first author. So, I will address the beginning of this...
Multiagent Systems (I.2.11...) | Jun 30 15

An introduction to agent-based modeling: modeling natural, social, and engineered complex systems with NetLogo

The NetLogo environment developed at Northwestern University [1] has become one of the most widely used tools for agent-based modeling. NetLogo’s restricted dialect of LISP has proven much more...
Multiagent Systems (I.2.11...) | Jun 17 15

Artificial cognitive systems: a primer

Since the earliest days of computers, researchers have sought to use them to emulate human cognition. Some early demonstrations of such “artificial intelligence” (playing checkers, diagnosing...
Cognitive Simulation (I.2.0...) | Jun 30 15

Background modeling and foreground detection for video surveillance

Providing a complete and extensive presentation of up-to-date video surveillance image processing techniques used for background modeling/removal and foreground object detection/tracking, this is an...
Image Processing & Computer Vision (I.4) | Jun 9 15

Beginning iPhone development: exploring the iOS SDK (7th ed.)

iPhone/iPad apps have gained unprecedented attention from both individual and enterprise developers. By presenting detailed guides on building standard iOS programs, enterprise iOS programs, and...
Apple (C.5.3...) | Jun 15 15

Big data, little data, no data: scholarship in the networked world

This book is a resource for understanding issues related to data collection, storage, and sharing practices across disciplines. The book has three parts: “Data and Scholarship,” “Case Studies in Data Scholarship,” and “Data...
Database Applications (H.2.8) | Jun 23 15

Big data: related technologies, challenges and future prospects

In recent years, big data has been a very active research field and its related technologies have been in practical use. In particular, scientists have adopted relevant technologies to conduct advanced...
Database Applications (H.2.8) | Jun 1 15

Bitemporal data: theory and practice

Things are not the same as data about these things in databases. Therefore, statements about things are different from statements about representations of these things in databases. Moreover, when incorrect representations about things are corrected, the...
Information Theory (H.1.1...) | Jun 8 15


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2015 ThinkLoud, Inc.
Terms of Use
| Privacy Policy