Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
December 1, 2020

Explainable AI: interpreting, explaining and visualizing deep learning
Deep learning has become so dominant in machine learning, and artificial intelligence (AI) as a whole, that its intrinsic lack of interpretability is paradigmatic for the whole field of explainable AI (XAI). This is why progress in interpreting, explaining, and visualizing deep... more
Programs must be written for people to read, and only incidentally for machines to execute... more
- Hal Abelson and Gerald Jay Sussman (1996)
A survey on food computing: ACM Computing Surveys

The authors have written an extensive survey of the published literature related to food computing. The survey is about 26 pages long, with an additional ten pages of (about 300) references. The... more

Image Databases (H.2.8...) | Nov 27 20

Exact transversal hypergraphs and application to Boolean -functions: Journal of Symbolic Computation

A hypergraph is a generalized structure of a graph in which an edge, called a hyperedge, can have more than two vertices. A subset T is said to be a transversal of a given hypergraph if it... more

Graph Theory (G.2.2) | Nov 26 20

Design and implementation of distributed traceability system for smart factories based on blockchain technology: RACS 19

Automation processes in modern manufacturing generate a huge amount of data, which is used to guarantee stability and reduce the defect rate of... more

Electronic Commerce (K.4.4) | Nov 25 20

Natural language processing with (tabled and constraint) logic programming: Declarative Logic Programming

Natural language processing (NLP) is a subfield of computer science, with a history of already more than 50 years. It concerns the... more

Natural Language Processing (I.2.7) | Nov 24 20

Reducing energy consumption in SDN-based data center networks through flow consolidation strategies: SAC 19

The data exchanged over networks has grown over the years, and is expected to grow further moving forward. This has led to increases in the required... more

Physical Sciences & Engineering (J.2) | Nov 24 20

Intelligent warehousing based on the Internet of Things technology: ICAAI 18

Over the past few years, the Internet of Things (IoT) has gained popularity in different industrial applications. IoT has become an integral part of industries such as healthcare, agriculture, manufacturing... more

Industrial Control (J.7...) | Nov 23 20

Unlocking data to improve public policy: Communications of the ACM

Data-driven decision-making is all the rage these days. Government and public sector organizations, as well as industry and private enterprise, are keen to leverage the flood of data available in the Information Age to... more

Government (J.1...) | Nov 20 20

Adaptive architecture and personal data: ACM Transactions on Computer-Human Interaction

This paper focuses on the implications of sensors embedded in buildings to make the buildings responsive to people. An important issue is privacy. One reason these privacy issues are... more

Architecture (J.5...) | Nov 20 20

Testing extended finite state machines using NSGA-III: A-TEST 19

The goal of the paper is to describe how the non-dominated sorting genetic algorithm III (NSGA-III) algorithm generates test suites from extended finite-state machines (EFSMs). Each generated test... more

General (D.2.0) | Nov 19 20

RML: runtime monitoring language: a system-agnostic DSL for runtime verification: Programming 19

This paper on the runtime monitoring language (RML) is a very brief look at a system-agnostic domain-specific language (DSL) for runtime verification. This language is system agnostic due to its use of JavaScript... more

General (D.2.0) | Nov 18 20

The computer science activity book

The book has 24 projects that can be done with pen and paper, without a computer. The term “unplugged computer science” refers to computer science (CS) activities that can be done without a computer. These kinds of activities have been popular for teaching CS to... more
Computer Science Education (K.3.2...) | Dec 1 20

Embedded software for the IoT (3rd ed.)

An in-depth study of embedded software for the Internet of Things (IoT), this book explains various topics, from selecting an operating system (OS) to code maintenance. Due to the resource-constrained nature of IoT, it is always a challenge to utilize central... more
Real-Time & Embedded Systems (C.3...) | Nov 30 20

Smart network inspired paradigm and approaches in IoT applications

There is no question that today’s world moves via billions and billions of bits exchanging data and information among millions or billions of emitters and receivers. One important aspect of this known... more
Real-Time & Embedded Systems (D.4.7...) | Nov 25 20

Reverse mathematics: proofs from the inside out

Reverse mathematics “seeks the axioms needed to prove given theorems.” The work of Emil Post and Kurt Gödel, in the 1920s and 1930s, permanently dashed the hope that axiom systems could formally generate all theorems for natural numbers, integers, rational... more
Mathematics & Statistics (J.2...) | Nov 23 20

The future of music: towards a computational musical theory of everything

When I picked this book to review, I had expected a book about formal theories of music: notations, definitions, functions, relations, theorems, and so on. However, when I opened it, I found professional... more
Music (J.5...) | Nov 23 20

T-minus AI

In order to understand this book in context, consider the following analogy. Birds fly, and airplanes fly. But it isn’t the same “fly.” A flock of birds can take off without running into each other, but if a flock of planes tried that, it would be a disaster. On the other hand... more
General (I.2.0) | Nov 19 20

Natural language processing for social media

Social media platforms are not only a place for individuals to voice their opinions, but have also become very influential in recent democratic elections and geo-politics. The importance of social media, including applications to analyze social media posts, is... more
Natural Language Processing (I.2.7) | Nov 19 20

The hardware hacker

Andrew “bunnie” Huang was Chumby’s lead hardware engineer for its WiFi-equipped embedded computer device, chumby, which premiered in 2006. He was charged with the task of traveling from the US to Shenzhen, and figuring how to build a supply... more
General (B.0) | Nov 17 20

Graph data management

Graph databases are now key in supporting semantic web and linked open data, as well as in application domains for software engineering, geographical databases, social networks, telecommunication, bioinformatics, chemistry, and datasets like... more
Database Manager (H.2.4...) | Nov 13 20

Genetic programming theory and practice XIV

This book, part of Springer’s “Genetic and Evolutionary Computation” series, contains the proceedings of the “14th meeting of the annual Genetic Programming Theory and Practice Workshop, [held] by the Center for the... more
Biology & Genetics (J.3...) | Nov 12 20

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2020 ThinkLoud, Inc.
Terms of Use
| Privacy Policy