Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
May 27, 2020

Fairness-aware machine learning: practical challenges and lessons learned
This is a timely paper in light of recent stories about bias in artificial intelligence (AI) systems, such as the COMPAS system used in Florida to predict recidivism. The tutorial’s aim is to describe what the authors call a “fairness-first approach” to machine learning. This is similar to a... more
The symbolic form of the work has been forced upon us by necessity: without its help we should have been unable to perform the requisite reasoning... more
- Whitehead/Russell (1901)
Security and privacy on blockchain: ACM Computing Surveys

While still controversial in terms of mainstream use, the study, research, and development of all things blockchain has been moving ahead full steam. Interestingly, while distributed ledger technology... more

Security & Protection (D.4.6) | May 27 20

The calculus of service availability: Queue

The authors give a brief introduction to the service availability required by service-level objectives (SLOs) for availability and responsiveness. The article makes many references to Google’s Site reliability engineering: how Google runs production systems, which is... more

Distributed Systems (D.4.7...) | May 21 20

DeFlaker: automatically detecting flaky tests: ICSE 18

One of the final steps in producing a new version of a software tool is to make sure the old functionality was not lost when the new functionality was added. A common approach to this problem is regression testing, that is, running... more

Testing And Debugging (D.2.5) | May 20 20

Multiplatform MOOC analytics: comparing global and regional patterns in edX and Edraak: L@S 19

Outcomes from a regional massive open online course (MOOC) are better than those from a global MOOC. The best-known MOOCs are global, such as edX, Coursera, and FutureLearn, but regional MOOCs exist... more

Computer Uses in Education (K.3.1) | May 19 20

Alias-free products of signals near Nyquist rate: IEEE Transactions on Signal Processing

When the nonlinear, complicated behavior of natural phenomena and man-made artifacts cannot be modeled perfectly by one-dimensional modeling, multidimensional modeling can be an... more

Signal Analysis, Synthesis & Proc. (H.5.5...) | May 19 20

A systematic literature review on intelligent user interfaces: preliminary results: IHM 19

Designers of user interfaces often face a fundamental dilemma: how much of the underlying functionality of the system should they expose to the user? An experienced user may want direct access to... more

User Interfaces (D.2.2...) | May 14 20

Dynamic malware analysis in the modern era--a state of the art survey: ACM Computing Surveys

Malware is a problem. Its spreading within industrial networks and critical infrastructures shows that there is an always increasing need for cybersecurity expertise to detect, protect, and react to infections... more

Security & Protection (D.4.6) | May 14 20

Surviving software dependencies: Communications of the ACM

Software has been reused since the days of exchanging decks of punched cards wrapped in listings printed on green bar paper. Packages (that is, libraries) of code are everywhere and are used in an overwhelming... more

Reusable Software (D.2.m...) | May 13 20

Machine learning for the developing world: ACM Transactions on Management Information Systems

The authors describe the ways in which machine learning for the developing world (referred to as ML4D) requires a different viewpoint from the kind of machine learning that concerns itself with the developed... more

Learning (I.2.6) | May 11 20

Fairness-aware machine learning: practical challenges and lessons learned: WWW 19

This is a timely paper in light of recent stories about bias in artificial intelligence (AI) systems, such as the COMPAS system used in Florida to predict recidivism. The tutorial’s aim is to... more

Learning (I.2.6) | May 7 20

Pro Azure governance and security

The pervasiveness of cloud technologies and the increasing popularity of Microsoft Azure make this book quite interesting for practicing software enthusiasts. Chapter 1 lays out the necessary governance needed in organizations to migrate to a cloud-based... more
Security & Protection (C.2.0...) | May 26 20

Applied reinforcement learning with Python: with OpenAI Gym, Tensorflow, and Keras

This is a small book on the broader topic of reinforcement learning (RL), written by a practitioner for practitioners. It is very practically oriented, but with limited theoretical background. The book... more
Learning (I.2.6) | May 22 20

Learn RStudio IDE: quick, effective, and productive data science

R is one of most popular programming languages used in statistical computing. RStudio is an easy-to-use, free, and open-source integrated development environment (IDE) to learn, apply, and develop an R program... more
General (E.0) | May 21 20

Business model innovation in the era of the Internet of Things

Being myself responsible for innovation at a large software firm in the Internet of Things (IoT) domain, this book sounded like a perfect match for me and my role. It certainly provides a selected set of... more
Business (J.1...) | May 18 20

Waging cyber war: technical challenges and operational constraints

The general population as well as industry and government are largely aware of the cyber threat risks to personal computers (PCs), smartphones, intelligent devices, servers, and networks. Attacks and... more
Military (J.1...) | May 15 20

Introduction to distributed self-stabilizing algorithms

Distribution is one of the most pervasive features of modern computing architectures. From the multiple specialized processors that make up a personal computer, to the network of computers in a modern automobile, to the... more
Algorithm Design & Analysis (G.4...) | May 12 20

The art of high performance computing for computational science, vol. 1

This is the book I wish I had owned when I started supporting computational scientists a few years ago. It is revised and updated from a Japanese volume based on computational science lectures broadcast... more
Performance of Systems (C.4) | May 12 20

Project management

Project management is not a new discipline. It has been studied for ages, with many examples from the past. The pyramids are a good example of the very first project management initiatives, for instance. The main difference is that, nowadays, there are entities... more
General (K.6.0) | May 6 20

Cross-lingual word embeddings

From the back cover: “The majority of natural language processing (NLP) is English language processing, and while there is good technology support for (standard varieties of) English, support for Albanian, Burmese, or Cebuano--and most other languages--remains... more
Natural Language Processing (I.2.7) | May 5 20

Frontiers of cyberlearning

This book would work well as the first volume in a series on this subject, with new editions released every three to five years due to rapidly changing technologies and the convergence of technologies that provide new forms of deployment in education. Learning to adapt... more
Education (J.1...) | May 4 20

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2020 ThinkLoud, Inc.
Terms of Use
| Privacy Policy