Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
March 5, 2024

The alienation of fact: digital educational privatization, AI, and the false promise of bodies and numbers
What does the alienation of fact and data mean? What are the reasons for these distortions, and why are they dangerous? The book’s subtitle suggests the main causes in the education sector: government’s decreasing role... more
Juan & Alice Do Hypertext R&D
Alice: Do you think anyone has ever made links like this before?
Juan: Not to worry. A few weeks of development and testing can often save an afternoon... more
- Anonymous (1990)
10 things software developers should learn about learning: Communications of the ACM

As software developers, we understand the detailed workings of the different components of our computer systems. And--probably due to how computers were presented since their appearance as “digital... more

Software Development (K.6.3...) | Feb 22 24

Conversational artificial intelligence in the AEC industry: a review of present status, challenges and opportunities: Advanced Engineering Informatics

Those working in the architecture, engineering, and construction (AEC) domain often get bogged down in day-to-day paperwork and verbally communicated instructions. Natural... more

General (I.2.0) | Feb 14 24

State-of-the-art improvements and applications of position based dynamics: Computer Animation and Virtual Worlds

The physically plausible simulation of objects is an active area of research in computer graphics. It is used in movies and video games and to simulate phenomena that would be expensive to do in a laboratory... more

Animation (I.3.7...) | Feb 12 24

A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks: Ad Hoc Networks

FANET was coined for flying ad hoc networks, for example, unmanned aerial vehicles (UAVs). This survey paper is an in-depth discussion of the cybersecurity concerns and shortcomings unique to UAVs, as compared to... more

Security & Protection (C.2.0...) | Feb 8 24

Trustworthy AI: from principles to practices: ACM Computing Surveys

As systems based on AI have become the backbone of various public services such as transportation, finance, medicine, security, academics, medicine, and entertainment, the reliability and trustworthiness of AI artifacts/products, including robustness... more

General (I.2.0) | Jan 30 24

A deep learning technique for intrusion detection system using a recurrent neural networks based framework: Computer Communications

So let’s assume you already know and understand that artificial intelligence’s main building blocks are perceptrons, that is, mathematical models of neurons. And you know that, while a single perceptron is... more

Neural Nets (I.5.1...) | Jan 19 24

CPFloat: a C library for simulating low-precision arithmetic: ACM Transactions on Mathematical Software

Mixed-mode floating-point arithmetic (MMFPA) is a requirement of modern numerical computing. The need arises, for instance, when computations entail execution on graphics processing units (GPUs) interleaved... more

Mathematical Software (G.4) | Jan 12 24

Hierarchical reinforcement learning for efficient and effective automated penetration testing of large networks: Journal of Intelligent Information Systems

Cybersecurity practitioners require alternative approaches and tools for combating the emerging security threats worldwide. How effective are current penetration testing (PT) training modules in... more

Learning (I.2.6) | Dec 18 23

Machine learning algorithms to forecast air quality: a survey: Artificial Intelligence Review

Forecasting air pollution levels can enable important public health actions such as traffic modification, self-protection steps by individuals at risk, and measures such as burn bans. The authors use this book to... more

Algorithms (B.2.4...) | Dec 11 23

Detecting deception using machine learning with facial expressions and pulse rate: Artificial Life and Robotics

This is a very important paper because it combines machine learning, facial expressions analysis, and pulse rate in order to detect deception in an interview context. The results are supported by strong machine learning... more

Learning (I.2.6) | Dec 8 23

Beginning AWS security: build secure, effective, and efficient AWS architecture

Beginning AWS security: build secure, effective, and efficient AWS architecture is an essential guide for anyone looking to understand and implement security measures within Amazon Web Services (AWS). This book is particularly valuable for system... more
Security & Protection (C.2.0...) | Mar 4 24

Data science: an introduction to statistics and machine learning

This comprehensive textbook covers a broad spectrum of essential topics for understanding and working in the field of data science. It is structured in a clear, well-organized manner, divided into three main parts. Part 1, “Basics,” starts with foundational concepts like... more
Statistics (K.1...) | Mar 1 24

The structure of game design

Game design may seem mystifying to the uninitiated, but Wallace Wang’s The structure of game design attempts to demystify the process of turning an idea into an actual playable game. Structured more like a textbook than a trade book, The structure of... more
Games (K.8...) | Feb 29 24

Modeling and simulation in Python: an introduction for scientists and engineers

Allen B. Downey’s Modeling and simulation in Python is a comprehensive guide to Python-based simulations for physical systems. Downey skillfully teaches Python syntax for modeling spring forces, universal gravitation, and more, emphasizing practical skills with... more
Python (D.3.2...) | Feb 28 24

Automata theory: an algorithmic approach

Novices to automata theory may want to start with Dines Bjørner’s narrative on principles and techniques, found in the automata theory chapter of his enjoyable three-volume set [1], which covers intuition, motivation, and pragmatics. Bjørner’s objective: to help... more
General (G.1.0) | Feb 27 24

Practical implementation of a data lake: translating customer expectations into tangible technical goals

Practical implementation of a data lake is a puzzling book. Full of buzzwords and acronyms, it rarely provides their explanation. Writing is colloquial to the extreme, similar to the transcripts of informal discussions between experts, or to well-kept class notes... more
General (K.6.0) | Feb 26 24

The future of work: challenges and prospects for organisations, jobs and workers

This collection of ten articles written as research papers--each constituting a different chapter of the book--is authored by 27 scholars and edited by four of them. The collection is essentially “a projection of how work, working... more
General (K.7.0) | Feb 23 24

Cyber malware: offensive and defensive systems

Cyber malware: offensive and defensive systems provides a thorough examination of the constantly changing realm of cyber threats and the defense mechanisms created to fend them off. For those working in the field of cybersecurity, this book is an... more
Security & Protection (K.6.5) | Feb 21 24

Security chaos engineering: sustaining resilience in software and systems

The remarkable progress in data communications and networking necessitates new behaviors, principles, and disciplines concerning security. In addition to security techniques like encryption, authentication, established demilitarized zones (DMZs), and firewalls, a... more
Security & Protection (K.6.5) | Feb 20 24

Software architecture: research roadmaps from the community

This short work is a compendium of six papers that arose from an International Conference on Software Architectures (ICSA) workshop held in Honolulu, Hawaii, in August 2022. The authors gathered around a common interest in a topic. These international teams... more
Software Architectures (D.2.11) | Feb 19 24

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy