Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
April 14, 2024
Search
Highlight

Information security planning: a practical approach (2nd ed.)
Information security planning presents a comprehensive guide to the basics of information security planning. The author’s perspective addresses critical issues and challenges for emerging information security, including security awareness, strategic/tactical security... more
Quote
The archetype of all humans, their ideal image, is the computer, once it has liberated itself from its creator, man. The computer is the essence of the... more
- Friedrich Dürrenmatt (1986)
Articles
Writing by hand or digitally in first grade: effects on rate of learning to compose text: Computers & Education

This paper is one outcome of the DigiHand project (2018-2022), funded by the Research Council of Norway (grant number 273422). It is divided into five sections: “Introduction,” “Method,” “Statistical Analysis,” “Results,” and “Discussion.” Each detailed section includes... more

Education (J.1...) | Apr 10 24

On the adaptation of recurrent neural networks for system identification: Automatica

In this pape, Forgione et al. propose a transfer learning methodology to adapt recurrent neural network (RNN) models for dynamic system identification to new operating... more

Neural Nets (C.1.3...) | Apr 9 24

Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges: Journal of Intelligent Information Systems

Today, machine learning is applied to threat detection and classification problems in the important field of industrial control. This paper reviews different ML papers that apply supervised learning, unsupervised... more

General (H.1.0) | Mar 18 24

Trustworthy AI: from principles to practices: ACM Computing Surveys

As computing technology continues to evolve, artificial intelligence (AI) is playing an increasing role in various aspects of our lives. Although AI dates back many decades--I took an AI subject in my university studies, in 1988--only recently have dramatic advances... more

General (I.2.0) | Mar 12 24

Data-driven prototyping via natural-language-based GUI retrieval: Automated Software Engineering

Reading this paper would leave anyone conflicted. It describes a good contribution ridden with flaws. It is puzzling that the referees and journal editors accepted the paper in its current form. The presentation... more

Software Development (K.6.3...) | Mar 7 24

10 things software developers should learn about learning: Communications of the ACM

As software developers, we understand the detailed workings of the different components of our computer systems. And--probably due to how computers were presented since... more

Software Development (K.6.3...) | Feb 22 24

Conversational artificial intelligence in the AEC industry: a review of present status, challenges and opportunities: Advanced Engineering Informatics

Those working in the architecture, engineering, and construction (AEC) domain often get bogged down in day-to-day paperwork and verbally communicated instructions. Natural language processing (NLP)... more

General (I.2.0) | Feb 14 24

State-of-the-art improvements and applications of position based dynamics: Computer Animation and Virtual Worlds

The physically plausible simulation of objects is an active area of research in computer graphics. It is used in movies and video games and to simulate phenomena that would be expensive to... more

Animation (I.3.7...) | Feb 12 24

A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks: Ad Hoc Networks

FANET was coined for flying ad hoc networks, for example, unmanned aerial vehicles (UAVs). This survey paper is an in-depth discussion of the cybersecurity concerns and shortcomings unique to UAVs, as... more

Security & Protection (C.2.0...) | Feb 8 24

Trustworthy AI: from principles to practices: ACM Computing Surveys

As systems based on AI have become the backbone of various public services such as transportation, finance, medicine, security, academics, medicine, and entertainment, the reliability and trustworthiness of AI artifacts/products, including robustness... more

General (I.2.0) | Jan 30 24

Books
Living computers

Living computers is simultaneously philosophical and scientific. Brazma begins with the following claim: “Life and the recording of information emerged together; there is no life without information and, arguably, there is no information without life.” Throughout the... more
Biology & Genetics (J.3...) | Apr 12 24

Fashion tech applied: exploring augmented reality, artificial intelligence, virtual reality, NFTs, body scanning, 3D digital design, and more

In the ever-evolving fashion landscape, technology plays a pivotal role in shaping the industry’s future. This book delves into the intersection of fashion and cutting-edge technology, offering enlightening and practical insights. Here are some key takeaways from this... more
Computer-Aided Design (CAD) (J.6...) | Apr 11 24

Information is energy: definition of a physically based concept of information

Shannon’s theory of information is one of the cornerstones of modern computer science (CS). The formalism he developed for quantifying channel capacity was previously known from statistical thermodynamics as entropy, and the significance of this formal... more
Information Theory (H.1.1...) | Apr 8 24

Building a data culture: the usage and flow data culture model

Building a data culture provides an introduction to the concepts of organizational culture and data culture. It emphasizes that, for an organization’s strategy to succeed, there must be alignment between the strategy and the prevailing organizational culture. This idea is... more
General (K.6.0) | Apr 5 24

Responsible AI: best practices for creating trustworthy AI systems

Responsible AI: best practices for creating trustworthy AI systems is an in-depth book that explores the essential elements of artificial intelligence (AI) systems, emphasizing ethics, transparency, and responsibility. The book is intricately organized, offering a clear... more
General (I.2.0) | Apr 4 24

Information security planning: a practical approach (2nd ed.)

Information security planning presents a comprehensive guide to the basics of information security planning. The author’s perspective addresses critical issues and challenges for emerging information security, including security awareness, strategic/tactical security... more
Security & Protection (K.6.5) | Apr 3 24

Visual complex analysis (25th anniversary ed.)

Complex analysis has always enhanced the learning of mathematics. The application of complex numbers in other fields has also been widely studied, independent of theoretical studies in mathematics and related subjects. This book looks at the geometrical aspects of... more
General (G.0) | Apr 1 24

Machine learning safety

Machine learning safety delves into the growing field of verification, robustness, training against adversarial attacks, privacy enhancement, and other safety concerns in the context of deep learning (DL) and deep reinforcement learning (DRL). The authors have... more
Probability & Statistics (G.3) | Mar 29 24

D-finite functions

D-finite functions is a comprehensive introduction to computations with functions, particularly the use of D-finite functions, in the design of algorithms targeting proof of presence/lack of relation(s), algorithms dedicated to resolving asymptotic behavior, and algorithms designed to find the closed form... more
Finite Difference Methods (G.1.4...) | Mar 27 24

Robotics, vision and control: fundamental algorithms in MATLAB (3rd ed.)

Robotics, an area that is often related to artificial intelligence (AI), is concerned with the use of robots for practical applications. Published as part of the “Springer Tracts in Advanced Robotics” series, Robotics, vision and control is... more
Matlab (G.4...) | Mar 25 24


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy