Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
August 12, 2020

A domain theory for statistical probabilistic programming
On the one hand, a statistical programming language is similar to a traditional programming language, but with libraries providing statistical functions. Examples are Mathematica, MATLAB, and the omnipresent R. On the other hand, probabilistic programming aims at... more
The computer in its modern form was born from the womb of the military. As with so much other modern technology of the same parentage... more
- Joseph Weizenbaum (1979)
Expert deduction rules in data mining with association rules: a case study: Knowledge and Information Systems

The author uses logical calculus to create and prove deduction and expert deduction rules in this paper that deals with concepts and material about the... more

Data Mining (H.2.8...) | Aug 11 20

The effects of mixing machine learning and human judgment: Communications of the ACM

Automated risk assessment systems are often used in situations that require human judgment. One motivation for doing this is to remove human bias. Even when the automated system... more

General (I.0) | Aug 7 20

A domain theory for statistical probabilistic programming: Proc. of the ACM on Programming Languages

On the one hand, a statistical programming language is similar to a traditional programming language, but with libraries providing statistical functions. Examples are Mathematica, MATLAB, and the omnipresent... more

Statistical Computing (G.3...) | Aug 6 20

AndroZoo: collecting millions of Android apps for the research community: MSR 16

This is basically a data collection paper. How did the authors collect more than three million free Android apps (more than 20 terabytes)? The answer: it’s somewhat more delicate than one might... more

Mobile Processors (C.1.4...) | Aug 5 20

Performance analysis of linear receivers for uplink massive MIMO FBMC-OQAM systems: IEEE Transactions on Signal Processing

Progressive improvements have been made to the FBMC-OQAM signaling, for example, many theoretical discussions and achievements... more

Signal Processing Systems (C.3...) | Aug 4 20

The rise of serverless computing: Communications of the ACM

In spite of a somewhat confusing introduction--“the server is dead, long live the server”--this informative article gives an overview of the relatively new phenomenon of serverless computing. It includes definitions... more

General (C.0) | Aug 3 20

Should researchers use data from security breaches?: Communications of the ACM

The use of data derived from publicly exposed and security loophole databases will continue to be a controversial subject of debate for legal scholars and IT computing ethics specialists. Should computing... more

Ethics (K.4.1...) | Jul 30 20

Toward automatic verification of quantum programs: Formal Aspects of Computing

Even if a world of quantum computing for everyone is years (if not decades) away, research on designing proper ways to program such systems has been ongoing for quite some time... more

Information Theory (H.1.1...) | Jul 28 20

Management system for secure mobile application development: ACM TURC 19

Our increasing reliance on mobile apps elevates their insecurities and shines a spotlight on their vulnerabilities. The author introduces a secure mobile app development approach that is proactive... more

General (K.6.0) | Jul 22 20

What makes a great manager of software engineers?: IEEE Transactions on Software Engineering

The non-physical nature of software is unique among products developed in the field of engineering; this fact places extreme importance on the qualities that the members of the software engineering team... more

Software Management (K.6.3) | Jul 21 20

Transportation systems: managing performance through advanced maintenance engineering

This review is being written in the midst of the most terrible calamity that anyone can remember. It is ironic that this magnificent contribution is edited by four giants of transportation... more
Engineering (J.2...) | Aug 12 20

Oracle Visual Builder cloud service revealed

Oracle Visual Builder is a very effective tool for significantly reducing the time spent coding, for example, from weeks to just a day or two. This tool is one of the great options available to build add-ons for other existing services provided by Oracle Cloud... more
Web-Based Services (H.3.5...) | Aug 10 20

Data architecture (2nd ed.)

Showing a perceptible pattern as a line-edited transcript consolidated from one or more slide-based seminars, this book provides many illustrations that would otherwise have been the focus of a presenter’s lecture and interactive session. However, the printed... more
Data Warehouse & Repository (H.2.7...) | Jul 31 20

Future automation

Timothy Carone provides a visionary outlook on what will probably be called our digitized future. The book is split into 11 chapters. First, the author introduces autonomous systems (ASs). ASs are (in addition to the Internet of Things, IoT) the core element of the whole book... more
Automation (K.4.3...) | Jul 29 20

Practical Flutter

One of the reasons a business may develop an application for mobile devices is for its branding and digital presence. In today’s market, that requires making the application available for both Android and iOS. The traditional way to accomplish this is to... more
Object-Oriented Design Methods (D.2.2...) | Jul 27 20

Explainable AI

Deep learning has become so dominant in machine learning, and artificial intelligence (AI) as a whole, that its intrinsic lack of interpretability is paradigmatic for the whole field of explainable AI (XAI). This is why progress in interpreting, explaining, and visualizing deep... more
Learning (I.2.6) | Jul 24 20

Transmedia knowledge for liberal arts and community engagement

McKenzie made his legacy teaching and working on projects related to the liberal arts, providing students with the skills and knowledge to formulate effective arguments, communicate well, and solve... more
Arts & Humanities (J.5) | Jul 23 20

Social practices and dynamic non-humans

In the contemporary world, there is perhaps an implicit, or even explicit, presumption that human experience matters above all--human society and actions seek to quash, or at least subjugate to the extreme, all nonhuman actors and their effects. Humans... more
Robotics (I.2.9) | Jul 20 20

Applied machine learning

Machine learning methods find application in almost any domain that makes use of some form of computation. These algorithms build appropriate models that help in making predictions; thus, they are of interest in industry as well as in business scenarios. This book is... more
Learning (I.2.6) | Jul 17 20

Information technology for peace and security

A book with this title might seem to be only marginally relevant for corporate security personnel who are not fighting wars or keeping peace. However, in a typical contextual security analysis, you will find terms like "state actors"... more
Military (J.1...) | Jul 16 20

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2020 ThinkLoud, Inc.
Terms of Use
| Privacy Policy