Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
January 31, 2023
Search
Highlight

Phishing and communication channels: a guide to identifying and mitigating phishing attacks
It is not far-fetched to say that most (if not all) CR readers have been subjected to some sort of phishing attack--and even more likely if we consider the wide taxonomy of activities that Sonowal’s book covers. Can we as individuals identify them before falling prey? Can we as... more
Quote
When we are all finished, and we have a mathematical theory by which we can compute consequences, what can we do? It really is an amazing thing. In order to figure out... more
- Richard Feynman (1965)
Articles
One-hop out-of-band control planes for multi-hop wireless sensor networks: ACM Transactions on Sensor Networks

Wireless sensor networks (WSNs) have expanded in the last decade. Sensors are deployed in an environment to control the data generated within that area, without any wiring. Data is sensed by the deployed devices... more

General (C.0) | Jan 26 23

On the model of computation: counterpoint: parallel programming wall and multicore software spiral: denial hence crisis: Communications of the ACM

Vishkin’s counterpoint to Dally [1] talks about what the model of computation should now be in light of multicore processors (and their programming difficulties) and parallel processing... more

General (D.1.0) | Jan 24 23

On the model of computation: point: we must extend our model of computation to account for cost and location: Communications of the ACM

The model of any process demonstrates its functionality and is useful for its study and analysis. For example, the Turing machine is a model for computation. However, the random-access machine (RAM) model is... more

General (D.1.0) | Jan 23 23

Block Walsh-Hadamard transform based binary layers in deep neural networks: ACM Transactions on Embedded Computing Systems

Convolution is a mathematical operation that calculates the integral of the product of two functions or signals with one of the signals flipped. Modern deep... more

General (G.0) | Jan 17 23

RxNet: Rx-refill graph neural network for overprescribing detection: CIKM 21

The intensifying rates of opioid overuse and drug misuse require effective drug prescription scrutinizing tools. Despite the available prescription drug monitoring programs (PDMPs) in countries like the US, how should... more

Health (J.3...) | Jan 6 23

A framework for understanding sources of harm throughout the machine learning life cycle: EAAMO 21

The most recent studies show how machine learning has increasingly started to affect people and society in a positive way, pointing out the main advantages and disadvantages for different areas of activities... more

Artificial Intelligence (I.2) | Jan 5 23

Declarative machine learning systems: Communications of the ACM

This article presents future directions for how machine learning (ML) can be easily adopted across applications to take advantage of artificial intelligence (AI). In the past two decades, ML has been improving at a... more

Learning (I.2.6) | Jan 3 23

Edge intelligence: concepts, architectures, applications and future directions: ACM Transactions on Embedded Computing Systems

Nowadays, cyber-physical systems are omnipresent. Internet of Things (IoT) devices give physical sensing to computers. However, they also pose serious architectural challenges due to a number of... more

General (I.2.0) | Dec 28 22

Deep learning based single sample face recognition: a survey: Artificial Intelligence Review

Deep learning (DL) methods, and in particular convolutional neural networks (CNNs), provide the most used and most effective face recognition systems. However, when “each... more

General (I.0) | Dec 27 22

Rule-based machine learning classification and knowledge discovery for complex problems: ACM SIGEVOlution

The intricate spiraling problems in areas such as aeronautics, bioinformatics, and meteorology require innovative algorithms for intellectual discovery from unique data types and sources. How should... more

Learning (I.2.6) | Dec 8 22

Books
A quantum computation workbook

Quantum computing is a complex and highly interdisciplinary field that assumes deep knowledge of particle physics, quantum mechanics theory, mathematics, and information theory, to name the most important disciplines outside the also essential fields of... more
Models of Computation (F.1.1) | Jan 30 23

The story of proof: logic and the history of mathematics

The present book is aimed at a general mathematical audience. My third Stillwell book, it follows Elements of mathematics and Reverse mathematics [1,2] and maintains these predecessors’ high standards in content, sequence, and clarity of expression... more
History of Computing (K.2) | Jan 18 23

Computational intelligence techniquess for combating Covid-19

This book looks at the application of computing techniques, especially intelligence techniques. Machine learning (ML) techniques have been developed for many decades now and the practical applications of ML have significantly increased over time. The Covid-19 virus has... more
Medical Information Systems (J.3...) | Jan 16 23

Phishing and communication channels: a guide to identifying and mitigating phishing attacks

It is not far-fetched to say that most (if not all) CR readers have been subjected to some sort of phishing attack--and even more likely if we consider the wide taxonomy of activities that Sonowal’s book covers. Can we as individuals identify them before falling... more
Security & Protection (K.6.5) | Jan 12 23

Learn enough developer tools to be dangerous: command line, text editor, and Git version control essentials

The command-line interface (CLI) scares many newcomers to the computing field. It is, however, a most powerful way to interact with the computer, allowing the user a command composition... more
Software Development (K.6.3...) | Jan 10 23

Human-centered AI

Human-centered AI is a must-read for anyone in charge of designing a software system involving a significant artificial intelligence (AI) component. However, this book is not about how to implement an AI technique to solve a problem. It is about the issues around... more
General (I.2.0) | Jan 9 23

Foundations of computational imaging: a model-based approach

This attractively titled book deals with the process of creating images using raw noisy data from unknown sources such as a black hole, for example. This book arose out of the notes used for a graduate-level course on this topic for over two decades. Using the standard Bayesian... more
General (I.4.0) | Dec 30 22

Artificial intelligence and quantum computing for advanced wireless networks

Artificial intelligence (AI) and quantum computing are widely discussed topics in the computing field. So it is no surprise that this book is about AI and quantum computing for advanced wireless networks. The book is divided into two parts: one on AI and the other... more
General (I.2.0) | Dec 29 22

The language of SQL

Structured query language (SQL) allows programmers to interact with a data repository through a relational database management system (RDBMS). The language of SQL is divided into 20 easy chapters. It also includes three appendices about installing and running... more
General (D.3.0) | Dec 23 22

Unity virtual reality development with VRTK4

This book provides practical knowledge and step-by-step instructions on how to use Unity and VRTK version 4 to develop virtual reality (VR) experiences. By the end of the book, readers will be able to “create advanced VR mechanics that can be used within any VR... more
Games (K.8...) | Dec 22 22


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2023 ThinkLoud®
Terms of Use
| Privacy Policy