Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
February 20, 2019
Search
Highlight

A survey of methods for explaining black box models
Computerized decision support systems have significant social consequences, and yet they are capable of mistakes or bias. Can an autonomous driving system be trusted, for example, when its visual scene recognition was implemented as a neural network trained on a dataset of traffic images? What about a college application... more
Quote
What kind of crazy symbol is this, which means nothing at all? Is it a digit, or isn’t it? 1, 2, 3, 4, 5, 6, 7, 8, and 9 all stand for numbers one can understand and graspbut 0... more
- Karl Menninger (1958)
Articles
An automatic proving approach to parameterized verification: ACM Transactions on Computational Logic

Network and security protocols occasionally require important but difficult to authenticate parameters such as the number in a communication party. The existing formal proofs of algorithms for verifying the... more

Security & Protection (C.2.0...) | Feb 20 19

Grasshopper optimization algorithm for multi-objective optimization problems: Applied Intelligence

Describing the grasshopper optimization algorithm to solve multi-objective optimization problems, the key idea in this paper is to simulate the swarm behavior of grasshoppers to... more

Optimization (E.5...) | Feb 15 19

Circuit complexity, proof complexity, and polynomial identity testing: Journal of the ACM

Cook and Reckhow [1] proved that NP ≠ coNP if and only if in every propositional proof system there is a tautology whose proof size has a super-polynomial lower bound (in terms of the size of the proved... more

Complexity of Proof Procedures (F.2.2...) | Feb 13 19

Cross-dependency inference in multi-layered networks: ACM Transactions on Knowledge Discovery from Data

Current and emerging networks have a duty to promote interconnections for new collaborative research and business between academia and industry. Multi-layered networks require descriptions of relations among... more

Database Applications (H.2.8) | Feb 11 19

Improving integrated development environment commands knowledge with recommender systems: ICSE-SEET 18

Integrated development environments (IDEs) are an essential part of software developers’ toolkits, enabling them to efficiently author, manage, and test... more

General (D.2.0) | Feb 11 19

Relational data factorization: Machine Learning

General methods take advantage of developing frameworks for data mining and machine learning that can be specialized for efficiency according to the problem domain. This paper discusses a declarative modeling method as a... more

Relational Databases (H.2.4...) | Feb 7 19

Game description language and dynamic epistemic logic compared: IJCAI 18

Efficient modeling and reasoning are critical to pushing the frontiers in knowledge-based, dynamic multiagent systems. The authors note that while several languages have been proposed to carry out this goal... more

Games (I.2.1...) | Feb 7 19

A survey of virtual sample generation technology for face recognition: Artificial Intelligence Review

Just as the authors state that “virtual sample generation technology belongs to the category of machine learning,” nobody ever has enough real data to train a face recognition model, and... more

Sampling (I.4.1...) | Feb 7 19

A generalized digraph model for expressing dependencies: RTNS 18

The authors characterize this paper as a work in progress in computer assisted verification (CAV) of task-scheduling models. Directed graph (digraph) models are expressive; however, as the authors point out... more

Correctness Proofs (D.2.4...) | Feb 7 19

A scalable and manageable IoT architecture based on transparent computing: Journal of Parallel and Distributed Computing

The Internet of things (IoT) has been emerging with a gradual tangible impact on everyday life. With such growth, its use cases are becoming more... more

Distributed Systems (C.2.4) | Feb 6 19

Books
An open door to number theory

In 1993, my daughter showed me the New York Times article that announced Andrew Wiles’s 100-plus-page proof (to be successfully corrected two years later) of Fermat’s last theorem (FLT) [1]. Wiles’s “20th-century” proof comprised excursions into algebraic... more
General (G.0) | Feb 19 19

Technology and the intelligence community: challenges and advances for the 21st century

If you have no background in the US intelligence community and your interests include the history, ethics, and organizational dynamics of intelligence agencies, you will find this book interesting. Technical... more
General (K.4.0) | Feb 19 19

Introduction to compiler design (2nd ed.)

Compiler design seems to be a rather narrow topic, which should interest only computer science undergraduate or graduate students in the framework of a mandatory course. After all, how many people will have in their professional life the opportunity to... more
Compilers (D.3.4...) | Feb 15 19

Neighborhood semantics for modal logic

Reading and writing a review of this wonderful book has been a pleasure. Knowing the basics of propositional modal logic may explain why I enjoyed reading it. The author has gathered and surveyed many papers in writing this book. This is a must-read for those... more
Modal Logic (F.4.1...) | Feb 14 19

Advance compression and watermarking technique for speech signals

In a time of increased interest in security assurance, all topics related to watermarking are important. While the book’s focus is securing speech, a technologically related problem of compression is also covered. While we are mostly used to image watermarking, security... more
Data Compaction & Compression (E.4...) | Feb 14 19

Distributed computing pearls

In computer science, the term “synchronization” can relate to coordination between processors or to contention. So I was expecting to find some program examples using the open message passing interface (OpenMPI) or a discussion of distributed... more
Distributed Systems (C.2.4) | Feb 13 19

REBUTTAL: Random numbers and computers

There is an error in the review. The reviewer states: “Also missing: the decimal expansions of irrational numbers (which are non-terminating and non-repeating) do not have a cycle from which they can be proposed as random number generators provided we can... more
Random Number Generation (G.3...) | Feb 13 19

RE-REBUTTAL: Random numbers and computers

There is no error in the review. The error lies in the way the author has interpreted it. It is not the randomness of pi that is missing from the book, but why it is important, as explicitly stated in my review. The following remark, found in Section 7.1, is grossly... more
Random Number Generation (G.3...) | Feb 13 19

Mobile payment systems

These days, if you go shopping in any of China’s major cities, one thing that you will probably not see is people making purchases using cash, or for that matter credit cards. Whether buying a TV, a burger, or groceries, the majority of retail transactions in China are now... more
Financial (J.1...) | Feb 12 19

Individual and collective graph mining

Having recently finished my course on web intelligence, with topics such as knowledge graphs, social network analysis, and web mining, as well as supervising a PhD candidate on graph-based querying and pattern matching for linked open data, this book could... more
Data Mining (H.2.8...) | Feb 11 19


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy