







A survey of methods for explaining black box models Computerized decision support systems have significant social consequences, and yet they are capable of mistakes or bias. Can an autonomous driving system be trusted, for example, when its visual scene recognition was implemented as a neural network trained on a dataset of traffic images? What about a college application... more









In a few years, after the CD ROM becomes commonplace, anyone looking back at the information, education, or entertainment applications of today will understand the limited... more 

 William H. Gates (1986) 









A framework for a forensically sound harvesting the dark web: CECC 18
Popov et al. go inside the dark web ecosystem to find more practical and more effective ways of making digital evidence within the invisible Internet infrastructure. Most people who have heard the term “dark... more
Security & Protection (K.6.5)  Feb 21 19
An automatic proving approach to parameterized verification: ACM Transactions on Computational Logic
Network and security protocols occasionally require important but difficult to authenticate parameters such as the number in a communication party. The existing formal proofs of algorithms for verifying the... more
Security & Protection (C.2.0...)  Feb 20 19
Grasshopper optimization algorithm for multiobjective optimization problems: Applied Intelligence
Describing the grasshopper optimization algorithm to solve multiobjective optimization problems, the key idea in this paper is to simulate the swarm behavior of grasshoppers to... more
Optimization (E.5...)  Feb 15 19
Circuit complexity, proof complexity, and polynomial identity testing: Journal of the ACM
Cook and Reckhow [1] proved that NP ≠ coNP if and only if in every propositional proof system there is a tautology whose proof size has a superpolynomial lower bound (in terms of the size of the proved formula). Currently, it is not known whether even very... more
Complexity of Proof Procedures (F.2.2...)  Feb 13 19
Improving integrated development environment commands knowledge with recommender systems: ICSESEET 18
Integrated development environments (IDEs) are an essential part of software developers’ toolkits, enabling them to efficiently author, manage, and test their development projects. As a developer’s... more
General (D.2.0)  Feb 11 19
Crossdependency inference in multilayered networks: ACM Transactions on Knowledge Discovery from Data
Current and emerging networks have a duty to promote interconnections for new collaborative research and business between academia and industry. Multilayered networks require... more
Database Applications (H.2.8)  Feb 11 19
Game description language and dynamic epistemic logic compared: IJCAI 18
Efficient modeling and reasoning are critical to pushing the frontiers in knowledgebased, dynamic multiagent systems. The authors note that while several languages have been proposed to carry out this goal, these languages are limited to specific application... more
Games (I.2.1...)  Feb 7 19
Relational data factorization: Machine Learning
General methods take advantage of developing frameworks for data mining and machine learning that can be specialized for efficiency according to the problem domain. This paper discusses a declarative modeling method as a... more
Relational Databases (H.2.4...)  Feb 7 19
A survey of virtual sample generation technology for face recognition: Artificial Intelligence Review
Just as the authors state that “virtual sample generation technology belongs to the category of machine learning,” nobody ever has enough real data to train a face recognition model, and they need... more
Sampling (I.4.1...)  Feb 7 19
A generalized digraph model for expressing dependencies: RTNS 18
The authors characterize this paper as a work in progress in computer assisted verification (CAV) of taskscheduling models. Directed graph (digraph) models are expressive; however, as the authors point out... more
Correctness Proofs (D.2.4...)  Feb 7 19









What can be computed?
What should be in a first course on the theory of computation? For 50 years, there has only been one answer: formal grammars and their corresponding automata. Hopcroft and Ullman’s book has been the standard [1], but there are dozens if not hundreds of other texts that... more
General (F.0)  Feb 21 19
An open door to number theory
In 1993, my daughter showed me the New York Times article that announced Andrew Wiles’s 100pluspage proof (to be successfully corrected two years later) of Fermat’s last theorem (FLT) [1]. Wiles’s “20thcentury” proof comprised excursions into algebraic... more
General (G.0)  Feb 19 19
Technology and the intelligence community: challenges and advances for the 21st century
If you have no background in the US intelligence community and your interests include the history, ethics, and organizational dynamics of intelligence agencies, you will find this book interesting. Technical intelligence began as a supplement to human intelligence... more
General (K.4.0)  Feb 19 19
Introduction to compiler design (2nd ed.)
Compiler design seems to be a rather narrow topic, which should interest only computer science undergraduate or graduate students in the framework of a mandatory course. After all, how many people will have in their... more
Compilers (D.3.4...)  Feb 15 19
Neighborhood semantics for modal logic
Reading and writing a review of this wonderful book has been a pleasure. Knowing the basics of propositional modal logic may explain why I enjoyed reading it. The author has gathered and surveyed many papers in writing this book. This is a mustread for those... more
Modal Logic (F.4.1...)  Feb 14 19
Advance compression and watermarking technique for speech signals
In a time of increased interest in security assurance, all topics related to watermarking are important. While the book’s focus is securing speech, a technologically related problem of compression is also covered. While we are mostly used to image watermarking, security... more
Data Compaction & Compression (E.4...)  Feb 14 19
Distributed computing pearls
In computer science, the term “synchronization” can relate to coordination between processors or to contention. So I was expecting to find some program examples using the open message passing interface (OpenMPI) or a discussion of distributed... more
Distributed Systems (C.2.4)  Feb 13 19
REBUTTAL: Random numbers and computers
There is an error in the review.
The reviewer states:
“Also missing: the decimal expansions of irrational numbers (which are nonterminating and nonrepeating) do not have a cycle from which they can be proposed as random number generators provided we can... more
Random Number Generation (G.3...)  Feb 13 19
REREBUTTAL: Random numbers and computers
There is no error in the review. The error lies in the way the author has interpreted it. It is not the randomness of pi that is missing from the book, but why it is important, as explicitly stated in my review. The following remark, found in Section 7.1, is grossly... more
Random Number Generation (G.3...)  Feb 13 19
Mobile payment systems
These days, if you go shopping in any of China’s major cities, one thing that you will probably not see is people making purchases using cash, or for that matter credit cards. Whether buying a TV, a burger, or groceries, the majority of retail transactions in China are now... more
Financial (J.1...)  Feb 12 19





