Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
Misc

View:



Compressed matrix multiplication : ACM Transactions on Computation Theory

This paper is concerned with approximating a matrix product, that is, finding the large entries (AB){i,j} [and the corresponding indices (i,j)] from A and B...
Hash-Table Representations (E.2...) | Jul 18 14

Context-based coherent surface completion : ACM Transactions on Graphics

Surface completion is an active area of research in computer graphics. Many times the mesh that represents a physical object has holes that...
Curve, Surface, Solid & Obj. Rep. (I.3.5...) | Aug 7 14

IntentFuzzer: detecting capability leaks of Android applications : ASIA CCS 14

Preserving the confidentiality of private data in mobile devices is currently a major security concern. For this reason, Android requires a program (app) to explicitly obtain permissions at installation...
Testing & Debugging (D.2.5) | Jul 31 14

Approximation of the matrix exponential operator by a structure-preserving block Arnoldi-type method : Applied Numerical Mathematics

The objective of this paper is to provide an algorithm for efficient estimation of the exp(A)V operator applied to particular types of...
Numerical Alg. & Prob. (F.2.1) | Aug 4 14

Neuromorphic computing gets ready for the (really) big time : CACM

Some global initiatives to build a biologically inspired computer are highlighted in this article. The term “neuromorphic” is used to refer to biologically...
Learning (I.2.6) | Aug 7 14

Duet: exploring joint interactions on a smart phone and a smart watch : CHI 14

The main idea of this paper is very interesting. A connection between a smart watch and a smart phone is established to work with a common shared human interface using the accelerometer present in...
User Interfaces (H.5.2) | Aug 15 14

Biometric interaction: a case study of visual feedback and privacy issues in new face recognition solutions : CHI 2013

Face recognition is emerging as an enhanced method for human security. It minimizes the use of...
User Interfaces (H.5.2) | Jul 31 14

A configuration scheme for connectivity-aware mobile P2P networks for efficient mobile cloud-based video streaming services : Cluster Computing

The focus in research relating to peer-to-peer networks and possible configuration schemes for efficient cloud-based video...
P2P Computing (C.2.1...) | Jul 24 14

An extensible framework for online testing of choreographed services : Computer

Services computing is widely adopted in the information technology (IT) industry because...
Testing & Debugging (D.2.5) | Aug 6 14

Designing green network architectures using the ten commandments for a mature ecosystem : Computer Communications

Drouant et al. clarify from the beginning of the paper that their goal is to check if philosophical concepts from ecology make sense when considering a...
Network Architecture & Design (C.2.1) | Jul 22 14



A new foundation for representation in cognitive and brain science: category theory and the hippocampus

“The search for integrative and integrating approaches in the biosciences is very important at the present time because of the rapid increases in amounts of...
Cognitive Simulation (I.2.0...) | Aug 15 14

A practical introduction to computer vision with OpenCV

Computer vision is a field dealing with developing methods for the automatic acquisition, processing, analyzing, and understanding of images and videos by computers, in order to produce decisions that...
General (I.4.0) | Aug 12 14

Advances in natural deduction: a celebration of Dag Prawitz’s work

Natural deduction was proposed as a formalization of classical reasoning that could mirror the use of assumptions as used in mathematical reasoning. Initial formulations toward that goal were made...
Deduction & Theorem Proving (I.2.3) | Aug 1 14

Agile software architecture: aligning agile processes and software architectures

Some agile evangelists assert that software architecture requires big design up front (BDUF), and that the artifacts produced by the software architects (that is, the architectural documentation) will...
Software Architectures (D.2.11) | Aug 6 14

Android programming: the Big Nerd Ranch guide

Computer programming has undergone transformations since its inception. At the very beginning, programming was limited to the underlying machine code, followed by macro languages as assemblers. In the late...
Language Constructs & Features (D.3.3) | Aug 4 14

Autonomous military robotics

This short book presents a research project dealing with a humanoid robot called iCub that is able to autonomously and accurately fire toy bullets at a bulls-eye target in lab conditions. Therefore...
Robotics (I.2.9) | Aug 11 14

Bayesian programming

Bayesian programming uses plausible reasoning to extend logic to cases where the premises are not certain. A complete system for efficient problem solving needs modeling, inference algorithms...
Deduction & Theorem Proving (I.2.3) | Aug 12 14

Beginning C (5th ed.)

This book is intended for readers with little or no programming experience. It introduces C as defined by the C11 standard (ISO/IEC 9899:2011, Information technology, Programming Languages, C)...
C (D.3.2...) | Jul 28 14

Big data application architecture Q&A

Written by two experts in the area (a third expert, Soumendra Mohanty, is listed as the technical reviewer), I was impressed with the simplicity of the organization of the book. It is written like a mini help guide to big...
Systems (H.2.4) | Aug 1 14

Cloud data management

Cloud computing, defined by the National Institute of Standards and Technology (NIST) as “a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable...
Distributed Systems (H.3.4...) | Aug 13 14


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2014 ThinkLoud, Inc.
Terms of Use
| Privacy Policy