notable computing books and articles—2016

NOTABLE COMPUTING BOOKS
AND ARTICLES—2016
Computing Reviews is happy to bring you the 21st annual list of notable items published in computing—this time for
2016. We reached out to many in the computing community for nominations: our reviewers, CR category editors, the
editors in chief of journals we cover, and computer scientists in both industry and academia. In addition, we included
proceedings papers that were recognized as “Best Papers” at their respective conferences, as well as the most downloaded
journal papers from some of the top journals covered in CR.
You will find 231 items on our list, with numerous publishers represented. As we continue to improve our methods for
collecting nominations and involve more of your peers in the computing community, we hope to bring you even more
definitive lists in the coming years.
We welcome your feedback, and encourage you to email us with any questions ([email protected]).
Angela Pugh
Managing Editor
Computing Reviews
A.
General Literature
• CALUDE C. (Ed.) The human face of computing. Imperial
College Press, 2016.
• SEDGEWICK, R.; AND WAYNE, K. Computer science: an interdisciplinary approach. Addison-Wesley Professional,
2016.
B.
Hardware
DAN, A. M.; LAM, P.; HOEFLER, T.; AND VECHEV, M. Modeling and analysis of remote memory access programming. In Proc. of the ACM SIGPLAN International
Conference on Object-Oriented Programming, Systems,
Languages, and Applications (OOPSLA), ACM, 2016,
129–144.
HAJ-YIHIA, J.; YASIN, A.; BEN ASHER, Y.; AND MENDELSON, A.
Fine-grain power breakdown of modern out-of-order cores
and its implications on Skylake-based systems. ACM
Transactions on Architecture and Code Optimization 13,
4 (Dec. 2016), Article No. 56.
WANG, P.; AND MCALLISTER, J. Streaming elements for
FPGA signal and image processing accelerators. IEEE
Transactions on Very Large Scale Integration (VLSI) Systems 24, 6 (June 2016), 2262–2274.
XIAO, K.; FORTE, D.; JIN, Y.; KARRI, R.; BHUNIA, S.; AND
TEHRANIPOOR, M. Hardware Trojans: lessons learned
after one decade of research. ACM Transactions on
Design Automation of Electronic Systems 22, 1 (Dec.
2016), Article No. 6.
186
C.
Computer Systems
Organization
AGELASTOS, A.; ALLAN, B.; BRANDT, J.; GENTILE, A.;
LEFANTZI, S.; MONK, S.; OGDEN, J.; RAJAN, M.; AND
STEVENSON, J. Continuous whole-system monitoring
toward rapid understanding of production HPC applications and systems. Parallel Computing 58 (Oct. 2016),
90–106.
ALTMEYER, S.; DOUMA, R.; LUNNISS, W.; AND DAVIS, R. I.
On the effectiveness of cache partitioning in hard realtime systems. Real-Time Systems 52, 5 (Sept. 2016),
598–643.
ÁLVAREZ, C.; AYGUADÉ, E.; BOSCH, J.; BUENO, J.; CHERKASHIN, A.;
FILGUERAS, A.;
JIMÉNEZ-GONZÁLEZ, D.;
MARTORELL, X.; NAVARRO, N.; VIDAL, M.; THEODOROPOULOS, D.; PNEVMATIKATOS, D. N.; CATANI, D.; ORO, D.;
FERNÁNDEZ, C.; SEGURA, C.; RODRÍGUEZ, J.; HERNANDO, J.;
SCORDINO, C.; GAI, P.; PASSERA, P.; POMELLA, A.;
BETTIN, N.; RIZZO, A.; AND GIORGI, R. The AXIOM software layers. Microprocessors & Microsystems 47, Part B
(Nov. 2016), 262–277.
• BALANI, N. Enterprise IoT: a definitive handbook. CreateSpace Independent Publishing Platform, 2016.
BERTINO, E.; CHOO, K.-K.R.; GEORGAKOPOLOUS, D.; AND
NEPAL, S. Internet of Things (IoT): smart and secure service delivery. ACM Transactions on Internet Technology
16, 4 (Dec. 2016), Article No. 22.
BIENKOWSKI, M.; KLONOWSKI, M.; KORZENIOWSKI, M.; AND
KOWALSKI, D. R. Randomized mutual exclusion on a
multiple access channel. Distributed Computing 29, 5
(Oct. 2016), 341–359.
Computing Reviews
•
April 2017
NOTABLE COMPUTING BOOKS AND ARTICLES
BREGU, E.; CASAMASSIMA, N.; CANTONI, D.; MOTTOLA, L.;
AND WHITEHOUSE, K. Reactive control of autonomous
drones. In Proc. of the 14th Annual International Conference on Mobile Systems, Applications, and Services
(MobiSys), ACM, 2016, 207–219.
CHEN, M.; QIAN, Y.; MAO, S.; TANG, W.; AND YANG, X.
Software-defined mobile networks security. Mobile Networks and Applications 21, 5 (Oct. 2016), 729–743.
CHO, S.; AND JULIEN, C. CHITCHAT: navigating tradeoffs
in device-to-device context sharing. In Proc. of the IEEE
International Conference on Pervasive Computing and
Communications (PerCom), IEEE, 2016, 1–10.
COPPOLA, R.; AND MORISIO, M. Connected car: technologies,
issues, future trends. ACM Computing Surveys 49, 3
(Dec. 2016), Article No. 46.
HAYES, T.; AND ALI, F. H. Robust ad-hoc sensor routing
(RASeR) protocol for mobile wireless sensor networks.
Ad Hoc Networks 50, 1 (Nov. 2016), 128–144.
HUBERMAN, B. A.; AND ASUR, S. BidPacket: trading bandwidth in public spaces. NETNOMICS: Economic Research
and Electronic Networking 17, 3 (Nov. 2016), 223–232.
KELLOGG, B.; TALLA, V.; GOLLAKOTA, S.; AND SMITH, J. R.
Passive Wi-Fi: bringing low power to Wi-Fi transmissions. In Proc. of the 13th USENIX Symposium on
Networked Systems Design & Implementation (NSDI),
USENIX, 2016, 151–164.
KUMAR, S.; AND HEGDE, R. M. Multi-sensor data fusion
methods for indoor localization under collinear ambiguity. Pervasive and Mobile Computing 30 (Aug. 2016),
18–31.
KUREK, T.; NIEMIEC, M.; AND LASON, A. Taking back control of privacy: a novel framework for preserving
cloud-based firewall policy confidentiality. International
Journal of Information Security 15, 3 (June 2016),
235–250.
LENZEN, C.; AND WATTENHOFER, R. Tight bounds for parallel
randomized load balancing. Distributed Computing 29,
2 (Apr. 2016), 127–142.
LIMONCELLI, T. Are you load balancing wrong?. Queue 14,
6 (Nov.–Dec. 2016), 1–9.
LO, D.; CHENG, L.; GOVINDARAJU, R.; RANGANATHAN, P.; AND
KOZYRAKIS, C. Improving resource efficiency at scale with
Heracles. ACM Transactions on Computer Systems 34, 2
(May 2016), Article No. 6.
LV, Y.; AND MOSCIBRODA, T. Fair and resilient incentive
tree mechanisms. Distributed Computing 29, 1 (Feb.
2016), 1–16.
• MAHMOOD, Z. Connectivity frameworks for smart devices.
Springer, 2016.
MIDI, D.; SULTANA S.; AND BERTINO, E. A system for response
and prevention of security incidents in wireless sensor
networks. ACM Transactions on Sensor Networks 13, 1
(Dec. 2016), Article No. 1.
Computing Reviews
REHMAN, Z.; HUSSAIN, O. K.; HUSSAIN, F. K.; CHANG, E.;
AND DILLON, T. User-side QoS forecasting and management of cloud services. World Wide Web 18, 6 (Nov.
2015), 1677–1716.
SHETH, A. Internet of Things to smart IoT through semantic,
cognitive, and perceptual computing. IEEE Intelligent
Systems 31, 2 (Mar.–Apr. 2016), 108–112.
SINGH, S.; AND CHANA, I. A survey on resource scheduling
in cloud computing: issues and challenges. Journal of
Grid Computing 14, 2 (June 2016), 217–264.
WANG, H.; ROSA, C.; AND PEDERSEN, K. I. Dual connectivity for LTE-advanced heterogeneous networks. Wireless
Networks 22, 4 (May 2016), 1315–1328.
WANG, K.; DU, M.; YANG, D.; ZHU, C.; SHEN, J.; AND
ZHANG, Y. Game-theory-based active defense for intrusion detection in cyber-physical embedded systems.
ACM Transactions on Embedded Computing Systems 16,
1 (Nov. 2016), Article No. 18.
YANG, D.; XUE, G.; FANG, X.; AND TANG, J. Incentive mechanisms for crowdsensing: crowdsourcing with smartphones. IEEE/ACM Transactions on Networking 24, 3
(June 2016), 1732–1744.
ZHANG, B.; REN, K.; XING, G.; FU, X.; AND WANG, C. SBVLC:
secure barcode-based visible light communication for
smartphones. IEEE Transactions on Mobile Computing
15, 2 (Feb. 2016), 432–446.
D.
Software
AIKEN, P. EXPERIENCE: succeeding at data management—BigCo attempts to leverage data. Journal of Data
and Information Quality 7, 1–2 (June 2016), Article
No. 8.
BERSANI, M. M.; BIANCULLI, D.; GHEZZI, C.; KRSTIĆ, S.; AND
SAN PIETRO, P. Efficient large-scale trace checking using
MapReduce. In Proc. of the 38th International Conference on Software Engineering (ICSE), ACM, 2016,
888–898.
BROCKSCHMIDT, M.; EMMES, F.; FALKE, S.; FUHS, C.; AND
GIESL, J. Analyzing runtime and size complexity of integer programs. ACM Transactions on Programming Languages and Systems 38, 4 (Oct. 2016), Article No. 13.
BURNS, A. Why the expressive power of programming languages such as Ada is needed for future cyber physical
systems. In Reliable software technologies: Ada-Europe
2016, Springer, 2016, 3–11.
CHAPMAN, K.; HOSKING, A. L.; AND MOSS, J. E. B. Hybrid
STM/HTM for nested transactions on OpenJDK. In
Proc. of the ACM SIGPLAN International Conference
on Object-Oriented Programming, Systems, Languages,
and Applications (OOPSLA), ACM, 2016, 660–676.
•
April 2017
187
NOTABLE COMPUTING BOOKS AND ARTICLES
CHRISTAKIS, M.; MÜLLER, P.; AND WÜSTHOLZ, V. Guiding
dynamic symbolic execution toward unverified program
executions. In Proc. of the 38th International Conference
on Software Engineering (ICSE), ACM, 2016, 144–155.
GHANI, N.; NORDVALL FORSBERG, F.; AND SIMPSON, A. Comprehensive parametric polymorphism: categorical models
and type theory. In Proc. of the 19th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS), Springer, 2016, 3–19.
GIL, Y.; AND LEVY, T. Formal language recognition with
the Java type checker. In Proc. of the European Conference on Object-Oriented Programming (ECOOP),
Dagstuhl LIPIcs, 2016, 10:1–10:27.
GOUSIOS, G.; STOREY, M.-A.; AND BACCHELLI, A. Work practices and challenges in pull-based development: the contributor’s perspective. In Proc. of the 38th International
Conference on Software Engineering (ICSE), ACM, 2016,
285–296.
HANAPPI, O.; HUMMER, W.; AND DUSTDAR, S. Asserting reliable convergence for configuration management scripts.
In Proc. of the ACM SIGPLAN International Conference
on Object-Oriented Programming, Systems, Languages,
and Applications (OOPSLA), ACM, 2016, 328–343.
• JULIAN, D. Designing machine learning systems with
Python: design efficient machine learning systems that
give you more accurate results. Packt Publishing, 2016.
KREBBERS, R. A formal C memory model for separation
logic. Journal of Automated Reasoning 57, 4 (Dec.
2016), 319–387.
LARGENT, D. L. Measuring and understanding team development by capturing self-assessed enthusiasm and skill
levels. ACM Transactions on Computing Education 16,
2 (Mar. 2016), Article No. 6.
LI, Y.; TAN, T.; ZHANG, Y.; AND XUE, J. Program tailoring: slicing by sequential criteria. In Proc. of the
European Conference on Object-Oriented Programming
(ECOOP), Dagstuhl LIPIcs, 2016, 15:1–15:27.
MADSEN, M.; TIP, F.; ANDREASEN, E.; SEN, K.; AND
M⊘LLER, A. Feedback-directed instrumentation for deployed JavaScript applications. In Proc. of the 38th International Conference on Software Engineering (ICSE),
ACM, 2016, 899–910.
MENENDEZ, D.; AND NAGARAKATTE, S. Termination-checking
for LLVM peephole optimizations. In Proc. of the
38th International Conference on Software Engineering
(ICSE), ACM, 2016, 191–202.
MINÉ, A.; BRECK, J.; AND REPS, T. An algorithm inspired by
constraint solvers to infer inductive invariants in numeric
programs. In Proc. of the 25th European Symposium on
Programming (ESOP), Springer, 2016, 560–588.
OUNI, A.; KESSENTINI, M.; SAHRAOUI, H.; INOUE, K.; AND
DEB, K. Multi-criteria code refactoring using searchbased software engineering: an industrial case study. ACM
188
Transactions on Software Engineering and Methodology
25, 3 (Aug. 2016), Article No. 23.
PETRICEK, T.; GUERRA, G.; AND SYME, D. Types from data:
making structured data first-class citizens in F#. In Proc.
of the 37th ACM SIGPLAN Conference on Programming
Language Design and Implementation (PLDI), ACM,
2016, 477–490.
POTVIN, R.; AND LEVENBERG, J. Why Google stores billions
of lines of code in a single repository. Communications
of the ACM 59, 7 (July 2016), 78–87.
• RASCHKA S. Python machine learning. Packt Publishing,
2016.
RIZZI, E. F.; ELBAUM, S.; AND DWYER, M. B. On the techniques we create, the tools we build, and their misalignments: a study of KLEE. In Proc. of the 38th
International Conference on Software Engineering
(ICSE), ACM, 2016, 132–143.
• RUMPE, B. Modeling with UML: language, concepts,
methods. Springer, 2016.
SONG, N. Y.; SON, Y; HAN, H.; AND YEOM, H. Y. Efficient
memory-mapped I/O on fast storage device. ACM Transactions on Storage 12, 4 (Aug. 2016), Article No. 19.
STEFǍNESCU, A.; PARK, D.; YUWEN, S.; LI, Y.; AND ROŞU, G.
Semantics-based program verifiers for all languages. In
Proc. of the ACM SIGPLAN International Conference
on Object-Oriented Programming, Systems, Languages,
and Applications (OOPSLA), ACM, 2016, 74–91.
SUTCLIFFE, R.; AND KOWARSCH, B. Closing the barn door:
re-prioritizing safety, security, and reliability. In Proc.
of the 21st Western Canadian Conference on Computing
Education (WCCCE), ACM, 2016, Article No. 1.
SWALENS, J.; DE KOSTER, J.; DE MEUTER, W. Transactional
tasks: parallelism in software transactions. In Proc. of the
European Conference on Object-Oriented Programming
(ECOOP), Dagstuhl LIPIcs, 2016, 23:1–23:28.
TAUBER, T.; AND OLIVEIRA, B. C. d. S. Modular architecture
for code and metadata sharing. In Proc. of the 15th
International Conference on Modularity (MODULARITY), ACM, 2016, 106–117.
WANG, Y.; AND OLIVEIRA, B. C. d. S. The expression problem, trivially!. In Proc. of the 15th International Conference on Modularity (MODULARITY), ACM, 2016,
37–41.
WONG, W. E.; GAO, R.; LI, Y.; ABREU, R.; AND WOTAWA, F.
A survey on software fault localization. IEEE Transactions on Software Engineering 42, 8 (Aug. 2016),
707–740.
YE, X.; SHEN, H.; MA, X.; BUNESCU, R.; AND LIU, C. From
word embeddings to document similarities for improved
information retrieval in software engineering. In Proc.
of the 38th International Conference on Software Engineering (ICSE), ACM, 2016, 404–415.
Computing Reviews
•
April 2017
NOTABLE COMPUTING BOOKS AND ARTICLES
YU, T.; QU, X.; AND COHEN, M. B. VDTest: an automated
framework to support testing for virtual devices. In
Proc. of the 38th International Conference on Software
Engineering (ICSE), ACM, 2016, 583–594.
ZHOU, H.; AND XUE, J. Exploiting mixed SIMD parallelism
by reducing data reorganization overhead. In Proc. of
the International Symposium on Code Generation and
Optimization (CGO), ACM, 2016, 59–69.
E.
Data
BEIMEL, A.; FARRÀS, O.; AND MINTZ, Y. Secret-sharing
schemes for very dense graphs. Journal of Cryptology
29, 2 (Apr. 2016), 336–362.
MONDELLI, M.; HASSANI, S. H.; AND URBANKE, R. L. Unified
scaling of polar codes: error exponent, scaling exponent,
moderate deviations, and error floors. IEEE Transactions
on Information Theory 62, 12 (Dec. 2016), 6698–6712.
YAN, H.; AND LIU, C. Two classes of cyclic codes and their
weight enumerator. Designs, Codes and Cryptography
81, 1 (Oct. 2016), 1–9.
F.
Theory of Computation
BABAI, L. Graph isomorphism in quasipolynomial time
[extended abstract]. In Proc. of the 48th Annual ACM
Symposium on the Theory of Computing (STOC), ACM,
2016, 684–697.
BÖRGER, E.; AND SCHEWE, K.-D. Concurrent abstract state
machines. Acta Informatica 53, 5 (Aug. 2016), 469–492.
BUDIG, B.; VAN DIJK, T. C.; AND WOLFF, A. Matching labels
and markers in historical maps: an algorithm with
interactive postprocessing. ACM Transactions on Spatial Algorithms and Systems 2, 4 (Nov. 2016), Article
No. 13.
CHADHA, R.; CHEVAL, V.; CIOBÂCǍ, S.; AND KREMER, S.
Automated verification of equivalence properties of
cryptographic protocols. ACM Transactions on Computational Logic 17, 4 (Nov. 2016), Article No. 23.
COECKE, B.; FRITZ, T.; AND SPEKKENS, R. W. A mathematical
theory of resources. Information and Computation 250
(Oct. 2016), 59–86.
DOCZKAL, C.; AND SMOLKA, G. Completeness and decidability results for CTL in constructive type theory. Journal
of Automated Reasoning 56, 3 (Mar. 2016), 343–365.
FAN, S.; ZAHEDI, S. M.; AND LEE, B. C. The computational
sprinting game. In Proc. of the 21st International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), ACM, 2016,
561–575.
Computing Reviews
FONTES, L.; JAIN, R.; KERENIDIS, I.; LAPLANTE, S.; LAURIÉRE,
M.; AND ROLAND, J. Relative discrepancy does not separate information and communication complexity. ACM
Transactions on Computation Theory 9, 1 (Dec. 2016),
Article No. 4.
GOLDREICH, O.; AND RON, D. On sample-based testers. ACM
Transactions on Computation Theory 8, 2 (May 2016),
Article No. 7.
HESSELINK, W. H. Correctness and concurrent complexity
of the black-white bakery algorithm. Formal Aspects of
Computing 28, 2 (Apr. 2016), 325–341.
KÄRKKÄINEN, J.; KEMPA, D.; AND PUGLISI, S. J. Lazy LempelZiv factorization algorithms. Journal of Experimental
Algorithmics 21 (2016), Article No. 2.4.
MEIR, O. Combinatorial PCPs with short proofs. Computational Complexity 25, 1 (Mar. 2016), 1–102.
RAZ, R. Fast learning requires good memory: a time-space
lower bound for parity learning. In Proc. of the 57th
Annual IEEE Symposium on Foundations of Computer
Science (FOCS), IEEE, 2016, 266–275.
RUBISTEIN, A. Settling the complexity of computing approximate two-player Nash equilibria. In Proc. of the 57th
Annual IEEE Symposium on Foundations of Computer
Science (FOCS), IEEE, 2016, 258–265.
SCHMITZ, S. Complexity hierarchies beyond elementary.
ACM Transactions on Computation Theory 8, 1 (Feb.
2016), Article No. 3.
G.
Mathematics of
Computing
CAO, Y.; CAO, Y.; AND FU, F.-W. Cyclic codes over
F2m [u]/⟨uk ⟩ of oddly even length. Applicable Algebra
in Engineering, Communication and Computing 27, 4
(Aug. 2016), 259–277.
CHATTOPADHYAY, E.; AND ZUCKERMAN, D. Explicit twosource extractors and resilient functions. In Proc. of the
48th Annual ACM Symposium on the Theory of Computing (STOC), ACM, 2016, 670–683.
CHECHIK, S.; AND WULFF-NILSEN, C. Near-optimal light
spanners. In Proc. of the 27th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), SIAM, 2016,
883–892.
CHONEV, V.; OUAKNINE, J.; AND WORRELL, J. On the complexity of the orbit problem. Journal of the ACM 63, 3
(Sept. 2016), Article No. 23.
CLEMENS, J.; REINEKING, T.; AND KLUTH, T. An evidential
approach to SLAM, path planning, and active exploration. International Journal of Approximate Reasoning
73 (June 2016), 1–26.
•
April 2017
189
NOTABLE COMPUTING BOOKS AND ARTICLES
DENG, W.; AND YIN, W. On the global and linear convergence of the generalized alternating direction method of
multipliers. Journal of Scientific Computing 66, 3 (Mar.
2016), 889–916.
DO, S.; HA, Y.; KANG, M.; AND KIM, C. H. Application of
a multi-dimensional limiting process to central-upwind
schemes for solving hyperbolic systems of conservation
laws. Journal of Scientific Computing 69, 1 (Oct. 2016),
274–291.
GHAFFARI, M. An improved distributed algorithm for maximal independent set. In Proc. of the 27th Annual
ACM-SIAM Symposium on Discrete Algorithms (SODA),
SIAM, 2016, 270–277.
KEELING, S. L.; AND KUNISCH, K. Robust ℓ1 approaches to
computing the geometric median and principal and independent components. Journal of Mathematical Imaging
and Vision 56, 1 (Sept. 2016), 99–124.
KITAMURA, D.; ONO, N.; SAWADA, H.; KAMEOKA, H.; AND
SARUWATARI, H. Determined blind source separation
unifying independent vector analysis and nonnegative
matrix factorization. IEEE/ACM Transactions on Audio,
Speech and Language Processing 24, 9 (Sept. 2016),
1626–1641.
KRENN, D.; AND WAGNER, S. Compositions into powers of
b: asymptotic enumeration and parameters. Algorithmica
75, 4 (Aug. 2016), 606–631.
KUDEKAR, S.; KUMAR, S.; MONDELLI, M.; PFISTER, H. D.;
ŞAŞOĞLU. E.; AND URBANKE, R. Reed-Muller codes achieve
capacity on erasure channels. In Proc. of the 48th Annual
ACM Symposium on the Theory of Computing (STOC),
ACM, 2016, 658–669.
NAKPIM, W. Third-order ordinary differential equations
equivalent to linear second-order ordinary differential
equations via tangent transformations. Journal of Symbolic Computation 77 (Nov.–Dec. 2016), 63–77.
NIKOLAOU, N.; EDAKUNNI, N.; KULL, M.; FLACH, P.; AND
BROWN, G. Cost-sensitive boosting algorithms: Do we
really need them?. Machine Learning 104, 2 (Sept.
2016), 359–384.
TIERNY, J.; AND CARR, H. Jacobi fiber surfaces for bivariate
reeb space computation. IEEE Transactions on Visualization and Computer Graphics (Proc. of SciVis 2016)
23, 1 (Jan. 2017), 960–969.
WANG, M. Stochastic composition optimization: algorithms
and sample complexities. In Proc. of the International
Conference on Continuous Optimization (ICCOPT), 2016.
WATRIGANT, R.; BOUGERET, M.; AND GIROUDEAU, R. Approximating the Sparsestk-Subgraph in chordal graphs. Theory of Computing Systems 58, 1 (Jan. 2016), 111–132.
YOSHIDA, Y. Nonlinear Laplacian for digraphs and its
applications to network analysis. In Proc. of the 9th
ACM International Conference on Web Search and Data
Mining (WSDM), ACM, 2016, 483–492.
190
H.
Information Systems
ALEXIEV, V.; ISAAC, A.; AND LINDENTHAL, J. On the composition of ISO 25964 hierarchical relations (BTG, BTP,
BTI). International Journal on Digital Libraries 17, 1
(Mar. 2016), 39–48.
BAROWY, D.; CURTSINGER, C.; BERGER, E.; AND MCGREGOR,
A. AutoMan: a platform for integrating human-based
and digital computation. Communications of the ACM
59, 6 (June 2016), 102–109.
BOTA, H.; ZHOU, K.; AND JOSE, J. M. Playing your cards
right: the effect of entity cards on search behaviour and
workload. In Proc. of the ACM Conference on Human
Information Interaction and Retrieval (CHIIR), ACM,
2016, 131–140.
CAMPOS, G. O.; ZIMEK, A.; SANDER, J.; CAMPELLO, R. J.
G. B.; MICENKOVÁ, B.; SCHUBERT, E.; ASSENT, I.; AND
HOULE, M. E. On the evaluation of unsupervised outlier
detection: measures, datasets, and an empirical study.
Data Mining and Knowledge Discovery 30, 4 (July
2016), 891–927.
CECCHINATO, M. E.; SELLEN, A.; SHOKOUHI, M.; AND SMYTH,
G. Finding email in a multi-account, multi-device world.
In Proc. of the CHI Conference on Human Factors in
Computing Systems (CHI), ACM, 2016, 1200–1210.
CHAKRABORTY, T.; SRINIVASAN, S.; GANGULY, N.; MUKHERJEE,
A.; AND BHOWMICK, S. Permanence and community
structure in complex networks. ACM Transactions on
Knowledge Discovery from Data 11, 2 (Dec. 2016), Article No. 14.
CHEN, C.; ZHU, X.; SHEN, P.; HU, J.; GUO, S.; TARI, Z.; AND
ZOMAYA, A. Y. An efficient privacy-preserving ranked
keyword search method. IEEE Transactions on Parallel
and Distributed Systems 27, 4 (Apr. 2016), 951–963.
CHUNG, C.-F.; DEW, K.; COLE, A.; ZIA, J.; FOGARTY, J.;
KIENTZ, J. A.; AND MUNSON, S. A. Boundary negotiating
artifacts in personal informatics: patient-provider collaboration with patient-generated data. In Proc. of the
19th ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW), ACM, 2016,
770–786.
COSTA, J.; ADAMS, A. T.; JUNG, M. F.; GUIMBRETIÉRE, F.;
AND CHOUDHURY, T. EmotionCheck: leveraging bodily
signals and false feedback to regulate our emotions.
In Proc. of the ACM International Joint Conference on
Pervasive and Ubiquitous Computing (UbiComp), ACM,
2016, 758–769.
DEMENTYEV, A.; KAO, H.-L.; CHOI, I.; AJILO, D.; XU, M.;
PARADISO, J. A.; SCHMANDT, C.; AND FOLLMER, S. Rovables: miniature on-body robots as mobile wearables. In
Proc. of the 29th Annual Symposium on User Interface
Software and Technology (UIST), ACM, 2016, 111–120.
Computing Reviews
•
April 2017
NOTABLE COMPUTING BOOKS AND ARTICLES
DIGNÖS, A.; BÖHLEN, M. H.; GAMPER, J.; AND JENSEN, C. S.
Extending the kernel of a relational DBMS with comprehensive support for sequenced temporal queries. ACM
Transactions on Database Systems 41, 4 (Dec. 2016),
Article No. 26.
DOMBROWSKI, L.; HARMON, E.; AND FOX, S. Social justiceoriented interaction design. In Proc. of the ACM Conference on Designing Interactive Systems (DIS), ACM,
2016, 656–671.
ELSAYED, N. A. M.; THOMAS, B. H.; MARRIOTT, K.; PIANTADOSI, J.; AND SMITH, R. T. Situated analytics: demonstrating immersive analytical tools with augmented reality.
Journal of Visual Languages and Computing 36 (Oct.
2016), 13–23.
GOTZ, D.; SUN, S.; AND CAO, N. Adaptive contextualization:
combating bias during high-dimensional visualization
and data selection. In Proc. of the 21st International
Conference on Intelligent User Interfaces (IUI), ACM,
2016, 85–95.
GRÖGER, C.; KASSNER, L.; HOOS, E.; KÖNIGSBERGER, J.;
KIEFER, C.; SILCHER, S.; AND MITSCHANG, B. The datadriven factory: leveraging big industrial data for agile,
learning and human-centric manufacturing. In Proc. of
the 18th International Conference on Enterprise
Information Systems (ICEIS), SCITEPRESS, 2016,
40–52.
GUO, G.; ZHU, F.; CHEN, E.; LIU, Q.; WU, L.; AND GUAN,
C. From footprint to evidence: an exploratory study of
mining social data for credit scoring. ACM Transactions
on the Web 10, 4 (Dec. 2016), Article No. 22.
HESPANHOL, L. Interacting with laughter: a case study on
audio-based interactivity of public projections. In Proc.
of the 28th Australian Conference on Computer-Human
Interaction (OzCHI), ACM, 2016, 205–214.
HSIEH, G.; KOCIELNIK, R. You get who you pay for: the
impact of incentives on participation bias. In Proc. of the
19th ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW), ACM, 2016,
823–835.
JAVORNIK, A.; ROGERS, Y.; MOUTINHO, A. M.; AND FREEMAN,
R. Revealing the shopper experience of using a “magic
mirror” augmented reality make-up application. In Proc.
of the ACM Conference on Designing Interactive Systems
(DIS), ACM, 2016, 871–882.
KAMALZADEH, M.; KRALJ, C.; MÖLLER, T.; AND SEDLMAIR,
M. TagFlip: active mobile music discovery with social
tags. In Proc. of the 21st International Conference on
Intelligent User Interfaces (IUI), ACM, 2016, 19–30.
KARANA, E.; GIACCARDI, E.; STAMHUIS, N.; AND GOOSSENSEN,
J. The tuning of materials. In Proc. of the ACM Conference on Designing Interactive Systems (DIS), ACM,
2016, 619–631.
Computing Reviews
KO, M.; CHOI, S.; YATANI, K.; AND LEE, U. Lock n’
LoL. In Proc. of the CHI Conference on Human
Factors in Computing Systems (CHI), ACM, 2016,
998–1010.
LAPUT, G.; XIAO, R.; AND HARRISON, C. ViBand: highfidelity bio-acoustic sensing using commodity smartwatch accelerometers. In Proc. of the 29th Annual
Symposium on User Interface Software and Technology
(UIST), ACM, 2016, 321–333.
LE GOC, M.; KIM, L. H.; PARSAEI, A.; FEKETE, J.-D.;
DRAGICEVIC, P.; AND FOLLMER, S. Zooids: building blocks
for swarm user interfaces. In Proc. of the 29th Annual
Symposium on User Interface Software and Technology
(UIST), ACM, 2016, 97–109.
LEONG, J.; PARZER, P.; PERTENEDER, F.; BABIC, T.; RENDL,
C.; VOGL, A.; EGGER, H.; OLWAL, A.; AND HALLER,
M. proCover: sensory augmentation of prosthetic limbs
using smart textile covers. In Proc. of the 29th Annual
Symposium on User Interface Software and Technology
(UIST), ACM, 2016, 335–346.
LESKOVEC, J.; AND SOSIČ, R. SNAP: a general-purpose network analysis and graph-mining library. ACM Transactions on Intelligent Systems and Technology 8, 1 (Oct.
2016), Article No. 1.
LI, H.; YANG, W.; WANG, J.; XU, Y.; AND HUANG, L. WiFinger: talk to your smart devices with finger-grained gesture. In Proc. of the ACM International Joint Conference
on Pervasive and Ubiquitous Computing (UbiComp),
ACM, 2016, 250–261.
LIEN, J.; GILLIAN, N.; KARAGOZLER, M. E.; AMIHOOD, P.;
SCHWESIG, C.; OLSON, E.; RAJA, H.; AND POUPYREV, I.
Soli: ubiquitous gesture sensing with millimeter wave
radar. ACM Transactions on Graphics 35, 4 (July 2016),
Article No. 142.
MASON, M. The MIT Museum Glassware prototype: visitor experience exploration for designing smart glasses.
Journal on Computing and Cultural Heritage 9, 3 (Nov.
2016), Article No. 12.
MEHROTRA, A.; HENDLEY, R.; AND MUSOLESI, M. Pref
Miner: mining user’s preferences for intelligent
mobile notification management. In Proc. of the
ACM International Joint Conference on Pervasive
and Ubiquitous Computing (UbiComp), ACM, 2016,
1223–1234.
MOSHFEGHI, Y.; TRIANTAFILLOU, P.; AND POLLICK, F. E.
Understanding information need: an fMRI study. In
Proc. of the 39th International ACM SIGIR Conference
on Research and Development in Information Retrieval
(SIGIR), ACM, 2016, 335–344.
MUTLU, B.; VEAS, E.; AND TRATTNER, C. VizRec: recommending personalized visualizations. ACM Transactions
on Interactive Intelligent Systems 6, 4 (Dec. 2016),
Article No. 31.
•
April 2017
191
NOTABLE COMPUTING BOOKS AND ARTICLES
NAPIERALA, K.; AND STEFANOWSKI, J. Types of minority
class examples and their influence on learning classifiers
from imbalanced data. Journal of Intelligent Information
Systems 46, 3 (June 2016), 563–597.
NICOLAESCU, P.; ROSENSTENGEL, M.; DERNTL, M.; KLAMMA,
R.; AND JARKE, M. View-based near real-time collaborative modeling for information systems engineering. In
Proc. of the 28th International Conference on Advanced
Information Systems Engineering (CAiSE), Springer,
2016, 3–17.
POLVI, J.; TAKETOMI, T.; YAMAMOTO, G.; DEY, A.; SANDOR,
C.; AND KATO, H. SlidAR: a 3D positioning method for
SLAM-based handheld augmented reality. Computers
and Graphics 55 (Apr. 2016), 33–43.
PREIST, C.; SCHIEN, D.; AND BLEVIS, E. Understanding
and mitigating the effects of device and cloud service
design decisions on the environmental footprint of digital infrastructure. In Proc. of the CHI Conference on
Human Factors in Computing Systems (CHI), ACM,
2016, 1324–1337.
RAMEAU, F.; HA, H.; JOO, K.; CHOI, J.; PARK, K.; AND KWEON,
I. S. A real-time augmented reality system to see-through
cars. IEEE Transactions on Visualization and Computer
Graphics 22, 11 (Nov. 2016), 2395–2404.
RAWASSIZADEH, R.; MOMENI, E.; DOBBINS, C.; GHARIBSHAH,
J.; AND PAZZANI, M. Scalable daily human behavioral
pattern mining from multivariate temporal data. IEEE
Transactions on Knowledge and Data Engineering 28,
11 (Nov. 2016), 3098–3112.
RISTOSKI, P.; AND PAULHEIM, H. Semantic web in data mining and knowledge discovery: a comprehensive survey.
Journal of Web Semantics 36 (Jan. 2016), 1–22.
ROUHANI, B. D.; MIRHOSEINI, A.; SONGHORI, E. M.; AND
KOUSHANFAR, F. Automated real-time analysis of streaming big and dense data on reconfigurable platforms. ACM
Transactions on Reconfigurable Technology and Systems
10, 1 (Dec. 2016), Article No. 8.
SAUNDERS, J.; SYRDAL, D. S.; KOAY, K. L.; BURKE, N.;
AND DAUTENHAHN, K. “Teach Me–Show Me”—end-user
personalization of a smart home and companion robot.
IEEE Transactions on Human-Machine Systems 46, 1
(Feb. 2016), 27–40.
SCHNEIDER, B.; SHARMA, K.; CUENDET, S.; ZUFFEREY, G.;
DILLENBOURG, P.; AND PEA, R. Using mobile eye-trackers
to unpack the perceptual benefits of a tangible user
interface for collaborative learning. ACM Transactions
on Computer-Human Interaction 23, 6 (Dec. 2016),
Article No. 39.
STONEBRAKER, M. Big data is (at least) four different problems. YouTube, 01:02:35 published on June 2, 2016,
stanfordonline, https://www.youtube.com/watch?v=S79buNhdhI.
192
ŚWIA̧TEK, P.; JUSZCZYSZYN, K.; KOŁACZEK, G.; BRZOSTOWSKI,
K.; AND SCHAUER, P. Processes’ optimization tools for
web-service oriented organizations’ resources: an ehealth
application. In Proc. of the 17th International Conference
on E-health Networking, Application & Services (HealthCom), IEEE, 2016, 222–226.
TRUSHKOWSKY, B.; KRASKA, T.; FRANKLIN, M.; AND SARKAR,
P. Answering enumeration queries with the crowd.
Communications of the ACM 59, 1 (Jan. 2016),
118–127.
TSAI, M.-F.; WANG, C.-J.; AND CHIEN, P.-C. Discovering
finance keywords via continuous-space language models. ACM Transactions on Management Information Systems 7, 3 (Oct. 2016), Article No. 7.
TUAN, A.; COMYN-WATTIAU, I.; AND SI-SAÏD CHERFI, S. Structuring guidelines for web application designers: a metamodel. In Proc. of the 18th International Conference on
Enterprise Information Systems (ICEIS), SCITEPRESS,
2016, 327–335.
VERBERNE, S.; SAPPELLI, M.; HIEMSTRA, D.; AND KRAAIJ,
W. Evaluation and analysis of term scoring methods
for term extraction. Information Retrieval Journal 19,
5 (Oct. 2016), 510–545.
VUORIMAA, P.; LAINE, M.; LITVINOVA, E.; AND SHESTAKOV,
D. Leveraging declarative languages in web application development. World Wide Web 19, 4 (July 2016),
519–543.
WANG, E. J.; LI, W.; HAWKINS, D.; GERNSHEIMER, T.; NORBYSLYCORD, C.; AND PATEL, S. N. HemaApp: noninvasive
blood screening of hemoglobin using smartphone cameras. In Proc. of the ACM International Joint Conference
on Pervasive and Ubiquitous Computing (UbiComp),
ACM, 2016, 593–604.
WIESE, O.; AND ROTH, V. See you next time: a model for
modern shoulder surfers. In Proc. of the 18th International Conference on Human-Computer Interaction with
Mobile Devices and Services (MobileHCI), ACM, 2016,
453–464.
YIN, H.; CUI, B.; ZHOU, X.; WANG, W.; HUANG, Z.; AND
SADIQ, S. Joint modeling of user check-in behaviors
for real-time point-of-interest recommendation. ACM
Transactions on Information Systems 35, 2 (Dec. 2016),
Article No. 11.
ZHAI, C.; AND MASSUNG, S. Text data management and
analysis: a practical introduction to information retrieval and text mining. ACM and Morgan & Claypool,
2016.
ZHAO, S.; RAMOS, J.; TAO, J.; JIANG, Z.; LI, S.; WU, Z.; PAN,
G.; AND DEY, A. K. Discovering different kinds of smartphone users through their application usage behaviors.
In Proc. of the ACM International Joint Conference on
Pervasive and Ubiquitous Computing (UbiComp), ACM,
2016, 498–509.
Computing Reviews
•
April 2017
NOTABLE COMPUTING BOOKS AND ARTICLES
I.
Computing
Methodologies
• ADOUANE, L. Autonomous vehicle navigation: from behavioral to hybrid multi-controller architectures. CRC Press,
2016.
AMBUSAIDI, M. A.; HE, X.; NANDA, P.; AND TA, Z. Building
an intrusion detection system using a filter-based feature
selection algorithm. IEEE Transactions on Computers
65, 10 (Oct. 2016), 2986–2998.
ATANASSOV, K.; GEORGIEV, I.; SZMIDT, E.; AND KACPRZYK,
J. Multidimensional intuitionistic fuzzy quantifiers. In
Proc. of the IEEE 8th International Conference on Intelligent Systems (IS), IEEE, 2016, 530–534.
AUTUORI, J.; HNAIEN, F.; AND YALAOUI, F. A mapping technique for better solution exploration: NSGA-II adaptation. Journal of Heuristics 22, 1 (Feb. 2016), 89–123.
BISSELING, B.; BRUZELIUS, F.; AND ERIKSSON, O. Effects
of visual latency on vehicle driving behavior. ACM
Transactions on Applied Perception 14, 1 (Aug. 2016),
Article No. 5.
BLOT, A.; DAGAND, P.-É.; AND LAWALL, J. From sets to bits
in Coq. In Proc. of the 13th International Symposium on
Functional and Logic Programming (FLOPS), Springer,
2016, 12–28.
BOUDHANE, M.; AND NSIRI, B. Underwater image processing
method for fish localization and detection in submarine environment. Journal of Visual Communication and
Image Representation 39 (Aug. 2016), 226–238.
CARVALHO, A.; DIMITROV, S.; AND LARSON, K. How many
crowdsourced workers should a requester hire?. Annals
of Mathematics and Artificial Intelligence 78, 1 (Sept.
2016), 45–72.
CHARLESWORTH, A. A theorem about computationalism and
“absolute” truth. Minds and Machines 26, 3 (Sept. 2016),
205–226.
CIMPOI, M.; MAJI, S.; KOKKINOS, I.; AND VEDALDI, A. Deep
filter banks for texture recognition, description, and
segmentation. International Journal of Computer Vision
118, 1 (May 2016), 65–94.
DAI, J.; LI, Y.; HE, K.; AND SUN, J. R-FCN: object detection
via region-based fully convolutional networks. In Proc.
of the Conference on Neural Information Processing
Systems (NIPS), Curran Assoc., 2016, 379–387.
DI BARTOLOMEO, M.; AND HU, Y. There is more to streamgraphs than movies: better aesthetics via ordering and
lassoing. Computer Graphics Forum 35, 3 (June 2016),
341–350.
DING, C.; KYAW THU, Y.; UTIYAMA, M.; AND SUMITA, E. Word
segmentation for Burmese (Myanmar). ACM Transactions on Asian and Low-Resource Language Information
Processing 15, 4 (June 2016), Article No. 22.
Computing Reviews
DONG, C.; LOY, C. C.; HE, K.; AND TANG, X. Image superresolution using deep convolutional networks. IEEE
Transactions on Pattern Analysis and Machine Intelligence 38, 2 (Feb. 2016), 295–307.
ELGENDY, O. A.; AND CHAN, S. H. Image reconstruction and
threshold design for quanta image sensors. In Proc. of
the IEEE International Conference on Image Processing
(ICIP), IEEE, 2016, 978–982.
ENGLUND, R.; AND ROPINSKI, T. Evaluating the perception of
semi-transparent structures in direct volume rendering
techniques. In Proc. of the SIGGRAPH Asia Symposium
on Visualization (SA), ACM, 2016, Article No. 9.
FUJIMOTO, R. M. Research challenges in parallel and distributed simulation. ACM Transactions on Modeling and
Computer Simulation 26, 4 (May 2016), Article No. 22.
GAO, J.; WANG, Y.; WANG, J.; AND LIANG, R. Adaptive optimization modeling of preconditioned conjugate gradient
on multi-GPUs. ACM Transactions on Parallel Computing 3, 3 (Dec. 2016), Article No. 16.
• GOODFELLOW, I.; BENGIO, Y.; AND COURVILLE, A. Deep
learning. MIT Press, 2016.
HACHMON, G.; MAMET, N.; SASSON, S.; BARKAI, T.; HADAR,
N.; ABU-HOROWITZ, A.; AND BACHELET, I. A nonNewtonian fluid robot. Artificial Life 22, 1 (Winter
2016), 1–22.
HAGIYA, M.; AUBERT-KATO, N.; WANG, S.; AND KOBAYASHI,
S. Molecular computers for molecular robots as hybrid
systems. Theoretical Computer Science 632 (June 2016),
4–20.
HAN, X.; WONG, K.-Y. K.; AND YU, Y. 3D human model
reconstruction from sparse uncalibrated views. IEEE
Computer Graphics and Applications 36, 6 (Nov.–Dec.
2016), 46–56.
HE, K.; ZHANG, X.; REN, S.; AND SUN, J. Deep residual
learning for image recognition. In Proc. of the IEEE
Conference on Computer Vision and Pattern Recognition
(CVPR), IEEE, 2016, 770–778.
• KAEHLER, A.; AND BRADSKI, G. Learning OpenCV 3.
O’Reilly Media, 2016.
KARTHEEK MEDATHATI, N. V.; NEUMANN, H.; MASSON, G.
S.; AND KORNPROBST, P. Bio-inspired computer vision:
towards a synergistic approach of artificial and biological vision. Computer Vision and Image Understanding
150 (Sept. 2016), 1–30.
KIM, I.-J.; CHOI, C.; AND LEE, S.-H. Improving discrimination ability of convolutional neural networks by hybrid
learning. International Journal on Document Analysis
and Recognition 19, 1 (Mar. 2016), 1–9.
LECOCQ, P.; DUFAY, A.; SOURIMANT, G.; AND MARVIE, J.-E.
Accurate analytic approximations for real-time specular
area lighting. In Proc. of the 20th ACM SIGGRAPH Symposium on Interactive 3D Graphics and Games (I3D),
ACM, 2016, 113–120.
•
April 2017
193
NOTABLE COMPUTING BOOKS AND ARTICLES
LIU, X.; XIE, N.; TANG, K.; AND JIA, J. Lightweighting for
Web3D visualization of large-scale BIM scenes in realtime. Graphical Models 88 (Nov. 2016), 40–56.
MAGLIETTA, R.; AMOROSO, N.; BOCCARDI, M.; BRUNO, S.;
CHINCARINI, A.; FRISONI, G. B.; INGLESE, P.; REDOLFI,
A.; TANGARO, S.; TATEO, A.; BELLOTTI, R.; and The
Alzheimers Disease Neuroimaging Initiative automated
hippocampal segmentation in 3D MRI using random
undersampling with boosting algorithm. Pattern Analysis and Applications 19, 2 (May 2016), 579–591.
MENDES N.; AND DOS SANTOS A. A hypercube queuing model
approach to the police units allocation problem. In Proc.
of the 18th International Conference on Enterprise Information Systems (ICEIS), SCITEPRESS, 2016, 70–81.
MERCADO-COLMENERO, J.-M.; PARAMIO, M.A.R.; PEREZGARCIA, J.-M.; AND MARTIN-DOÑATE, C. A new hybrid
method for demoldability analysis of discrete geometries. Computer-Aided Design 80 (Nov. 2016), 43–60.
MOLLAJAFARI, M.; AND SHAHHOSEINI, H. S. An efficient
ACO-based algorithm for scheduling tasks onto dynamically reconfigurable hardware using TSP-likened construction graph. Applied Intelligence 45, 3 (Oct. 2016),
695–712.
• MÜLLER V. (Ed.) Fundamental issues of artificial intelligence. Springer, 2016.
ORTNER, T.; SORGER, J.; PIRINGER, H.; HESINA, G.; AND
GRÖLLER, E. Visual analytics and rendering for tunnel
crack analysis. The Visual Computer 32, 6 (June 2016),
859–869.
PEREIRA, G.; PRADA, R.; AND SANTOS, P. A. Integrating social
power into the decision-making of cognitive agents.
Artificial Intelligence 241 (Dec. 2016), 1–44.
POUND, M .P.; FRENCH, A. P.; FOZARD, J. A.; MURCHIE, E. H.;
AND PRIDMORE, T. P. A patch-based approach to 3D plant
shoot phenotyping. Machine Vision and Applications 27,
5 (July 2016), 767–779.
PRÖLLOCHS, N.; FEUERRIEGEL, S.; AND NEUMANN, D. Detecting negation scopes for financial news sentiment using
reinforcement learning. In Proc. of the 49th Hawaii
International Conference on System Sciences (HICSS),
IEEE, 2016, 1164–1173.
RODRÍGUEZ, M. B.; AGUS, M.; BETTIO, F.; MARTON, F.;
AND GOBBETTI, E. Digital Mont’e Prama: exploring large
collections of detailed 3D models of sculptures. Journal
on Computing and Cultural Heritage 9, 4 (Dec. 2016),
Article No. 18.
SATYANARAYAN, A.; MORIT, D.; WONGSUPHASAWAT, K.; AND
HEER, J. Vega-lite: a grammar of interactive graphics. IEEE
Transactions on Visualization and Computer Graphics
(Proc. of InfoVis 2016) 23, 1 (Jan. 2017), 341–350.
• SGUREV, V.; YAGER, R. R.; KACPRZYK, J.; AND JOTSOV, V.
(Eds.) Innovative issues in intelligent systems. Springer,
2016.
194
SHOKOUHIFAR, M.; AND JALALI, A. Two-stage fuzzy inference
system for symbolic simplification of analog circuits.
Integration, the VLSI Journal 55 (Sept. 2016), 281–292.
SILVA, F.; DUARTE, M.; CORREIA, L.; OLIVEIRA, S. M.;
AND CHRISTENSEN, A. L. Open issues in evolutionary robotics. Evolutionary Computation 24, 2 (Summer
2016), 205–236.
SKRABA, P.; ROSEN, P.; WANG, B.; CHEN, G.; BHATIA, H.;
AND PASCUCCI, V. Critical point cancellation in 3D vector
fields: robustness and discussion. IEEE Transactions on
Visualization and Computer Graphics 22, 6 (June 2016),
1683–1693.
STAHL, B. C.; AND COECKELBERGH, M. Ethics of healthcare robotics: towards responsible research and innovation. Robotics and Autonomous Systems 86 (Dec. 2016),
152–161.
STOFFERS, M.; SCHEMMEL, D.; DUSTMANN, O. S.; AND
WEHRLE, K. Automated memoization for parameter studies implemented in impure languages. In Proc. of the
ACM Conference on SIGSIM Principles of Advanced
Discrete Simulation (PADS), ACM, 2016, 221–232.
• SUGIYAMA M. Introduction to statistical machine learning.
Morgan Kaufmann, 2016.
TAM, G. K. L.; KOTHARI, V.; AND CHEN, M. An analysis
of machine- and human-analytics in classification. IEEE
Transactions on Visualization and Computer Graphics
(Proc. of VAST 2016) 23, 1 (Jan. 2017), 71–80.
TIPPETTS, B.; LEE, D. J.; LILLYWHITE, K.; AND ARCHIBALD,
J. Review of stereo vision algorithms and their suitability for resource-limited systems. Journal of Real-Time
Image Processing 11, 1 (Jan. 2016), 5–25.
WANG, G.; WANG, C.; DU, Q.; LI, L.; AND DONG, W. Distributed cooperative control of multiple nonholonomic
mobile robots. Journal of Intelligent & Robotic Systems
83, 3 (Sept. 2016), 525–541.
WANG, W.; CHEN, G.; CHEN, H.; DINH, T. T. A.; GAO, J.;
OOI, B. C.; TAN, K.-L.; WANG, S.; AND ZHANG, M. Deep
learning at scale and at ease. ACM Transactions on Multimedia Computing, Communications, and Applications
12, 4s (Nov. 2016), Article No. 69.
WANG, W.; YANG, X.; OOI, B. C.; ZHANG, D.; AND ZHUANG,
Y. Effective deep learning-based multi-modal retrieval.
The VLDB Journal 25, 1 (Feb. 2016), 79–101.
WEI, X.; PHUNG, S. L.; AND BOUZERDOUM, A. Visual
descriptors for scene categorization: experimental evaluation. Artificial Intelligence Review 45, 3 (Mar. 2016),
333–368.
XIONG, F.; KAM, M.; HREBIEN, L.; WANG, B.; QI, Y. Kernelized information-theoretic metric learning for cancer
diagnosis using high-dimensional molecular profiling
data. ACM Transactions on Knowledge Discovery from
Data 10, 4 (Jul. 2016), Article No. 38.
Computing Reviews
•
April 2017
NOTABLE COMPUTING BOOKS AND ARTICLES
YU, Q.; YAN, R.; TANG, H.; TAN, K.C.; AND LI, H. A spiking
neural network system for robust sequence recognition.
IEEE Transactions on Neural Networks and Learning
Systems 27, 3 (Mar. 2016), 621–635.
J.
Computer Applications
ALBERDI, A.; AZTIRIA, A.; AND BASARAB, A. On the early
diagnosis of Alzheimer’s disease from multimodal signals: a survey. Artificial Intelligence in Medicine 71
(July 2016), 1–29.
HUMMEL, P.; AND MCAFEE, R. P. When does improved
targeting increase revenue?. ACM Transactions on Economics and Computation 5, 1 (Nov. 2016), Article
No. 4.
• LEWIS, M. The undoing project: a friendship that changed
our minds. W. W. Norton & Co., 2016.
MURNANE, E. L.; ABDULLAH, S.; MATTHEWS, M.; KAY, M.;
KIENTZ, J. A.; CHOUDHURY, T.; GAY, G.; AND COSLEY, D.
Mobile manifestations of alertness: connecting biological rhythms with patterms of smartphone app use. In
Proc. of the 18th International Conference on HumanComputer Interaction with Mobile Devices and Services
(MobileHCI), ACM, 2016, 465–477.
ROMERO, M.; SÁNCHEZ, M.; AND VILLALOBOS, J. Weaving
business model patterns: understanding business models.
In Proc. of the 18th International Conference on Enterprise Information Systems (ICEIS), SCITEPRESS, 2016,
496–505.
TANG, J.; AND ZHOU, S. A new approach for feature selection
from microarray data based on mutual information.
IEEE/ACM Transactions on Computational Biology and
Bioinformatics 13, 6 (Nov.–Dec. 2016), 1004–1015.
K.
Computing Milieux
BERGHEL, H. The bogus science theorem. IEEE Computer
49, 4 (Apr. 2016), 74–78.
DEVENDORF, L.; DE KOSNIK, A.; MATTINGLY, K.; RYOKAI,
K. Probing the potential of post-anthropocentric 3D
printing. In Proc. of the ACM Conference on Designing
Interactive Systems (DIS), ACM, 2016, 170–181.
GANGWAL, N.; AND BANSAL, V. Application of decomposed
theory of planned behavior for m-commerce adoption in
India. In Proc. of the 18th International Conference on
Enterprise Information Systems (ICEIS), SCITEPRESS,
2016, 357–367.
Computing Reviews
HAMARI, J.; SJÖKLINT, M.; AND UKKONEN, A. The sharing
economy: why people participate in collaborative consumption. Journal of the Association for Information
Science and Technology 67, 9 (Sept. 2016), 2047–2059.
HASAN, S.; KING, Z.; HAFIZ, M.; SAYAGH, M.; ADAMS, B.;
AND HINDLE, A. Energy profiles of Java collections
classes. In Proc. of the 38th International Conference on
Software Engineering (ICSE), ACM, 2016, 225–236.
IMMONEN, A.; OVASKA, E.; KALAOJA, J.; AND PAKKALA, D.
A service requirements engineering method for a digital service ecosystem. Service Oriented Computing and
Applications 10, 2 (June 2016), 151–172.
LUCASSEN, G.; DALPIAZ, F.; VAN DER WERF, J. M. E. M.;
AND BRINKKEMPER, S. Improving agile requirements: the
quality user story framework and tool. Requirements
Engineering 21, 3 (Sept. 2016), 383–403.
MARQUES, D.; MUSLUKHOV, I.; GUERREIRO, T.; BEZNOSOV, K.;
AND CARRIÇO, L. Snooping on mobile phones: prevalence and trends. In Proc. of the 12th Symposium on
Usable Privacy and Security (SOUPS), USENIX, 2016,
159–174.
MOUAKKET, S.; AND BETTAYEB, A. Factors affecting university instructors’ continuance intention to use learning
management systems: the Blackboard system case. In
Proc. of the 18th International Conference on Enterprise Information Systems (ICEIS), SCITEPRESS, 2016,
215–222.
• O’NEIL, C. Weapons of math destruction. Crown, 2016.
RELLO, L.; and BAEZA-YATES, R. The effect of font type
on screen readability by people with dyslexia. ACM
Transactions on Accessible Computing 8, 4 (May 2016),
Article No. 15.
SHAY, R.; KOMANDURI, S.; DURITY, A. L.; HUH, P.; MAZUREK,
M. L.; SEGRETI, S. M.; UR, B.; BAUER, L.; CHRISTIN,
N.; AND CRANOR, L. F. Designing password policies for
strength and usability. ACM Transactions on Information
and System Security 18, 4 (May 2016), Article No. 13.
SUCH, J. M.; AND ROVATSOS, M. Privacy policy negotiation
in social media. ACM Transactions on Autonomous and
Adaptive Systems 11, 1 (Apr. 2016), Article No. 4.
WÓJTOWICZ, A.; AND JOACHIMIAK, K. Model for adaptable context-based biometric authentication for mobile
devices. Personal and Ubiquitous Computing 20, 2 (Apr.
2016), 195–207.
SYMBOLS
• Book
•
April 2017
195