Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
June 23, 2018

Dempster’s rule of combination
The rule of combination of belief functions on infinite sets of possibilities is developed in this paper. The author continues his developments on Dempster’s theory on lower probabilities in order to generalize already-obtained results in the framework of “theory of evidence” that are important for approximate reasoning using such a... more
It is not yet known whether a computer has its own consciousness, and it would be hard to find out about this. When you walk into one of those great... more
- Lewis Thomas (1995)
SAViL: cross-display visual links for sensemaking in display ecologies: Personal and Ubiquitous Computing

This paper discusses software that links data scattered across separate displays. Software intended for users who need to integrate documents from different... more

Personal Computing (K.8) | Jun 22 18

Decomposing images into layers via RGB-space geometry: ACM Transactions on Graphics

The notion of representing a color image as a set of translucent layers, each of a single (non-primary) color, is useful in the field of digital image painting. Although the layering is not present... more

General (I.4.0) | Jun 22 18

Serverless computing: economic and architectural impact: ESEC/FSE 17

The concept of virtual machines has liberated--elegantly and very successfully-- information technology (IT) from hardware constraints. The next step in virtualization now concerns the very programs themselves: in... more

Distributed Programming (D.1.3...) | Jun 22 18

Lightweight, obfuscation-resilient detection and family identification of Android malware: ACM Transactions on Software Engineering and Methodology

Malware is undoubtedly one of the most real and potent threats in the smartphone industry. Android’s open ecosystem in terms of code as well as... more

Security and Protection (C.2.0...) | Jun 22 18

Ant colony algorithm for automotive safety integrity level allocation: Applied Intelligence

Any technical system can fail and cause damages to its users and other people at large; the more damages a failure can cause, the more hazardous the system is. Of course, engineers... more

Constrained Optimization (G.1.6...) | Jun 21 18

Attention recognition in EEG-based affective learning research using CFS+KNN algorithm: IEEE/ACM Transactions on Computational Biology and Bioinformatics

Probably the core of this paper is the usage of “correlation-based feature selection (CFS) plus a k-nearest neighbors (KNN) data mining... more

Biology & Genetics (J.3...) | Jun 21 18

Enhancing collaboration in classroom using smartphone in developing countries: GROUP 18

The paper discusses a smartphone application with four features: the presentation of audio quiz questions, optical character recognition (OCR) scoring on a server, record management, and an English dictionary... more

Education (J.1...) | Jun 21 18

Symmetric masks for in-fill pixel interpolation on discrete p:q lattices: Journal of Mathematical Imaging and Vision

This paper is an extension of a conference paper presented by the second two authors [1]. The authors consider the problem of how to fill in the blank pixel values that result from an affine... more

Discrete Mathematics (G.2) | Jun 20 18

Rivulet: a fault-tolerant platform for smart-home applications: Middleware 17

The paper presents Rivulet, a distributed middleware for smart home applications. The main idea of Rivulet is to move from a state-of-the-art cloud-centric architectural solution, where the whole application logic is... more

Fault Tolerance (C.4...) | Jun 20 18

Social MatchUP: CHI EA 18

As soon as this paper came across my desk, I knew I had to read and review it. What could be better than a virtual teaching environment for children to whom reality presents a struggle? Social skills are... more

Multimedia Information Systems (H.5.1) | Jun 19 18

Mathematical grammar of biology

What is life? This is a question that bothers everyone. Many scientists, including physicists such as Schrödinger, have attempted to explain it using science. Toward the end of the last century, a scientific revolution happened that resulted in the digital biology... more
Biology & Genetics (J.3...) | Jun 22 18

Compact representations for the design of quantum logic

This book is in the area of quantum computer design. It proposes a new approach for such designs. It provides the background information required to understand the new approach. It also describes experimental... more
Computer-Aided Design (CAD) (J.6...) | Jun 21 18

Credit scoring and its applications (2nd ed.)

Anyone involved in credit scoring, from financial professionals to advanced students in mathematics and business, should own this treatise. Heavily mathematical in its approach, it addresses the practical mechanics... more
Financial (J.1...) | Jun 21 18

Bioinformatics for evolutionary biologists: a problems approach

This book was specifically designed to keep all elements needed for understanding the fundamental research approaches used in bioinformatics in a single text. It aims to help future evolutionary biologists... more
Biology & Genetics (J.3...) | Jun 21 18

Smart learning in smart cities

Smart learning has been a neglected aspect of smart technology applications, which this work seeks to address. The book addresses the connection between smart cities and smart learning. Then, the second part introduces smart learning in... more
Education (J.1...) | Jun 20 18

Introduction to software testing (2nd ed.)

Software testing is essential. It doesn’t much matter if you can do something quickly or in minimal memory or with a spiffy web interface if the results are incorrect, though incorrect might include “more or less correct” in many circumstances (this is often explicit in... more
Testing & Debugging (D.2.5) | Jun 15 18


I like books about the history of the computing field. Those of us who lived through all of it delight in stories of folks who pioneered all of what we have today. This is a very good example of one of those books. It tells the story of six Silicon Valley principals (it variously... more
History of Computing (K.2) | Jun 15 18

Trust and reputation management systems: an e-business perspective

This 86-page treatise provides information officers and project managers with a conceptual and computational approach to managing trust and reputation in the e-commerce world. The author is a faculty... more
Electronic Commerce (K.4.4) | Jun 14 18

Secondary liability of Internet service providers

Secondary liability occurs when an entity facilitates, makes material contributions to, or is otherwise responsible for violating a law or the right of another party. In the case of Internet service providers (ISPs), determining liability for the actions of users... more
Governmental Issues (K.5.2) | Jun 14 18


The book proposes a new model of higher education that goes beyond the classical undergraduate/graduate model and should be a better fit for the fabric of a modern technologically driven society. It consists of five chapters. The first chapter serves as motivation... more
Computers & Education (K.3) | Jun 14 18

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy