Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
February 24, 2017

Big data is (at least) four different problems
This video is an hour-long talk by Michael Stonebraker on potential disruptions in the world of big data. “Wait, a minute!” you might say, “I thought big data was the disrupter. How can it be disrupted as well?” Well, it can. And in this extremely informative talk, Stonebraker lays out the case for disruption in big data clearly... more
The growth of computational facilities in the period since World War I has already been phenomenal, and the possibilities in the near future are beyond... more
- William Edmund Milne (1949)
Modeling and understanding human routine behavior: CHI 16

The study of human routines is expanding the scope of behavioral sciences in light of actions performed by humans. Such studies help in improving bad habits, inexpert behaviors, and suboptimal routines... more

Miscellaneous (H.5.m) | Feb 23 17

Bayesian multi-tensor factorization: Machine Learning

Data mining is increasingly facing the problem of extracting new knowledge from experimental data collected from complex phenomena. To extract hidden information... more

Matrix Inversion (G.1.3...) | Feb 23 17

Dempster’s rule of combination: International Journal of Approximate Reasoning

The rule of combination of belief functions on infinite sets of possibilities is developed in this paper. The author continues his developments on Dempster’s theory on lower probabilities in... more

Approximation (G.1.2) | Feb 22 17

Estimating the number of tetrahedra determined by volume, circumradius and four face areas using Groebner basis: Journal of Symbolic Computation

Given a tetrahedron, we can compute its volume, its circumradius (radius of the sphere going through the four vertices), and the... more

Symbolic & Algebraic Manipulation (I.1) | Feb 22 17

Dimensional enrichment of statistical linked open data: Web Semantics: Science, Services and Agents on the World Wide Web

As with most consolidated analysis techniques, online analytical processing (OLAP) usually assumes a local data environment (for example, analysis... more

Data Models (H.2.1...) | Feb 16 17

Interacting multiview tracker: IEEE Transactions on Pattern Analysis and Machine Intelligence

Tracking objects in image sequences, in the presence of blurring, occlusion, and variations in illumination and object pose, is an important and challenging... more

Tracking (I.4.8...) | Feb 15 17

Efficient large-scale trace checking using MapReduce: ICSE 16

In software engineering, software verification and validation has always been a challenging task. On the other hand, the emergence of big data and cloud computing has opened a new horizon... more

Software Engineering (D.2) | Feb 13 17

Parameterized complexity of critical node cuts: Theoretical Computer Science

The critical node cut (CNC) problem is defined as follows: given an (undirected) graph G and two integers k and x, decide if k nodes can be removed from G such that... more

Graph Algorithms (G.2.2...) | Feb 13 17

Space-efficient path-reporting approximate distance oracles: Theoretical Computer Science

Graph spanners are sparse subgraphs that preserve distances between nodes of the original graph to an approximation that is bounded, usually given in the form of a multiplication factor known as stretch... more

Routing & Layout (F.2.2...) | Feb 10 17

A survey on context learning: IEEE Transactions on Knowledge and Data Engineering

This paper provides a structured and extensive survey on context learning methods. It groups context learning methods into four categories, in order of complexity: explicit analysis, implicit analysis... more

Learning (I.2.6) | Feb 9 17

Numerical methods and modelling for engineering

I always appreciated numerical methods courses, possibly because I found the field a simpler and more versatile alternative to learning the analytic solutions across many application domains. Although this book is... more
Numerical Algorithms (G.1.0...) | Feb 23 17

Handbook of genetic programming applications

Over the years, researchers have attempted to solve tough scientific problems using techniques from the field of artificial intelligence. One such collection of techniques is genetic programming... more
Optimization (G.1.6) | Feb 23 17

Programming for computations -- MATLAB/Octave

The title suggests the book is about MATLAB programming, and it is. It’s also about numerical analysis. It’s a textbook for a numerical analysis course that integrates MATLAB programming as its... more
MATLAB (G.4...) | Feb 22 17

IsoGeometric analysis: a new paradigm in the numerical approximation of PDEs

For their daily work, computational engineers in many technical disciplines rely heavily on the use of finite element software systems. However, certain features of the traditional mathematical approaches... more
Partial Differential Equations (G.1.8) | Feb 22 17

How to use objects: code and concepts

Object orientation was developed and has evolved as an effective software development methodology to model the complexities of real-life phenomena and outperform other legacy methods, which were lagging... more
Object-Oriented Programming (D.1.5) | Feb 21 17

The world made meme: public conversations and participatory media

Round up the usual suspects: Black is beautiful; I’ll have what she’s having; We are the 99 percent; We’ll always have Paris; Read my lips--memes that have survived over time. They are cultural carriers transmitting... more
Web-Based Interaction (H.5.3...) | Feb 17 17

User interface design of digital textbooks: how screens affect learning

One of the recent major changes in educational technology has been learning using digital books, or ebooks. Some of their benefits include portability, affordability, interactivity, and an enhanced... more
User Interfaces (H.5.2) | Feb 17 17

Springer handbook of robotics (2nd ed.)

This handbook describes a very large number of topics on robotics. It describes robots with individual functional, control, programming, social, application, and historical aspects. It provides necessary... more
Robotics (I.2.9) | Feb 17 17

The tyranny of uncertainty: a new framework to predict, remediate and monitor risk

What is risk? For our purposes, risk is some event or set of events that interferes with a planned process or activity. Generally, in the business world, organizations seek to mitigate risks, to balance... more
Simulation & Modeling (I.6) | Feb 16 17

Graph-based social media analysis

The proliferation of data from social media is presenting new opportunities for discovering and analyzing social networks. Much of this data, however, is unstructured, presenting challenges in both constructing and inferring information from these networks. Graph analytics is a tool... more
Data Mining (H.2.8...) | Feb 14 17

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy