NOTABLE COMPUTING BOOKS AND ARTICLES—2016 Computing Reviews is happy to bring you the 21st annual list of notable items published in computing—this time for 2016. We reached out to many in the computing community for nominations: our reviewers, CR category editors, the editors in chief of journals we cover, and computer scientists in both industry and academia. In addition, we included proceedings papers that were recognized as “Best Papers” at their respective conferences, as well as the most downloaded journal papers from some of the top journals covered in CR. You will find 231 items on our list, with numerous publishers represented. As we continue to improve our methods for collecting nominations and involve more of your peers in the computing community, we hope to bring you even more definitive lists in the coming years. We welcome your feedback, and encourage you to email us with any questions ([email protected]). Angela Pugh Managing Editor Computing Reviews A. General Literature • CALUDE C. (Ed.) The human face of computing. Imperial College Press, 2016. • SEDGEWICK, R.; AND WAYNE, K. Computer science: an interdisciplinary approach. Addison-Wesley Professional, 2016. B. Hardware DAN, A. M.; LAM, P.; HOEFLER, T.; AND VECHEV, M. Modeling and analysis of remote memory access programming. In Proc. of the ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), ACM, 2016, 129–144. HAJ-YIHIA, J.; YASIN, A.; BEN ASHER, Y.; AND MENDELSON, A. Fine-grain power breakdown of modern out-of-order cores and its implications on Skylake-based systems. ACM Transactions on Architecture and Code Optimization 13, 4 (Dec. 2016), Article No. 56. WANG, P.; AND MCALLISTER, J. Streaming elements for FPGA signal and image processing accelerators. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 24, 6 (June 2016), 2262–2274. XIAO, K.; FORTE, D.; JIN, Y.; KARRI, R.; BHUNIA, S.; AND TEHRANIPOOR, M. Hardware Trojans: lessons learned after one decade of research. ACM Transactions on Design Automation of Electronic Systems 22, 1 (Dec. 2016), Article No. 6. 186 C. Computer Systems Organization AGELASTOS, A.; ALLAN, B.; BRANDT, J.; GENTILE, A.; LEFANTZI, S.; MONK, S.; OGDEN, J.; RAJAN, M.; AND STEVENSON, J. Continuous whole-system monitoring toward rapid understanding of production HPC applications and systems. Parallel Computing 58 (Oct. 2016), 90–106. ALTMEYER, S.; DOUMA, R.; LUNNISS, W.; AND DAVIS, R. I. On the effectiveness of cache partitioning in hard realtime systems. Real-Time Systems 52, 5 (Sept. 2016), 598–643. ÁLVAREZ, C.; AYGUADÉ, E.; BOSCH, J.; BUENO, J.; CHERKASHIN, A.; FILGUERAS, A.; JIMÉNEZ-GONZÁLEZ, D.; MARTORELL, X.; NAVARRO, N.; VIDAL, M.; THEODOROPOULOS, D.; PNEVMATIKATOS, D. N.; CATANI, D.; ORO, D.; FERNÁNDEZ, C.; SEGURA, C.; RODRÍGUEZ, J.; HERNANDO, J.; SCORDINO, C.; GAI, P.; PASSERA, P.; POMELLA, A.; BETTIN, N.; RIZZO, A.; AND GIORGI, R. The AXIOM software layers. Microprocessors & Microsystems 47, Part B (Nov. 2016), 262–277. • BALANI, N. Enterprise IoT: a definitive handbook. CreateSpace Independent Publishing Platform, 2016. BERTINO, E.; CHOO, K.-K.R.; GEORGAKOPOLOUS, D.; AND NEPAL, S. Internet of Things (IoT): smart and secure service delivery. ACM Transactions on Internet Technology 16, 4 (Dec. 2016), Article No. 22. BIENKOWSKI, M.; KLONOWSKI, M.; KORZENIOWSKI, M.; AND KOWALSKI, D. R. Randomized mutual exclusion on a multiple access channel. Distributed Computing 29, 5 (Oct. 2016), 341–359. Computing Reviews • April 2017 NOTABLE COMPUTING BOOKS AND ARTICLES BREGU, E.; CASAMASSIMA, N.; CANTONI, D.; MOTTOLA, L.; AND WHITEHOUSE, K. Reactive control of autonomous drones. In Proc. of the 14th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys), ACM, 2016, 207–219. CHEN, M.; QIAN, Y.; MAO, S.; TANG, W.; AND YANG, X. Software-defined mobile networks security. Mobile Networks and Applications 21, 5 (Oct. 2016), 729–743. CHO, S.; AND JULIEN, C. CHITCHAT: navigating tradeoffs in device-to-device context sharing. In Proc. of the IEEE International Conference on Pervasive Computing and Communications (PerCom), IEEE, 2016, 1–10. COPPOLA, R.; AND MORISIO, M. Connected car: technologies, issues, future trends. ACM Computing Surveys 49, 3 (Dec. 2016), Article No. 46. HAYES, T.; AND ALI, F. H. Robust ad-hoc sensor routing (RASeR) protocol for mobile wireless sensor networks. Ad Hoc Networks 50, 1 (Nov. 2016), 128–144. HUBERMAN, B. A.; AND ASUR, S. BidPacket: trading bandwidth in public spaces. NETNOMICS: Economic Research and Electronic Networking 17, 3 (Nov. 2016), 223–232. KELLOGG, B.; TALLA, V.; GOLLAKOTA, S.; AND SMITH, J. R. Passive Wi-Fi: bringing low power to Wi-Fi transmissions. In Proc. of the 13th USENIX Symposium on Networked Systems Design & Implementation (NSDI), USENIX, 2016, 151–164. KUMAR, S.; AND HEGDE, R. M. Multi-sensor data fusion methods for indoor localization under collinear ambiguity. Pervasive and Mobile Computing 30 (Aug. 2016), 18–31. KUREK, T.; NIEMIEC, M.; AND LASON, A. Taking back control of privacy: a novel framework for preserving cloud-based firewall policy confidentiality. International Journal of Information Security 15, 3 (June 2016), 235–250. LENZEN, C.; AND WATTENHOFER, R. Tight bounds for parallel randomized load balancing. Distributed Computing 29, 2 (Apr. 2016), 127–142. LIMONCELLI, T. Are you load balancing wrong?. Queue 14, 6 (Nov.–Dec. 2016), 1–9. LO, D.; CHENG, L.; GOVINDARAJU, R.; RANGANATHAN, P.; AND KOZYRAKIS, C. Improving resource efficiency at scale with Heracles. ACM Transactions on Computer Systems 34, 2 (May 2016), Article No. 6. LV, Y.; AND MOSCIBRODA, T. Fair and resilient incentive tree mechanisms. Distributed Computing 29, 1 (Feb. 2016), 1–16. • MAHMOOD, Z. Connectivity frameworks for smart devices. Springer, 2016. MIDI, D.; SULTANA S.; AND BERTINO, E. A system for response and prevention of security incidents in wireless sensor networks. ACM Transactions on Sensor Networks 13, 1 (Dec. 2016), Article No. 1. Computing Reviews REHMAN, Z.; HUSSAIN, O. K.; HUSSAIN, F. K.; CHANG, E.; AND DILLON, T. User-side QoS forecasting and management of cloud services. World Wide Web 18, 6 (Nov. 2015), 1677–1716. SHETH, A. Internet of Things to smart IoT through semantic, cognitive, and perceptual computing. IEEE Intelligent Systems 31, 2 (Mar.–Apr. 2016), 108–112. SINGH, S.; AND CHANA, I. A survey on resource scheduling in cloud computing: issues and challenges. Journal of Grid Computing 14, 2 (June 2016), 217–264. WANG, H.; ROSA, C.; AND PEDERSEN, K. I. Dual connectivity for LTE-advanced heterogeneous networks. Wireless Networks 22, 4 (May 2016), 1315–1328. WANG, K.; DU, M.; YANG, D.; ZHU, C.; SHEN, J.; AND ZHANG, Y. Game-theory-based active defense for intrusion detection in cyber-physical embedded systems. ACM Transactions on Embedded Computing Systems 16, 1 (Nov. 2016), Article No. 18. YANG, D.; XUE, G.; FANG, X.; AND TANG, J. Incentive mechanisms for crowdsensing: crowdsourcing with smartphones. IEEE/ACM Transactions on Networking 24, 3 (June 2016), 1732–1744. ZHANG, B.; REN, K.; XING, G.; FU, X.; AND WANG, C. SBVLC: secure barcode-based visible light communication for smartphones. IEEE Transactions on Mobile Computing 15, 2 (Feb. 2016), 432–446. D. Software AIKEN, P. EXPERIENCE: succeeding at data management—BigCo attempts to leverage data. Journal of Data and Information Quality 7, 1–2 (June 2016), Article No. 8. BERSANI, M. M.; BIANCULLI, D.; GHEZZI, C.; KRSTIĆ, S.; AND SAN PIETRO, P. Efficient large-scale trace checking using MapReduce. In Proc. of the 38th International Conference on Software Engineering (ICSE), ACM, 2016, 888–898. BROCKSCHMIDT, M.; EMMES, F.; FALKE, S.; FUHS, C.; AND GIESL, J. Analyzing runtime and size complexity of integer programs. ACM Transactions on Programming Languages and Systems 38, 4 (Oct. 2016), Article No. 13. BURNS, A. Why the expressive power of programming languages such as Ada is needed for future cyber physical systems. In Reliable software technologies: Ada-Europe 2016, Springer, 2016, 3–11. CHAPMAN, K.; HOSKING, A. L.; AND MOSS, J. E. B. Hybrid STM/HTM for nested transactions on OpenJDK. In Proc. of the ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), ACM, 2016, 660–676. • April 2017 187 NOTABLE COMPUTING BOOKS AND ARTICLES CHRISTAKIS, M.; MÜLLER, P.; AND WÜSTHOLZ, V. Guiding dynamic symbolic execution toward unverified program executions. In Proc. of the 38th International Conference on Software Engineering (ICSE), ACM, 2016, 144–155. GHANI, N.; NORDVALL FORSBERG, F.; AND SIMPSON, A. Comprehensive parametric polymorphism: categorical models and type theory. In Proc. of the 19th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS), Springer, 2016, 3–19. GIL, Y.; AND LEVY, T. Formal language recognition with the Java type checker. In Proc. of the European Conference on Object-Oriented Programming (ECOOP), Dagstuhl LIPIcs, 2016, 10:1–10:27. GOUSIOS, G.; STOREY, M.-A.; AND BACCHELLI, A. Work practices and challenges in pull-based development: the contributor’s perspective. In Proc. of the 38th International Conference on Software Engineering (ICSE), ACM, 2016, 285–296. HANAPPI, O.; HUMMER, W.; AND DUSTDAR, S. Asserting reliable convergence for configuration management scripts. In Proc. of the ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), ACM, 2016, 328–343. • JULIAN, D. Designing machine learning systems with Python: design efficient machine learning systems that give you more accurate results. Packt Publishing, 2016. KREBBERS, R. A formal C memory model for separation logic. Journal of Automated Reasoning 57, 4 (Dec. 2016), 319–387. LARGENT, D. L. Measuring and understanding team development by capturing self-assessed enthusiasm and skill levels. ACM Transactions on Computing Education 16, 2 (Mar. 2016), Article No. 6. LI, Y.; TAN, T.; ZHANG, Y.; AND XUE, J. Program tailoring: slicing by sequential criteria. In Proc. of the European Conference on Object-Oriented Programming (ECOOP), Dagstuhl LIPIcs, 2016, 15:1–15:27. MADSEN, M.; TIP, F.; ANDREASEN, E.; SEN, K.; AND M⊘LLER, A. Feedback-directed instrumentation for deployed JavaScript applications. In Proc. of the 38th International Conference on Software Engineering (ICSE), ACM, 2016, 899–910. MENENDEZ, D.; AND NAGARAKATTE, S. Termination-checking for LLVM peephole optimizations. In Proc. of the 38th International Conference on Software Engineering (ICSE), ACM, 2016, 191–202. MINÉ, A.; BRECK, J.; AND REPS, T. An algorithm inspired by constraint solvers to infer inductive invariants in numeric programs. In Proc. of the 25th European Symposium on Programming (ESOP), Springer, 2016, 560–588. OUNI, A.; KESSENTINI, M.; SAHRAOUI, H.; INOUE, K.; AND DEB, K. Multi-criteria code refactoring using searchbased software engineering: an industrial case study. ACM 188 Transactions on Software Engineering and Methodology 25, 3 (Aug. 2016), Article No. 23. PETRICEK, T.; GUERRA, G.; AND SYME, D. Types from data: making structured data first-class citizens in F#. In Proc. of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), ACM, 2016, 477–490. POTVIN, R.; AND LEVENBERG, J. Why Google stores billions of lines of code in a single repository. Communications of the ACM 59, 7 (July 2016), 78–87. • RASCHKA S. Python machine learning. Packt Publishing, 2016. RIZZI, E. F.; ELBAUM, S.; AND DWYER, M. B. On the techniques we create, the tools we build, and their misalignments: a study of KLEE. In Proc. of the 38th International Conference on Software Engineering (ICSE), ACM, 2016, 132–143. • RUMPE, B. Modeling with UML: language, concepts, methods. Springer, 2016. SONG, N. Y.; SON, Y; HAN, H.; AND YEOM, H. Y. Efficient memory-mapped I/O on fast storage device. ACM Transactions on Storage 12, 4 (Aug. 2016), Article No. 19. STEFǍNESCU, A.; PARK, D.; YUWEN, S.; LI, Y.; AND ROŞU, G. Semantics-based program verifiers for all languages. In Proc. of the ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), ACM, 2016, 74–91. SUTCLIFFE, R.; AND KOWARSCH, B. Closing the barn door: re-prioritizing safety, security, and reliability. In Proc. of the 21st Western Canadian Conference on Computing Education (WCCCE), ACM, 2016, Article No. 1. SWALENS, J.; DE KOSTER, J.; DE MEUTER, W. Transactional tasks: parallelism in software transactions. In Proc. of the European Conference on Object-Oriented Programming (ECOOP), Dagstuhl LIPIcs, 2016, 23:1–23:28. TAUBER, T.; AND OLIVEIRA, B. C. d. S. Modular architecture for code and metadata sharing. In Proc. of the 15th International Conference on Modularity (MODULARITY), ACM, 2016, 106–117. WANG, Y.; AND OLIVEIRA, B. C. d. S. The expression problem, trivially!. In Proc. of the 15th International Conference on Modularity (MODULARITY), ACM, 2016, 37–41. WONG, W. E.; GAO, R.; LI, Y.; ABREU, R.; AND WOTAWA, F. A survey on software fault localization. IEEE Transactions on Software Engineering 42, 8 (Aug. 2016), 707–740. YE, X.; SHEN, H.; MA, X.; BUNESCU, R.; AND LIU, C. From word embeddings to document similarities for improved information retrieval in software engineering. In Proc. of the 38th International Conference on Software Engineering (ICSE), ACM, 2016, 404–415. Computing Reviews • April 2017 NOTABLE COMPUTING BOOKS AND ARTICLES YU, T.; QU, X.; AND COHEN, M. B. VDTest: an automated framework to support testing for virtual devices. In Proc. of the 38th International Conference on Software Engineering (ICSE), ACM, 2016, 583–594. ZHOU, H.; AND XUE, J. Exploiting mixed SIMD parallelism by reducing data reorganization overhead. In Proc. of the International Symposium on Code Generation and Optimization (CGO), ACM, 2016, 59–69. E. Data BEIMEL, A.; FARRÀS, O.; AND MINTZ, Y. Secret-sharing schemes for very dense graphs. Journal of Cryptology 29, 2 (Apr. 2016), 336–362. MONDELLI, M.; HASSANI, S. H.; AND URBANKE, R. L. Unified scaling of polar codes: error exponent, scaling exponent, moderate deviations, and error floors. IEEE Transactions on Information Theory 62, 12 (Dec. 2016), 6698–6712. YAN, H.; AND LIU, C. Two classes of cyclic codes and their weight enumerator. Designs, Codes and Cryptography 81, 1 (Oct. 2016), 1–9. F. Theory of Computation BABAI, L. Graph isomorphism in quasipolynomial time [extended abstract]. In Proc. of the 48th Annual ACM Symposium on the Theory of Computing (STOC), ACM, 2016, 684–697. BÖRGER, E.; AND SCHEWE, K.-D. Concurrent abstract state machines. Acta Informatica 53, 5 (Aug. 2016), 469–492. BUDIG, B.; VAN DIJK, T. C.; AND WOLFF, A. Matching labels and markers in historical maps: an algorithm with interactive postprocessing. ACM Transactions on Spatial Algorithms and Systems 2, 4 (Nov. 2016), Article No. 13. CHADHA, R.; CHEVAL, V.; CIOBÂCǍ, S.; AND KREMER, S. Automated verification of equivalence properties of cryptographic protocols. ACM Transactions on Computational Logic 17, 4 (Nov. 2016), Article No. 23. COECKE, B.; FRITZ, T.; AND SPEKKENS, R. W. A mathematical theory of resources. Information and Computation 250 (Oct. 2016), 59–86. DOCZKAL, C.; AND SMOLKA, G. Completeness and decidability results for CTL in constructive type theory. Journal of Automated Reasoning 56, 3 (Mar. 2016), 343–365. FAN, S.; ZAHEDI, S. M.; AND LEE, B. C. The computational sprinting game. In Proc. of the 21st International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), ACM, 2016, 561–575. Computing Reviews FONTES, L.; JAIN, R.; KERENIDIS, I.; LAPLANTE, S.; LAURIÉRE, M.; AND ROLAND, J. Relative discrepancy does not separate information and communication complexity. ACM Transactions on Computation Theory 9, 1 (Dec. 2016), Article No. 4. GOLDREICH, O.; AND RON, D. On sample-based testers. ACM Transactions on Computation Theory 8, 2 (May 2016), Article No. 7. HESSELINK, W. H. Correctness and concurrent complexity of the black-white bakery algorithm. Formal Aspects of Computing 28, 2 (Apr. 2016), 325–341. KÄRKKÄINEN, J.; KEMPA, D.; AND PUGLISI, S. J. Lazy LempelZiv factorization algorithms. Journal of Experimental Algorithmics 21 (2016), Article No. 2.4. MEIR, O. Combinatorial PCPs with short proofs. Computational Complexity 25, 1 (Mar. 2016), 1–102. RAZ, R. Fast learning requires good memory: a time-space lower bound for parity learning. In Proc. of the 57th Annual IEEE Symposium on Foundations of Computer Science (FOCS), IEEE, 2016, 266–275. RUBISTEIN, A. Settling the complexity of computing approximate two-player Nash equilibria. In Proc. of the 57th Annual IEEE Symposium on Foundations of Computer Science (FOCS), IEEE, 2016, 258–265. SCHMITZ, S. Complexity hierarchies beyond elementary. ACM Transactions on Computation Theory 8, 1 (Feb. 2016), Article No. 3. G. Mathematics of Computing CAO, Y.; CAO, Y.; AND FU, F.-W. Cyclic codes over F2m [u]/⟨uk ⟩ of oddly even length. Applicable Algebra in Engineering, Communication and Computing 27, 4 (Aug. 2016), 259–277. CHATTOPADHYAY, E.; AND ZUCKERMAN, D. Explicit twosource extractors and resilient functions. In Proc. of the 48th Annual ACM Symposium on the Theory of Computing (STOC), ACM, 2016, 670–683. CHECHIK, S.; AND WULFF-NILSEN, C. Near-optimal light spanners. In Proc. of the 27th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), SIAM, 2016, 883–892. CHONEV, V.; OUAKNINE, J.; AND WORRELL, J. On the complexity of the orbit problem. Journal of the ACM 63, 3 (Sept. 2016), Article No. 23. CLEMENS, J.; REINEKING, T.; AND KLUTH, T. An evidential approach to SLAM, path planning, and active exploration. International Journal of Approximate Reasoning 73 (June 2016), 1–26. • April 2017 189 NOTABLE COMPUTING BOOKS AND ARTICLES DENG, W.; AND YIN, W. On the global and linear convergence of the generalized alternating direction method of multipliers. Journal of Scientific Computing 66, 3 (Mar. 2016), 889–916. DO, S.; HA, Y.; KANG, M.; AND KIM, C. H. Application of a multi-dimensional limiting process to central-upwind schemes for solving hyperbolic systems of conservation laws. Journal of Scientific Computing 69, 1 (Oct. 2016), 274–291. GHAFFARI, M. An improved distributed algorithm for maximal independent set. In Proc. of the 27th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), SIAM, 2016, 270–277. KEELING, S. L.; AND KUNISCH, K. Robust ℓ1 approaches to computing the geometric median and principal and independent components. Journal of Mathematical Imaging and Vision 56, 1 (Sept. 2016), 99–124. KITAMURA, D.; ONO, N.; SAWADA, H.; KAMEOKA, H.; AND SARUWATARI, H. Determined blind source separation unifying independent vector analysis and nonnegative matrix factorization. IEEE/ACM Transactions on Audio, Speech and Language Processing 24, 9 (Sept. 2016), 1626–1641. KRENN, D.; AND WAGNER, S. Compositions into powers of b: asymptotic enumeration and parameters. Algorithmica 75, 4 (Aug. 2016), 606–631. KUDEKAR, S.; KUMAR, S.; MONDELLI, M.; PFISTER, H. D.; ŞAŞOĞLU. E.; AND URBANKE, R. Reed-Muller codes achieve capacity on erasure channels. In Proc. of the 48th Annual ACM Symposium on the Theory of Computing (STOC), ACM, 2016, 658–669. NAKPIM, W. Third-order ordinary differential equations equivalent to linear second-order ordinary differential equations via tangent transformations. Journal of Symbolic Computation 77 (Nov.–Dec. 2016), 63–77. NIKOLAOU, N.; EDAKUNNI, N.; KULL, M.; FLACH, P.; AND BROWN, G. Cost-sensitive boosting algorithms: Do we really need them?. Machine Learning 104, 2 (Sept. 2016), 359–384. TIERNY, J.; AND CARR, H. Jacobi fiber surfaces for bivariate reeb space computation. IEEE Transactions on Visualization and Computer Graphics (Proc. of SciVis 2016) 23, 1 (Jan. 2017), 960–969. WANG, M. Stochastic composition optimization: algorithms and sample complexities. In Proc. of the International Conference on Continuous Optimization (ICCOPT), 2016. WATRIGANT, R.; BOUGERET, M.; AND GIROUDEAU, R. Approximating the Sparsestk-Subgraph in chordal graphs. Theory of Computing Systems 58, 1 (Jan. 2016), 111–132. YOSHIDA, Y. Nonlinear Laplacian for digraphs and its applications to network analysis. In Proc. of the 9th ACM International Conference on Web Search and Data Mining (WSDM), ACM, 2016, 483–492. 190 H. Information Systems ALEXIEV, V.; ISAAC, A.; AND LINDENTHAL, J. On the composition of ISO 25964 hierarchical relations (BTG, BTP, BTI). International Journal on Digital Libraries 17, 1 (Mar. 2016), 39–48. BAROWY, D.; CURTSINGER, C.; BERGER, E.; AND MCGREGOR, A. AutoMan: a platform for integrating human-based and digital computation. Communications of the ACM 59, 6 (June 2016), 102–109. BOTA, H.; ZHOU, K.; AND JOSE, J. M. Playing your cards right: the effect of entity cards on search behaviour and workload. In Proc. of the ACM Conference on Human Information Interaction and Retrieval (CHIIR), ACM, 2016, 131–140. CAMPOS, G. O.; ZIMEK, A.; SANDER, J.; CAMPELLO, R. J. G. B.; MICENKOVÁ, B.; SCHUBERT, E.; ASSENT, I.; AND HOULE, M. E. On the evaluation of unsupervised outlier detection: measures, datasets, and an empirical study. Data Mining and Knowledge Discovery 30, 4 (July 2016), 891–927. CECCHINATO, M. E.; SELLEN, A.; SHOKOUHI, M.; AND SMYTH, G. Finding email in a multi-account, multi-device world. In Proc. of the CHI Conference on Human Factors in Computing Systems (CHI), ACM, 2016, 1200–1210. CHAKRABORTY, T.; SRINIVASAN, S.; GANGULY, N.; MUKHERJEE, A.; AND BHOWMICK, S. Permanence and community structure in complex networks. ACM Transactions on Knowledge Discovery from Data 11, 2 (Dec. 2016), Article No. 14. CHEN, C.; ZHU, X.; SHEN, P.; HU, J.; GUO, S.; TARI, Z.; AND ZOMAYA, A. Y. An efficient privacy-preserving ranked keyword search method. IEEE Transactions on Parallel and Distributed Systems 27, 4 (Apr. 2016), 951–963. CHUNG, C.-F.; DEW, K.; COLE, A.; ZIA, J.; FOGARTY, J.; KIENTZ, J. A.; AND MUNSON, S. A. Boundary negotiating artifacts in personal informatics: patient-provider collaboration with patient-generated data. In Proc. of the 19th ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW), ACM, 2016, 770–786. COSTA, J.; ADAMS, A. T.; JUNG, M. F.; GUIMBRETIÉRE, F.; AND CHOUDHURY, T. EmotionCheck: leveraging bodily signals and false feedback to regulate our emotions. In Proc. of the ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp), ACM, 2016, 758–769. DEMENTYEV, A.; KAO, H.-L.; CHOI, I.; AJILO, D.; XU, M.; PARADISO, J. A.; SCHMANDT, C.; AND FOLLMER, S. Rovables: miniature on-body robots as mobile wearables. In Proc. of the 29th Annual Symposium on User Interface Software and Technology (UIST), ACM, 2016, 111–120. Computing Reviews • April 2017 NOTABLE COMPUTING BOOKS AND ARTICLES DIGNÖS, A.; BÖHLEN, M. H.; GAMPER, J.; AND JENSEN, C. S. Extending the kernel of a relational DBMS with comprehensive support for sequenced temporal queries. ACM Transactions on Database Systems 41, 4 (Dec. 2016), Article No. 26. DOMBROWSKI, L.; HARMON, E.; AND FOX, S. Social justiceoriented interaction design. In Proc. of the ACM Conference on Designing Interactive Systems (DIS), ACM, 2016, 656–671. ELSAYED, N. A. M.; THOMAS, B. H.; MARRIOTT, K.; PIANTADOSI, J.; AND SMITH, R. T. Situated analytics: demonstrating immersive analytical tools with augmented reality. Journal of Visual Languages and Computing 36 (Oct. 2016), 13–23. GOTZ, D.; SUN, S.; AND CAO, N. Adaptive contextualization: combating bias during high-dimensional visualization and data selection. In Proc. of the 21st International Conference on Intelligent User Interfaces (IUI), ACM, 2016, 85–95. GRÖGER, C.; KASSNER, L.; HOOS, E.; KÖNIGSBERGER, J.; KIEFER, C.; SILCHER, S.; AND MITSCHANG, B. The datadriven factory: leveraging big industrial data for agile, learning and human-centric manufacturing. In Proc. of the 18th International Conference on Enterprise Information Systems (ICEIS), SCITEPRESS, 2016, 40–52. GUO, G.; ZHU, F.; CHEN, E.; LIU, Q.; WU, L.; AND GUAN, C. From footprint to evidence: an exploratory study of mining social data for credit scoring. ACM Transactions on the Web 10, 4 (Dec. 2016), Article No. 22. HESPANHOL, L. Interacting with laughter: a case study on audio-based interactivity of public projections. In Proc. of the 28th Australian Conference on Computer-Human Interaction (OzCHI), ACM, 2016, 205–214. HSIEH, G.; KOCIELNIK, R. You get who you pay for: the impact of incentives on participation bias. In Proc. of the 19th ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW), ACM, 2016, 823–835. JAVORNIK, A.; ROGERS, Y.; MOUTINHO, A. M.; AND FREEMAN, R. Revealing the shopper experience of using a “magic mirror” augmented reality make-up application. In Proc. of the ACM Conference on Designing Interactive Systems (DIS), ACM, 2016, 871–882. KAMALZADEH, M.; KRALJ, C.; MÖLLER, T.; AND SEDLMAIR, M. TagFlip: active mobile music discovery with social tags. In Proc. of the 21st International Conference on Intelligent User Interfaces (IUI), ACM, 2016, 19–30. KARANA, E.; GIACCARDI, E.; STAMHUIS, N.; AND GOOSSENSEN, J. The tuning of materials. In Proc. of the ACM Conference on Designing Interactive Systems (DIS), ACM, 2016, 619–631. Computing Reviews KO, M.; CHOI, S.; YATANI, K.; AND LEE, U. Lock n’ LoL. In Proc. of the CHI Conference on Human Factors in Computing Systems (CHI), ACM, 2016, 998–1010. LAPUT, G.; XIAO, R.; AND HARRISON, C. ViBand: highfidelity bio-acoustic sensing using commodity smartwatch accelerometers. In Proc. of the 29th Annual Symposium on User Interface Software and Technology (UIST), ACM, 2016, 321–333. LE GOC, M.; KIM, L. H.; PARSAEI, A.; FEKETE, J.-D.; DRAGICEVIC, P.; AND FOLLMER, S. Zooids: building blocks for swarm user interfaces. In Proc. of the 29th Annual Symposium on User Interface Software and Technology (UIST), ACM, 2016, 97–109. LEONG, J.; PARZER, P.; PERTENEDER, F.; BABIC, T.; RENDL, C.; VOGL, A.; EGGER, H.; OLWAL, A.; AND HALLER, M. proCover: sensory augmentation of prosthetic limbs using smart textile covers. In Proc. of the 29th Annual Symposium on User Interface Software and Technology (UIST), ACM, 2016, 335–346. LESKOVEC, J.; AND SOSIČ, R. SNAP: a general-purpose network analysis and graph-mining library. ACM Transactions on Intelligent Systems and Technology 8, 1 (Oct. 2016), Article No. 1. LI, H.; YANG, W.; WANG, J.; XU, Y.; AND HUANG, L. WiFinger: talk to your smart devices with finger-grained gesture. In Proc. of the ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp), ACM, 2016, 250–261. LIEN, J.; GILLIAN, N.; KARAGOZLER, M. E.; AMIHOOD, P.; SCHWESIG, C.; OLSON, E.; RAJA, H.; AND POUPYREV, I. Soli: ubiquitous gesture sensing with millimeter wave radar. ACM Transactions on Graphics 35, 4 (July 2016), Article No. 142. MASON, M. The MIT Museum Glassware prototype: visitor experience exploration for designing smart glasses. Journal on Computing and Cultural Heritage 9, 3 (Nov. 2016), Article No. 12. MEHROTRA, A.; HENDLEY, R.; AND MUSOLESI, M. Pref Miner: mining user’s preferences for intelligent mobile notification management. In Proc. of the ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp), ACM, 2016, 1223–1234. MOSHFEGHI, Y.; TRIANTAFILLOU, P.; AND POLLICK, F. E. Understanding information need: an fMRI study. In Proc. of the 39th International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR), ACM, 2016, 335–344. MUTLU, B.; VEAS, E.; AND TRATTNER, C. VizRec: recommending personalized visualizations. ACM Transactions on Interactive Intelligent Systems 6, 4 (Dec. 2016), Article No. 31. • April 2017 191 NOTABLE COMPUTING BOOKS AND ARTICLES NAPIERALA, K.; AND STEFANOWSKI, J. Types of minority class examples and their influence on learning classifiers from imbalanced data. Journal of Intelligent Information Systems 46, 3 (June 2016), 563–597. NICOLAESCU, P.; ROSENSTENGEL, M.; DERNTL, M.; KLAMMA, R.; AND JARKE, M. View-based near real-time collaborative modeling for information systems engineering. In Proc. of the 28th International Conference on Advanced Information Systems Engineering (CAiSE), Springer, 2016, 3–17. POLVI, J.; TAKETOMI, T.; YAMAMOTO, G.; DEY, A.; SANDOR, C.; AND KATO, H. SlidAR: a 3D positioning method for SLAM-based handheld augmented reality. Computers and Graphics 55 (Apr. 2016), 33–43. PREIST, C.; SCHIEN, D.; AND BLEVIS, E. Understanding and mitigating the effects of device and cloud service design decisions on the environmental footprint of digital infrastructure. In Proc. of the CHI Conference on Human Factors in Computing Systems (CHI), ACM, 2016, 1324–1337. RAMEAU, F.; HA, H.; JOO, K.; CHOI, J.; PARK, K.; AND KWEON, I. S. A real-time augmented reality system to see-through cars. IEEE Transactions on Visualization and Computer Graphics 22, 11 (Nov. 2016), 2395–2404. RAWASSIZADEH, R.; MOMENI, E.; DOBBINS, C.; GHARIBSHAH, J.; AND PAZZANI, M. Scalable daily human behavioral pattern mining from multivariate temporal data. IEEE Transactions on Knowledge and Data Engineering 28, 11 (Nov. 2016), 3098–3112. RISTOSKI, P.; AND PAULHEIM, H. Semantic web in data mining and knowledge discovery: a comprehensive survey. Journal of Web Semantics 36 (Jan. 2016), 1–22. ROUHANI, B. D.; MIRHOSEINI, A.; SONGHORI, E. M.; AND KOUSHANFAR, F. Automated real-time analysis of streaming big and dense data on reconfigurable platforms. ACM Transactions on Reconfigurable Technology and Systems 10, 1 (Dec. 2016), Article No. 8. SAUNDERS, J.; SYRDAL, D. S.; KOAY, K. L.; BURKE, N.; AND DAUTENHAHN, K. “Teach Me–Show Me”—end-user personalization of a smart home and companion robot. IEEE Transactions on Human-Machine Systems 46, 1 (Feb. 2016), 27–40. SCHNEIDER, B.; SHARMA, K.; CUENDET, S.; ZUFFEREY, G.; DILLENBOURG, P.; AND PEA, R. Using mobile eye-trackers to unpack the perceptual benefits of a tangible user interface for collaborative learning. ACM Transactions on Computer-Human Interaction 23, 6 (Dec. 2016), Article No. 39. STONEBRAKER, M. Big data is (at least) four different problems. YouTube, 01:02:35 published on June 2, 2016, stanfordonline, https://www.youtube.com/watch?v=S79buNhdhI. 192 ŚWIA̧TEK, P.; JUSZCZYSZYN, K.; KOŁACZEK, G.; BRZOSTOWSKI, K.; AND SCHAUER, P. Processes’ optimization tools for web-service oriented organizations’ resources: an ehealth application. In Proc. of the 17th International Conference on E-health Networking, Application & Services (HealthCom), IEEE, 2016, 222–226. TRUSHKOWSKY, B.; KRASKA, T.; FRANKLIN, M.; AND SARKAR, P. Answering enumeration queries with the crowd. Communications of the ACM 59, 1 (Jan. 2016), 118–127. TSAI, M.-F.; WANG, C.-J.; AND CHIEN, P.-C. Discovering finance keywords via continuous-space language models. ACM Transactions on Management Information Systems 7, 3 (Oct. 2016), Article No. 7. TUAN, A.; COMYN-WATTIAU, I.; AND SI-SAÏD CHERFI, S. Structuring guidelines for web application designers: a metamodel. In Proc. of the 18th International Conference on Enterprise Information Systems (ICEIS), SCITEPRESS, 2016, 327–335. VERBERNE, S.; SAPPELLI, M.; HIEMSTRA, D.; AND KRAAIJ, W. Evaluation and analysis of term scoring methods for term extraction. Information Retrieval Journal 19, 5 (Oct. 2016), 510–545. VUORIMAA, P.; LAINE, M.; LITVINOVA, E.; AND SHESTAKOV, D. Leveraging declarative languages in web application development. World Wide Web 19, 4 (July 2016), 519–543. WANG, E. J.; LI, W.; HAWKINS, D.; GERNSHEIMER, T.; NORBYSLYCORD, C.; AND PATEL, S. N. HemaApp: noninvasive blood screening of hemoglobin using smartphone cameras. In Proc. of the ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp), ACM, 2016, 593–604. WIESE, O.; AND ROTH, V. See you next time: a model for modern shoulder surfers. In Proc. of the 18th International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI), ACM, 2016, 453–464. YIN, H.; CUI, B.; ZHOU, X.; WANG, W.; HUANG, Z.; AND SADIQ, S. Joint modeling of user check-in behaviors for real-time point-of-interest recommendation. ACM Transactions on Information Systems 35, 2 (Dec. 2016), Article No. 11. ZHAI, C.; AND MASSUNG, S. Text data management and analysis: a practical introduction to information retrieval and text mining. ACM and Morgan & Claypool, 2016. ZHAO, S.; RAMOS, J.; TAO, J.; JIANG, Z.; LI, S.; WU, Z.; PAN, G.; AND DEY, A. K. Discovering different kinds of smartphone users through their application usage behaviors. In Proc. of the ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp), ACM, 2016, 498–509. Computing Reviews • April 2017 NOTABLE COMPUTING BOOKS AND ARTICLES I. Computing Methodologies • ADOUANE, L. Autonomous vehicle navigation: from behavioral to hybrid multi-controller architectures. CRC Press, 2016. AMBUSAIDI, M. A.; HE, X.; NANDA, P.; AND TA, Z. Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Transactions on Computers 65, 10 (Oct. 2016), 2986–2998. ATANASSOV, K.; GEORGIEV, I.; SZMIDT, E.; AND KACPRZYK, J. Multidimensional intuitionistic fuzzy quantifiers. In Proc. of the IEEE 8th International Conference on Intelligent Systems (IS), IEEE, 2016, 530–534. AUTUORI, J.; HNAIEN, F.; AND YALAOUI, F. A mapping technique for better solution exploration: NSGA-II adaptation. Journal of Heuristics 22, 1 (Feb. 2016), 89–123. BISSELING, B.; BRUZELIUS, F.; AND ERIKSSON, O. Effects of visual latency on vehicle driving behavior. ACM Transactions on Applied Perception 14, 1 (Aug. 2016), Article No. 5. BLOT, A.; DAGAND, P.-É.; AND LAWALL, J. From sets to bits in Coq. In Proc. of the 13th International Symposium on Functional and Logic Programming (FLOPS), Springer, 2016, 12–28. BOUDHANE, M.; AND NSIRI, B. Underwater image processing method for fish localization and detection in submarine environment. Journal of Visual Communication and Image Representation 39 (Aug. 2016), 226–238. CARVALHO, A.; DIMITROV, S.; AND LARSON, K. How many crowdsourced workers should a requester hire?. Annals of Mathematics and Artificial Intelligence 78, 1 (Sept. 2016), 45–72. CHARLESWORTH, A. A theorem about computationalism and “absolute” truth. Minds and Machines 26, 3 (Sept. 2016), 205–226. CIMPOI, M.; MAJI, S.; KOKKINOS, I.; AND VEDALDI, A. Deep filter banks for texture recognition, description, and segmentation. International Journal of Computer Vision 118, 1 (May 2016), 65–94. DAI, J.; LI, Y.; HE, K.; AND SUN, J. R-FCN: object detection via region-based fully convolutional networks. In Proc. of the Conference on Neural Information Processing Systems (NIPS), Curran Assoc., 2016, 379–387. DI BARTOLOMEO, M.; AND HU, Y. There is more to streamgraphs than movies: better aesthetics via ordering and lassoing. Computer Graphics Forum 35, 3 (June 2016), 341–350. DING, C.; KYAW THU, Y.; UTIYAMA, M.; AND SUMITA, E. Word segmentation for Burmese (Myanmar). ACM Transactions on Asian and Low-Resource Language Information Processing 15, 4 (June 2016), Article No. 22. Computing Reviews DONG, C.; LOY, C. C.; HE, K.; AND TANG, X. Image superresolution using deep convolutional networks. IEEE Transactions on Pattern Analysis and Machine Intelligence 38, 2 (Feb. 2016), 295–307. ELGENDY, O. A.; AND CHAN, S. H. Image reconstruction and threshold design for quanta image sensors. In Proc. of the IEEE International Conference on Image Processing (ICIP), IEEE, 2016, 978–982. ENGLUND, R.; AND ROPINSKI, T. Evaluating the perception of semi-transparent structures in direct volume rendering techniques. In Proc. of the SIGGRAPH Asia Symposium on Visualization (SA), ACM, 2016, Article No. 9. FUJIMOTO, R. M. Research challenges in parallel and distributed simulation. ACM Transactions on Modeling and Computer Simulation 26, 4 (May 2016), Article No. 22. GAO, J.; WANG, Y.; WANG, J.; AND LIANG, R. Adaptive optimization modeling of preconditioned conjugate gradient on multi-GPUs. ACM Transactions on Parallel Computing 3, 3 (Dec. 2016), Article No. 16. • GOODFELLOW, I.; BENGIO, Y.; AND COURVILLE, A. Deep learning. MIT Press, 2016. HACHMON, G.; MAMET, N.; SASSON, S.; BARKAI, T.; HADAR, N.; ABU-HOROWITZ, A.; AND BACHELET, I. A nonNewtonian fluid robot. Artificial Life 22, 1 (Winter 2016), 1–22. HAGIYA, M.; AUBERT-KATO, N.; WANG, S.; AND KOBAYASHI, S. Molecular computers for molecular robots as hybrid systems. Theoretical Computer Science 632 (June 2016), 4–20. HAN, X.; WONG, K.-Y. K.; AND YU, Y. 3D human model reconstruction from sparse uncalibrated views. IEEE Computer Graphics and Applications 36, 6 (Nov.–Dec. 2016), 46–56. HE, K.; ZHANG, X.; REN, S.; AND SUN, J. Deep residual learning for image recognition. In Proc. of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), IEEE, 2016, 770–778. • KAEHLER, A.; AND BRADSKI, G. Learning OpenCV 3. O’Reilly Media, 2016. KARTHEEK MEDATHATI, N. V.; NEUMANN, H.; MASSON, G. S.; AND KORNPROBST, P. Bio-inspired computer vision: towards a synergistic approach of artificial and biological vision. Computer Vision and Image Understanding 150 (Sept. 2016), 1–30. KIM, I.-J.; CHOI, C.; AND LEE, S.-H. Improving discrimination ability of convolutional neural networks by hybrid learning. International Journal on Document Analysis and Recognition 19, 1 (Mar. 2016), 1–9. LECOCQ, P.; DUFAY, A.; SOURIMANT, G.; AND MARVIE, J.-E. Accurate analytic approximations for real-time specular area lighting. In Proc. of the 20th ACM SIGGRAPH Symposium on Interactive 3D Graphics and Games (I3D), ACM, 2016, 113–120. • April 2017 193 NOTABLE COMPUTING BOOKS AND ARTICLES LIU, X.; XIE, N.; TANG, K.; AND JIA, J. Lightweighting for Web3D visualization of large-scale BIM scenes in realtime. Graphical Models 88 (Nov. 2016), 40–56. MAGLIETTA, R.; AMOROSO, N.; BOCCARDI, M.; BRUNO, S.; CHINCARINI, A.; FRISONI, G. B.; INGLESE, P.; REDOLFI, A.; TANGARO, S.; TATEO, A.; BELLOTTI, R.; and The Alzheimers Disease Neuroimaging Initiative automated hippocampal segmentation in 3D MRI using random undersampling with boosting algorithm. Pattern Analysis and Applications 19, 2 (May 2016), 579–591. MENDES N.; AND DOS SANTOS A. A hypercube queuing model approach to the police units allocation problem. In Proc. of the 18th International Conference on Enterprise Information Systems (ICEIS), SCITEPRESS, 2016, 70–81. MERCADO-COLMENERO, J.-M.; PARAMIO, M.A.R.; PEREZGARCIA, J.-M.; AND MARTIN-DOÑATE, C. A new hybrid method for demoldability analysis of discrete geometries. Computer-Aided Design 80 (Nov. 2016), 43–60. MOLLAJAFARI, M.; AND SHAHHOSEINI, H. S. An efficient ACO-based algorithm for scheduling tasks onto dynamically reconfigurable hardware using TSP-likened construction graph. Applied Intelligence 45, 3 (Oct. 2016), 695–712. • MÜLLER V. (Ed.) Fundamental issues of artificial intelligence. Springer, 2016. ORTNER, T.; SORGER, J.; PIRINGER, H.; HESINA, G.; AND GRÖLLER, E. Visual analytics and rendering for tunnel crack analysis. The Visual Computer 32, 6 (June 2016), 859–869. PEREIRA, G.; PRADA, R.; AND SANTOS, P. A. Integrating social power into the decision-making of cognitive agents. Artificial Intelligence 241 (Dec. 2016), 1–44. POUND, M .P.; FRENCH, A. P.; FOZARD, J. A.; MURCHIE, E. H.; AND PRIDMORE, T. P. A patch-based approach to 3D plant shoot phenotyping. Machine Vision and Applications 27, 5 (July 2016), 767–779. PRÖLLOCHS, N.; FEUERRIEGEL, S.; AND NEUMANN, D. Detecting negation scopes for financial news sentiment using reinforcement learning. In Proc. of the 49th Hawaii International Conference on System Sciences (HICSS), IEEE, 2016, 1164–1173. RODRÍGUEZ, M. B.; AGUS, M.; BETTIO, F.; MARTON, F.; AND GOBBETTI, E. Digital Mont’e Prama: exploring large collections of detailed 3D models of sculptures. Journal on Computing and Cultural Heritage 9, 4 (Dec. 2016), Article No. 18. SATYANARAYAN, A.; MORIT, D.; WONGSUPHASAWAT, K.; AND HEER, J. Vega-lite: a grammar of interactive graphics. IEEE Transactions on Visualization and Computer Graphics (Proc. of InfoVis 2016) 23, 1 (Jan. 2017), 341–350. • SGUREV, V.; YAGER, R. R.; KACPRZYK, J.; AND JOTSOV, V. (Eds.) Innovative issues in intelligent systems. Springer, 2016. 194 SHOKOUHIFAR, M.; AND JALALI, A. Two-stage fuzzy inference system for symbolic simplification of analog circuits. Integration, the VLSI Journal 55 (Sept. 2016), 281–292. SILVA, F.; DUARTE, M.; CORREIA, L.; OLIVEIRA, S. M.; AND CHRISTENSEN, A. L. Open issues in evolutionary robotics. Evolutionary Computation 24, 2 (Summer 2016), 205–236. SKRABA, P.; ROSEN, P.; WANG, B.; CHEN, G.; BHATIA, H.; AND PASCUCCI, V. Critical point cancellation in 3D vector fields: robustness and discussion. IEEE Transactions on Visualization and Computer Graphics 22, 6 (June 2016), 1683–1693. STAHL, B. C.; AND COECKELBERGH, M. Ethics of healthcare robotics: towards responsible research and innovation. Robotics and Autonomous Systems 86 (Dec. 2016), 152–161. STOFFERS, M.; SCHEMMEL, D.; DUSTMANN, O. S.; AND WEHRLE, K. Automated memoization for parameter studies implemented in impure languages. In Proc. of the ACM Conference on SIGSIM Principles of Advanced Discrete Simulation (PADS), ACM, 2016, 221–232. • SUGIYAMA M. Introduction to statistical machine learning. Morgan Kaufmann, 2016. TAM, G. K. L.; KOTHARI, V.; AND CHEN, M. An analysis of machine- and human-analytics in classification. IEEE Transactions on Visualization and Computer Graphics (Proc. of VAST 2016) 23, 1 (Jan. 2017), 71–80. TIPPETTS, B.; LEE, D. J.; LILLYWHITE, K.; AND ARCHIBALD, J. Review of stereo vision algorithms and their suitability for resource-limited systems. Journal of Real-Time Image Processing 11, 1 (Jan. 2016), 5–25. WANG, G.; WANG, C.; DU, Q.; LI, L.; AND DONG, W. Distributed cooperative control of multiple nonholonomic mobile robots. Journal of Intelligent & Robotic Systems 83, 3 (Sept. 2016), 525–541. WANG, W.; CHEN, G.; CHEN, H.; DINH, T. T. A.; GAO, J.; OOI, B. C.; TAN, K.-L.; WANG, S.; AND ZHANG, M. Deep learning at scale and at ease. ACM Transactions on Multimedia Computing, Communications, and Applications 12, 4s (Nov. 2016), Article No. 69. WANG, W.; YANG, X.; OOI, B. C.; ZHANG, D.; AND ZHUANG, Y. Effective deep learning-based multi-modal retrieval. The VLDB Journal 25, 1 (Feb. 2016), 79–101. WEI, X.; PHUNG, S. L.; AND BOUZERDOUM, A. Visual descriptors for scene categorization: experimental evaluation. Artificial Intelligence Review 45, 3 (Mar. 2016), 333–368. XIONG, F.; KAM, M.; HREBIEN, L.; WANG, B.; QI, Y. Kernelized information-theoretic metric learning for cancer diagnosis using high-dimensional molecular profiling data. ACM Transactions on Knowledge Discovery from Data 10, 4 (Jul. 2016), Article No. 38. Computing Reviews • April 2017 NOTABLE COMPUTING BOOKS AND ARTICLES YU, Q.; YAN, R.; TANG, H.; TAN, K.C.; AND LI, H. A spiking neural network system for robust sequence recognition. IEEE Transactions on Neural Networks and Learning Systems 27, 3 (Mar. 2016), 621–635. J. Computer Applications ALBERDI, A.; AZTIRIA, A.; AND BASARAB, A. On the early diagnosis of Alzheimer’s disease from multimodal signals: a survey. Artificial Intelligence in Medicine 71 (July 2016), 1–29. HUMMEL, P.; AND MCAFEE, R. P. When does improved targeting increase revenue?. ACM Transactions on Economics and Computation 5, 1 (Nov. 2016), Article No. 4. • LEWIS, M. The undoing project: a friendship that changed our minds. W. W. Norton & Co., 2016. MURNANE, E. L.; ABDULLAH, S.; MATTHEWS, M.; KAY, M.; KIENTZ, J. A.; CHOUDHURY, T.; GAY, G.; AND COSLEY, D. Mobile manifestations of alertness: connecting biological rhythms with patterms of smartphone app use. In Proc. of the 18th International Conference on HumanComputer Interaction with Mobile Devices and Services (MobileHCI), ACM, 2016, 465–477. ROMERO, M.; SÁNCHEZ, M.; AND VILLALOBOS, J. Weaving business model patterns: understanding business models. In Proc. of the 18th International Conference on Enterprise Information Systems (ICEIS), SCITEPRESS, 2016, 496–505. TANG, J.; AND ZHOU, S. A new approach for feature selection from microarray data based on mutual information. IEEE/ACM Transactions on Computational Biology and Bioinformatics 13, 6 (Nov.–Dec. 2016), 1004–1015. K. Computing Milieux BERGHEL, H. The bogus science theorem. IEEE Computer 49, 4 (Apr. 2016), 74–78. DEVENDORF, L.; DE KOSNIK, A.; MATTINGLY, K.; RYOKAI, K. Probing the potential of post-anthropocentric 3D printing. In Proc. of the ACM Conference on Designing Interactive Systems (DIS), ACM, 2016, 170–181. GANGWAL, N.; AND BANSAL, V. Application of decomposed theory of planned behavior for m-commerce adoption in India. In Proc. of the 18th International Conference on Enterprise Information Systems (ICEIS), SCITEPRESS, 2016, 357–367. Computing Reviews HAMARI, J.; SJÖKLINT, M.; AND UKKONEN, A. The sharing economy: why people participate in collaborative consumption. Journal of the Association for Information Science and Technology 67, 9 (Sept. 2016), 2047–2059. HASAN, S.; KING, Z.; HAFIZ, M.; SAYAGH, M.; ADAMS, B.; AND HINDLE, A. Energy profiles of Java collections classes. In Proc. of the 38th International Conference on Software Engineering (ICSE), ACM, 2016, 225–236. IMMONEN, A.; OVASKA, E.; KALAOJA, J.; AND PAKKALA, D. A service requirements engineering method for a digital service ecosystem. Service Oriented Computing and Applications 10, 2 (June 2016), 151–172. LUCASSEN, G.; DALPIAZ, F.; VAN DER WERF, J. M. E. M.; AND BRINKKEMPER, S. Improving agile requirements: the quality user story framework and tool. Requirements Engineering 21, 3 (Sept. 2016), 383–403. MARQUES, D.; MUSLUKHOV, I.; GUERREIRO, T.; BEZNOSOV, K.; AND CARRIÇO, L. Snooping on mobile phones: prevalence and trends. In Proc. of the 12th Symposium on Usable Privacy and Security (SOUPS), USENIX, 2016, 159–174. MOUAKKET, S.; AND BETTAYEB, A. Factors affecting university instructors’ continuance intention to use learning management systems: the Blackboard system case. In Proc. of the 18th International Conference on Enterprise Information Systems (ICEIS), SCITEPRESS, 2016, 215–222. • O’NEIL, C. Weapons of math destruction. Crown, 2016. RELLO, L.; and BAEZA-YATES, R. The effect of font type on screen readability by people with dyslexia. ACM Transactions on Accessible Computing 8, 4 (May 2016), Article No. 15. SHAY, R.; KOMANDURI, S.; DURITY, A. L.; HUH, P.; MAZUREK, M. L.; SEGRETI, S. M.; UR, B.; BAUER, L.; CHRISTIN, N.; AND CRANOR, L. F. Designing password policies for strength and usability. ACM Transactions on Information and System Security 18, 4 (May 2016), Article No. 13. SUCH, J. M.; AND ROVATSOS, M. Privacy policy negotiation in social media. ACM Transactions on Autonomous and Adaptive Systems 11, 1 (Apr. 2016), Article No. 4. WÓJTOWICZ, A.; AND JOACHIMIAK, K. Model for adaptable context-based biometric authentication for mobile devices. Personal and Ubiquitous Computing 20, 2 (Apr. 2016), 195–207. SYMBOLS • Book • April 2017 195
© Copyright 2026 Paperzz