Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help


Genetic-algorithm-based FPGA architectural exploration using analytical models : ACM Trans. on Design Automation of Electronic Systems

Mehri and Alizadeh use the genetic algorithm (GA) to optimize field-programmable gate array (FPGA) architectural performance involving area...
Integrated Circuits (B.7) | Nov 9 16

Co-clustering structural temporal data with applications to semiconductor manufacturing : ACM Trans. on Knowledge Discovery from Data

New improvements in storage, measurement, and control methods in semiconductor engineering are rapidly producing more data. Today, there...
Time Series Analysis (G.3...) | Nov 15 16

ICT-based fall prevention system for older adults: qualitative results from a long-term field study : ACM Transactions on Computer-Human Interaction

As the population is aging, more attention needs to be paid to the needs of seniors and how information and communication technology (ICT)-based support...
Miscellaneous (H.5.m) | Dec 28 16

Social question answering: textual, user, and network features for best answer prediction : ACM Transactions on Information Systems

This paper combines a good review of the main techniques used in community question-answering (CQA) systems with an extensive and...
Artificial Intelligence (I.2) | Nov 11 16

Catching synchronized behaviors in large networks: a graph mining approach : ACM Transactions on Knowledge Discovery from Data

The automatic detection and accurate interpretation of suspicious graph patterns is one of the key issues in spotting malicious...
Online Information Services (H.3.5) | Nov 10 16

Modeling and performance evaluation of security attacks on opportunistic routing protocols for multihop wireless networks : Ad Hoc Networks

The primary aim of opportunistic routing for wireless networks is to improve resilience and increase the probability that data will be...
Wireless Communication (C.2.1...) | Nov 16 16

A probabilistic inference model for recommender systems : Applied Intelligence

Information retrieval systems--which return information according to a textual description and user queries--have been around for quite some time. Their natural evolution is recommender systems...
Information Search & Retrieval (H.3.3) | Nov 10 16

A trust evaluation scheme for complex links in a social network: a link strength perspective : Applied Intelligence

As links among users are the channel for interchanging information inside social networks, trust is a widely accepted indicator or parameter to discover...
Social Networking (H.3.4...) | Nov 10 16

Decision tree induction with a constrained number of leaf nodes : Applied Intelligence

Decision trees are broadly applied in machine learning, especially for data-driven decision making. Training with a subset of data, one may build a decision tree to classify other data items. The concept of the...
Nonnumerical Alg. & Prob. (F.2.2) | Dec 6 16

Fractals and Ravens : Artificial Intelligence

Startling! This paper really offers something to think about. The authors also seem surprised by the success of their counter-intuitive juxtaposition of a...
Fractals (I.3.7...) | Dec 28 16

A multimodal end-2-end approach to accessible computing (2nd ed.)

Today, communication applications and devices such as smartphones are mostly designed for common use. However, they feature a plethora of complex functionalities that make their use difficult...
User Interfaces (H.5.2) | Dec 12 16

A primer for financial engineering: financial signal processing and electronic trading

This concise 140-page introduction to financial engineering is structured in six chapters. The content addresses the most relevant topics required to grasp the basics...
Financial (J.1...) | Nov 8 16

Accelerating discovery: mining unstructured information for hypothesis generation

The basic idea behind the “accelerated discovery” of this book’s title is that by using the ability of a computer to process large quantities of data, one can find interconnections...
Learning (I.2.6) | Nov 16 16

Autonomous vehicle navigation: from behavioral to hybrid multi-controller architectures

Autonomous vehicle navigation represents a global view of the wide field of ground mobile robotics. This view is ensured by the notable and broad background of the author, especially in the context of multirobot...
Robotics (I.2.9) | Dec 27 16

Banking beyond banks and money: a guide to banking services in the twenty-first century

If the reader is looking for a book that tells of the perks of opening a checking account at a bank, this text is the wrong choice. Banking beyond banks and money is a compendium of...
Financial (J.1...) | Jan 17 17

Beginning Ruby: from novice to professional

Although this book was written with the intent to be a comprehensive introduction to the Ruby language, it is not a textbook because it lacks exercises and questions aimed to test knowledge and concepts. Instead...
General (D.1.0) | Dec 16 16

Big data concepts, theories, and applications

The term “big data” synthesizes the problems and technologies that arise with the spread of big volumes of data. Usually the five Vs model is used to characterize big data problems: velocity (speed of data in and out)...
General (H.3.0) | Nov 14 16

Big data optimization: recent developments and challenges

Edited by Ali Emrouznejad, this book is volume 18 in Springer’s “Studies in Big Data” series. The inside cover of the book states that the series publishes big-data-related developments, quickly and with high...
Data Mining (H.2.8...) | Jan 9 17

Big data over networks

It is always hard to provide a balanced review of an edited book with varied contributions. In this case, it is no different. Four editors, all of them IEEE Fellows, have collected 15 chapters written by 50 different authors that provide different perspectives on...
Data Mining (H.2.8...) | Nov 15 16

Building maintainable software: ten guidelines for future-proof code (Java edition)

Building maintainable software starts by formulating some generic concepts of software architecture that can be applied to various software engineering, architecture, and...
Software Maintenance (K.6.3...) | Nov 18 16

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy