notable books and articles in computing of...

11
Search Best Reviews | Notable Books & Articles | "Best of" Archive Computing Reviews is happy to bring you the 21st annual list of notable items published in computing—this time for 2016. We reached out to many in the computing community for nominations: our reviewers, CR category editors, the editors in chief of journals we cover, and computer scientists in both industry and academia. In addition, we included proceedings papers that were recognized as “Best Papers” at their respective conferences, as well as the most downloaded journal papers from some of the top journals covered in CR. Read more about our selection process. All reviews with the symbol are freely available on the site. Download the full list as a PDF . Notable Books and Articles in Computing of 2016 A. General Literature Calude C. The human face of computing (vol. 9) . Imperial College Press. Review Sedgewick R.; Wayne K. Computer science : an interdisciplinary approach . AddisonWesley Professional. Review1 Review2 B. Hardware Dan A.; Lam P.; Hoefler T.; Vechev M. Modeling and analysis of remote memory access programming . In Proceedings of the 2016 ACM SIGPLAN International Conference on ObjectOriented Programming, Systems, Languages, and Applications (OOPSLA 2016), ACM, 2016, 129144. HajYihia J.; Yasin A.; Asher Y.; Mendelson A. Fine grain power breakdown of modern outoforder cores and its implications on Skylakebased systems . ACM Transactions on Architecture and Code Optimization 13, 4 (October 2016), Article No. 56. Wang, P.; McAllister, J. Streaming elements for FPGA signal and image processing accelerators . IEEE Transactions on Very Large Scale Integration (VLSI) Systems 24, 6 (June 2016), 22622274. Xiao K.; Forte D.; Jin Y.; Karri R.; Bhunia S.; Tehranipoor M. Hardware trojans: lessons learned H. Information Systems (Cont'd.) Gröger, C.; Kassner, L.; Hoos, E.; Königsberger, J.; Kiefer, C.; Silcher, S.; and Mitschang, B. The data driven factory: leveraging big industrial data for agile, learning and humancentric manufacturing . In Proc. of the 18th International Conference on Enterprise Information Systems, (ICEIS 2016) SCITEPRESS, 2016, 4052. Guo G.; Zhu F.; Chen E.; Liu Q.; Wu L.; Guan C. From footprint to evidence: an exploratory study of mining social data for credit scoring . ACM Transactions on the Web 10, 4 (November 2016), Article No. 22. Hespanhol L. Interacting with laughter: a case study on audiobased interactivity of public projections . In Proceedings of the 28th Australian Conference on ComputerHuman Interaction (OzCHI 2016), ACM, 2016, 205214. Hsieh G.; Kocielnik R. You get who you pay for: the impact of incentives on participation bias . In Proceedings of the 19th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW 2016), ACM, 2016, 823835. Javornik A.; Rogers Y.; Moutinho A.; Freeman R. Revealing the shopper experience of using a "magic

Upload: others

Post on 02-Aug-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Notable Books and Articles in Computing of 2016gotz.web.unc.edu/files/2017/08/Computing-Reviews... · methods for indoor localization under collinear ambiguity. Pervasive and Mobile

Search

Best Reviews | Notable Books & Articles | "Best of" Archive

Computing Reviews is happy to bring you the 21st annual list of notable items published in computing—thistime for 2016. We reached out to many in the computing community for nominations: our reviewers, CR categoryeditors, the editors in chief of journals we cover, and computer scientists in both industry and academia. In addition, weincluded proceedings papers that were recognized as “Best Papers” at their respective conferences, as well as the mostdownloaded journal papers from some of the top journals covered in CR.

Read more about our selection process.

All reviews with the symbol are freely available on the site. Download the full list as a PDF.

Notable Books and Articles in Computing of 2016 A. General Literature

Calude C. The human face of computing (vol. 9).Imperial College Press. Review Sedgewick R.; Wayne K. Computer

science: an interdisciplinary approach.Addison­Wesley Professional. Review1Review2

B. Hardware

Dan A.; Lam P.; Hoefler T.; Vechev M. Modeling andanalysis of remote memory access programming. InProceedings of the 2016 ACM SIGPLAN InternationalConference on Object­Oriented Programming,Systems, Languages, and Applications (OOPSLA2016), ACM, 2016, 129­144. Haj­Yihia J.; Yasin A.; Asher Y.; Mendelson A. Fine­grain power breakdown of modern out­of­order coresand its implications on Skylake­based systems. ACMTransactions on Architecture and Code Optimization13, 4 (October 2016), Article No. 56. Wang, P.; McAllister, J. Streaming elements for FPGAsignal and image processing accelerators. IEEETransactions on Very Large Scale Integration (VLSI)Systems 24, 6 (June 2016), 2262­2274. Xiao K.; Forte D.; Jin Y.; Karri R.; Bhunia S.;Tehranipoor M. Hardware trojans: lessons learned

H. Information Systems (Cont'd.)

Gröger, C.; Kassner, L.; Hoos, E.; Königsberger, J.;Kiefer, C.; Silcher, S.; and Mitschang, B. The data­driven factory: leveraging big industrial data foragile, learning and human­centric manufacturing. InProc. of the 18th International Conference onEnterprise Information Systems, (ICEIS 2016)SCITEPRESS, 2016, 40­52. Guo G.; Zhu F.; Chen E.; Liu Q.; Wu L.; Guan C.From footprint to evidence: an exploratory study ofmining social data for credit scoring. ACMTransactions on the Web 10, 4 (November 2016),Article No. 22. Hespanhol L. Interacting with laughter: a case studyon audio­based interactivity of public projections. InProceedings of the 28th Australian Conference onComputer­Human Interaction (OzCHI 2016), ACM,2016, 205­214.

Hsieh G.; Kocielnik R. You get who you payfor: the impact of incentives onparticipation bias. In Proceedings of the19th ACM Conference on Computer­Supported Cooperative Work & SocialComputing (CSCW 2016), ACM, 2016,

823­835. Javornik A.; Rogers Y.; Moutinho A.; Freeman R.Revealing the shopper experience of using a "magic

Page 2: Notable Books and Articles in Computing of 2016gotz.web.unc.edu/files/2017/08/Computing-Reviews... · methods for indoor localization under collinear ambiguity. Pervasive and Mobile

after one decade of research. ACM Transactions onDesign Automation of Electronic Systems 22, 1 (May2016), Article No. 6.

C. Computer Systems Organization

Agelastos A.; Allan B.; Brandt J.; GentileA.; Lefantzi S.; Monk S.; Ogden J.; RajanM.; Stevenson J. Continuous whole­systemmonitoring toward rapid understanding ofproduction HPC applications and systems.Parallel Computing 58 (October 2016), 90­

106. Altmeyer S.; Douma R.; Lunniss W.; Davis R. On theeffectiveness of cache partitioning in hard real­timesystems. Real­Time Systems 52, 5 (September2016), 598­643. Álvarez C.; Ayguadé E.; Bosch J.; Bueno J.;

Cherkashin A.; Filgueras A.; Jiménez­González D.;Martorell X.; Navarro N.; Vidal M.; TheodoropoulosD.; Pnevmatikatos D.; Catani D.; Oro D.; FernándezC.; Segura C.; Rodríguez J.; Hernando J.; ScordinoC.; Gai P.; Passera P.; Pomella A.; Bettin N.; RizzoA.; Giorgi R. The AXIOM software layers.Microprocessors & Microsystems 47, Part B,(November 2016), 262­277. Review Balani N. Enterprise IoT: a definitive

handbook. CreateSpace IndependentPublishing Platform. Review Bertino E.; Choo K.; Georgakopolous

D.; Nepal S. Internet of Things (IoT): smart andsecure service delivery. ACM Transactions on InternetTechnology 16, 4 (December 2016), Article No. 22.Review Bienkowski M.; Klonowski M.; Korzeniowski M.;Kowalski D. Randomized mutual exclusion on amultiple access channel. Distributed Computing 29, 5(October 2016), 341­359. Bregu E.; Casamassima N.; Cantoni D.; Mottola L.;Whitehouse K. Reactive control of autonomousdrones. In Proceedings of the 14th AnnualInternational Conference on Mobile Systems,

Applications, and Services (MobiSys 2016), ACM,2016, 207­219. Chen M.; Qian Y.; Mao S.; Tang W.; Yang X.

Software­defined mobile networks security. MobileNetworks and Applications 21, 5 (October 2016),729­743. Review Cho, S.; Julien, C. CHITCHAT: navigating tradeoffs indevice­to­device context sharing. In Proc. of the IEEEInternational Conference on Pervasive Computing and

Communications (PerCom 2016), IEEE, 2016, 1­10. Coppola R.; Morisio M. Connected car: technologies,issues, future trends. ACM Computing Surveys 49, 3(December 2016), Article No. 46.

Hayes T.; Ali F. Robust ad­hoc sensorrouting (RASeR) protocol for mobilewireless sensor networks. Ad HocNetworks 50 (November 2016), 128­144.

mirror" augmented reality make­up application. InProceedings of the 2016 ACM Conference on

Designing Interactive Systems (DIS 2016), ACM,2016, 871­882. Kamalzadeh M.; Kralj C.; Möller T.; Sedlmair M.TagFlip: active mobile music discovery with socialtags. In Proceedings of the 21st InternationalConference on Intelligent User Interfaces (IUI 2016),ACM, 2016, 19­30. Karana E.; Giaccardi E.; Stamhuis N.; Goossensen J.The tuning of materials: a designer’s journey. InProceedings of the 2016 ACM Conference on

Designing Interactive Systems (DIS 2016), ACM,2016, 619­631. Ko M.; Choi S.; Yatani K.; Lee U. Lock n’ LoL: group­based limiting assistance app to mitigate smartphonedistractions in group activities. In Proceedings of the2016 CHI Conference on Human Factors in

Computing Systems (CHI 2016), ACM, 2016, 998­1010. Laput G.; Xiao R.; Harrison C. ViBand: high­fidelitybio­acoustic sensing using commodity smartwatchaccelerometers. In Proceedings of the 29th AnnualSymposium on User Interface Software and

Technology (UIST 2016), ACM, 2016, 321­333. Le Goc M.; Kim L.; Parsaei A.; Fekete J.; DragicevicP.; Follmer S. Zooids: building blocks for swarm userinterfaces. In Proceedings of the 29th AnnualSymposium on User Interface Software and

Technology (UIST 2016), ACM, 2016, 97­109. Leong J.; Parzer P.; Perteneder F.; Babic T.; RendlC.; Vogl A.; Egger H.; Olwal A.; Haller M. proCover:sensory augmentation of prosthetic limbs using smarttextile covers. In Proceedings of the 29th AnnualSymposium on User Interface Software and

Technology (UIST 2016), ACM, 2016, 335­346. Leskovec J.; Sosič R. SNAP: a general­purposenetwork analysis and graph­mining library. ACMTransactions on Intelligent Systems and Technology

8, 1 (July 2016), Article No. 1. Li H.; Yang W.; Wang J.; Xu Y.; Huang L.WiFinger: talk to your smart devices withfinger­grained gesture. In Proceedings ofthe 2016 ACM International Joint

Conference on Pervasive and Ubiquitous

Computing (UbiComp 2016), ACM, 2016,250­261. Lien J.; Gillian N.; Karagozler M.; Amihood P.;Schwesig C.; Olson E.; Raja H.; Poupyrev I. Soli:ubiquitous gesture sensing with millimeter waveradar. ACM Transactions on Graphics 35, 4 (July2016), Article No. 142. Mason M. The MIT Museum Glassware prototype:visitor experience exploration for designing smartglasses. Journal on Computing and Cultural Heritage9, 3 (September 2016), Article No. 12. Mehrotra A.; Hendley R.; Musolesi M. PrefMiner:mining user’s preferences for intelligent mobilenotification management. In Proceedings of the 2016

Page 3: Notable Books and Articles in Computing of 2016gotz.web.unc.edu/files/2017/08/Computing-Reviews... · methods for indoor localization under collinear ambiguity. Pervasive and Mobile

Huberman B.; Asur S. BidPacket: trading bandwidthin public spaces. Netnomics 17, 3 (November 2016),223­232. Kellogg B.; Talla V.; Gollakota S.; Smith J. Passive

Wi­Fi: bringing low power to Wi­Fi transmissions. InProceedings of the 13th Usenix Conference on

Networked Systems Design and Implementation

(NSDI 2016), USENIX Association, 2016, 151­164.Review Kumar S.; Hegde R. Multi­sensor data fusionmethods for indoor localization under collinearambiguity. Pervasive and Mobile Computing 30(August 2016), 18­31. Kurek T.; Niemiec M.; Lason A. Taking back

control of privacy: a novel framework for preservingcloud­based firewall policy confidentiality.International Journal of Information Security 15, 3(June 2016), 235­250. Review Lenzen C.; Wattenhofer R. Tight bounds for parallelrandomized load balancing. Distributed Computing29, 2 (April 2016), 127­142. Limoncelli T. Are you load balancing wrong?. Queue14, 6 (December 2016), 5­13. Lo D.; Cheng L.; Govindaraju R.; Ranganathan P.;Kozyrakis C. Improving resource efficiency at scalewith Heracles. ACM Transactions on ComputerSystems 34, 2 (April 2016), Article No. 6. Lv Y.; Moscibroda T. Fair and resilientincentive tree mechanisms. DistributedComputing 29, 1 (February 2016), 1­16. Mahmood Z. Connectivity frameworks forsmart devices: the Internet of Things from

a distributed computing perspective. SpringerInternational Publishing. Midi D.; Sultana S.; Bertino E. A system for responseand prevention of security incidents in wirelesssensor networks. ACM Transactions on SensorNetworks 13, 1 (December 2016), Article No. 1. Rehman, Z.; Hussain, O. K.; Hussain, F. K.; Chang,E.; Dillon, T. User­side QoS forecasting andmanagement of cloud services. World Wide Web 18,6 (Nov. 2015), 1677­1716.

Sheth A. Internet of Things to smart IoTthrough semantic, cognitive, andperceptual computing. IEEE IntelligentSystems 31, 2 (March 2016), 108­112. Singh S.; Chana I. A survey on resource

scheduling in cloud computing: issues andchallenges. Journal of Grid Computing 14, 2 (June2016), 217­264. Review Wang H.; Rosa C.; Pedersen K. Dual connectivity forLTE­advanced heterogeneous networks. WirelessNetworks 22, 4 (May 2016), 1315­1328. Wang K.; Du M.; Yang D.; Zhu C.; Shen J.; Zhang Y.Game­theory­based active defense for intrusion

ACM International Joint Conference on Pervasive and

Ubiquitous Computing (UbiComp 2016), ACM, 2016,1223­1234. Moshfeghi Y.; Triantafillou P.; Pollick F.Understanding information need: an fMRI study. InProceedings of the 39th International ACM SIGIR

Conference on Research and Development in

Information Retrieval (SIGIR 2016), ACM, 2016, 335­344. Mutlu B.; Veas E.; Trattner C. VizRec: recommendingpersonalized visualizations. ACM Transactions onInteractive Intelligent Systems 6, 4 (November2016), Article No. 31.

Napierala K.; Stefanowski J. Types ofminority class examples and their influenceon learning classifiers from imbalanceddata. Journal of Intelligent InformationSystems 46, 3 (June 2016), 563­597.

Nicolaescu, P.; Rosenstengel, M.; Derntl, M.;Klamma, R.; and Jarke, M. View­based near real­timecollaborative modeling for information systemsengineering. In Proc. of the 28th InternationalConference on Advanced Information Systems

Engineering (CAiSE 2016), Springer, 2016, 3­17. Polvi J.; Taketomi T.; Yamamoto G.; Dey A.; SandorC.; Kato H. SlidAR. Computers and Graphics 55 (April2016), 33­43. Preist C.; Schien D.; Blevis E. Understanding andmitigating the effects of device and cloud servicedesign decisions on the environmental footprint ofdigital infrastructure. In Proceedings of the 2016 CHIConference on Human Factors in Computing Systems

(CHI 2016), ACM, 2016, 1324­1337. Rameau, F.; Ha, H.; Joo, K.; Choi, J.; Park, K.; andKweon, I. S. A real­time augmented reality system tosee­through cars. IEEE Transactions on Visualizationand Computer Graphics 22, 11 (Nov. 2016), 2395­2404. Rawassizadeh R.; Momeni E.; Dobbins C.;Gharibshah J.; Pazzani M. Scalable daily humanbehavioral pattern mining from multivariate temporaldata. IEEE Transactions on Knowledge and DataEngineering 28, 11 (November 2016), 3098­3112. Ristoski P.; Paulheim H. Semantic web in data miningand knowledge discovery. Web Semantics: Science,Services and Agents on the World Wide Web 36(January 2016), 1­22. Rouhani B.; Mirhoseini A.; Songhori E.; Koushanfar F.Automated real­time analysis of streaming big anddense data on reconfigurable platforms. ACMTransactions on Reconfigurable Technology and

Systems 10, 1 (September 2016), Article No. 8. Saunders, J.; Syrdal, D. S.; Koay, K. L.; Burke, N.;and Dautenhahn, K. “Teach Me–Show Me”—end­userpersonalization of a smart home and companionrobot. IEEE Transactions on Human­Machine Systems46, 1 (Feb. 2016), 27­40. Schneider B.; Sharma K.; Cuendet S.; Zufferey G.;

Page 4: Notable Books and Articles in Computing of 2016gotz.web.unc.edu/files/2017/08/Computing-Reviews... · methods for indoor localization under collinear ambiguity. Pervasive and Mobile

detection in cyber­physical embedded systems. ACMTransactions on Embedded Computing Systems 16, 1(October 2016), Article No. 18. Yang, D.; Xue, G.; Fang, X.; Tang, J. Incentivemechanisms for crowdsensing: crowdsourcing withsmartphones. IEEE/ACM Transactions on Networking24, 3 (June 2016), 1732­1744. Zhang B.; Ren K.; Xing G.; Fu X.; Wang C. SBVLC:secure barcode­based visible light communication forsmartphones. IEEE Transactions on Mobile Computing15, 2 (February 2016), 432­446.

D. Software

Aiken P. EXPERIENCE: succeeding at datamanagement­­BigCo attempts to leverage data.Journal of Data and Information Quality 7, 1­2(February 2016), Article No. 8. Bersani M.; Bianculli D.; Ghezzi C.;

Krstić S.; San Pietro P. Efficient large­scaletrace checking using MapReduce. InProceedings of the 38th InternationalConference on Software Engineering (ICSE2016), ACM, 2016, 888­898. Review Brockschmidt M.; Emmes F.; Falke S.; Fuhs C.; GieslJ. Analyzing runtime and size complexity of integerprograms. ACM Transactions on ProgrammingLanguages and Systems 38, 4 (August 2016), ArticleNo. 13. Burns A. Why the expressive power of programminglanguages such as Ada is needed for future cyberphysical systems. In Proceedings of the 21st Ada­Europe International Conference on Reliable SoftwareTechnologies (Ada­Europe 2016), Springer, 2016, 3­11. Chapman K.; Hosking A.; Moss J. Hybrid STM/HTMfor nested transactions on OpenJDK. In Proceedingsof the 2016 ACM SIGPLAN International Conferenceon Object­Oriented Programming, Systems,Languages, and Applications (OOPSLA 2016), ACM,2016, 660­676. Christakis M.; Müller P.; Wüstholz V. Guiding dynamicsymbolic execution toward unverified programexecutions. In Proceedings of the 38th InternationalConference on Software Engineering (ICSE 2016),ACM, 2016, 144­155. Ghani, N.; Nordvall Forsberg, F.; Simpson, A.Comprehensive parametric polymorphism:categorical models and type theory. In Proc. of the19th International Conference on Foundations ofSoftware Science and Computation Structures(FoSSaCS 2016), Springer, 2016, 3­19.

Gil, Y.; Levy, T. Formal languagerecognition with the Java type checker. InProc. of the European Conference onObject­Oriented Programming (ECOOP2016), Dagstuhl LIPIcs, 2016, 10:1­10:27.

Gousios G.; Storey M.; Bacchelli A. Work practicesand challenges in pull­based development: thecontributor’s perspective. In Proceedings of the 38th

Dillenbourg P.; Pea R. Using mobile eye­trackers tounpack the perceptual benefits of a tangible userinterface for collaborative learning. ACM Transactionson Computer­Human Interaction 23, 6 (November2016), Article No. 39. Stonebraker, M. Big data is (at least)

four different problems. YouTube,01:02:35 published on June 2, 2016,stanfordonline,https://www.youtube.com/watch?v=S79­buNhdhI Swiatek, P.; Juszczyszyn, K.; Kolaczek, G.;Brzostowski, K.; and Schauer, P. Processes’optimization tools for web­service orientedorganizations’ resources: an ehealth application. InProc. of the 17th International Conference on E­health Networking, Application & Services(HealthCom 2016), IEEE, 2016, 222 ­ 226. Trushkowsky B.; Kraska T.; Franklin M.; Sarkar P.

Answering enumeration queries with the crowd.Communications of the ACM 59, 1 (January 2016),118­127. Review Tsai M.; Wang C.; Chien P. Discovering financekeywords via continuous­space language models.ACM Transactions on Management InformationSystems 7, 3 (August 2016), Article No. 7. Tuan, A.; Comyn­Wattiau, I.; and Si­Saïd Cherfi, S.Structuring guidelines for web application designers:a meta­model. In Proc. of the 18th InternationalConference on Enterprise Information Systems(ICEIS 2016), SCITEPRESS, 2016, 327­335. Verberne S.; Sappelli M.; Hiemstra D.; Kraaij W.Evaluation and analysis of term scoring methods forterm extraction. Information Retrieval 19, 5 (October2016), 510­545.

Vuorimaa P.; Laine M.; Litvinova E.;Shestakov D. Leveraging declarativelanguages in web application development.World Wide Web 19, 4 (July 2016), 519­543.

Wang E.; Li W.; Hawkins D.; Gernsheimer T.; Norby­Slycord C.; Patel S. HemaApp: noninvasive bloodscreening of hemoglobin using smartphone cameras.In Proceedings of the 2016 ACM International JointConference on Pervasive and Ubiquitous Computing(UbiComp 2016), ACM, 2016, 593­604. Wiese O.; Roth V. See you next time: a model formodern shoulder surfers. In Proceedings of the 18thInternational Conference on Human­ComputerInteraction with Mobile Devices and Services(MobileHCI 2016), ACM, 2016, 453­464. Yin H.; Cui B.; Zhou X.; Wang W.; Huang Z.;

Sadiq S. Joint modeling of user check­in behaviors forreal­time point­of­interest recommendation. ACMTransactions on Information Systems 35, 2(September 2016), Article No. 11. Review Zhai C.; Massung S. Text data management and

analysis: a practical introduction to information

Page 5: Notable Books and Articles in Computing of 2016gotz.web.unc.edu/files/2017/08/Computing-Reviews... · methods for indoor localization under collinear ambiguity. Pervasive and Mobile

International Conference on Software Engineering(ICSE 2016), ACM, 2016, 285­296. Hanappi O.; Hummer W.; Dustdar S. Assertingreliable convergence for configuration managementscripts. In Proceedings of the 2016 ACM SIGPLANInternational Conference on Object­OrientedProgramming, Systems, Languages, and Applications(OOPSLA 2016), ACM, 2016, 328­343. Julian, D. Designing machine learning systems withPython: design efficient machine learning systemsthat give you more accurate results. Packt Publishing,2016. Krebbers R. A formal C memory model for separationlogic. Journal of Automated Reasoning 57, 4(December 2016), 319­387. Largent, D. L. Measuring and understanding teamdevelopment by capturing self­assessed enthusiasmand skill levels. ACM Transactions on ComputingEducation 16, 2 (Mar. 2016), Article No. 6. Li, Y.; Tan, T.; Zhang, Y.; and Xue, J. Programtailoring: slicing by sequential criteria. In Proc. of theEuropean Conference on Object­OrientedProgramming (ECOOP 2016), Dagstuhl LIPIcs, 2016,15:1­15:27. Madsen M.; Tip F.; Andreasen E.; Sen K.; Møller A.Feedback­directed instrumentation for deployedJavaScript applications. In Proceedings of the 38thInternational Conference on Software Engineering(ICSE 2016), ACM, 2016, 899­910. Menendez D.; Nagarakatte S. Termination­checkingfor LLVM peephole optimizations. In Proceedings ofthe 38th International Conference on SoftwareEngineering (ICSE 2016), ACM, 2016, 191­202. Miné A.; Breck J.; Reps T. An algorithm inspired byconstraint solvers to infer inductive invariants innumeric programs. In Proceedings of the 25thEuropean Symposium on Programming Languagesand Systems (ESOP 2016), Springer­Verlag NewYork, Inc., 2016, 560­588. Ouni A.; Kessentini M.; Sahraoui H.;

Inoue K.; Deb K. Multi­criteria coderefactoring using search­based softwareengineering: an industrial case study. ACMTransactions on Software Engineering andMethodology 25, 3 (May 2016), Article No. 23.Review Petricek T.; Guerra G.; Syme D. Types from data:making structured data first­class citizens in F#. InProceedings of the 37th ACM SIGPLAN Conference onProgramming Language Design and Implementation(PLDI 2016), ACM, 2016, 477­490. Potvin R.; Levenberg J. Why Google stores billions oflines of code in a single repository. Communicationsof the ACM 59, 7 (July 2016), 78­87. Raschka S. Python machine learning. Packt

Publishing. Review

retrieval and text mining. Association for ComputingMachinery and Morgan & Claypool. Review1 Review2Review3 Review4 Zhao S.; Ramos J.; Tao J.; Jiang Z.; Li S.; Wu Z.;

Pan G.; Dey A. Discovering different kinds ofsmartphone users through their application usagebehaviors. In Proceedings of the 2016 ACMInternational Joint Conference on Pervasive andUbiquitous Computing (UbiComp 2016), ACM, 2016,498­509. Review

I. Computing Methodologies

Adouane L. Autonomous vehiclenavigation: from behavioral to hybridmulti­controller architectures. A. K. Peters,Ltd. Review1 Review2 Ambusaidi M.; He X.; Nanda P.; Tan Z. Building anintrusion detection system using a filter­basedfeature selection algorithm. IEEE Transactions onComputers 65, 10 (October 2016), 2986­2998. Atanassov, K.; Georgiev, I.; Szmidt, E.; andKacprzyk, J. Multidimensional intuitionistic fuzzyquantifiers. In Proc. of the IEEE 8th InternationalConference on Intelligent Systems (IS 2016), IEEE,2016, 530 ­ 534. Autuori J.; Hnaien F.; Yalaoui F. A mapping techniquefor better solution exploration: NSGA­II adaptation.Journal of Heuristics 22, 1 (February 2016), 89­123. Blissing B.; Bruzelius F.; Eriksson O. Effects of visuallatency on vehicle driving behavior. ACM Transactionson Applied Perception 14, 1 (July 2016), Article No.5. Blot, A.; Dagand, P.­É.; and Lawall, J. From sets tobits in Coq. In Proc. of the 13th InternationalSymposium on Functional and Logic Programming(FLOPS 2016), Springer, 2016, 12­28. Boudhane M.; Nsiri B. Underwater image processingmethod for fish localization and detection insubmarine environment. Journal of VisualCommunication and Image Representation 39(August 2016), 226­238. Carvalho A.; Dimitrov S.; Larson K. How manycrowdsourced workers should a requester hire?.Annals of Mathematics and Artificial Intelligence 78,1 (September 2016), 45­72. Charlesworth A. A theorem about computationalismand "absolute" truth. Minds and Machines 26, 3(September 2016), 205­226. Cimpoi M.; Maji S.; Kokkinos I.; Vedaldi A. Deep filterbanks for texture recognition, description, andsegmentation. International Journal of ComputerVision 118, 1 (May 2016), 65­94. Dai, J.; Li, Y.; He, K.; and Sun, J. R­FCN: objectdetection via region­based fully convolutionalnetworks. In Proc. of the Conference on NeuralInformation Processing Systems (NIPS 2016), CurranAssoc., 2016, 379­387.

Page 6: Notable Books and Articles in Computing of 2016gotz.web.unc.edu/files/2017/08/Computing-Reviews... · methods for indoor localization under collinear ambiguity. Pervasive and Mobile

Rizzi E.; Elbaum S.; Dwyer M. On the techniqueswe create, the tools we build, and theirmisalignments: a study of KLEE. In Proceedings ofthe 38th International Conference on SoftwareEngineering (ICSE 2016), ACM, 2016, 132­143.Review Rumpe B. Modeling with UML: language, concepts,

methods. Springer International Publishing. Review Song N.; Son Y.; Han H.; Yeom H. Efficient

memory­mapped I/O on fast storage device. ACMTransactions on Storage 12, 4 (May 2016), ArticleNo. 19. Review Stefănescu A.; Park D.; Yuwen S.; Li Y.; Roşu G.Semantics­based program verifiers for all languages.In Proceedings of the 2016 ACM SIGPLANInternational Conference on Object­OrientedProgramming, Systems, Languages, and Applications(OOPSLA 2016), ACM, 2016, 74­91. Sutcliffe R.; Kowarsch B. Closing the barn door:

re­prioritizing safety, security, and reliability. InProceedings of the 21st Western CanadianConference on Computing Education (WCCCE 2016),ACM, 2016, Article No. 1. Review Swalens, J.; De Koster, J.; De Meuter, W.Transactional tasks: parallelism in softwaretransactions. In Proc. of the European Conference onObject­Oriented Programming (ECOOP 2016),Dagstuhl LIPIcs, 2016, 23:1­23:28. Tauber T.; Oliveira B. Modular architecture for codeand metadata sharing. In Proceedings of the 15thInternational Conference on Modularity (MODULARITY2016), ACM, 2016, 106­117. Wang Y.; Oliveira B. The expression problem,trivially!. In Proceedings of the 15th InternationalConference on Modularity (MODULARITY 2016), ACM,2016, 37­41.

Wong W.; Gao R.; Li Y.; Abreu R.;Wotawa F. A survey on software faultlocalization. IEEE Transactions on SoftwareEngineering 42, 8 (August 2016), 707­740. Review

Ye X.; Shen H.; Ma X.; Bunescu R.; Liu C. From

word embeddings to document similarities forimproved information retrieval in softwareengineering. In Proceedings of the 38th InternationalConference on Software Engineering (ICSE 2016),ACM, 2016, 404­415. Review Yu T.; Qu X.; Cohen M. VDTest: an automatedframework to support testing for virtual devices. InProceedings of the 38th International Conference onSoftware Engineering (ICSE 2016), ACM, 2016, 583­594. Zhou H.; Xue J. Exploiting mixed SIMD parallelism byreducing data reorganization overhead. InProceedings of the 2016 International Symposium onCode Generation and Optimization (CGO 2016), ACM,2016, 59­69.

Di Bartolomeo, M.; and Hu, Y. There ismore to streamgraphs than movies: betteraesthetics via ordering and lassoing.Computer Graphics Forum 35, 3 (June2016), 341­350.

Ding C.; Thu Y.; Utiyama M.; Sumita E. Wordsegmentation for Burmese (Myanmar). ACMTransactions on Asian and Low­Resource LanguageInformation Processing 15, 4 (April 2016), Article No.22. Dong C.; Loy C.; He K.; Tang X. Image super­resolution using deep convolutional networks. IEEETransactions on Pattern Analysis and MachineIntelligence 38, 2 (February 2016), 295­307. Elgendy, O. A.; and Chan, S. H. Image reconstructionand threshold design for quanta image sensors. InProc. of the IEEE International Conference on ImageProcessing (ICIP 2016), IEEE, 2016, 978­982. Englund R.; Ropinski T. Evaluating the perception ofsemi­transparent structures in direct volumerendering techniques. In Proceedings of theSIGGRAPH Asia Symposium on Visualization (SA2016), ACM, 2016, Article No. 9. Fujimoto R. Research challenges in parallel anddistributed simulation. ACM Transactions on Modelingand Computer Simulation 26, 4 (February 2016),Article No. 22. Gao J.; Wang Y.; Wang J.; Liang R. Adaptiveoptimization modeling of preconditioned conjugategradient on multi­GPUs. ACM Transactions on ParallelComputing 3, 3 (October 2016), Article No. 16. Goodfellow, I.; Bengio, Y.; and Courville, A. Deeplearning. MIT Press, 2016. Hachmon G.; Mamet N.; Sasson S.; Barkai T.; HadarN.; Abu­Horowitz A.; Bachelet I. A non­Newtonianfluid robot. Artificial Life 22, 1 (February 2016), 1­22. Hagiya M.; Aubert­Kato N.; Wang S.; Kobayashi S.

Molecular computers for molecular robots as hybridsystems. Theoretical Computer Science 632 (June2016), 4­20. Review Han X.; Wong K.; Yu Y. 3D human modelreconstruction from sparse uncalibrated views. IEEEComputer Graphics and Applications 36, 6(November 2016), 46­56. He, K.; Zhang, X.; Ren, S.; and Sun, J. Deep residuallearning for image recognition. In Proc. of the IEEEConference on Computer Vision and PatternRecognition (CVPR 2016), IEEE, 2016, 770­778. Kaehler A.; Bradski G. Learning OpenCV 3:computer vision in C++ with the OpenCVlibrary. O’Reilly Media, Inc. Kartheek Medathati, N. V.; Neumann, H.;Masson, G. S.; and Kornprobst, P. Bio­inspired computer vision: towards a synergisticapproach of artificial and biological vision. ComputerVision and Image Understanding 150 (Sept. 2016),

Page 7: Notable Books and Articles in Computing of 2016gotz.web.unc.edu/files/2017/08/Computing-Reviews... · methods for indoor localization under collinear ambiguity. Pervasive and Mobile

E. Data

Beimel A.; Farràs O.; Mintz Y. Secret­sharingschemes for very dense graphs. Journal of Cryptology29, 2 (April 2016), 336­362. Review Mondelli M.; Hassani S.; Urbanke R. Unified scaling ofpolar codes: error exponent, scaling exponent,moderate deviations, and error floors. IEEETransactions on Information Theory 62, 12(December 2016), 6698­6712. Yan H.; Liu C. Two classes of cyclic codes and theirweight enumerator. Designs, Codes andCryptography 81, 1 (October 2016), 1­9.

F. Theory Of Computation

Babai L. Graph isomorphism in quasipolynomial time[extended abstract]. In Proceedings of the 48thAnnual ACM SIGACT Symposium on the Theory ofComputing (STOC 2016), ACM, 2016, 684­697. Börger E.; Schewe K. Concurrent abstract statemachines. Acta Informatica 53, 5 (August 2016),469­492. Budig B.; Van Dijk T.; Wolff A. Matching labels andmarkers in historical maps: an algorithm withinteractive postprocessing. ACM Transactions onSpatial Algorithms and Systems 2, 4 (November2016), Article No. 13. Chadha R.; Cheval V.; Ciobâcă S.; Kremer S.Automated verification of equivalence properties ofcryptographic protocols. ACM Transactions onComputational Logic 17, 4 (September 2016), ArticleNo. 23. Coecke B.; Fritz T.; Spekkens R. A

mathematical theory of resources.Information and Computation 250(October 2016), 59­86. Review Doczkal C.; Smolka G. Completeness and

decidability results for CTL in constructive typetheory. Journal of Automated Reasoning 56, 3 (March2016), 343­365. Review Fan S.; Zahedi S.; Lee B. The computational sprintinggame. In Proceedings of the Twenty­FirstInternational Conference on Architectural Support forProgramming Languages and Operating Systems(ASPLOS 2016), ACM, 2016, 561­575. Fontes L.; Jain R.; Kerenidis I.; Laplante S.; LaurièreM.; Roland J. Relative discrepancy does not separateinformation and communication complexity. ACMTransactions on Computation Theory 9, 1 (October2016), Article No. 4. Goldreich O.; Ron D. On sample­based testers. ACMTransactions on Computation Theory 8, 2 (April2016), Article No. 7. Hesselink W. Correctness and concurrent complexityof the black­white bakery algorithm. Formal Aspectsof Computing 28, 2 (April 2016), 325­341. Kärkkäinen J.; Kempa D.; Puglisi S. Lazy Lempel­Ziv

1­30. Kim I.; Choi C.; Lee S. Improving discriminationability of convolutional neural networks by hybridlearning. International Journal on Document Analysisand Recognition 19, 1 (March 2016), 1­9. Lecocq P.; Dufay A.; Sourimant G.; Marvie J.Accurate analytic approximations for real­timespecular area lighting. In Proceedings of the 20thACM SIGGRAPH Symposium on Interactive 3DGraphics and Games (I3D 2016), ACM, 2016, 113­120. Liu, X.; Xie, N.; Tang, K.; and Jia, J. Lightweightingfor Web3D visualization of large­scale BIM scenes inreal­time. Graphical Models 88 (Nov. 2016), 40­56. Maglietta R.; Amoroso N.; Boccardi M.; Bruno S.;Chincarini A.; Frisoni G.; Inglese P.; Redolfi A.;Tangaro S.; Tateo A.; Bellotti R. Automatedhippocampal segmentation in 3D MRI using randomundersampling with boosting algorithm. PatternAnalysis & Applications 19, 2 (May 2016), 579­591. Mendes N.; and dos Santos A. A hypercube queuingmodel approach to the police units allocationproblem. In Proc. of the 18th InternationalConference on Enterprise Information Systems(ICEIS 2016), SCITEPRESS, 2016, 70­81. Mercado­Colmenero, J.­M.; Paramio, M.A.R.; Perez­Garcia, J.­M.; and Martin­Doñate, C. A new hybridmethod for demoldability analysis of discretegeometries. Computer­Aided Design 80 (Nov. 2016),43­60. Mollajafari M.; Shahhoseini H. An efficient ACO­basedalgorithm for scheduling tasks onto dynamicallyreconfigurable hardware using TSP­likenedconstruction graph. Applied Intelligence 45, 3(October 2016), 695­712. Müller V. (Ed.) Fundamental issues of artificial

intelligence. Springer International Publishing. Review

Ortner T.; Sorger J.; Piringer H.; HesinaG.; Gröller E. Visual analytics andrendering for tunnel crack analysis. TheVisual Computer 32, 6­8 (June 2016),859­869.

Pereira, G.; Prada, R.; and Santos, P. A. Integratingsocial power into the decision­making of cognitiveagents. Artificial Intelligence 241 (Dec. 2016), 1­44. Pound M.; French A.; Fozard J.; Murchie E.; PridmoreT. A patch­based approach to 3D plant shootphenotyping. Machine Vision and Applications 27, 5(July 2016), 767­779. Pröllochs N.; Feuerriegel S.; Neumann D. Detectingnegation scopes for financial news sentiment usingreinforcement learning. In Proceedings of the 201649th Hawaii International Conference on SystemSciences (HICSS 2016), IEEE Computer Society,2016, 1164­1173. Rodríguez M.; Agus M.; Bettio F.; Marton F.; GobbettiE. Digital Mont’e Prama: exploring large collections of

Page 8: Notable Books and Articles in Computing of 2016gotz.web.unc.edu/files/2017/08/Computing-Reviews... · methods for indoor localization under collinear ambiguity. Pervasive and Mobile

factorization algorithms. Journal of ExperimentalAlgorithmics 21 (January 2016), Article No. 2.4. Meir O. Combinatorial PCPs with short proofs.Computational Complexity 25, 1 (March 2016), 1­102.

Raz, R. Fast learning requires goodmemory: a time­space lower bound forparity learning. In Proc. of the 57th AnnualIEEE Symposium on Foundations of

Computer Science (FOCS 2016), IEEE,2016, 266­275.

Rubistein, A. Settling the complexity of computingapproximate two­player Nash equilibria. In Proc. ofthe 57th Annual IEEE Symposium on Foundations of

Computer Science (FOCS 2016), IEEE, 2016, 258­265. Schmitz S. Complexity hierarchies beyondelementary. ACM Transactions on ComputationTheory 8, 1 (February 2016), Article No. 3.

G. Mathematics Of Computing

Cao Y.; Cao Y.; Fu F. Cyclic codes over 2m [u]/⟨uk ⟩of oddly even length. Applicable Algebra inEngineering, Communication and Computing 27, 4(August 2016), 259­277. Chattopadhyay E.; Zuckerman D. Explicit two­sourceextractors and resilient functions. In Proceedings ofthe 48th Annual ACM SIGACT Symposium on the

Theory of Computing (STOC 2016), ACM, 2016, 670­683. Chechik S.; Wulff­Nilsen C. Near­optimal lightspanners. In Proceedings of the Twenty­SeventhAnnual ACM­SIAM Symposium on Discrete Algorithms

(SODA 2016), SIAM, 2016, 883­892. Chonev V.; Ouaknine J.; Worrell J. On the complexityof the orbit problem. Journal of the ACM 63, 3 (June2016), Article No. 23. Clemens J.; Reineking T.; Kluth T. An evidential

approach to SLAM, path planning, and activeexploration. International Journal of ApproximateReasoning 73 (June 2016), 1­26. Review Deng W.; Yin W. On the global and linearconvergence of the generalized alternating directionmethod of multipliers. Journal of Scientific Computing66, 3 (March 2016), 889­916. Do S.; Ha Y.; Kang M.; Kim C. Applicationof a multi­dimensional limiting process tocentral­upwind schemes for solvinghyperbolic systems of conservation laws.Journal of Scientific Computing 69, 1(October 2016), 274­291. Ghaffari M. An improved distributed algorithm formaximal independent set. In Proceedings of theTwenty­Seventh Annual ACM­SIAM Symposium on

Discrete Algorithms (SODA 2016), SIAM, 2016, 270­277. Keeling S.; Kunisch K. Robust ℓ1 approaches to

detailed 3D models of sculptures. Journal onComputing and Cultural Heritage 9, 4 (September2016), Article No. 18. Satyanarayan A.; Moritz D.; Wongsuphasawat K.;Heer J. Vega­Lite: a grammar of interactive graphics.IEEE Transactions on Visualization and Computer

Graphics 23, 1 (January 2017), 341­350. Sgurev V.; Yager R.; Kacprzyk J.; Jotsov V.Innovative issues in intelligent systems. SpringerInternational Publishing. Shokouhifar M.; Jalali A. Two­stage fuzzy inferencesystem for symbolic simplification of analog circuits.Integration, the VLSI Journal 55 (September 2016),281­292. Silva F.; Duarte M.; Correia L.; Oliveira

S.; Christensen A. Open issues inevolutionary robotics. EvolutionaryComputation 24, 2 (August 2016), 205­236. Review Skraba P.; Rosen P.; Wang B.; Chen G.; Bhatia H.;Pascucci V. Critical point cancellation in 3D vectorfields: robustness and discussion. IEEE Transactionson Visualization and Computer Graphics 22, 6 (June2016), 1683­1693. Stahl, B. C.; and Coeckelbergh, M. Ethics ofhealthcare robotics: towards responsible researchand innovation. Robotics and Autonomous Systems86 (Dec. 2016), 152­161. Stoffers M.; Schemmel D.; Soria Dustmann O.;

Wehrle K. Automated memoization for parameterstudies implemented in impure languages. InProceedings of the 2016 Annual ACM Conference on

SIGSIM Principles of Advanced Discrete Simulation

(SIGSIM­PADS 2016), ACM, 2016, 221­232. Review Sugiyama M. Introduction to statistical machine

learning. Morgan Kaufmann Publishers Inc. Review Tam G.; Kothari V.; Chen M. An analysis of machine­and human­analytics in classification. IEEETransactions on Visualization and Computer Graphics

23, 1 (January 2017), 71­80. Tippetts B.; Lee D.; Lillywhite K.; Archibald J. Reviewof stereo vision algorithms and their suitability forresource­limited systems. Journal of Real­TimeImage Processing 11, 1 (January 2016), 5­25. Wang G.; Wang C.; Du Q.; Li L.; Dong W. Distributedcooperative control of multiple nonholonomic mobilerobots. Journal of Intelligent and Robotic Systems83, 3­4 (September 2016), 525­541. Wang W.; Chen G.; Chen H.; Dinh T.; Gao J.; Ooi B.;Tan K.; Wang S.; Zhang M. Deep learning at scaleand at ease. ACM Transactions on MultimediaComputing, Communications, and Applications 12, 4s(September 2016), Article No. 69. Wang W.; Yang X.; Ooi B.; Zhang D.; Zhuang Y.Effective deep learning­based multi­modal retrieval.The VLDB Journal: The International Journal on Very

Page 9: Notable Books and Articles in Computing of 2016gotz.web.unc.edu/files/2017/08/Computing-Reviews... · methods for indoor localization under collinear ambiguity. Pervasive and Mobile

computing the geometric median and principal andindependent components. Journal of MathematicalImaging and Vision 56, 1 (September 2016), 99­124. Kitamura D.; Ono N.; Sawada H.; Kameoka H.;Saruwatari H. Determined blind source separationunifying independent vector analysis and nonnegativematrix factorization. IEEE/ACM Transactions onAudio, Speech and Language Processing 24, 9(September 2016), 1622­1637. Krenn D.; Wagner S. Compositions into powers of b:asymptotic enumeration and parameters.Algorithmica 75, 4 (August 2016), 606­631. Kudekar S.; Kumar S.; Mondelli M.; Pfister H.;Şaşoğlu E.; Urbanke R. Reed­Muller codes achievecapacity on erasure channels. In Proceedings of the48th Annual ACM SIGACT Symposium on the Theoryof Computing (STOC 2016), ACM, 2016, 658­669. Nakpim W. Third­order ordinary differential equationsequivalent to linear second­order ordinary differentialequations via tangent transformations. Journal ofSymbolic Computation 77 (November 2016), 63­77. Nikolaou N.; Edakunni N.; Kull M.; Flach P.; Brown G.Cost­sensitive boosting algorithms: Do we really needthem?. Machine Learning 104, 2­3 (September2016), 359­384. Tierny J.; Carr H. Jacobi fiber surfaces for bivariateReeb space computation. IEEE Transactions onVisualization and Computer Graphics 23, 1 (January2017), 960­969. Wang, M. Stochastic composition optimization:algorithms and sample complexities. In Proc. of theInternational Conference on Continuous Optimization(ICCOPT 2016), 2016.

Watrigant R.; Bougeret M.; Giroudeau R.Approximating the sparsest k­subgraph inchordal graphs. Theory of ComputingSystems 58, 1 (January 2016), 111­132. Yoshida Y. Nonlinear Laplacian for

digraphs and its applications to network analysis. InProceedings of the 9th ACM International Conferenceon Web Search and Data Mining (WSDM 2016), ACM,2016, 483­492. Review

H. Information Systems

Alexiev V.; Isaac A.; Lindenthal J. On the compositionof ISO 25964 hierarchical relations (BTG, BTP, BTI).International Journal on Digital Libraries 17, 1 (March2016), 39­48. Barowy D.; Curtsinger C.; Berger E.; McGregor A.

AutoMan: a platform for integrating human­basedand digital computation. Communications of the ACM59, 6 (June 2016), 102­109. Review Bota H.; Zhou K.; Jose J. Playing your cards right:the effect of entity cards on search behaviour andworkload. In Proceedings of the 2016 ACMConference on Human Information Interaction andRetrieval (CHIIR 2016), ACM, 2016, 131­140.

Large Data Bases 25, 1 (February 2016), 79­101.

Wei X.; Phung S.; Bouzerdoum A. Visualdescriptors for scene categorization:experimental evaluation. ArtificialIntelligence Review 45, 3 (March 2016),333­368.

Xiong F.; Kam M.; Hrebien L.; Wang B.; Qi Y.Kernelized information­theoretic metric learning forcancer diagnosis using high­dimensional molecularprofiling data. ACM Transactions on KnowledgeDiscovery from Data 10, 4 (May 2016), Article No.38. Review Yu, Q.; Yan, R.; Tang, H.; Tan, K.C.; and Li, H. Aspiking neural network system for robust sequencerecognition. IEEE Transactions on Neural Networksand Learning Systems 27, 3 (Mar. 2016), 621­635.

J. Computer Applications

Alberdi A.; Aztiria A.; Basarab A. On the earlydiagnosis of Alzheimer’s disease from multimodalsignals. Artificial Intelligence in Medicine 71 (July2016), 1­29. Hummel P.; Mcafee R. When does improved targetingincrease revenue?. ACM Transactions on Economicsand Computation 5, 1 (October 2016), Article No. 4. Lewis, M. The undoing project: a friendship thatchanged our minds. W. W. Norton & Co., 2016. Murnane E.; Abdullah S.; Matthews M.; Kay M.;Kientz J.; Choudhury T.; Gay G.; Cosley D. Mobilemanifestations of alertness: connecting biologicalrhythms with patterns of smartphone app use. InProceedings of the 18th International Conference onHuman­Computer Interaction with Mobile Devicesand Services (MobileHCI 2016), ACM, 2016, 465­477. Romero, M.; Sánchez, M.; and Villalobos, J. Weavingbusiness model patterns: understanding businessmodels. In Proc. of the 18th International Conferenceon Enterprise Information Systems (ICEIS 2016),SCITEPRESS, 2016, 496­505. Tang J.; Zhou S. A new approach for featureselection from microarray data based on mutualinformation. IEEE/ACM Transactions onComputational Biology and Bioinformatics 13, 6(November 2016), 1004­1015.

K. Computing Milieux

Berghel H. The bogus science theorem(and the junk science wager). Computer49, 4 (April 2016), 74­78. Devendorf L.; De Kosnik A.; Mattingly

K.; Ryokai K. Probing the potential of post­anthropocentric 3D printing. In Proceedings of the2016 ACM Conference on Designing InteractiveSystems (DIS 2016), ACM, 2016, 170­181. Review Gangwal, N.; and Bansal, V. Application ofdecomposed theory of planned behavior for m­commerce adoption in India. In Proc. of the 18thInternational Conference on Enterprise Information

Page 10: Notable Books and Articles in Computing of 2016gotz.web.unc.edu/files/2017/08/Computing-Reviews... · methods for indoor localization under collinear ambiguity. Pervasive and Mobile

Campos G.; Zimek A.; Sander J.; Campello R.;Micenková B.; Schubert E.; Assent I.; Houle M. Onthe evaluation of unsupervised outlier detection:measures, datasets, and an empirical study. DataMining and Knowledge Discovery 30, 4 (July 2016),891­927. Cecchinato M.; Sellen A.; Shokouhi M.; Smyth G.Finding email in a multi­account, multi­device world.In Proceedings of the 2016 CHI Conference onHuman Factors in Computing Systems (CHI 2016),ACM, 2016, 1200­1210. Chakraborty T.; Srinivasan S.; Ganguly N.;Mukherjee A.; Bhowmick S. Permanence andcommunity structure in complex networks. ACMTransactions on Knowledge Discovery from Data 11,2 (November 2016), Article No. 14. Chen C.; Zhu X.; Shen P.; Hu J.; Guo S.; Tari Z.;Zomaya A. An efficient privacy­preserving rankedkeyword search method. IEEE Transactions onParallel and Distributed Systems 27, 4 (April 2016),951­963. Chung C.; Dew K.; Cole A.; Zia J.; Fogarty J.; KientzJ.; Munson S. Boundary negotiating artifacts inpersonal informatics: patient­provider collaborationwith patient­generated data. In Proceedings of the19th ACM Conference on Computer­SupportedCooperative Work & Social Computing (CSCW 2016),ACM, 2016, 770­786. Costa J.; Adams A.; Jung M.; Guimbretière F.;Choudhury T. EmotionCheck: leveraging bodilysignals and false feedback to regulate our emotions.In Proceedings of the 2016 ACM International JointConference on Pervasive and Ubiquitous Computing(UbiComp 2016), ACM, 2016, 758­769. Dementyev A.; Kao H.; Choi I.; Ajilo D.; Xu M.;Paradiso J.; Schmandt C.; Follmer S. Rovables:miniature on­body robots as mobile wearables. InProceedings of the 29th Annual Symposium on UserInterface Software and Technology (UIST 2016),ACM, 2016, 111­120. Dignös A.; Böhlen M.; Gamper J.; Jensen C.Extending the kernel of a relational DBMS withcomprehensive support for sequenced temporalqueries. ACM Transactions on Database Systems 41,4 (November 2016), Article No. 26. Dombrowski L.; Harmon E.; Fox S. Social justice­oriented interaction design: outlining key designstrategies and commitments. In Proceedings of the2016 ACM Conference on Designing InteractiveSystems (DIS 2016), ACM, 2016, 656­671. ElSayed N.; Thomas B.; Marriott K.;Piantadosi J.; Smith R. Situated analytics.Journal of Visual Languages andComputing 36 (October 2016), 13­23. Gotz D.; Sun S.; Cao N. Adaptivecontextualization: combating bias during high­dimensional visualization and data selection. InProceedings of the 21st International Conference onIntelligent User Interfaces (IUI 2016), ACM, 2016,85­95.

Systems (ICEIS 2016), SCITEPRESS, 2016, 357­367. Hamari, J.; Sjöklint, M.; and Ukkonen, A. The sharingeconomy: why people participate in collaborativeconsumption. Journal of the Association forInformation Science and Technology 67, 9 (Sept.2016), 2047­2059. Hasan S.; King Z.; Hafiz M.; Sayagh M.; Adams B.;Hindle A. Energy profiles of Java collections classes.In Proceedings of the 38th International Conferenceon Software Engineering (ICSE 2016), ACM, 2016,225­236. Immonen A.; Ovaska E.; Kalaoja J.; Pakkala D. Aservice requirements engineering method for a digitalservice ecosystem. Service Oriented Computing andApplications 10, 2 (June 2016), 151­172.

Lucassen G.; Dalpiaz F.; Van Der Werf J.;Brinkkemper S. Improving agilerequirements: the Quality User Storyframework and tool. RequirementsEngineering 21, 3 (September 2016), 383­403.

Marques, D.; Muslukhov, I.; Guerreiro, T.; Beznosov,K.; and Carriço, L. Snooping on mobile phones:prevalence and trends. In Proc. of the 12thSymposium on Usable Privacy and Security (SOUPS2016), USENIX, 2016, 159­174. Mouakket, S.; and Bettayeb, A. Factors affectinguniversity instructors' continuance intention to uselearning management systems: the Blackboardsystem case. In Proc. of the 18th InternationalConference on Enterprise Information Systems(ICEIS 2016), SCITEPRESS, 2016, 215­222. O’Neil C. Weapons of math destruction: how big

data increases inequality and threatens democracy.Crown Publishing Group. Review1 Review2 Rello L.; Baeza­Yates R. The effect of font type onscreen readability by people with dyslexia. ACMTransactions on Accessible Computing 8, 4 (March2016), Article No. 15. Shay R.; Komanduri S.; Durity A.; Huh P.; MazurekM.; Segreti S.; Ur B.; Bauer L.; Christin N.; Cranor L.Designing password policies for strength andusability. ACM Transactions on Information andSystem Security 18, 4 (April 2016), Article No. 13. Such J.; Rovatsos M. Privacy policy negotiation insocial media. ACM Transactions on Autonomous andAdaptive Systems 11, 1 (February 2016), Article No.4. Wójtowicz A.; Joachimiak K. Model for adaptablecontext­based biometric authentication for mobiledevices. Personal and Ubiquitous Computing 20, 2(April 2016), 195­207.

Page 11: Notable Books and Articles in Computing of 2016gotz.web.unc.edu/files/2017/08/Computing-Reviews... · methods for indoor localization under collinear ambiguity. Pervasive and Mobile

Select Language Powered by Translate

Reproduction in whole or in part without permission is prohibited. Copyright © 2000­2017 ThinkLoud, Inc. Terms of Use | Privacy Policy