Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
January 22, 2017

The accidental taxonomist (2nd ed.)
The human urge to name and classify is ancient. According to the Bible, the first task ever performed by a human was the formation of a taxonomy, when Adam named the animals. But he left no documentation for others to use. Carl Linnaeus filled this gap in the 18th century, enabling the systematic development of the biological... more
Let me say a little about today’s computer. This is a brain, though not an exciting intellectual generalist. The cortex has a thousand times as... more
- J. D. Williams (1960)
Topology-oriented incremental algorithm for the robust construction of the Voronoi diagrams of disks: ACM Transactions on Mathematical Software

Voronoi diagrams are important in many applications that range from theoretical computing to computational geometry, to computer graphics and computer vision. The relatively new problem of computing... more

Geo. Algorithms, Lang. & Syst. (I.3.5...) | Jan 20 17

Multiple kernel fuzzy SVM-based data fusion for improving peptide identification: IEEE/ACM Trans. on Computational Biology & Bioinformatics

This paper proposes a fuzzy support vector machine (SVM)-based data fusion technique that aims to distinguish true or false peptide... more

Biology & Genetics (J.3...) | Jan 19 17

Application of IT in healthcare: a systematic review: ACM SIGBioinformatics Record

Information technology (IT) is expanding its scope from communications to other fields, including engineering, the environment, healthcare, and... more

Health (J.3...) | Jan 19 17

High-performance data structures for de novo assembly of genomes: cache oblivious generic programming: BCB 16

This short paper presents a C++ library, in a generic programming style, for more efficient de novo genome assembly. The basic idea is to use a cache... more

Software Libraries (D.2.2...) | Jan 19 17

A new efficient algorithm for the all sorting reversals problem with no bad components: IEEE/ACM Trans. on Computational Biology & Bioinformatics

The paradigm of Wang’s paper is computational biology, more specifically genome rearrangement. The genome rearrangement problem simply means... more

Biology & Genetics (J.3...) | Jan 17 17

A deterministic fully polynomial time approximation scheme for counting integer knapsack solutions made easy: Theoretical Computer Science

The knapsack problem (KP) appears in many forms in science, economics, and engineering. The classical formulation uses a set of items, each with a weight and a value, and asks to determine the number... more

Dynamic Programming (I.2.8...) | Jan 16 17

A new faster algorithm for factoring skew polynomials over finite fields: Journal of Symbolic Computation

Let k be a finite field of characteristic p and size pqr, and let σ be an automorphism of k of order r. The ring of skew polynomials... more

Computations on Polynomials (F.2.1...) | Jan 13 17

Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares: Theoretical Computer Science

Libert et al. develop a fully distributed, non-interactive, adaptively secure threshold signature scheme with scalable share size. A threshold... more

Public Key Cryptosystems (E.3...) | Jan 13 17

An approach to checking consistency between UML class model and its Java implementation: IEEE Transactions on Software Engineering

Checking for consistency between a design and its implementation is usually done manually. It is crucial to check that the diagrams... more

UML (D.3.2...) | Jan 12 17

Results of a digital library curriculum field test: Int. Journal on Digital Libraries

The digital library curriculum was the result of a 2006 to 2009 project funded by the National Science Foundation through grants to Virginia Tech and the... more

Digital Libraries (H.3.7) | Jan 6 17

The Dart programming language

Dart is a general-purpose, object-oriented, optionally typed programming language designed to be easy to learn, easy to use, and easy to run efficiently in multi-core, distributed environments, including the World Wide Web. The Dart programming language describes... more
Object-Oriented Languages (D.3.2...) | Jan 20 17

Search engines for children: search user interfaces and information-seeking behaviour

This book focuses on a very important educational subject matter: the proper usage of search engines for children. In order to approach this, one has to study the behavior of children when querying... more
Information Search & Retrieval (H.3.3) | Jan 20 17

Intelligent systems and applications: extended and selected results from the SAI Intelligent Systems Conference (IntelliSys) 2015

This book is a collection of “extended and selected results” from the 2015 SAI Intelligent Systems Conference, held in London. Each of the 21 papers is about 20 pages in length. While the... more
Applications & Expert Systems (I.2.1) | Jan 20 17

Digital defense: a cybersecurity primer

Digital defense is a well-written, easy-to-follow, practical book, suitable for personal as well as professional use. It makes for a worthy read as we live in a digital world and are exposed to many known and unknown... more
Security & Protection (K.6.5) | Jan 19 17

Foundations of quantum programming

We keep hearing several buzzwords: big data, Internet of Things, machine learning, and quantum computing. This last one is the most “futuristic” among them in the sense that you cannot go online and buy... more
Physics (J.2...) | Jan 19 17

DITA -- the topic-based XML standard: a quick start

Unlike classic Hypertext Markup Language (HTML), which is oriented to the format of material presented on web pages, Extensible Markup Language (XML) allows developers to separate content from format. There are many special-purpose XML implementations... more
Standards (I.7.2...) | Jan 19 17

The art of electronics

It is difficult to imagine late-night bedtime reading of a 1,192 page, 2.3 kg book. Yet this is what I found myself doing when I got my hands on the third edition of this Horowitz and Hill classic. Although I’m a proud and happy owner of the book’s 1989 second... more
Electronics (J.2...) | Jan 19 17

Reconsidering change management: applying evidence-based insights in change management practice

Imagine a group of managers and employees of an organization engaged in a simple experiential exercise designed to demonstrate barriers to change [1]. One of the participants plays the role of chief... more
General (K.6.0) | Jan 18 17

Computer age statistical inference: algorithms, evidence, and data science

No healthy scientific discipline stands still, and active practitioners recognize the flux of ideas and frequently contribute to it. But the exigencies of pedagogy make it difficult for a student to understand the trajectory of a... more
Mathematics & Statistics (J.2...) | Jan 18 17

Computer supported qualitative research

Today both qualitative and quantitative research involves heavy use of computer tools. Learning about the tools used for deep qualitative research is important for researchers. This is an area of... more
Social & Behavioral Sciences (J.4) | Jan 18 17

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy