Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
Misc

View:



A tutorial on canonical correlation methods : ACM Computing Surveys

Canonical correlation analysis (CCA) is used to discover relations between two or more multivariate sets of variables, called views. Data to be processed are collected for a population of individuals, and...
Correlation & Regression Analysis (G.3...) | Apr 26 18

Surveying stylometry techniques and applications : ACM Computing Surveys

Stylometry is analysis of textual data to find hidden patterns. This paper provides a comprehensive survey on this topic. The paper contains three main parts. In the first part, the authors consider five...
Natural Language Processing (I.2.7) | Apr 19 18

Control strategies for self-adaptive software systems : ACM Transactions on Autonomous and Adaptive Systems

How can we develop advanced control strategies for self-adaptive software systems? If you are interested in an extended answer, please read this paper. Its aim is to provide an overview of the control techniques...
Computer-Aided Software Eng. (D.2.2...) | Apr 13 18

Detecting decidable classes of finitely ground logic programs with function symbols : ACM Transactions on Computational Logic

The termination problem of programs is in general an undecidable problem. However, in the context of some programming paradigms, there has been a...
Logic Programming (D.1.6) | May 22 18

Fast and accurate time-series clustering : ACM Transactions on Database Systems

Clustering temporal data, namely time series, is a challenging and expensive computational task in terms of accuracy and speed. Despite the fact that a wide variety of time-series clustering algorithms exist...
Clustering (H.3.3...) | Apr 16 18

A discriminatively learned CNN embedding for person reidentification : ACM Transactions on Multimedia Computing, Communications, and Applications

For knowing whether the same person appears in two images (reidentification), one can either use identification models (that is, classifying the...
Image Representation (I.4.10) | May 4 18

Bit-precise procedure-modular termination analysis : ACM Transactions on Programming Languages and Systems

That software is pervasive in our lives is now a platitude. That much of this software is flawed has also reached the collective consciousness. A lot of code, much...
Semantics of Prog. Languages (F.3.2) | Apr 27 18

Network on chip architecture for multi-agent systems in FPGA : ACM Transactions on Reconfigurable Technology and Systems

Hardware agent architecture is based on event-driven reactive architecture. In this architecture, each agent has defined tasks and these tasks interact using events. Events can be used to pass data and control...
Parallel Architectures (C.1.4) | Apr 17 18

An FPT 2-approximation for tree-cut decomposition : Algorithmica

Fixed-parameter tractable (FPT) computational-complexity classification seeks to measure complexity as functions of problems’ parameters. The algorithm presented in this 20-page advanced paper concerns the FPT...
Approximation (G.1.2) | May 7 18

A filter attribute selection method based on local reliable information : Applied Intelligence

In classification algorithms, the core problem is selecting the right attributes and assigning them the right weight for each item being processed, in order to achieve reliable results; all the more...
Feature Evaluation & Selection (I.5.2...) | Apr 25 18



5G wireless systems: simulation and evaluation techniques

Yang et al. set out their objective of pursuing the latest research simulations and evaluations of possible 5G candidate technologies to comply with the identified International Telecommunication Union (ITU) 5G...
Signal Processing Systems (C.3...) | Apr 4 18

Analytical methods for network congestion control

This is one of the most comprehensive books I have read recently, and it is a must-read for a serious network designer. This book uses a step-by-step approach to build a mathematical model to understand, design, and fix network congestion. This book...
Network Architecture & Design (C.2.1) | May 3 18

Anomaly detection as a service

Written by a team of well-known academic researchers and authors of landmark papers in the area of system and network security, this book is a distilled and concise overview of academic and industrial approaches for anomaly detection in the context of information...
Security & Protection (K.6.5) | Apr 25 18

Beginning Ubuntu for Windows and Mac users (2nd ed.)

The Ubuntu Linux operating system is one of the most popular Linux distributions, if not the most popular. When this book was listed among the books available to be reviewed, I selected it because I had installed Ubuntu on a...
Linux (D.4.0...) | Apr 27 18

Beginning artificial intelligence with the Raspberry Pi

For anybody looking for a fast and basic introduction to the field of artificial intelligence (AI) or machine learning (ML) supported by many practical examples for one’s own implementation, the book by Norris is a perfect match. Although the author truly and honestly...
General (I.2.0) | May 11 18

Building the network of the future

Software-defined networking (SDN) and network function virtualization (NFV) have been at the forefront of the R&D networking world since the last decade [1]. However, these new paradigms may not be well understood by many IT professionals. The book is easy to...
Network Architecture & Design (C.2.1) | Apr 26 18

Building web applications with Visual Studio 2017

In recent times, the .NET ecosystem has witnessed a rapid transformation in many services it offers. It includes a completely rewritten Entity Framework Core that is designed not only to support multiple platforms, but also to offer features such as nonrelational...
Systems & Software (H.3.4) | May 4 18

Cloud computing (2nd ed.)

In recent years, the applications and architectural specifications of cloud computing have been major streams of investigation. Besides the cloud’s technical significance at performing practical projects, it has opened a new horizon within the computing...
Distributed Systems (C.2.4) | May 8 18

Cognitive informatics in health and biomedicine: understanding and modeling health behaviors

Health-related decisions are often based on personal experiences, biases, trust, knowledge (or lack of it), and the physical and social environment (availability, friends and family, and so on). This book fills an important gap by discussing health informatics concepts from...
Health (J.3...) | Apr 9 18

Complexity management in engineering design: a primer

The purpose of this well-written habilitation thesis by Maik Maurer is to present a “big picture of complexity management” to guide students “through the necessities, ideas, concepts and implementations” and to give engineers “a framework at hand for...
General (K.6.0) | Apr 4 18


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy