Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Conferences Tutorials
 
VLSI Routing Arrays Validation Optimization Verification
 
Neural nets RISC/CISC,VLIW architectures Distributed architectures Portable devices Servers Network architecture Distributed systems
 
Networks Security Embedded systems Object-oriented Java OO design State diagrams Software evolution UML C# Methodologies Coding Tools Correctness proofs Design
 
Structures Arrays Graphs Stacks Hash-tables Encryption Compression Objects Standards
 
Automata Parallelism Transforms Geometric Algorithms Patterns Invariants
 
Numerical Linear Algebra PDEs Finite element methods Combinatorics Graph Theory Probability and statistics Mathematical software
 
Human factors Data models Systems Information interfaces User interfaces Ergonomics Evaluation/methodology Interaction styles Warehouses Data mining Web Digital libraries
 
AI Expert systems Knowledge representation Learning Robotics Vision Geometry and modeling Graphics and realism Scene analysis Simulation theory Document preparation Learning Discrete event simulation Deduction Robotics Video analysis XML
 
Business Engineering Biosciences Humanities Arts Linguistics CAD Publishing
 
Privacy Regulation Systems design Security Crime Patents Strategic planning
 
Design Human factors Languages Performance Theory
 
 
Reviews limited to
Date Reviewed
 
 
"Why should I trust you?": Explaining the predictions of any classifier
Ribeiro M., Singh S., Guestrin C.  KDD 2016 (Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA,  Aug 13-17, 2016) 1135-1144, 2016. Type: Proceedings
May 29 2020
 
 
A simulation modelling process based on expert modelers’ practices
Ahmed R.  SummerSim 2017 (Proceedings of the Summer Simulation Multi-Conference, Bellevue, Washington,  Jul 9-12, 2017) 1-8, 2017. Type: Proceedings
May 28 2020
 
 
Security and privacy on blockchain
Zhang R., Xue R., Liu L.  ACM Computing Surveys 52(3): 1-34, 2019. Type: Article
May 27 2020
 
 
Pro Azure governance and security: a comprehensive guide to Azure Policy, Blueprints, Security Center, and Sentinel
Tender P., Rendon D., Erskine S.,  Apress, New York, NY, 2019. 340 pp. Type: Book (978-1-484249-09-3)
May 26 2020
 
 
Applied reinforcement learning with Python: with OpenAI Gym, Tensorflow, and Keras
Beysolow I.,  Apress, New York, NY, 2019. 184 pp. Type: Book (978-1-484251-26-3)
May 22 2020
 
  more..    
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2020 ThinkLoud, Inc.
Terms of Use
| Privacy Policy