Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
September 30, 2016

Discrete Fourier and wavelet transforms
Fourier and wavelet transforms have proven to be indispensable tools in signal processing. They are taught in many courses, both at the graduate and undergraduate levels. When deciding how to teach these topics, the lecturer can choose from a number of different paths. Goodman’s textbook is for an undergraduate... more
We have seen that the symbols of Logic are subject to the special law, x2 = x. Now of the symbols of Number there are but two, viz. 0 and 1, which are subject... more
- George Boole (1854)
Out-of-band covert channels--a survey: ACM Computing Surveys

In recent years, covert channels were shifted back into the focus of research. These channels can be used to communicate in a stealthy way not recognizable by third parties. Typical application scenarios... more

General (C.2.0) | Sep 30 16

The interplay of pedestrian navigation, wayfinding devices, and environmental features in indoor settings: ETRA 16

If you have ever thought about the differences in or influences on pedestrian route processing, this paper is for you. The authors compare the results of... more

Tracking (I.4.8...) | Sep 29 16

Discrete Bayesian network classifiers: a survey: ACM Computing Surveys

Bayesian networks (BN) are used to estimate the value of one of the attributes (termed as the predicted or class attribute) of the dataset utilizing the remaining attributes (termed as predictor attribute(s)). The naive Bayes (NB)... more

Models (I.5.1) | Sep 28 16

Compensating for sub-pixel shift in motion estimation: MOCO 16

Motion estimation in imagery is the process of locating a subimage in two images, a reference and a test image, and precisely determining the displacement. When done to subpixel accuracy, the process generally... more

Pattern Recognition (I.5) | Sep 28 16

Designing for intuitive use for non-human users: ACE 15

When I read this paper, I couldn’t help but think of the infinite monkey theorem: an army of monkeys hunched over typewriters. But the question the authors investigate is not the probability of a... more

Input Devices & Strategies (H.5.2...) | Sep 28 16

epiC: an extensible and scalable system for processing big data: The VLDB Journal: The International Journal on Very Large Data Bases

Addressing the problem of performance while processing big data, the authors propose a new programming model, named epiC, that deals with the... more

General (H.2.0) | Sep 27 16

Declarative framework for specification, simulation and analysis of distributed applications: IEEE Transactions on Knowledge and Data Engineering

Distributed applications are normally overlaid on a network of computing elements (nodes). Their specification requires the declaration... more

Distributed Applications (C.2.4...) | Sep 23 16

Why designers might want to redesign company processes to get to better UX design: a case study: CHI EA 16

In this paper, the authors summarize the various problems faced by software/user experience (UX) designers in implementing change that on the surface seems like an easy job that has widespread... more

Requirements/Specifications (D.2.1) | Sep 21 16

Prediction of who will be the next speaker and when using gaze behavior in multiparty meetings: ACM Transactions on Interactive Intelligent Systems

The authors study an issue that, as far as I know, has not been studied in the past: predicting the next speaker and the timing of the start of his or her... more

User/Machine Systems (H.1.2) | Sep 21 16

Coupling interactions and performance: predicting team performance from thin slices of conflict: ACM Transactions on Computer-Human Interaction

The basic question is whether the performance of a team can be predicted from a 15-minute observation, a “thin slice” of the... more

User/Machine Systems (H.1.2) | Sep 21 16

Turing’s vision: the birth of computer science

Books about Alan Turing’s life and work have always gone to one of two extremes, either to the complete technical or to the complete trivial focusing on, for example, Turing’s sexual preferences, which should be completely... more
Theory (K.2...) | Sep 29 16

Computer networks and Internets (6th ed.)

For many years, Comer’s book has been an excellent source for those who want to learn about or teach the fundamentals of networking. Obviously, this has not changed with the new updated edition. Being an overview of all the related techniques, from the... more
Internet (C.2.1...) | Sep 29 16

Practical software architecture: moving from system context to deployment

Oh! Another book on software architecture! Perhaps the mysteries behind building software will definitely be solved one day! Often it is argued that good software architecture without implementation... more
Software Architectures (D.2.11) | Sep 28 16

Discovering modern C++: an intensive course for scientists, engineers, and programmers

This is not a conventional book teaching C++ programming. The author targets scientists and engineers, and teaches them the utilization of advanced C++ for scientific studies. There are a number... more
C++ (D.3.2...) | Sep 28 16

Fundamentals of machine learning for predictive data analytics

This is an interesting book that presents the fundamentals of machine learning for predictive analytics in an intuitive and highly educational way. The book is structured in 11 chapters and three appendices. Each chapter... more
Learning (I.2.6) | Sep 28 16

Reactive Internet programming

In choosing this book to, in Nobel laureate J.D. Watson’s words, “read around [my] subject” [1], laureate Richard Feynman’s expressed truism, namely that “the same equations have the same solutions,” came to mind [2]. My adaptation here would be that, in software... more
Design (D.2.10) | Sep 26 16

Data wrangling with Python

“Wrangle” is a new version of an old word that has evolved in some interesting and revealing ways. Originally, wrangle meant to argue or dispute. For example, you might wrangle with your neighbor over a property line. The meaning drifted over time so... more
Python (D.3.2...) | Sep 22 16

REBUTTAL: Improving computer science education

I want to thank the reviewer for this appraisal, which I read with great interest. She rightly said that “we should be concerned with logical thinking and putting the resulting thoughts into practice.” She also rightly added, “word processing, spreadsheets, and databases... more
Computer Science Education (K.3.2...) | Sep 21 16

Enterprise IoT: a definitive handbook

The Internet of Things (IoT), the idea of connecting everything using Internet protocols, is one of the most innovative visions across industries as well as daily life. A wide range of subjects, from tiny sensors to big data analysis, are related to IoT; it is not easy for... more
Internet (C.2.1...) | Sep 20 16

Trust and communication in a digitized world: models and concepts of trust research

Trust is foundational for all interactions. While one might suppose that digital interactions are inherently disadvantaged in creating trust, the authors demonstrate that this stereotype may not... more
Data Communications (C.2.0...) | Sep 20 16

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2016 ThinkLoud, Inc.
Terms of Use
| Privacy Policy