Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
August 20, 2019
Search
Highlight

Computational texture and patterns: from textons to deep learning
This slim volume considers the question of representing and matching textures and similar patterns. This question is closely related to recognition--for example, recognizing that something is a picture of a leafless tree--and segmentation, that is, picking out the distinct (leaved) trees in a... more
Quote
It has been pointed out by A. M. Turing in 1937 and by W. S. McCulloch and W. Pitts in 1943 that effectively constructive logics, that is, intuitionistic logics, can... more
- John von Neumann (1956)
Articles
Research for practice: troubling trends in machine-learning scholarship: Communications of the ACM

The article reviews the attention paid to an important issue in machine learning research, but the problem raised can be generalized to other fields within computer science and informatics. Machine learning and... more

Learning (I.2.6) | Aug 20 19

Orchestrating complex application architectures in heterogeneous clouds: Journal of Grid Computing

The authors present INDIGO-DataCloud for deploying cloud applications across multiple cloud management platforms (CMPs) that require complex topologies and operational... more

General (C.2.0) | Aug 19 19

Take it or leave it: a survey study on operating system upgrade practices: ACSAC 18

Periodic software updates are a necessary evil to keep computers and other digital devices protected from viruses and other malicious forms of exploitation; still, many users resent reminders from vendors... more

Testing & Debugging (D.2.5) | Aug 19 19

Reliable industrial IoT-based distributed automation: IoTDI 19

This paper shows improved reliability in Industrial Internet of Things (IIoT) distributed automation systems by following along at runtime against expected real-world fault models. This novel idea represents models using... more

General (C.2.0) | Aug 16 19

Smart city system design: ACM Computing Surveys

As the authors state, “smart city applications in healthcare, transportation, utility, safety, and environmental health” are likely to benefit from machine intelligence and Internet of Things (IoT) technology. In this survey article on smart city system design... more

Security & Protection (C.2.0...) | Aug 16 19

Back to the future: Communications of the ACM

The name of this short article comes from the fact that the dawn of the Internet with the Advanced Research Projects Agency Network (ARPANET) reintroduced the store-and-forward method used for telegraphs, but instead of human nodes that made information... more

Public Networks (C.2.3...) | Aug 15 19

Sentiment analysis for software engineering: ICSE 18

Sentiment analysis continues to be successfully applied to consumer reviews. In other areas, the challenges involved can prove insurmountable. A failed attempt to successfully apply sentiment analysis is reported... more

General (D.2.0) | Aug 15 19

Algorithm 993: ACM Trans. on Mathematical Software

The Kronecker product of two matrices replaces each element of the first matrix with a multiple of a copy of the second matrix. The history, applications, and properties of the Kronecker and the symmetric products are... more

Numerical Algorithms & Problems (F.2.1) | Aug 14 19

Long short-term memory fuzzy finite state machine for human activity modelling: PETRA 19

As sensors become more ubiquitous in smart homes and work environments, the data they provide can offer information about the locations and actions of any occupants. The authors propose using a... more

Memory Design (B.5.1...) | Aug 14 19

The challenge of crafting intelligible intelligence: Communications of the ACM

In the past decade, many algorithms and techniques have been classified as computational intelligence, machine learning, cognitive informatics, or data science, so much so that those approaches now fall... more

General (I.2.0) | Aug 9 19

Books
Natural language processing for social media (2nd ed.)

As social networks gain widespread popularity, they dominate all other forms of communication, particularly among youth (but of course not only). Perhaps this is because of real-time information and opinion... more
Natural Language Processing (I.2.7) | Aug 19 19

Computational texture and patterns

This slim volume considers the question of representing and matching textures and similar patterns. This question is closely related to recognition--for example, recognizing that something is a picture of a leafless tree--and segmentation, that is, picking out the... more
Vision & Scene Understanding (I.2.10) | Aug 16 19

Location-based gaming

Location-based games, an offshoot of more traditional video games, provide unique opportunities for interaction in shared public spaces, experiments in social dynamics, artistic exploration, and of course fun. In order to more fully understand the... more
Games (K.8.0...) | Aug 15 19

Contactless 3D fingerprint identification

I am interested in machine learning (ML)-based image classification. Thus, I thought this book may be an interesting read about how ML techniques are applied to fingerprinting. As it turns out, the book is not about ML, but just plain mathematics and algorithms... more
Computer Vision (I.5.4...) | Aug 13 19

Orthogonal waveforms and filter banks for future communication systems

Filter bank multicarrier (FBMC) signaling policy is the subject of this book. To explain its different features and functionalities in different communication interaction scenarios, the authors present a comprehensive... more
Signal Processing Systems (C.3...) | Aug 12 19

Research advances in cloud computing

This book includes recent research trends in cloud computing. It covers a wide range of research topics, some of which will be of interest to cloud users and others to cloud vendors. This review organizes 18 chapters into topics for cloud users, cloud platform providers, cloud... more
Cloud Computing (C.2.4...) | Aug 8 19

You’ll see this message when it is too late

It seems not a day goes by without a media headline of some cybersecurity breach somewhere. Whether espionage, financial attack, or theft of personal data, we see a brief burst of hysteria followed by assurances that the problem is fixed, and then the media moves... more
Privacy (K.4.1...) | Aug 7 19

Logic functions and equations (2nd ed.)

Logic functions, commonly known as Boolean functions, arise in many areas of computer science and information technology. On a fundamental technological level, every digital circuit can be modeled as a Boolean function. Design, optimization, and circuit synthesis... more
General (F.3.0) | Aug 6 19

The book of why

In fields such as data science, explainable artificial intelligence (AI), and big data analytics, “why?” is the ultimate question that needs to be answered to make sense of real data. “Why?” has been the simplest question to advance science since the Age of... more
Probability & Statistics (G.3) | Aug 2 19

Calendrical calculations (4th ed.)

Calendrical computation is motivated by a collision between incommensurability and importance. The month (the time from one new moon to another) is not an integral number of days, and the year (the time between successive spring equinoxes) is not an... more
Mathematics & Statistics (J.2...) | Jul 30 19


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy