Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
July 29, 2016

How to compute with Schrödinger's cat: an introduction to quantum computing
Quantum computing is a new computing paradigm that is very interesting; this video is good primarily for novices in the field who want to get a flavor of the subject. There are two main reasons why this lecture is interesting. First, it presents the basics of quantum computing, which... more
Back in the 1960s at MIT, there was a guy named Harvey Allen, a child of privilege for whom everything was just that easy, or at least that’s the... more
- Robert X. Cringely (1992)
The status, challenges, and future of additive manufacturing in engineering: Computer-Aided Design

There has been exponential growth in the field of manufacturing technology with emerging concepts like additive manufacturing (AM). AM is a technique that adds or deposits layers of material to build... more

Computer-Aided Design (CAD) (J.6...) | Jul 29 16

Tolerating transient illegal turn faults in NoCs: Microprocessors & Microsystems

Faults in on-chip level networks are very common. There have been multiple approaches to detect and correct faults in different levels, such as the error-detecting code (EDC) and error-correcting code (ECC) used in the... more

Reliability, Testing & Fault-Tolerance (B.8.1) | Jul 29 16

Long-term assessment of a service robot in a hotel environment: Robotics and Autonomous Systems

The paper presents a long-term assessment of a service robot, Sacarino robot, in a hotel environment. Its aim is to act as a bellboy to greet guests and provide... more

Robotics (I.2.9) | Jul 29 16

Probabilistic logic programming for hybrid relational domains: Machine Learning

Tracking objects and estimating objects’ sizes from their interactions are challenging state estimation problems in artificial intelligence and robotics. Robotics... more

Uncertain, Fuzzy & Prob. Reasoning (I.2.3...) | Jul 29 16

Collaboration in multi-robot exploration: To meet or not to meet?: Journal of Intelligent and Robotic Systems

We expect that using more communicating robots to explore and map an environment will reduce the time to completion of the task. But this basic question is sometimes neglected: Is the... more

Robotics (I.2.9) | Jul 29 16

Nonlinear Laplacian for digraphs and its applications to network analysis: WSDM 16

This paper relates to spectral graph theory and more specifically concerns the case of digraphs, directed graphs. It proposes an alternative framework to existing digraph approaches, such as Chung’s... more

Graphs & Networks (E.1...) | Jul 28 16

Kangaroo: workload-aware processing of range data and range queries in Hadoop: WSDM 16

Kangaroo is a set of algorithms that is aimed at optimizing the execution of range-based queries. It has been implemented for Hadoop-based systems. Specific examples of range-based data queries include... more

Information Storage (H.3.2) | Jul 28 16

Secure multi-server-aided data deduplication in cloud computing: Pervasive and Mobile Computing

This detailed paper on secure multiserver-aided data deduplication computing gives a quick overview of cloud computing and then delves into the main topic of secure... more

Cloud Computing (C.2.4...) | Jul 28 16

Belief & evidence in empirical software engineering: ICSE 16

A survey of Microsoft software engineers had respondents answer a series of questions about software development. The number of respondents was 564, which represents a 22 percent response rate... more

Software Engineering (D.2) | Jul 28 16

Efficient 3D object segmentation from densely sampled light fields with applications to 3D reconstruction: ACM Transactions on Graphics

To segment a static foreground object from a highly cluttered background in an image can be tricky. But how about using an image sequence? Is it true that... more

Segmentation (I.4.6) | Jul 27 16

Recent advances in computational intelligence in defense and security

While it is obvious that computational problems in defense and security are some of the most crucial in existence, involving the lives and homes of people across the world, it’s also true that they are some of the most... more
Applications & Expert Systems (I.2.1) | Jul 29 16

ENIAC in action

In this volume, the actions surrounding ENIAC are important in understanding the making and remaking of the modern computer. As such, this is not simply a history per se but it features the circumstances, personalities, and ways in which this early... more
ENIAC (K.2...) | Jul 28 16

An introduction to optimal satellite range scheduling

Satellite range scheduling is the problem of matching task requests to available orbiting and ground resources during their mutual visibility windows. Additional factors such as weather and light conditions... more
Aerospace (J.2...) | Jul 28 16

ICT in education in global context: comparative reports of innovations in K-12 education

Given my interest in the use of ICT in education, the title caught my interest, and I took up the book for review. The book is a collection of articles by a range of researchers and practitioners... more
Computer Uses in Education (K.3.1) | Jul 28 16

Design and implementation of the MTX operating system

Design and implementation books for operating systems (OSs) can help one understand many details and subtleties. This book is no exception, but there are a couple of books that rival it [1,2]. The design and implementation of the FreeBSD operating... more
General (D.4.0) | Jul 27 16

Designing connected products: UX for the consumer Internet of Things

Seven hundred pages of text on topics like network architecture, battery-life considerations, and authentication mechanisms; only a masochist would read this stuff! The good news is that there are... more
User-Centered Design (H.5.2...) | Jul 27 16

Excel 2013 for educational and psychological statistics: a guide to solving practical problems

Truly living up to its name, this book is not intended to be yet another Excel encyclopedia but rather targets the essential curricular requirements that would be found in a sociology or psychology major’s statistics... more
Excel (H.4.1...) | Jul 27 16

Cyber operations: building, defending, and attacking modern computer networks

Among the wide range of literature available on the topic, this book distinguishes itself for its practical and didactical cut, which gives the reader an... more
Security & Protection (C.2.0...) | Jul 27 16

Computational intelligence

This book is composed of selected papers that were submitted and presented at the Fifth International Joint Conference on Computational Intelligence (IJCCI), held in Portugal in 2013. The conference is divided... more
Deduction & Theorem Proving (I.2.3) | Jul 26 16

Introduction to quantum physics and information processing

Quantum mechanics (QM) is the study of subatomic phenomena that began in the 20th century and has steadily added to the knowledge of mankind, providing us with such technologies as the transistor and... more
Physics (J.2...) | Jul 25 16

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2016 ThinkLoud, Inc.
Terms of Use
| Privacy Policy