Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
June 12, 2025
Search
Highlight

Fundamentals of data science: theory and practice
Fundamentals of data science: theory and practice is an overview of the broad landscape and principles used to extract meaning from large amounts of data. It primarily focuses on machine learning, data mining, and predictive modeling. After an articulate introduction (chapter 1), exposition begins with a short treatise on the... more
Quote
I wish to disclaim in advance any assertion that any particular entity in psychopathology is due to a specific type of defect in the organization of the brain as a computing machine... more
- Norbert Wiener (1948)
Articles
Exploiting cross-layer vulnerabilities: off-path attacks on the TCP/IP protocol suite: Communications of the ACM

The transmission control protocol/Internet protocol (TCP/IP) suite has been the backbone of the Internet since the 1970s. This suite of protocols operates in five distinct layers; however, the Internet control... more

TCP/IP (C.2.2...) | Jun 11 25

How games can support misinformation education: a sociocultural perspective: JASIST

Is false information intentionally or accidentally spread? How should the distribution of false information be minimized? Perhaps civilized societies should become more cognizant... more

Education (J.1...) | May 23 25

The rise of the AI co-pilot: lessons for design from aviation and beyond: Communications of the ACM

Sellen and Horvitz look at how artificial intelligence (AI) functions similarly to an aircraft co-pilot by enhancing human operations while maintaining human control authority. The authors support human-centered design through insights from human–computer... more

Aerospace (J.2...) | May 21 25

Security risks in the encryption of database connection strings: Software—Practice & Experience

This paper talks about a subtle but significant weakness in the way encrypted database connection strings can continue to leak structure, particularly with symmetric ciphers such as the... more

Security & Protection (D.4.6) | May 19 25

The role of online search platforms in scientific diffusion: JASIST

Drivas’s paper explores the influence of online search platforms like Google Scholar on the dissemination and application of scientific knowledge. The paper tackles a relevant and timely issue regarding the impact of digital tools on scientific research. The author contends... more

General (K.3.0) | May 14 25

Online reading lists: a mixed-method analysis of the academic perspective: International Journal on Digital Libraries

You can’t judge a book by its cover. This review begins with a question and ends with a challenge about the future of reading lists in higher education. Reading lists in this context are curated collections of recommended reading and resources, compiled by academics... more

Education (J.1...) | May 8 25

AceCoder: an effective prompting technique specialized in code generation: ACM Transactions on Software Engineering and Methodology

In the fast-evolving world of large language models (LLMs), code generation has been a particularly interesting application. However, despite their general success, LLMs often fail when prompts are not tailored to the task--particularly in programming, where... more

General (D.2.0) | May 7 25

Variational inference based adversarial domain adaptation: Pattern Analysis & Applications

This paper is based on Tzeng et al.’s work, which introduced adversarial discriminative domain adaptation (ADDA) eight years ago [1]. To adapt a model to a new domain, the ADDA paper proposed a method that combines adversarial learning with... more

Learning (I.2.6) | May 6 25

Towards understanding and mitigating the hallucinations in NLP and speech: CODS-COMAD ’24

Mittal et al.’s comprehensive tutorial explores the problem of hallucinations in neural language generation, focusing on both natural language processing and speech recognition systems. It provides a structured overview of hallucination types, their underlying... more

Speech Recognition & Synthesis (I.2.7...) | May 5 25

Model-based deep learning: Foundations and Trends in Signal Processing

Deep learning has revolutionized fields such as computer vision and natural language processing (NLP), but its application in signal processing remains challenging due to the complexity and interpretability of deep models. Traditional... more

General (I.2.0) | May 1 25

Books
Architecting data and machine learning platforms: enable analytics and AI-driven innovation in the cloud

In the rapidly changing realm of technology, data has become a pivotal asset, driving advancements and strategic decision-making in various sectors. Architecting data and machine learning platforms presents a thorough... more
Business (J.1...) | Jun 10 25

The early-career professional’s guide to generative AI: opportunities and challenges for an AI-enabled workforce

This book is a simple and clear guide for people who are new to the workforce and want to understand generative artificial intelligence (GenAI), for example, ChatGPT. The author does not clearly state one main goal at the beginning, but it is easy to see that he wants to... more
Project & People Management (K.6.1) | Jun 9 25

Machine learning for engineers: using data to solve problems for physical systems

It is rare to find a machine learning book that balances fundamentals with practical relevance, especially for those working with physical systems. What stands out most in this book is the smart and approachable way it explains RL, a topic often seen as abstract or... more
Physical Sciences & Engineering (J.2) | Jun 6 25

The business of hacking: creating, developing, and maintaining an effective penetration testing team

The business of hacking is for anyone “interested in creating a penetration testing team or business.” It is especially valuable for those currently running such a business or working for one. Readers will learn how to create, develop, and maintain an effective... more
Security & Protection (K.6.5) | Jun 5 25

Linear algebra in data science

Zizler and La Haye’s comprehensive resource bridges foundational mathematics with practical applications in the field of data science. The authors offer a structured approach to understanding the essential role that linear algebra plays in data processing, machine... more
Data (E) | Jun 4 25

Fundamentals of data science: theory and practice

Data science has been a hot topic for a decade or so now, reincarnating from the equally popular term “data mining.” With the massive growth in deep learning (DL)-related technologies, the interest has picked up much more, with an expanded list of tasks driven by... more
General (J.0) | Jun 3 25

The sensory accommodation framework for technology: bridging sensory processing to social cognition

This is a small book with a “big hairy audacious goal (BHAG),” as one of my bosses used to say. The goal: use technology to improve the quality of life for the whole person. In this case, someone experiencing autism. The book is another volume in the... more
Frameworks (D.3.3...) | Jun 2 25

AI for designers

AI for designers is a concise and timely book that bridges the gap between artificial intelligence (AI) technologies and the design community. It offers an accessible introduction to the applications of AI in design processes, making it a valuable resource for... more
General (I.2.0) | May 30 25

Counterterrorism and cybersecurity: total information awareness (3rd ed.)

In an age when national security battles are increasingly fought across digital landscapes, Newton Lee’s Counterterrorism and cybersecurity: total information awareness is a timely and authoritative contribution. Now in its third edition, the book serves as a... more
General (K.0) | May 29 25

Fundamentals of data science: theory and practice

Fundamentals of data science is an overview of the broad landscape and principles used to extract meaning from large amounts of data. It primarily focuses on machine learning, data mining, and predictive modeling. After an articulate introduction (chapter 1), exposition begins with a short treatise on the nature of... more
General (J.0) | May 28 25


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2025 ThinkLoud®
Terms of Use
| Privacy Policy