notable books and articles in computing of...
TRANSCRIPT
Search
Best Reviews | Notable Books & Articles | "Best of" Archive
Computing Reviews is happy to bring you the 21st annual list of notable items published in computing—thistime for 2016. We reached out to many in the computing community for nominations: our reviewers, CR categoryeditors, the editors in chief of journals we cover, and computer scientists in both industry and academia. In addition, weincluded proceedings papers that were recognized as “Best Papers” at their respective conferences, as well as the mostdownloaded journal papers from some of the top journals covered in CR.
Read more about our selection process.
All reviews with the symbol are freely available on the site. Download the full list as a PDF.
Notable Books and Articles in Computing of 2016 A. General Literature
Calude C. The human face of computing (vol. 9).Imperial College Press. Review Sedgewick R.; Wayne K. Computer
science: an interdisciplinary approach.AddisonWesley Professional. Review1Review2
B. Hardware
Dan A.; Lam P.; Hoefler T.; Vechev M. Modeling andanalysis of remote memory access programming. InProceedings of the 2016 ACM SIGPLAN InternationalConference on ObjectOriented Programming,Systems, Languages, and Applications (OOPSLA2016), ACM, 2016, 129144. HajYihia J.; Yasin A.; Asher Y.; Mendelson A. Finegrain power breakdown of modern outoforder coresand its implications on Skylakebased systems. ACMTransactions on Architecture and Code Optimization13, 4 (October 2016), Article No. 56. Wang, P.; McAllister, J. Streaming elements for FPGAsignal and image processing accelerators. IEEETransactions on Very Large Scale Integration (VLSI)Systems 24, 6 (June 2016), 22622274. Xiao K.; Forte D.; Jin Y.; Karri R.; Bhunia S.;Tehranipoor M. Hardware trojans: lessons learned
H. Information Systems (Cont'd.)
Gröger, C.; Kassner, L.; Hoos, E.; Königsberger, J.;Kiefer, C.; Silcher, S.; and Mitschang, B. The datadriven factory: leveraging big industrial data foragile, learning and humancentric manufacturing. InProc. of the 18th International Conference onEnterprise Information Systems, (ICEIS 2016)SCITEPRESS, 2016, 4052. Guo G.; Zhu F.; Chen E.; Liu Q.; Wu L.; Guan C.From footprint to evidence: an exploratory study ofmining social data for credit scoring. ACMTransactions on the Web 10, 4 (November 2016),Article No. 22. Hespanhol L. Interacting with laughter: a case studyon audiobased interactivity of public projections. InProceedings of the 28th Australian Conference onComputerHuman Interaction (OzCHI 2016), ACM,2016, 205214.
Hsieh G.; Kocielnik R. You get who you payfor: the impact of incentives onparticipation bias. In Proceedings of the19th ACM Conference on ComputerSupported Cooperative Work & SocialComputing (CSCW 2016), ACM, 2016,
823835. Javornik A.; Rogers Y.; Moutinho A.; Freeman R.Revealing the shopper experience of using a "magic
after one decade of research. ACM Transactions onDesign Automation of Electronic Systems 22, 1 (May2016), Article No. 6.
C. Computer Systems Organization
Agelastos A.; Allan B.; Brandt J.; GentileA.; Lefantzi S.; Monk S.; Ogden J.; RajanM.; Stevenson J. Continuous wholesystemmonitoring toward rapid understanding ofproduction HPC applications and systems.Parallel Computing 58 (October 2016), 90
106. Altmeyer S.; Douma R.; Lunniss W.; Davis R. On theeffectiveness of cache partitioning in hard realtimesystems. RealTime Systems 52, 5 (September2016), 598643. Álvarez C.; Ayguadé E.; Bosch J.; Bueno J.;
Cherkashin A.; Filgueras A.; JiménezGonzález D.;Martorell X.; Navarro N.; Vidal M.; TheodoropoulosD.; Pnevmatikatos D.; Catani D.; Oro D.; FernándezC.; Segura C.; Rodríguez J.; Hernando J.; ScordinoC.; Gai P.; Passera P.; Pomella A.; Bettin N.; RizzoA.; Giorgi R. The AXIOM software layers.Microprocessors & Microsystems 47, Part B,(November 2016), 262277. Review Balani N. Enterprise IoT: a definitive
handbook. CreateSpace IndependentPublishing Platform. Review Bertino E.; Choo K.; Georgakopolous
D.; Nepal S. Internet of Things (IoT): smart andsecure service delivery. ACM Transactions on InternetTechnology 16, 4 (December 2016), Article No. 22.Review Bienkowski M.; Klonowski M.; Korzeniowski M.;Kowalski D. Randomized mutual exclusion on amultiple access channel. Distributed Computing 29, 5(October 2016), 341359. Bregu E.; Casamassima N.; Cantoni D.; Mottola L.;Whitehouse K. Reactive control of autonomousdrones. In Proceedings of the 14th AnnualInternational Conference on Mobile Systems,
Applications, and Services (MobiSys 2016), ACM,2016, 207219. Chen M.; Qian Y.; Mao S.; Tang W.; Yang X.
Softwaredefined mobile networks security. MobileNetworks and Applications 21, 5 (October 2016),729743. Review Cho, S.; Julien, C. CHITCHAT: navigating tradeoffs indevicetodevice context sharing. In Proc. of the IEEEInternational Conference on Pervasive Computing and
Communications (PerCom 2016), IEEE, 2016, 110. Coppola R.; Morisio M. Connected car: technologies,issues, future trends. ACM Computing Surveys 49, 3(December 2016), Article No. 46.
Hayes T.; Ali F. Robust adhoc sensorrouting (RASeR) protocol for mobilewireless sensor networks. Ad HocNetworks 50 (November 2016), 128144.
mirror" augmented reality makeup application. InProceedings of the 2016 ACM Conference on
Designing Interactive Systems (DIS 2016), ACM,2016, 871882. Kamalzadeh M.; Kralj C.; Möller T.; Sedlmair M.TagFlip: active mobile music discovery with socialtags. In Proceedings of the 21st InternationalConference on Intelligent User Interfaces (IUI 2016),ACM, 2016, 1930. Karana E.; Giaccardi E.; Stamhuis N.; Goossensen J.The tuning of materials: a designer’s journey. InProceedings of the 2016 ACM Conference on
Designing Interactive Systems (DIS 2016), ACM,2016, 619631. Ko M.; Choi S.; Yatani K.; Lee U. Lock n’ LoL: groupbased limiting assistance app to mitigate smartphonedistractions in group activities. In Proceedings of the2016 CHI Conference on Human Factors in
Computing Systems (CHI 2016), ACM, 2016, 9981010. Laput G.; Xiao R.; Harrison C. ViBand: highfidelitybioacoustic sensing using commodity smartwatchaccelerometers. In Proceedings of the 29th AnnualSymposium on User Interface Software and
Technology (UIST 2016), ACM, 2016, 321333. Le Goc M.; Kim L.; Parsaei A.; Fekete J.; DragicevicP.; Follmer S. Zooids: building blocks for swarm userinterfaces. In Proceedings of the 29th AnnualSymposium on User Interface Software and
Technology (UIST 2016), ACM, 2016, 97109. Leong J.; Parzer P.; Perteneder F.; Babic T.; RendlC.; Vogl A.; Egger H.; Olwal A.; Haller M. proCover:sensory augmentation of prosthetic limbs using smarttextile covers. In Proceedings of the 29th AnnualSymposium on User Interface Software and
Technology (UIST 2016), ACM, 2016, 335346. Leskovec J.; Sosič R. SNAP: a generalpurposenetwork analysis and graphmining library. ACMTransactions on Intelligent Systems and Technology
8, 1 (July 2016), Article No. 1. Li H.; Yang W.; Wang J.; Xu Y.; Huang L.WiFinger: talk to your smart devices withfingergrained gesture. In Proceedings ofthe 2016 ACM International Joint
Conference on Pervasive and Ubiquitous
Computing (UbiComp 2016), ACM, 2016,250261. Lien J.; Gillian N.; Karagozler M.; Amihood P.;Schwesig C.; Olson E.; Raja H.; Poupyrev I. Soli:ubiquitous gesture sensing with millimeter waveradar. ACM Transactions on Graphics 35, 4 (July2016), Article No. 142. Mason M. The MIT Museum Glassware prototype:visitor experience exploration for designing smartglasses. Journal on Computing and Cultural Heritage9, 3 (September 2016), Article No. 12. Mehrotra A.; Hendley R.; Musolesi M. PrefMiner:mining user’s preferences for intelligent mobilenotification management. In Proceedings of the 2016
Huberman B.; Asur S. BidPacket: trading bandwidthin public spaces. Netnomics 17, 3 (November 2016),223232. Kellogg B.; Talla V.; Gollakota S.; Smith J. Passive
WiFi: bringing low power to WiFi transmissions. InProceedings of the 13th Usenix Conference on
Networked Systems Design and Implementation
(NSDI 2016), USENIX Association, 2016, 151164.Review Kumar S.; Hegde R. Multisensor data fusionmethods for indoor localization under collinearambiguity. Pervasive and Mobile Computing 30(August 2016), 1831. Kurek T.; Niemiec M.; Lason A. Taking back
control of privacy: a novel framework for preservingcloudbased firewall policy confidentiality.International Journal of Information Security 15, 3(June 2016), 235250. Review Lenzen C.; Wattenhofer R. Tight bounds for parallelrandomized load balancing. Distributed Computing29, 2 (April 2016), 127142. Limoncelli T. Are you load balancing wrong?. Queue14, 6 (December 2016), 513. Lo D.; Cheng L.; Govindaraju R.; Ranganathan P.;Kozyrakis C. Improving resource efficiency at scalewith Heracles. ACM Transactions on ComputerSystems 34, 2 (April 2016), Article No. 6. Lv Y.; Moscibroda T. Fair and resilientincentive tree mechanisms. DistributedComputing 29, 1 (February 2016), 116. Mahmood Z. Connectivity frameworks forsmart devices: the Internet of Things from
a distributed computing perspective. SpringerInternational Publishing. Midi D.; Sultana S.; Bertino E. A system for responseand prevention of security incidents in wirelesssensor networks. ACM Transactions on SensorNetworks 13, 1 (December 2016), Article No. 1. Rehman, Z.; Hussain, O. K.; Hussain, F. K.; Chang,E.; Dillon, T. Userside QoS forecasting andmanagement of cloud services. World Wide Web 18,6 (Nov. 2015), 16771716.
Sheth A. Internet of Things to smart IoTthrough semantic, cognitive, andperceptual computing. IEEE IntelligentSystems 31, 2 (March 2016), 108112. Singh S.; Chana I. A survey on resource
scheduling in cloud computing: issues andchallenges. Journal of Grid Computing 14, 2 (June2016), 217264. Review Wang H.; Rosa C.; Pedersen K. Dual connectivity forLTEadvanced heterogeneous networks. WirelessNetworks 22, 4 (May 2016), 13151328. Wang K.; Du M.; Yang D.; Zhu C.; Shen J.; Zhang Y.Gametheorybased active defense for intrusion
ACM International Joint Conference on Pervasive and
Ubiquitous Computing (UbiComp 2016), ACM, 2016,12231234. Moshfeghi Y.; Triantafillou P.; Pollick F.Understanding information need: an fMRI study. InProceedings of the 39th International ACM SIGIR
Conference on Research and Development in
Information Retrieval (SIGIR 2016), ACM, 2016, 335344. Mutlu B.; Veas E.; Trattner C. VizRec: recommendingpersonalized visualizations. ACM Transactions onInteractive Intelligent Systems 6, 4 (November2016), Article No. 31.
Napierala K.; Stefanowski J. Types ofminority class examples and their influenceon learning classifiers from imbalanceddata. Journal of Intelligent InformationSystems 46, 3 (June 2016), 563597.
Nicolaescu, P.; Rosenstengel, M.; Derntl, M.;Klamma, R.; and Jarke, M. Viewbased near realtimecollaborative modeling for information systemsengineering. In Proc. of the 28th InternationalConference on Advanced Information Systems
Engineering (CAiSE 2016), Springer, 2016, 317. Polvi J.; Taketomi T.; Yamamoto G.; Dey A.; SandorC.; Kato H. SlidAR. Computers and Graphics 55 (April2016), 3343. Preist C.; Schien D.; Blevis E. Understanding andmitigating the effects of device and cloud servicedesign decisions on the environmental footprint ofdigital infrastructure. In Proceedings of the 2016 CHIConference on Human Factors in Computing Systems
(CHI 2016), ACM, 2016, 13241337. Rameau, F.; Ha, H.; Joo, K.; Choi, J.; Park, K.; andKweon, I. S. A realtime augmented reality system toseethrough cars. IEEE Transactions on Visualizationand Computer Graphics 22, 11 (Nov. 2016), 23952404. Rawassizadeh R.; Momeni E.; Dobbins C.;Gharibshah J.; Pazzani M. Scalable daily humanbehavioral pattern mining from multivariate temporaldata. IEEE Transactions on Knowledge and DataEngineering 28, 11 (November 2016), 30983112. Ristoski P.; Paulheim H. Semantic web in data miningand knowledge discovery. Web Semantics: Science,Services and Agents on the World Wide Web 36(January 2016), 122. Rouhani B.; Mirhoseini A.; Songhori E.; Koushanfar F.Automated realtime analysis of streaming big anddense data on reconfigurable platforms. ACMTransactions on Reconfigurable Technology and
Systems 10, 1 (September 2016), Article No. 8. Saunders, J.; Syrdal, D. S.; Koay, K. L.; Burke, N.;and Dautenhahn, K. “Teach Me–Show Me”—enduserpersonalization of a smart home and companionrobot. IEEE Transactions on HumanMachine Systems46, 1 (Feb. 2016), 2740. Schneider B.; Sharma K.; Cuendet S.; Zufferey G.;
detection in cyberphysical embedded systems. ACMTransactions on Embedded Computing Systems 16, 1(October 2016), Article No. 18. Yang, D.; Xue, G.; Fang, X.; Tang, J. Incentivemechanisms for crowdsensing: crowdsourcing withsmartphones. IEEE/ACM Transactions on Networking24, 3 (June 2016), 17321744. Zhang B.; Ren K.; Xing G.; Fu X.; Wang C. SBVLC:secure barcodebased visible light communication forsmartphones. IEEE Transactions on Mobile Computing15, 2 (February 2016), 432446.
D. Software
Aiken P. EXPERIENCE: succeeding at datamanagementBigCo attempts to leverage data.Journal of Data and Information Quality 7, 12(February 2016), Article No. 8. Bersani M.; Bianculli D.; Ghezzi C.;
Krstić S.; San Pietro P. Efficient largescaletrace checking using MapReduce. InProceedings of the 38th InternationalConference on Software Engineering (ICSE2016), ACM, 2016, 888898. Review Brockschmidt M.; Emmes F.; Falke S.; Fuhs C.; GieslJ. Analyzing runtime and size complexity of integerprograms. ACM Transactions on ProgrammingLanguages and Systems 38, 4 (August 2016), ArticleNo. 13. Burns A. Why the expressive power of programminglanguages such as Ada is needed for future cyberphysical systems. In Proceedings of the 21st AdaEurope International Conference on Reliable SoftwareTechnologies (AdaEurope 2016), Springer, 2016, 311. Chapman K.; Hosking A.; Moss J. Hybrid STM/HTMfor nested transactions on OpenJDK. In Proceedingsof the 2016 ACM SIGPLAN International Conferenceon ObjectOriented Programming, Systems,Languages, and Applications (OOPSLA 2016), ACM,2016, 660676. Christakis M.; Müller P.; Wüstholz V. Guiding dynamicsymbolic execution toward unverified programexecutions. In Proceedings of the 38th InternationalConference on Software Engineering (ICSE 2016),ACM, 2016, 144155. Ghani, N.; Nordvall Forsberg, F.; Simpson, A.Comprehensive parametric polymorphism:categorical models and type theory. In Proc. of the19th International Conference on Foundations ofSoftware Science and Computation Structures(FoSSaCS 2016), Springer, 2016, 319.
Gil, Y.; Levy, T. Formal languagerecognition with the Java type checker. InProc. of the European Conference onObjectOriented Programming (ECOOP2016), Dagstuhl LIPIcs, 2016, 10:110:27.
Gousios G.; Storey M.; Bacchelli A. Work practicesand challenges in pullbased development: thecontributor’s perspective. In Proceedings of the 38th
Dillenbourg P.; Pea R. Using mobile eyetrackers tounpack the perceptual benefits of a tangible userinterface for collaborative learning. ACM Transactionson ComputerHuman Interaction 23, 6 (November2016), Article No. 39. Stonebraker, M. Big data is (at least)
four different problems. YouTube,01:02:35 published on June 2, 2016,stanfordonline,https://www.youtube.com/watch?v=S79buNhdhI Swiatek, P.; Juszczyszyn, K.; Kolaczek, G.;Brzostowski, K.; and Schauer, P. Processes’optimization tools for webservice orientedorganizations’ resources: an ehealth application. InProc. of the 17th International Conference on Ehealth Networking, Application & Services(HealthCom 2016), IEEE, 2016, 222 226. Trushkowsky B.; Kraska T.; Franklin M.; Sarkar P.
Answering enumeration queries with the crowd.Communications of the ACM 59, 1 (January 2016),118127. Review Tsai M.; Wang C.; Chien P. Discovering financekeywords via continuousspace language models.ACM Transactions on Management InformationSystems 7, 3 (August 2016), Article No. 7. Tuan, A.; ComynWattiau, I.; and SiSaïd Cherfi, S.Structuring guidelines for web application designers:a metamodel. In Proc. of the 18th InternationalConference on Enterprise Information Systems(ICEIS 2016), SCITEPRESS, 2016, 327335. Verberne S.; Sappelli M.; Hiemstra D.; Kraaij W.Evaluation and analysis of term scoring methods forterm extraction. Information Retrieval 19, 5 (October2016), 510545.
Vuorimaa P.; Laine M.; Litvinova E.;Shestakov D. Leveraging declarativelanguages in web application development.World Wide Web 19, 4 (July 2016), 519543.
Wang E.; Li W.; Hawkins D.; Gernsheimer T.; NorbySlycord C.; Patel S. HemaApp: noninvasive bloodscreening of hemoglobin using smartphone cameras.In Proceedings of the 2016 ACM International JointConference on Pervasive and Ubiquitous Computing(UbiComp 2016), ACM, 2016, 593604. Wiese O.; Roth V. See you next time: a model formodern shoulder surfers. In Proceedings of the 18thInternational Conference on HumanComputerInteraction with Mobile Devices and Services(MobileHCI 2016), ACM, 2016, 453464. Yin H.; Cui B.; Zhou X.; Wang W.; Huang Z.;
Sadiq S. Joint modeling of user checkin behaviors forrealtime pointofinterest recommendation. ACMTransactions on Information Systems 35, 2(September 2016), Article No. 11. Review Zhai C.; Massung S. Text data management and
analysis: a practical introduction to information
International Conference on Software Engineering(ICSE 2016), ACM, 2016, 285296. Hanappi O.; Hummer W.; Dustdar S. Assertingreliable convergence for configuration managementscripts. In Proceedings of the 2016 ACM SIGPLANInternational Conference on ObjectOrientedProgramming, Systems, Languages, and Applications(OOPSLA 2016), ACM, 2016, 328343. Julian, D. Designing machine learning systems withPython: design efficient machine learning systemsthat give you more accurate results. Packt Publishing,2016. Krebbers R. A formal C memory model for separationlogic. Journal of Automated Reasoning 57, 4(December 2016), 319387. Largent, D. L. Measuring and understanding teamdevelopment by capturing selfassessed enthusiasmand skill levels. ACM Transactions on ComputingEducation 16, 2 (Mar. 2016), Article No. 6. Li, Y.; Tan, T.; Zhang, Y.; and Xue, J. Programtailoring: slicing by sequential criteria. In Proc. of theEuropean Conference on ObjectOrientedProgramming (ECOOP 2016), Dagstuhl LIPIcs, 2016,15:115:27. Madsen M.; Tip F.; Andreasen E.; Sen K.; Møller A.Feedbackdirected instrumentation for deployedJavaScript applications. In Proceedings of the 38thInternational Conference on Software Engineering(ICSE 2016), ACM, 2016, 899910. Menendez D.; Nagarakatte S. Terminationcheckingfor LLVM peephole optimizations. In Proceedings ofthe 38th International Conference on SoftwareEngineering (ICSE 2016), ACM, 2016, 191202. Miné A.; Breck J.; Reps T. An algorithm inspired byconstraint solvers to infer inductive invariants innumeric programs. In Proceedings of the 25thEuropean Symposium on Programming Languagesand Systems (ESOP 2016), SpringerVerlag NewYork, Inc., 2016, 560588. Ouni A.; Kessentini M.; Sahraoui H.;
Inoue K.; Deb K. Multicriteria coderefactoring using searchbased softwareengineering: an industrial case study. ACMTransactions on Software Engineering andMethodology 25, 3 (May 2016), Article No. 23.Review Petricek T.; Guerra G.; Syme D. Types from data:making structured data firstclass citizens in F#. InProceedings of the 37th ACM SIGPLAN Conference onProgramming Language Design and Implementation(PLDI 2016), ACM, 2016, 477490. Potvin R.; Levenberg J. Why Google stores billions oflines of code in a single repository. Communicationsof the ACM 59, 7 (July 2016), 7887. Raschka S. Python machine learning. Packt
Publishing. Review
retrieval and text mining. Association for ComputingMachinery and Morgan & Claypool. Review1 Review2Review3 Review4 Zhao S.; Ramos J.; Tao J.; Jiang Z.; Li S.; Wu Z.;
Pan G.; Dey A. Discovering different kinds ofsmartphone users through their application usagebehaviors. In Proceedings of the 2016 ACMInternational Joint Conference on Pervasive andUbiquitous Computing (UbiComp 2016), ACM, 2016,498509. Review
I. Computing Methodologies
Adouane L. Autonomous vehiclenavigation: from behavioral to hybridmulticontroller architectures. A. K. Peters,Ltd. Review1 Review2 Ambusaidi M.; He X.; Nanda P.; Tan Z. Building anintrusion detection system using a filterbasedfeature selection algorithm. IEEE Transactions onComputers 65, 10 (October 2016), 29862998. Atanassov, K.; Georgiev, I.; Szmidt, E.; andKacprzyk, J. Multidimensional intuitionistic fuzzyquantifiers. In Proc. of the IEEE 8th InternationalConference on Intelligent Systems (IS 2016), IEEE,2016, 530 534. Autuori J.; Hnaien F.; Yalaoui F. A mapping techniquefor better solution exploration: NSGAII adaptation.Journal of Heuristics 22, 1 (February 2016), 89123. Blissing B.; Bruzelius F.; Eriksson O. Effects of visuallatency on vehicle driving behavior. ACM Transactionson Applied Perception 14, 1 (July 2016), Article No.5. Blot, A.; Dagand, P.É.; and Lawall, J. From sets tobits in Coq. In Proc. of the 13th InternationalSymposium on Functional and Logic Programming(FLOPS 2016), Springer, 2016, 1228. Boudhane M.; Nsiri B. Underwater image processingmethod for fish localization and detection insubmarine environment. Journal of VisualCommunication and Image Representation 39(August 2016), 226238. Carvalho A.; Dimitrov S.; Larson K. How manycrowdsourced workers should a requester hire?.Annals of Mathematics and Artificial Intelligence 78,1 (September 2016), 4572. Charlesworth A. A theorem about computationalismand "absolute" truth. Minds and Machines 26, 3(September 2016), 205226. Cimpoi M.; Maji S.; Kokkinos I.; Vedaldi A. Deep filterbanks for texture recognition, description, andsegmentation. International Journal of ComputerVision 118, 1 (May 2016), 6594. Dai, J.; Li, Y.; He, K.; and Sun, J. RFCN: objectdetection via regionbased fully convolutionalnetworks. In Proc. of the Conference on NeuralInformation Processing Systems (NIPS 2016), CurranAssoc., 2016, 379387.
Rizzi E.; Elbaum S.; Dwyer M. On the techniqueswe create, the tools we build, and theirmisalignments: a study of KLEE. In Proceedings ofthe 38th International Conference on SoftwareEngineering (ICSE 2016), ACM, 2016, 132143.Review Rumpe B. Modeling with UML: language, concepts,
methods. Springer International Publishing. Review Song N.; Son Y.; Han H.; Yeom H. Efficient
memorymapped I/O on fast storage device. ACMTransactions on Storage 12, 4 (May 2016), ArticleNo. 19. Review Stefănescu A.; Park D.; Yuwen S.; Li Y.; Roşu G.Semanticsbased program verifiers for all languages.In Proceedings of the 2016 ACM SIGPLANInternational Conference on ObjectOrientedProgramming, Systems, Languages, and Applications(OOPSLA 2016), ACM, 2016, 7491. Sutcliffe R.; Kowarsch B. Closing the barn door:
reprioritizing safety, security, and reliability. InProceedings of the 21st Western CanadianConference on Computing Education (WCCCE 2016),ACM, 2016, Article No. 1. Review Swalens, J.; De Koster, J.; De Meuter, W.Transactional tasks: parallelism in softwaretransactions. In Proc. of the European Conference onObjectOriented Programming (ECOOP 2016),Dagstuhl LIPIcs, 2016, 23:123:28. Tauber T.; Oliveira B. Modular architecture for codeand metadata sharing. In Proceedings of the 15thInternational Conference on Modularity (MODULARITY2016), ACM, 2016, 106117. Wang Y.; Oliveira B. The expression problem,trivially!. In Proceedings of the 15th InternationalConference on Modularity (MODULARITY 2016), ACM,2016, 3741.
Wong W.; Gao R.; Li Y.; Abreu R.;Wotawa F. A survey on software faultlocalization. IEEE Transactions on SoftwareEngineering 42, 8 (August 2016), 707740. Review
Ye X.; Shen H.; Ma X.; Bunescu R.; Liu C. From
word embeddings to document similarities forimproved information retrieval in softwareengineering. In Proceedings of the 38th InternationalConference on Software Engineering (ICSE 2016),ACM, 2016, 404415. Review Yu T.; Qu X.; Cohen M. VDTest: an automatedframework to support testing for virtual devices. InProceedings of the 38th International Conference onSoftware Engineering (ICSE 2016), ACM, 2016, 583594. Zhou H.; Xue J. Exploiting mixed SIMD parallelism byreducing data reorganization overhead. InProceedings of the 2016 International Symposium onCode Generation and Optimization (CGO 2016), ACM,2016, 5969.
Di Bartolomeo, M.; and Hu, Y. There ismore to streamgraphs than movies: betteraesthetics via ordering and lassoing.Computer Graphics Forum 35, 3 (June2016), 341350.
Ding C.; Thu Y.; Utiyama M.; Sumita E. Wordsegmentation for Burmese (Myanmar). ACMTransactions on Asian and LowResource LanguageInformation Processing 15, 4 (April 2016), Article No.22. Dong C.; Loy C.; He K.; Tang X. Image superresolution using deep convolutional networks. IEEETransactions on Pattern Analysis and MachineIntelligence 38, 2 (February 2016), 295307. Elgendy, O. A.; and Chan, S. H. Image reconstructionand threshold design for quanta image sensors. InProc. of the IEEE International Conference on ImageProcessing (ICIP 2016), IEEE, 2016, 978982. Englund R.; Ropinski T. Evaluating the perception ofsemitransparent structures in direct volumerendering techniques. In Proceedings of theSIGGRAPH Asia Symposium on Visualization (SA2016), ACM, 2016, Article No. 9. Fujimoto R. Research challenges in parallel anddistributed simulation. ACM Transactions on Modelingand Computer Simulation 26, 4 (February 2016),Article No. 22. Gao J.; Wang Y.; Wang J.; Liang R. Adaptiveoptimization modeling of preconditioned conjugategradient on multiGPUs. ACM Transactions on ParallelComputing 3, 3 (October 2016), Article No. 16. Goodfellow, I.; Bengio, Y.; and Courville, A. Deeplearning. MIT Press, 2016. Hachmon G.; Mamet N.; Sasson S.; Barkai T.; HadarN.; AbuHorowitz A.; Bachelet I. A nonNewtonianfluid robot. Artificial Life 22, 1 (February 2016), 122. Hagiya M.; AubertKato N.; Wang S.; Kobayashi S.
Molecular computers for molecular robots as hybridsystems. Theoretical Computer Science 632 (June2016), 420. Review Han X.; Wong K.; Yu Y. 3D human modelreconstruction from sparse uncalibrated views. IEEEComputer Graphics and Applications 36, 6(November 2016), 4656. He, K.; Zhang, X.; Ren, S.; and Sun, J. Deep residuallearning for image recognition. In Proc. of the IEEEConference on Computer Vision and PatternRecognition (CVPR 2016), IEEE, 2016, 770778. Kaehler A.; Bradski G. Learning OpenCV 3:computer vision in C++ with the OpenCVlibrary. O’Reilly Media, Inc. Kartheek Medathati, N. V.; Neumann, H.;Masson, G. S.; and Kornprobst, P. Bioinspired computer vision: towards a synergisticapproach of artificial and biological vision. ComputerVision and Image Understanding 150 (Sept. 2016),
E. Data
Beimel A.; Farràs O.; Mintz Y. Secretsharingschemes for very dense graphs. Journal of Cryptology29, 2 (April 2016), 336362. Review Mondelli M.; Hassani S.; Urbanke R. Unified scaling ofpolar codes: error exponent, scaling exponent,moderate deviations, and error floors. IEEETransactions on Information Theory 62, 12(December 2016), 66986712. Yan H.; Liu C. Two classes of cyclic codes and theirweight enumerator. Designs, Codes andCryptography 81, 1 (October 2016), 19.
F. Theory Of Computation
Babai L. Graph isomorphism in quasipolynomial time[extended abstract]. In Proceedings of the 48thAnnual ACM SIGACT Symposium on the Theory ofComputing (STOC 2016), ACM, 2016, 684697. Börger E.; Schewe K. Concurrent abstract statemachines. Acta Informatica 53, 5 (August 2016),469492. Budig B.; Van Dijk T.; Wolff A. Matching labels andmarkers in historical maps: an algorithm withinteractive postprocessing. ACM Transactions onSpatial Algorithms and Systems 2, 4 (November2016), Article No. 13. Chadha R.; Cheval V.; Ciobâcă S.; Kremer S.Automated verification of equivalence properties ofcryptographic protocols. ACM Transactions onComputational Logic 17, 4 (September 2016), ArticleNo. 23. Coecke B.; Fritz T.; Spekkens R. A
mathematical theory of resources.Information and Computation 250(October 2016), 5986. Review Doczkal C.; Smolka G. Completeness and
decidability results for CTL in constructive typetheory. Journal of Automated Reasoning 56, 3 (March2016), 343365. Review Fan S.; Zahedi S.; Lee B. The computational sprintinggame. In Proceedings of the TwentyFirstInternational Conference on Architectural Support forProgramming Languages and Operating Systems(ASPLOS 2016), ACM, 2016, 561575. Fontes L.; Jain R.; Kerenidis I.; Laplante S.; LaurièreM.; Roland J. Relative discrepancy does not separateinformation and communication complexity. ACMTransactions on Computation Theory 9, 1 (October2016), Article No. 4. Goldreich O.; Ron D. On samplebased testers. ACMTransactions on Computation Theory 8, 2 (April2016), Article No. 7. Hesselink W. Correctness and concurrent complexityof the blackwhite bakery algorithm. Formal Aspectsof Computing 28, 2 (April 2016), 325341. Kärkkäinen J.; Kempa D.; Puglisi S. Lazy LempelZiv
130. Kim I.; Choi C.; Lee S. Improving discriminationability of convolutional neural networks by hybridlearning. International Journal on Document Analysisand Recognition 19, 1 (March 2016), 19. Lecocq P.; Dufay A.; Sourimant G.; Marvie J.Accurate analytic approximations for realtimespecular area lighting. In Proceedings of the 20thACM SIGGRAPH Symposium on Interactive 3DGraphics and Games (I3D 2016), ACM, 2016, 113120. Liu, X.; Xie, N.; Tang, K.; and Jia, J. Lightweightingfor Web3D visualization of largescale BIM scenes inrealtime. Graphical Models 88 (Nov. 2016), 4056. Maglietta R.; Amoroso N.; Boccardi M.; Bruno S.;Chincarini A.; Frisoni G.; Inglese P.; Redolfi A.;Tangaro S.; Tateo A.; Bellotti R. Automatedhippocampal segmentation in 3D MRI using randomundersampling with boosting algorithm. PatternAnalysis & Applications 19, 2 (May 2016), 579591. Mendes N.; and dos Santos A. A hypercube queuingmodel approach to the police units allocationproblem. In Proc. of the 18th InternationalConference on Enterprise Information Systems(ICEIS 2016), SCITEPRESS, 2016, 7081. MercadoColmenero, J.M.; Paramio, M.A.R.; PerezGarcia, J.M.; and MartinDoñate, C. A new hybridmethod for demoldability analysis of discretegeometries. ComputerAided Design 80 (Nov. 2016),4360. Mollajafari M.; Shahhoseini H. An efficient ACObasedalgorithm for scheduling tasks onto dynamicallyreconfigurable hardware using TSPlikenedconstruction graph. Applied Intelligence 45, 3(October 2016), 695712. Müller V. (Ed.) Fundamental issues of artificial
intelligence. Springer International Publishing. Review
Ortner T.; Sorger J.; Piringer H.; HesinaG.; Gröller E. Visual analytics andrendering for tunnel crack analysis. TheVisual Computer 32, 68 (June 2016),859869.
Pereira, G.; Prada, R.; and Santos, P. A. Integratingsocial power into the decisionmaking of cognitiveagents. Artificial Intelligence 241 (Dec. 2016), 144. Pound M.; French A.; Fozard J.; Murchie E.; PridmoreT. A patchbased approach to 3D plant shootphenotyping. Machine Vision and Applications 27, 5(July 2016), 767779. Pröllochs N.; Feuerriegel S.; Neumann D. Detectingnegation scopes for financial news sentiment usingreinforcement learning. In Proceedings of the 201649th Hawaii International Conference on SystemSciences (HICSS 2016), IEEE Computer Society,2016, 11641173. Rodríguez M.; Agus M.; Bettio F.; Marton F.; GobbettiE. Digital Mont’e Prama: exploring large collections of
factorization algorithms. Journal of ExperimentalAlgorithmics 21 (January 2016), Article No. 2.4. Meir O. Combinatorial PCPs with short proofs.Computational Complexity 25, 1 (March 2016), 1102.
Raz, R. Fast learning requires goodmemory: a timespace lower bound forparity learning. In Proc. of the 57th AnnualIEEE Symposium on Foundations of
Computer Science (FOCS 2016), IEEE,2016, 266275.
Rubistein, A. Settling the complexity of computingapproximate twoplayer Nash equilibria. In Proc. ofthe 57th Annual IEEE Symposium on Foundations of
Computer Science (FOCS 2016), IEEE, 2016, 258265. Schmitz S. Complexity hierarchies beyondelementary. ACM Transactions on ComputationTheory 8, 1 (February 2016), Article No. 3.
G. Mathematics Of Computing
Cao Y.; Cao Y.; Fu F. Cyclic codes over 2m [u]/⟨uk ⟩of oddly even length. Applicable Algebra inEngineering, Communication and Computing 27, 4(August 2016), 259277. Chattopadhyay E.; Zuckerman D. Explicit twosourceextractors and resilient functions. In Proceedings ofthe 48th Annual ACM SIGACT Symposium on the
Theory of Computing (STOC 2016), ACM, 2016, 670683. Chechik S.; WulffNilsen C. Nearoptimal lightspanners. In Proceedings of the TwentySeventhAnnual ACMSIAM Symposium on Discrete Algorithms
(SODA 2016), SIAM, 2016, 883892. Chonev V.; Ouaknine J.; Worrell J. On the complexityof the orbit problem. Journal of the ACM 63, 3 (June2016), Article No. 23. Clemens J.; Reineking T.; Kluth T. An evidential
approach to SLAM, path planning, and activeexploration. International Journal of ApproximateReasoning 73 (June 2016), 126. Review Deng W.; Yin W. On the global and linearconvergence of the generalized alternating directionmethod of multipliers. Journal of Scientific Computing66, 3 (March 2016), 889916. Do S.; Ha Y.; Kang M.; Kim C. Applicationof a multidimensional limiting process tocentralupwind schemes for solvinghyperbolic systems of conservation laws.Journal of Scientific Computing 69, 1(October 2016), 274291. Ghaffari M. An improved distributed algorithm formaximal independent set. In Proceedings of theTwentySeventh Annual ACMSIAM Symposium on
Discrete Algorithms (SODA 2016), SIAM, 2016, 270277. Keeling S.; Kunisch K. Robust ℓ1 approaches to
detailed 3D models of sculptures. Journal onComputing and Cultural Heritage 9, 4 (September2016), Article No. 18. Satyanarayan A.; Moritz D.; Wongsuphasawat K.;Heer J. VegaLite: a grammar of interactive graphics.IEEE Transactions on Visualization and Computer
Graphics 23, 1 (January 2017), 341350. Sgurev V.; Yager R.; Kacprzyk J.; Jotsov V.Innovative issues in intelligent systems. SpringerInternational Publishing. Shokouhifar M.; Jalali A. Twostage fuzzy inferencesystem for symbolic simplification of analog circuits.Integration, the VLSI Journal 55 (September 2016),281292. Silva F.; Duarte M.; Correia L.; Oliveira
S.; Christensen A. Open issues inevolutionary robotics. EvolutionaryComputation 24, 2 (August 2016), 205236. Review Skraba P.; Rosen P.; Wang B.; Chen G.; Bhatia H.;Pascucci V. Critical point cancellation in 3D vectorfields: robustness and discussion. IEEE Transactionson Visualization and Computer Graphics 22, 6 (June2016), 16831693. Stahl, B. C.; and Coeckelbergh, M. Ethics ofhealthcare robotics: towards responsible researchand innovation. Robotics and Autonomous Systems86 (Dec. 2016), 152161. Stoffers M.; Schemmel D.; Soria Dustmann O.;
Wehrle K. Automated memoization for parameterstudies implemented in impure languages. InProceedings of the 2016 Annual ACM Conference on
SIGSIM Principles of Advanced Discrete Simulation
(SIGSIMPADS 2016), ACM, 2016, 221232. Review Sugiyama M. Introduction to statistical machine
learning. Morgan Kaufmann Publishers Inc. Review Tam G.; Kothari V.; Chen M. An analysis of machineand humananalytics in classification. IEEETransactions on Visualization and Computer Graphics
23, 1 (January 2017), 7180. Tippetts B.; Lee D.; Lillywhite K.; Archibald J. Reviewof stereo vision algorithms and their suitability forresourcelimited systems. Journal of RealTimeImage Processing 11, 1 (January 2016), 525. Wang G.; Wang C.; Du Q.; Li L.; Dong W. Distributedcooperative control of multiple nonholonomic mobilerobots. Journal of Intelligent and Robotic Systems83, 34 (September 2016), 525541. Wang W.; Chen G.; Chen H.; Dinh T.; Gao J.; Ooi B.;Tan K.; Wang S.; Zhang M. Deep learning at scaleand at ease. ACM Transactions on MultimediaComputing, Communications, and Applications 12, 4s(September 2016), Article No. 69. Wang W.; Yang X.; Ooi B.; Zhang D.; Zhuang Y.Effective deep learningbased multimodal retrieval.The VLDB Journal: The International Journal on Very
computing the geometric median and principal andindependent components. Journal of MathematicalImaging and Vision 56, 1 (September 2016), 99124. Kitamura D.; Ono N.; Sawada H.; Kameoka H.;Saruwatari H. Determined blind source separationunifying independent vector analysis and nonnegativematrix factorization. IEEE/ACM Transactions onAudio, Speech and Language Processing 24, 9(September 2016), 16221637. Krenn D.; Wagner S. Compositions into powers of b:asymptotic enumeration and parameters.Algorithmica 75, 4 (August 2016), 606631. Kudekar S.; Kumar S.; Mondelli M.; Pfister H.;Şaşoğlu E.; Urbanke R. ReedMuller codes achievecapacity on erasure channels. In Proceedings of the48th Annual ACM SIGACT Symposium on the Theoryof Computing (STOC 2016), ACM, 2016, 658669. Nakpim W. Thirdorder ordinary differential equationsequivalent to linear secondorder ordinary differentialequations via tangent transformations. Journal ofSymbolic Computation 77 (November 2016), 6377. Nikolaou N.; Edakunni N.; Kull M.; Flach P.; Brown G.Costsensitive boosting algorithms: Do we really needthem?. Machine Learning 104, 23 (September2016), 359384. Tierny J.; Carr H. Jacobi fiber surfaces for bivariateReeb space computation. IEEE Transactions onVisualization and Computer Graphics 23, 1 (January2017), 960969. Wang, M. Stochastic composition optimization:algorithms and sample complexities. In Proc. of theInternational Conference on Continuous Optimization(ICCOPT 2016), 2016.
Watrigant R.; Bougeret M.; Giroudeau R.Approximating the sparsest ksubgraph inchordal graphs. Theory of ComputingSystems 58, 1 (January 2016), 111132. Yoshida Y. Nonlinear Laplacian for
digraphs and its applications to network analysis. InProceedings of the 9th ACM International Conferenceon Web Search and Data Mining (WSDM 2016), ACM,2016, 483492. Review
H. Information Systems
Alexiev V.; Isaac A.; Lindenthal J. On the compositionof ISO 25964 hierarchical relations (BTG, BTP, BTI).International Journal on Digital Libraries 17, 1 (March2016), 3948. Barowy D.; Curtsinger C.; Berger E.; McGregor A.
AutoMan: a platform for integrating humanbasedand digital computation. Communications of the ACM59, 6 (June 2016), 102109. Review Bota H.; Zhou K.; Jose J. Playing your cards right:the effect of entity cards on search behaviour andworkload. In Proceedings of the 2016 ACMConference on Human Information Interaction andRetrieval (CHIIR 2016), ACM, 2016, 131140.
Large Data Bases 25, 1 (February 2016), 79101.
Wei X.; Phung S.; Bouzerdoum A. Visualdescriptors for scene categorization:experimental evaluation. ArtificialIntelligence Review 45, 3 (March 2016),333368.
Xiong F.; Kam M.; Hrebien L.; Wang B.; Qi Y.Kernelized informationtheoretic metric learning forcancer diagnosis using highdimensional molecularprofiling data. ACM Transactions on KnowledgeDiscovery from Data 10, 4 (May 2016), Article No.38. Review Yu, Q.; Yan, R.; Tang, H.; Tan, K.C.; and Li, H. Aspiking neural network system for robust sequencerecognition. IEEE Transactions on Neural Networksand Learning Systems 27, 3 (Mar. 2016), 621635.
J. Computer Applications
Alberdi A.; Aztiria A.; Basarab A. On the earlydiagnosis of Alzheimer’s disease from multimodalsignals. Artificial Intelligence in Medicine 71 (July2016), 129. Hummel P.; Mcafee R. When does improved targetingincrease revenue?. ACM Transactions on Economicsand Computation 5, 1 (October 2016), Article No. 4. Lewis, M. The undoing project: a friendship thatchanged our minds. W. W. Norton & Co., 2016. Murnane E.; Abdullah S.; Matthews M.; Kay M.;Kientz J.; Choudhury T.; Gay G.; Cosley D. Mobilemanifestations of alertness: connecting biologicalrhythms with patterns of smartphone app use. InProceedings of the 18th International Conference onHumanComputer Interaction with Mobile Devicesand Services (MobileHCI 2016), ACM, 2016, 465477. Romero, M.; Sánchez, M.; and Villalobos, J. Weavingbusiness model patterns: understanding businessmodels. In Proc. of the 18th International Conferenceon Enterprise Information Systems (ICEIS 2016),SCITEPRESS, 2016, 496505. Tang J.; Zhou S. A new approach for featureselection from microarray data based on mutualinformation. IEEE/ACM Transactions onComputational Biology and Bioinformatics 13, 6(November 2016), 10041015.
K. Computing Milieux
Berghel H. The bogus science theorem(and the junk science wager). Computer49, 4 (April 2016), 7478. Devendorf L.; De Kosnik A.; Mattingly
K.; Ryokai K. Probing the potential of postanthropocentric 3D printing. In Proceedings of the2016 ACM Conference on Designing InteractiveSystems (DIS 2016), ACM, 2016, 170181. Review Gangwal, N.; and Bansal, V. Application ofdecomposed theory of planned behavior for mcommerce adoption in India. In Proc. of the 18thInternational Conference on Enterprise Information
Campos G.; Zimek A.; Sander J.; Campello R.;Micenková B.; Schubert E.; Assent I.; Houle M. Onthe evaluation of unsupervised outlier detection:measures, datasets, and an empirical study. DataMining and Knowledge Discovery 30, 4 (July 2016),891927. Cecchinato M.; Sellen A.; Shokouhi M.; Smyth G.Finding email in a multiaccount, multidevice world.In Proceedings of the 2016 CHI Conference onHuman Factors in Computing Systems (CHI 2016),ACM, 2016, 12001210. Chakraborty T.; Srinivasan S.; Ganguly N.;Mukherjee A.; Bhowmick S. Permanence andcommunity structure in complex networks. ACMTransactions on Knowledge Discovery from Data 11,2 (November 2016), Article No. 14. Chen C.; Zhu X.; Shen P.; Hu J.; Guo S.; Tari Z.;Zomaya A. An efficient privacypreserving rankedkeyword search method. IEEE Transactions onParallel and Distributed Systems 27, 4 (April 2016),951963. Chung C.; Dew K.; Cole A.; Zia J.; Fogarty J.; KientzJ.; Munson S. Boundary negotiating artifacts inpersonal informatics: patientprovider collaborationwith patientgenerated data. In Proceedings of the19th ACM Conference on ComputerSupportedCooperative Work & Social Computing (CSCW 2016),ACM, 2016, 770786. Costa J.; Adams A.; Jung M.; Guimbretière F.;Choudhury T. EmotionCheck: leveraging bodilysignals and false feedback to regulate our emotions.In Proceedings of the 2016 ACM International JointConference on Pervasive and Ubiquitous Computing(UbiComp 2016), ACM, 2016, 758769. Dementyev A.; Kao H.; Choi I.; Ajilo D.; Xu M.;Paradiso J.; Schmandt C.; Follmer S. Rovables:miniature onbody robots as mobile wearables. InProceedings of the 29th Annual Symposium on UserInterface Software and Technology (UIST 2016),ACM, 2016, 111120. Dignös A.; Böhlen M.; Gamper J.; Jensen C.Extending the kernel of a relational DBMS withcomprehensive support for sequenced temporalqueries. ACM Transactions on Database Systems 41,4 (November 2016), Article No. 26. Dombrowski L.; Harmon E.; Fox S. Social justiceoriented interaction design: outlining key designstrategies and commitments. In Proceedings of the2016 ACM Conference on Designing InteractiveSystems (DIS 2016), ACM, 2016, 656671. ElSayed N.; Thomas B.; Marriott K.;Piantadosi J.; Smith R. Situated analytics.Journal of Visual Languages andComputing 36 (October 2016), 1323. Gotz D.; Sun S.; Cao N. Adaptivecontextualization: combating bias during highdimensional visualization and data selection. InProceedings of the 21st International Conference onIntelligent User Interfaces (IUI 2016), ACM, 2016,8595.
Systems (ICEIS 2016), SCITEPRESS, 2016, 357367. Hamari, J.; Sjöklint, M.; and Ukkonen, A. The sharingeconomy: why people participate in collaborativeconsumption. Journal of the Association forInformation Science and Technology 67, 9 (Sept.2016), 20472059. Hasan S.; King Z.; Hafiz M.; Sayagh M.; Adams B.;Hindle A. Energy profiles of Java collections classes.In Proceedings of the 38th International Conferenceon Software Engineering (ICSE 2016), ACM, 2016,225236. Immonen A.; Ovaska E.; Kalaoja J.; Pakkala D. Aservice requirements engineering method for a digitalservice ecosystem. Service Oriented Computing andApplications 10, 2 (June 2016), 151172.
Lucassen G.; Dalpiaz F.; Van Der Werf J.;Brinkkemper S. Improving agilerequirements: the Quality User Storyframework and tool. RequirementsEngineering 21, 3 (September 2016), 383403.
Marques, D.; Muslukhov, I.; Guerreiro, T.; Beznosov,K.; and Carriço, L. Snooping on mobile phones:prevalence and trends. In Proc. of the 12thSymposium on Usable Privacy and Security (SOUPS2016), USENIX, 2016, 159174. Mouakket, S.; and Bettayeb, A. Factors affectinguniversity instructors' continuance intention to uselearning management systems: the Blackboardsystem case. In Proc. of the 18th InternationalConference on Enterprise Information Systems(ICEIS 2016), SCITEPRESS, 2016, 215222. O’Neil C. Weapons of math destruction: how big
data increases inequality and threatens democracy.Crown Publishing Group. Review1 Review2 Rello L.; BaezaYates R. The effect of font type onscreen readability by people with dyslexia. ACMTransactions on Accessible Computing 8, 4 (March2016), Article No. 15. Shay R.; Komanduri S.; Durity A.; Huh P.; MazurekM.; Segreti S.; Ur B.; Bauer L.; Christin N.; Cranor L.Designing password policies for strength andusability. ACM Transactions on Information andSystem Security 18, 4 (April 2016), Article No. 13. Such J.; Rovatsos M. Privacy policy negotiation insocial media. ACM Transactions on Autonomous andAdaptive Systems 11, 1 (February 2016), Article No.4. Wójtowicz A.; Joachimiak K. Model for adaptablecontextbased biometric authentication for mobiledevices. Personal and Ubiquitous Computing 20, 2(April 2016), 195207.
Select Language Powered by Translate
Reproduction in whole or in part without permission is prohibited. Copyright © 20002017 ThinkLoud, Inc. Terms of Use | Privacy Policy