Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
May 6, 2021
Search
Highlight

Exact algorithms via monotone local search
Many important problems are NP-complete; this means that, unless P = NP, we cannot have a polynomial-time (feasible) algorithm for solving all instances of this problem. For each such problem, there is an exhaustive search algorithm that requires exponential time... more
Quote
It would be possible to define a language even more restrictively: as a set of semantically interpreted well-formed formulas used for communication... more
- D. Sperber & D. Wilson (1986)
Articles
Implementing a modal dependent type theory: Proceedings of the ACM on Programming Languages

Modalities are widely used in mathematics and computer science as an abstraction tool, but it turns out to be difficult to incorporate them in rich type theories... more

General (D.3.0) | Apr 27 21

Exact algorithms via monotone local search: Journal of the ACM

Many important problems are NP-complete; this means that, unless P = NP, we cannot have a polynomial-time (feasible) algorithm for solving all instances of this problem. For each such problem, there is an... more

Search Process (H.3.3...) | Apr 26 21

Evaluating the effects of missing values and mixed data types on social sequence clustering using t-SNE visualization: Journal of Data and Information Quality

The authors discuss how one can compensate for missing values when clustering joint categorical sequences. For example, one might have a... more

Learning (I.2.6) | Apr 21 21

SOD: making smartphone smart on demand with radio interface management: ACM Transactions on Autonomous and Adaptive Systems

Smartphone batteries don’t last as long as they used to. Why? Applications consume a lot of energy. However, the authors show that, besides the display... more

General (B.0) | Apr 20 21

Data-parallel structural optimisation in agent-based models: ACM SIGEVOlution

Modeling is a tool for studying a natural phenomenon. The accuracy of such a model depends on how well the model mimics the behavior of the system under study. The modeling of phenomena in ecology, microbiology, social... more

Multiagent Systems (I.2.11...) | Apr 16 21

Data transparency with blockchain and AI ethics: Journal of Data and Information Quality

With the ever-growing use of digital technology, especially the use of big data technologies and machine learning, questions related to the proper use of data collected from social networks led to the... more

Ethics (K.4.1...) | Apr 14 21

An analysis of inheritance hierarchy evolution: EASE 19

This is a refreshing paper on ten open-source systems and their use of “inheritance” programing concepts. Computer languages have evolved with the type-safe extensibility concept of inheritance, which is embodied in object... more

General (D.2.0) | Apr 13 21

Modeling information retrieval by formal logic: a survey: ACM Computing Surveys

As the title indicates, formal logic is used for modeling information retrieval (IR). Readers can expect a literature review (of IR models), supported with graphs, mathematical formulas, and examples that... more

Retrieval Models (H.3.3...) | Apr 12 21

Coding-data portability in systematic literature reviews: a W3C’s open annotation approach: EASE 19

Systematic literature reviews (SLRs) involve several steps: the planning step, which identifies the scope of literature according to the research goals, and develops a coding protocol; the analysis step, which... more

Software Engineering (D.2) | Apr 9 21

Multigrid for matrix-free high-order finite element computations on graphics processors: ACM Transactions on Parallel Computing

Discretization is a method for transforming continuous variables, equations, functions, and models into their discrete equivalents. A multigrid technique uses... more

Differential-Algebraic Equations (G.1.7...) | Apr 7 21

Books
Modern data mining algorithms in C++ and CUDA C

In his earlier book from 2018, Data mining algorithms in C++ [1], the author indicated that a “volume 2 will appear some day.” This is it. It builds on the techniques and tools of the earlier book and follows a similar style of presentation.... more
C++ (D.3.2...) | May 5 21

Reasoning with probabilistic and deterministic graphical models: exact algorithms (2nd ed.)

Many problems related to learning and reasoning can make use of graphical models where a knowledge structure is compactly encoded into a graph. When dependencies (or independencies) among the... more
Graphical Environments (D.2.6...) | May 4 21

Bandit algorithms

This book is on bandit algorithms. The word “bandit” is commonly understood to mean an armed thief who is usually a member of a group or band. However, in the context of this book, bandit refers to a type of slot machine with a large metal pole or handle... more
Learning (I.2.6) | May 3 21

The kollected Kode Vicious: opinionated advice for programmers

Readers of Communications of the ACM and ACM Queue are surely familiar with the magazines’ “Dear Abby”-like column, written by George V. Neville-Neil, under his persona Kode Vicious, or KV. This book is a collection of... more
General (D.3.0) | Apr 30 21

Software product management: finding the right balance for YourProduct Inc.

Software product management is at the core of the software product development life cycle. It takes into consideration all of the factors needed to bring a product to market. Furthermore, software product... more
Project & People Management (K.6.1) | Apr 29 21

Data visualization and knowledge engineering: spotting data points with artificial intelligence

Data is the new gold in the 21st century. Artificial intelligence (AI), data visualization, and knowledge engineering are important fields that provide concepts, techniques, and methods that help draw insights... more
KR Formalisms & Methods (I.2.4) | Apr 28 21

Algorithms for optimization

Anyone wanting to publish a book in a respectable and classical research field needs to find a niche to justify the originality. This statement includes the area of mathematical optimization, which interests Kochenderfer and Wheeler. They decided to focus on the... more
Optimization (B.1.4...) | Apr 27 21

Computational methods for deep learning: theoretic, practice and applications

Computational methods for deep learning is written for the typical second-year graduate student at a US university, working in this area for his/her PhD-level dissertation research on the application of... more
Learning (I.2.6) | Apr 23 21

Soft computing: techniques in engineering science

Soft computing is that part of computational science that is applied to problems characterized by uncertainty and imprecision. The techniques of soft computing include fuzzy sets, numbers, and logic; neural networks... more
General (D.1.0) | Apr 22 21

Identity, institutions, and governance in an AI world: transhuman relations

You must pause for a moment to get into the right frame of mind for this book. Grant the author a willing suspension of disbelief and allow for the possibility that several major breakthroughs have occurred in... more
General (I.2.0) | Apr 19 21


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2021 ThinkLoud, Inc.
Terms of Use
| Privacy Policy