Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
July 22, 2019
Search
Highlight

Computational artifacts: towards a philosophy of computer science
The philosophy of any discipline must account for the goals, methodology, and subject matter of the discipline [1]. There is a well-developed body of scholarship on the philosophy of mathematics and of science, especially physics and biology, and more recently chemistry... more
Quote
That innocent experience of the software upgrade--the relinquishing of control to something one does not understand or want to understand, consenting to a back-seat ride on sheer faith--is now a normal... more
- William Davies (2015)
Articles
A survey on deep neural network-based image captioning: The Visual Computer

Automated image captioning is the task of generating a useful and accurate description of an image without manual input. An ideal system, when shown an image, generates a summary such as “the mailman is... more

Computer Vision (I.5.4...) | Jul 19 19

Improving lazy decision tree for imbalanced classification by using skew-insensitive criteria: Applied Intelligence

Decision trees are powerful graphic tools representing decisions and their related outcomes as branches of a tree. They enable people to see both the overall picture and the... more

Decision Tables (D.2.2...) | Jul 18 19

Towards a competency model: Education and Information Technologies

This paper has a title that clearly defines its content, but I found section 4, “The Proposed Model and Case Study,” the most interesting. Competency-based education and assessment can be briefly defined as “the... more

Computer Uses in Education (K.3.1) | Jul 16 19

Efficiency through uncertainty: HSCC 19

Hybrid systems are those “with both continuous dynamics and discrete logic” [1]. The discrete logic serves to label or parametrize (my terms) states; state-specific continuous dynamics, modeled largely if not exclusively by differential equations, operate within... more

Formal Methods (D.2.4...) | Jul 12 19

Practical minimum cut algorithms: Journal of Experimental Algorithmics

Due to the ever-increasing deployment of graph theory in natural and artificial phenomena, it is challenging for scientists to utilize it in a more performant manner. One of the most popular topics in graph and... more

Graph Algorithms (G.2.2...) | Jul 10 19

Exploring parent use of early STEM media to inform design for children: IDC 19

From the first sentence of the abstract: “This paper explores how parents identify and use science and math media to engage their preschool children in informal science and math learning.” Existing research... more

Computer Uses in Education (K.3.1) | Jul 3 19

The seven tools of causal inference, with reflections on machine learning: Communications of the ACM

This is one of the most influential and eye-opening articles I’ve read in the last two or three years. The author, an ACM Turing Award recipient, makes clear distinctions between machine learning (ML)... more

Learning (I.2.6) | Jul 2 19

A study on software fault prediction techniques: Artificial Intelligence Review

Software developers and managers struggle with the increasing number of software problems and defects. Such problems can rapidly increase the costs of software maintenance and development. Traditional... more

Metrics (D.2.8) | Jun 24 19

Guidelines for human-AI interaction: CHI 19

From a human-computer interaction (HCI) perspective, the arrival of virtual assistants (for example, Alexa, Siri, Google Assistant, and Bixby) has led to a shift in interaction mode from visual to speech-based... more

General (I.2.0) | Jun 20 19

NV-clustering: normally-off computing using non-volatile datapaths: IEEE Transactions on Computers

The much-needed downscaling of different core system architectures is significantly challenged by static power dissipation. The authors present a solution via middleware-transparent... more

Logic Design (B.6) | Jun 19 19

Books
Empowering professional teaching in engineering

Each generation has its own idea of how education should look. Teaching is not easy. It assumes that a generally older generation passes selected aspects of mankind’s achievements to a younger generation. Is there... more
General (K.3.0) | Jul 22 19

Handbook of mobile data privacy

Location, location, location! If you are at risk of being targeted by an intelligent guided missile and you want to survive, I can only suggest you turn off your cellphone. But OK, let’s be realistic: if you’re worrying about this, you’ve got bigger problems than... more
Security & Protection (C.2.0...) | Jul 22 19

Low-rank approximation (2nd ed.)

Low-rank approximation (LRA) is an abstract framework for approximately solving many highly complex problems in science and engineering within acceptable time limits. Concrete implementations of LRA-based algorithms for specific problems are therefore... more
Approximation (G.1.2) | Jul 18 19

How to build a cyber-resilient organization

Today, cyberattacks on a nation’s infrastructure are an acceptable form of undercover activity. All nations engage in this form of espionage, and every year increasingly sophisticated tools are created and tested to breach private and public networks and... more
Management Audit (K.6.4...) | Jul 17 19

Computational artifacts

The philosophy of any discipline must account for the goals, methodology, and subject matter of the discipline [1]. There is a well-developed body of scholarship on the philosophy of mathematics and of science, especially physics and biology, and more recently... more
General (A.0) | Jul 15 19

From Gutenberg to Google

The author of this book was the Chairman of the US Federal Communications Commission (FCC) from 2013 to 2017. From that experience, Wheeler gained firsthand knowledge of some recent developments in communication networks, and the impact of... more
Hardware (K.2...) | Jul 11 19

The Bitcoin standard

Do we need yet another book about Bitcoin [1,2,3]? After reading The Bitcoin standard, the answer is a resounding yes. Here is why. While Bitcoin is commonly viewed as a technological phenomenon, the author views it as but one “decentralized alternative to... more
Electronic Commerce (K.4.4) | Jul 9 19

Beginning blockchain

Blockchain, a distributed ledger technology, is experiencing a surge of popular interest in the context of various domains, including electronic health records, supply chains, cryptocurrencies, and electronic voting, to name a few. A blockchain is defined as a system of record to... more
Cybercash, Digital Cash (K.4.4...) | Jul 8 19

How the Internet happened

“You’ve come a long way, baby!” For those readers old enough to remember the Virginia Slims advertising campaign, which started in 1969, this phrase refers to the early days of the women’s liberation movement, highlighting momentous changes in the roles of... more
History of Computing (K.2) | Jul 5 19

The ascent of GIM, the global intelligent machine

Part of Springer’s “History of Mechanism and Machine Science” series, this would have been a better title for the book. The author starts with a kind of “fuzzy” introduction to the “Big History of the Machine,” looking at concepts related to autonomous robots... more
General (I.2.0) | Jul 1 19


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy