Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
January 19, 2020

Internet of Things and big data analytics for smart generation
This edited collection of papers is about the Internet of Things (IoT) and big data--areas of growing interest and importance for emerging applications in smart cities, intelligent transportation systems (ITSs), healthcare, and so on. Though the book explores the concepts of... more
Top management must ensure that an appropriate information infrastructure is built. It’s already starting to fall into place in many of our better-run corporations... more
- James Martin (1985)
Research on LRU optimal division method considering comprehensive cost of development and maintenance: CSAE 19

Efforts can be made to reduce life cycle costs and improve equipment availability. This is not only an issue of (company) low-maintenance costs and high availability, but can also be a big challenge... more

Modeling Methodologies (I.6.5...) | Jan 17 20

ELSA: a multilingual document summarization algorithm based on frequent itemsets and latent semantic analysis: ACM Transactions on Information Systems

Multi-document summarization involves the automatic generation of concise summaries of a number of textual documents, with the goal of succinctly... more

Database Applications (H.2.8) | Jan 16 20

Semi-automatic safety analysis and optimization: DAC 18

Model-based development (MBD) has been widely used in software development for a long time, and software models are increasingly used in the field of safety analysis. This paper presents a new approach to... more

Engineering (J.2...) | Jan 15 20

Modular product programs: ACM Transactions on Programming Languages and Systems

Some properties of programs are not about a single run of the program; instead, they relate multiple runs. For example, a program is deterministic if, given the same input, two... more

Formal Methods (D.2.4...) | Jan 14 20

An effective and versatile distance measure for spatiotemporal trajectories: Data Mining and Knowledge Discovery

With the increasing accumulation of spatial temporal path data, such as in the truck and cab datasets considered here, the need for effective path... more

Data Mining (H.2.8...) | Jan 9 20

Internet of Things: information security challenges and solutions: Cluster Computing

The Internet of Things (IoT) has gained tremendous popularity over the years, allowing objects to be connected without intervention from humans. While this has opened up many opportunities for... more

Security, Integrity, & Protection (H.2.0...) | Jan 9 20

How might we increase system trustworthiness?: Communications of the ACM

With the ever-increasing number of vulnerabilities and threats against systems and networks, one would wonder the best way to make systems more trusted. In reality,... more

General (H.0) | Jan 8 20

An analysis of performance evolution of Linux’s core operations: SOSP 19

The GNU Linux operating system (OS) has become, for better or worse, the dominant OS for computer science (CS) research, for deploying large-scale Internet/cloud infrastructures and supercomputers, as well as... more

Linux (D.4.0...) | Jan 6 20

A survey on compiler autotuning using machine learning: ACM Computing Surveys

Most modern compilers contain an optimization phase that tries to optimize the emitted machine code with respect to different objectives. Often this phase is heuristic, and the heuristics can usually be... more

Compilers (D.3.4...) | Dec 31 19

Records with rank polymorphism: ARRAY 19

Most modern libraries for data manipulation transparently handle data with different shapes. For example, in Python’s NumPy, a simple multiplication may be performed across scalars, or complex collections of scalars (for example, collections of matrices... more

Polymorphism (D.3.3...) | Dec 27 19

Artificial psychology: psychological modeling and testing of AI systems

According to the authors, Dan Curtis proposed artificial psychology as a theoretical discipline in 1963 (p. 164). During the 56 years since, it can be expected to have broadly expanded in both complexity... more
Psychology (J.4...) | Jan 17 20

Sweetie 2.0: using artificial intelligence to fight webcam child sex tourism

Webcam-related child sexual abuse, an emerging crime of the 21st century, involves perpetrators using digital media to commit offenses. Adequate amendments to substantive criminal and procedural criminal... more
Law (J.1...) | Jan 17 20

Oceanographic analysis with R

This book is about using state-of-the-art software--in this case, the R language--to solve oceanographic problems. The use of computer software in this field is relatively new. Oceanography, the study of the physical and biological aspects of the ocean, clearly dates... more
Earth & Atmospheric Sciences (J.2...) | Jan 16 20

Lai-Massey cipher designs

Ciphers, which are widely used for encrypting communication, are often classified as either stream ciphers or block ciphers. A stream cipher is defined as “a symmetric cipher that operates with a time-varying transformation on individual plain-text digits. By... more
Cryptographic Controls (D.4.6...) | Jan 13 20

Data management in machine learning systems

Supervised machine learning (ML) systems need labeled datasets for training and testing models, and unsupervised ML systems need datasets for identifying hidden patterns. If the datasets for an application could be generated from an existing database, two... more
General (H.2.0) | Jan 10 20

Exploiting the power of group differences: using patterns to solve data analysis problems

Emerging patterns (EPs) can be used as features, as simple classifiers, and as subpopulation signatures or characterizations. This book presents methods for investigating group differences based on EPs for... more
General (G.0) | Jan 10 20

Ray tracing: a tool for all

In the appendix, Peddie makes the claim that artist Albrecht Dürer originated ray tracing with his 1502 painting of a hare, which displays all of the visual techniques of composition that ray must apply in a good image. Computational ray tracing is not quite... more
Raytracing (I.3.7...) | Jan 9 20

Big data and innovation in tourism, travel, and hospitality

While collecting data has always been an important aspect of the tourism, travel, and hospitality industry, big data has changed the landscape and brought metrics-based strategies to the spotlight. In this... more
General (K.6.0) | Jan 8 20

Robot rules: regulating artificial intelligence

The fast pace of growth in artificial intelligence (AI) algorithms, like deep learning, has transformed many applications. One of the major beneficiaries is the field of robotics. Advanced robots can be seen as embodiments of AI, and hence candidates for... more
Regulation (K.5.2...) | Jan 8 20

Probability and mathematical statistics

Back when I was an undergraduate, I took a course in numerical recipes (in the C programming language). That course introduced me to the approximation of answers to questions that, often times, cannot be solved through analytical means. My sense is that this... more
Probability & Statistics (G.3) | Jan 7 20

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2020 ThinkLoud, Inc.
Terms of Use
| Privacy Policy