Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
June 6, 2023

Beyond data: reclaiming human rights at the dawn of the metaverse
This book is a short, focused essay on data security and privacy. The author makes it clear that these are two separate matters that are often in conflict both in practice and in law. Each of the book’s three major sections emphasizes a different stage in the evolution of the... more
Last year, several firms came up with a solution [to the problem of software piracy]. It is called a WORM. A worm is a command which is built deep into the... more
- Gary North (1985)
Software assistants in software engineering: a systematic mapping study: Software—Practice & Experience

The authors note the considerable research and engineering efforts to create numerous software assistants (SAs) that have higher autonomy and intelligence for various stages and aspects... more

General (D.2.0) | May 24 23

Lane compression: a lightweight lossless compression method for machine learning on embedded systems: ACM Transactions on Embedded Computing Systems

Yonsun Ko’s paper presents an innovative approach to compressing machine learning models for use on embedded systems. The paper proposes... more

Embedded Systems (D.4.7...) | May 17 23

H-Container: enabling heterogeneous-ISA container migration in edge computing: ACM Transactions on Computer Systems

Xing et al. describe a novel approach to dealing with the difficulties posed by container migration in edge computing settings with heterogeneous instruction set architectures (ISAs). By putting forth a... more

Distributed Systems (C.2.4) | May 10 23

HPC forecast : cloudy and uncertain: Communications of the ACM

This article points to possible directions for high-performance computing (HPC) ecosystem development and the related big challenges for the scientific community and the future of advanced scientific... more

Computers in Other Systems (J.7) | May 8 23

A fast approximate EM algorithm for joint models of survival and multivariate longitudinal data: Computational Statistics & Data Analysis

Many longitudinal clinical studies involve the repeated periodic measurement of continuous responses over a period to detect any changes that might occur in the condition of the... more

Algorithms (I.5.3...) | May 4 23

A survey of inverse reinforcement learning: Artificial Intelligence Review

The process of discovering and incorporating knowledge from educators into machine learning (ML) poses major challenges. Beyond coding the known or derived characteristics of systems into ML algorithms... more

Learning (I.2.6) | May 1 23

Identifying informative tweets during a pandemic via a topic-aware neural language model: World Wide Web

Years ago, when Twitter was a new social media tool, I reviewed an article for Computing Reviews that looked at how tweets can be used in emergency situations. This new paper follows along similar lines: Twitter... more

General (K.4.0) | Apr 28 23

AI and neurotechnology: learning from AI ethics to address an expanded ethics landscape: Communications of the ACM

Strategies developed by the artificial intelligence (AI) community for dealing with ethical issues should be useful in dealing with neurotechnology (neurotech). Some ethical issues associated with both AI and neurotechnology... more

Ethics (K.4.1...) | Apr 27 23

Multiple LDPC-encoder layered space-time-frequency architectures for OFDM MIMO multiplexing: Wireless Personal Communications: An International Journal

For many, because of its influence in both everyday life and business, fourth-generation (4G) wireless communication has a distinguished place, where coupling OFDM and MIMO is one of its... more

Wireless Communication (C.2.1...) | Apr 24 23

Potential technologies and applications based on deep learning in the 6G networks: Computers and Electrical Engineering

The sixth generation of cellular networks (6G) still hasn’t reached its peak in terms of hype, and in light of 4G and 5G coordinates and ruling experiences, concerned theorists are working to define 6G’s framework... more

Security & Protection (C.2.0...) | Apr 4 23

Law and artificial intelligence: regulating AI and applying AI in legal practice

Artificial intelligence (AI) has a significant impact on various legal issues, and several books have been written on the subject. These books often explore the intersection between AI and law, discussing topics such as the legal... more
Law (J.1...) | Jun 6 23

Protecting privacy through homomorphic encryption

With the growing use of sensitive personal information, which also corresponds to the term “personally identifiable information (PII)” in information and communications technology (ICT) environments, the requirements for privacy protection are also... more
Data Encryption (E.3) | Jun 2 23

Data analysis for social science: a friendly and practical introduction

Earl Babbie’s classic textbook The practice of social research, which went to its 15th edition in 2021 [1], is a standard reference for social science students and researchers. Its comprehensive review of research methods is still of great value even to modern data analysts in... more
General (E.0) | May 31 23

Big data and public policy: course, content, and outcome

Big data and public policy: course, content, and outcome, by Rebecca Moody and Victor Bekkers, is an excellent book for those who are involved in policy-making processes and looking to learn how big data and public policy are strengthened together. The... more
Public Policy Issues (K.4.1) | May 25 23

Artificial intelligence, machine learning, and optimization tools for smart cities: designing for sustainability

The book’s 11 chapters deal with digital “vitalism” in cities, unbuildable cities, smart cities and identities, services and data representation of information and communication technology (ICT), strategies for... more
Architecture (J.5...) | May 22 23

Applied probability and stochastic processes

Natural phenomena are very complicated, and statistical analysis, which is categorized in the stochastic conceptual framework, is an effective tool to formulate, estimate, and predicate their nature, behaviors, and functionalities. Stochastic processes are useful... more
Stochastic Programming (G.1.6...) | May 16 23

Beyond data: reclaiming human rights at the dawn of the metaverse

This book is a short, focused essay on data security and privacy. The author makes it clear that these are two separate matters that are often in conflict both in practice and in law. Each of the book’s three major sections emphasizes a different stage in the... more
General (K.4.0) | May 11 23

Applied linear analysis for chemical engineers: a multi-scale approach with Mathematica

This 750-plus-page book on applied linear analysis is the culmination of the authors’ more than three decades of experience teaching graduate students in chemical engineering, as well as a continuation of their own mentors’ legacy. It is reminiscent of books with... more
General (G.1.0) | May 2 23

MySQL crash course: a hands-on introduction to database development

MySQL crash course is an excellent book for beginners looking to learn how to use MySQL for database development. The book is well structured and easy to follow, with plenty of practical examples and exercises to help readers understand the concepts and... more
SQL (H.2.3...) | Apr 26 23

Language, gender and videogames: using corpora to analyse the representation of gender in fantasy videogames

It has often been stated that the videogaming environment is filled with machismo, and there are many observations to that end: numerous studies have been published that... more
Games (K.8.0...) | Apr 25 23

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2023 ThinkLoud®
Terms of Use
| Privacy Policy