|

 Local load migration in high-capacity fog computing: :
ACM Transactions on Internet Technology
This paper introduces a novel approach to processing data-intensive and delay-sensitive requests. It utilizes a heterogeneous fleet of fog nodes where super fog (SF) nodes (high computational resources local to terminal) are always active and handle incoming requests...
Network Architecture And Design (C.2.1)
| Jul 2 25

Image recognition tools for blind and visually impaired users: an emphasis on the design considerations: :
ACM Transactions on Accessible Computing
Digital images are essential to communication, but pose accessibility challenges to people with visual impairments (VIPs). Image recognition (IR) technology bridges the divide by converting visuals into...
Assistive Technologies For Persons With Disabilities (K.4.2...)
| Jul 3 25

UR-YOLO: an urban road small object detection algorithm: :
Pattern Analysis & Applications
Detecting small objects such as pedestrians, bicycles, or traffic cones is a major challenge for autonomous driving systems. These objects often appear partially hidden, small, or in low-visibility...
Image Processing And Computer Vision (I.4)
| Jul 7 25

Security and privacy challenges of large language models: a survey: :
ACM Computing Surveys
Text generation systems based on large language models (LLMs) have a mixed reputation--many question the reliability of their advice and their discretion in protecting sensitive sources. When there are active attacks against an LLM, matters get worse. The...
Language Models (I.2.7...)
| Jul 9 25

|
|

Just enough data science and machine learning: essential tools and techniques:

As the title implies, the book provides very good coverage of essential data science and machine learning methods. The language of the book is very clear, giving readers an intuitive understanding of the concepts without the burden of heavy technical details...
Learning (I.2.6)
| Jul 1 25

The foundations of computability theory (2nd ed.):

After my review of the first edition (referred to as 1e going forward) was published [1], the author contacted me by email to request the full list (reduced in the final review) of issues I had compiled for CR. He was already seriously involved in producing this second edition (called 2e here) and poised to correct whatever...
Theory (K.2...)
| Jul 2 25

Modulated apertures and resolution in microscopy:

Modulated apertures and resolution in microscopy is a concise yet impactful exploration of the critical relationship between aperture modulation techniques and resolution enhancement in optical microscopy. Spanning 100 pages, the book is designed as a specialized...
Biology And Genetics (J.3...)
| Jul 4 25

LLM engineer’s handbook: master the art of engineering large language models from concept to production:

LLM engineer’s handbook is suitable for a wide range of information technology (IT) professionals and people interested in the practical applications of large language models (LLMs). It is useful for software engineers to build artificial intelligence (AI) projects. This...
Language Models (I.2.7...)
| Jul 8 25

More than a chatbot: language models demystified:

More than a chatbot is a basic text on artificial intelligence (AI) and especially generative AI, written for the general public. It could be useful for students outside of computer science, as well as for researchers who want learn how to use AI in their work. The book is concise and well structured, and the language is...
Language Models (I.2.7...)
| Jul 10 25

Phenotropic interaction: improving interfaces with computing with words and perceptions:

Colombo’s Phenotropic interaction is a groundbreaking exploration of how computational models rooted in human perception and natural language can enhance human-computer interfaces. The book delves into the concept of phenotropic interaction, a novel...
Interfaces (B.4.3...)
| Jul 11 25

Cryptography: a very short introduction (2nd ed.):

Cryptography: a very short introduction is, true to its name, an accessible primer of refreshing brevity for a centuries-old subject that lately has become of general interest. In just over 100 pages and nine chapters, plus a short appendix, the authors endeavor to explain to a...
Cryptographic Controls (D.4.6...)
| Jul 11 25

Quantum computer music: foundations, methods and advanced concepts:

It is held that those who forget history are condemned to repeat it. When it comes to quantum computing, I would like to recast this saying: those who forget (computer) history are surprisingly shocked to rediscover it. True enough, when computers...
Music (J.5...)
| Jul 14 25

Maths for computing: a beginner''s guide:

Charatan and Kans’s Maths for computing offers a structured, approachable introduction to the mathematical ideas most relevant to computing. What sets this book apart is its accessible tone--a choice that makes it particularly effective for readers lacking a deep mathematical background.
The journey begins...
Mathematics Of Computing (G)
| Jul 15 25

Enterprise cyber risk management as a value creator: leverage cybersecurity for competitive advantage:

Bob Chaput’s Enterprise cyber risk management as a value creator offers a groundbreaking perspective on cybersecurity, elevating it from a traditional defensive posture to a strategic enabler of business growth and...
General (K.6.0)
| Jul 16 25

|
|