 |
|
 |
 |
  |
 |
 |

 |
More than a chatbot: language models demystified More than a chatbot is a basic text on artificial intelligence (AI) and especially generative AI, written for the general public. It could be useful for students outside of computer science, as well as for researchers who want learn how to use AI in their work. The book is concise and well structured, and the language is light and clear. The... more
|
|
 |
|
 |
 |
 |
 |
 |
The operations of logic (syllogisms, conjunctions, disjunctions, negations, etc., that is, in the terminology that is customary for automata, various forms of gating, coincidence... more |
 |
- John von Neumann (1951) |
|
 |
|
 |
 |
 |
 |
 |
 |
Security and privacy challenges of large language models: a survey: ACM Computing Surveys

Text generation systems based on large language models (LLMs) have a mixed reputation--many question the reliability of their advice and their discretion in protecting sensitive sources. When there are active attacks against an LLM, matters get worse. The... more
Language Models (I.2.7...) | Jul 9 25

UR-YOLO: an urban road small object detection algorithm: Pattern Analysis & Applications

Detecting small objects such as pedestrians, bicycles, or traffic cones is a major challenge for autonomous driving systems. These objects often appear partially hidden, small, or in low-visibility... more
Image Processing & Computer Vision (I.4) | Jul 7 25

Image recognition tools for blind and visually impaired users: an emphasis on the design considerations: ACM Transactions on Accessible Computing

Digital images are essential to communication, but pose accessibility challenges to people with visual impairments (VIPs). Image recognition (IR) technology bridges the divide by converting visuals into... more
Assistive Technologies (K.4.2...) | Jul 3 25

Local load migration in high-capacity fog computing: ACM Transactions on Internet Technology

This paper introduces a novel approach to processing data-intensive and delay-sensitive requests. It utilizes a heterogeneous fleet of fog nodes where super fog (SF) nodes (high computational resources local to terminal) are always active and handle incoming requests... more
Network Architecture & Design (C.2.1) | Jul 2 25

Gaze analysis: a survey on its applications: Image and Vision Computing

Thanks to recent developments, gaze analysis and eye-tracking applications are now highly accurate and effective in many practical uses. This survey paper presents a comprehensive summary of work... more
Human Factors (H.1.2...) | Jun 30 25

One schema to rule them all: how Schema.org models the world of search: JASIST

The evolution of search engines has made structured data essential for effective information organization and retrieval. Schema.org emerged as a joint project of Google, Microsoft... more
Data Models (H.2.1...) | Jun 26 25

Understanding misunderstandings: evaluating LLMs on networking questions: SIGCOMM CCR

Large language models (LLMs) have awed the world, emerging as the fastest-growing
application of all time--ChatGPT reached 100 million active users in January
2023, just two months after its launch. After an initial cycle, they have gradually been mostly accepted... more
Language Models (I.2.7...) | Jun 20 25

Are disruptive papers more likely to impact technology and society?: JASIST

The significance of science, technology, engineering, and mathematics (STEM)-related research on society is an interesting subject of debate. To what extent are the published research results from STEM areas truly impacting the advancements of technology and... more
General (K.3.0) | Jun 17 25

Image recognition tools for blind and visually impaired users: an emphasis on the design considerations: ACM Transactions on Accessible Computing

This paper offers a timely and comprehensive overview of assistive image recognition technologies (IRTs), focusing on the inclusion of blind or low vision (BLV) users. It contextualizes the topic within broader digital inclusion goals, referencing United Nations SDGs... more
Assistive Technologies (K.4.2...) | Jun 16 25

Exploiting cross-layer vulnerabilities: off-path attacks on the TCP/IP protocol suite: Communications of the ACM

The transmission control protocol/Internet protocol (TCP/IP) suite has been the backbone of the Internet since the 1970s. This suite of protocols operates in five distinct layers; however, the Internet control message protocol... more
TCP/IP (C.2.2...) | Jun 11 25

|
 |
|
 |
 |
 |
 |
 |
 |
Enterprise cyber risk management as a value creator: leverage cybersecurity for competitive advantage

Bob Chaput’s Enterprise cyber risk management as a value creator offers a groundbreaking perspective on cybersecurity, elevating it from a traditional defensive posture to a strategic enabler of business growth and... more
General (K.6.0) | Jul 16 25

Maths for computing: a beginner's guide

Charatan and Kans’s Maths for computing offers a structured, approachable introduction to the mathematical ideas most relevant to computing. What sets this book apart is its accessible tone--a choice that makes it particularly effective for readers lacking a deep mathematical background.
The journey begins... more
Mathematics of Computing (G) | Jul 15 25

Quantum computer music: foundations, methods and advanced concepts

It is held that those who forget history are condemned to repeat it. When it comes to quantum computing, I would like to recast this saying: those who forget (computer) history are surprisingly shocked to rediscover it. True enough, when computers... more
Music (J.5...) | Jul 14 25

Cryptography: a very short introduction

Cryptography: a very short introduction is, true to its name, an accessible primer of refreshing brevity for a centuries-old subject that lately has become of general interest. In just over 100 pages and nine chapters, plus a short appendix, the authors endeavor to explain to a... more
Cryptographic Controls (D.4.6...) | Jul 11 25

Phenotropic interaction: improving interfaces with computing with words and perceptions

Colombo’s Phenotropic interaction is a groundbreaking exploration of how computational models rooted in human perception and natural language can enhance human-computer interfaces. The book delves into the concept of phenotropic interaction, a novel... more
Interfaces (B.4.3...) | Jul 11 25

More than a chatbot: language models demystified

More than a chatbot is a basic text on artificial intelligence (AI) and especially generative AI, written for the general public. It could be useful for students outside of computer science, as well as for researchers who want learn how to use AI in their work. The book is concise and well structured, and the language is... more
Language Models (I.2.7...) | Jul 10 25

LLM engineer’s handbook: master the art of engineering large language models from concept to production

LLM engineer’s handbook is suitable for a wide range of information technology (IT) professionals and people interested in the practical applications of large language models (LLMs). It is useful for software engineers to build artificial intelligence (AI) projects. This... more
Language Models (I.2.7...) | Jul 8 25

Modulated apertures and resolution in microscopy

Modulated apertures and resolution in microscopy is a concise yet impactful exploration of the critical relationship between aperture modulation techniques and resolution enhancement in optical microscopy. Spanning 100 pages, the book is designed as a specialized... more
Biology & Genetics (J.3...) | Jul 4 25

The foundations of computability theory (2nd ed.)

After my review of the first edition (referred to as 1e going forward) was published [1], the author contacted me by email to request the full list (reduced in the final review) of issues I had compiled for CR. He was already seriously involved in producing this second edition (called 2e here) and poised to correct whatever... more
Theory (K.2...) | Jul 2 25

Just enough data science and machine learning: essential tools and techniques

As the title implies, the book provides very good coverage of essential data science and machine learning methods. The language of the book is very clear, giving readers an intuitive understanding of the concepts without the burden of heavy technical details... more
Learning (I.2.6) | Jul 1 25

|
 |
|
|
|
 |