Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help


Application of IT in healthcare: a systematic review : ACM SIGBioinformatics Record

Information technology (IT) is expanding its scope from communications to other fields, including engineering, the environment, healthcare, and...
Health (J.3...) | Jan 19 17

ICT-based fall prevention system for older adults: qualitative results from a long-term field study : ACM Transactions on Computer-Human Interaction

As the population is aging, more attention needs to be paid to the needs of seniors and how information and communication technology (ICT)-based support...
Miscellaneous (H.5.m) | Dec 28 16

Topology-oriented incremental algorithm for the robust construction of the Voronoi diagrams of disks : ACM Transactions on Mathematical Software

Voronoi diagrams are important in many applications that range from theoretical computing to computational geometry, to computer graphics and computer...
Geo. Algorithms, Lang. & Syst. (I.3.5...) | Jan 20 17

Fractals and Ravens : Artificial Intelligence

Startling! This paper really offers something to think about. The authors also seem surprised by the success of their counter-intuitive juxtaposition of a...
Fractals (I.3.7...) | Dec 28 16

A dimensionality reduction method based on structured sparse representation for face recognition : Artificial Intelligence Review

Face recognition (FR) is considered to be a typical machine learning problem. Among all FR algorithms, popular models include classical...
Object Recognition (I.4.8...) | Jan 23 17

A mixed-ensemble model for hospital readmission : Artificial Intelligence in Medicine

The authors developed a mixed-ensemble model to predict hospital readmission rates, which allows the tradeoff between reasoning transparency...
Learning (I.2.6) | Dec 22 16

Efficient processing of multiple nested event pattern queries over multi-dimensional event streams based on a triaxial hierarchical model : Artificial Intelligence in Medicine

Processing very “strong” event streams (with lots of events) to extract meaningful information in the shortest possible time (lowest latency) is the...
Artificial Intelligence (I.2) | Dec 23 16

Exploring the space of viable configurations in a model of metabolism-boundary co-construction : Artificial Life

In an attempt to expand my horizon toward the exploration of interactions among of agents, including humans and robots, one of the...
Cognitive Simulation (I.2.0...) | Dec 30 16

High-performance data structures for de novo assembly of genomes: cache oblivious generic programming : BCB 16

This short paper presents a C++ library, in a generic programming style, for more efficient de novo genome assembly. The basic idea is to use a cache...
Software Libraries (D.2.2...) | Jan 19 17

Modeling and understanding human routine behavior : CHI 16

The study of human routines is expanding the scope of behavioral sciences in light of actions performed by humans. Such studies help in improving bad habits, inexpert behaviors, and suboptimal routines...
Miscellaneous (H.5.m) | Feb 23 17

Applied computer science (2nd ed.)

The goal of this book is to “encourage, prepare and challenge” talented computing students. The goal is not to motivate students without talent. As the author states in the preface: “Efforts to increase student participation in computing ... have taken a bizarre turn...
Introductory & Survey (A.1) | Jan 25 17

Autonomous vehicle navigation: from behavioral to hybrid multi-controller architectures

If you are interested in learning about the research and development of autonomous vehicles, you really should read this book. It is an absolute must-read for...
Robotics (I.2.9) | Feb 1 17

Banking beyond banks and money: a guide to banking services in the twenty-first century

If the reader is looking for a book that tells of the perks of opening a checking account at a bank, this text is the wrong choice. Banking beyond banks and money is a compendium of...
Financial (J.1...) | Jan 17 17

Big data 2.0 processing systems: a survey

With the advent of smartphones with Internet connections and the widespread use of social media, a data explosion has been witnessed in recent years. Almost 90 percent of the data that exists today has been generated only in the last...
Content Analysis & Indexing (H.3.1) | Jan 25 17

Computer age statistical inference: algorithms, evidence, and data science

No healthy scientific discipline stands still, and active practitioners recognize the flux of ideas and frequently contribute to it. But the exigencies of pedagogy make it difficult for a student to understand the trajectory of a...
Mathematics & Statistics (J.2...) | Jan 18 17

Computer supported qualitative research

Today both qualitative and quantitative research involves heavy use of computer tools. Learning about the tools used for deep qualitative research is important for researchers. This is an area of interdisciplinary research where computer science meets health...
Social & Behavioral Sciences (J.4) | Jan 18 17

DITA — the topic-based XML standard: a quick start

Unlike classic Hypertext Markup Language (HTML), which is oriented to the format of material presented on web pages, Extensible Markup Language (XML) allows developers to separate content from format. There are many special-purpose XML implementations...
Standards (I.7.2...) | Jan 19 17

Dependence logic: theory and applications

As computers penetrate human life in all its aspects, the difficulties of computer use during the human problem-solving process deepen. This may be a consequence of making the computer a universal problem-solving tool while problem domains and problem...
Prob. Solv., Control Meth. & Search (I.2.8) | Jan 26 17

Digital defense: a cybersecurity primer

Digital defense is a well-written, easy-to-follow, practical book, suitable for personal as well as professional use. It makes for a worthy read as we live in a digital world and are exposed to many known and unknown risks. Our daily lives are virtually controlled by the Internet...
Security & Protection (K.6.5) | Jan 19 17

Digital watermarking: techniques and trends

Digital watermarking has many applications, including steganography, data authentication, and digital rights management. It is a challenging problem, since the techniques used are dependent on the type of media being watermarked, and the...
Security & Protection (K.6.5) | Jan 18 17

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy