Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
September 18, 2024
Search
Highlight

Nexus: a brief history of information networks from the Stone Age to AI
Nexus: a brief history of information networks from the Stone Age to AI provides an expansive overview of how information networks have evolved throughout human history, influencing societies, economies, and technologies in profound ways. The book traces the development... more
Quote
I want to talk about the relationship between theory and practice. [...] This sort of debating point is not helpful. The truth of the matter is that we tend to look with doubt and suspicion at the other side; whichever side of that particular barrier we are... more
- Christopher S. Strachey (1970)
Articles
Free and open source software and other market failures: Communications of the ACM

Understanding the free and open-source software (FOSS) movement has, since its beginning, implied crossing many disciplinary boundaries. This article describes FOSS’s history, explaining its undeniable success throughout the 1990s, and why the... more

General (D.0) | Sep 2 24

The Internet of batteryless things: Communications of the ACM

The world is moving toward a future of very small, Internet-connected intelligent devices, that is, the Internet of Things (IoT). However, at present, providing power to these devices is a problem--the inconvenient, expensive, and... more

General (K.6.0) | Aug 16 24

A review of semi-supervised learning for text classification: Artificial Intelligence Review

Duarte and Berton address the challenges of text classification in the context of big data, emphasizing the difficulties and costs associated with obtaining large labeled datasets. They explore the field of semi-supervised learning as a solution, presenting... more

Text Analysis (I.2.7...) | Aug 14 24

10 things software developers should learn about learning: Communications of the ACM

In today’s fast-changing world where groundbreaking technologies are emerging to eclipse their predecessors at an unprecedented pace, continuous learning is not an option but a necessity for practitioners. Understanding how humans learn and memorize can help us do... more

Software Development (K.6.3...) | Jul 29 24

ContraMTD: an unsupervised malicious network traffic detection method based on contrastive learning: WWW 24

The methodology utilized in this study is innovative, as the procedure used to identify malicious network traffic involves an unsupervised method in contrastive learning. This unsupervised technique aims to... more

Security & Protection (C.2.0...) | Jul 19 24

The temporal logic of coalitional goal assignments in concurrent multiplayer games: ACM Transactions on Computational Logic

Enqvist and Goranko’s temporal logic of coalitional goal assignments (TL-CGA) extends Alur, Henzinger, and Kupferman’s 1997 alternating-time temporal logic (ATL) and de... more

Games (K.8.0...) | Jun 25 24

Backdoor attacks and defenses in federated learning: survey, challenges and future research directions: Engineering Applications of Artificial Intelligence

Machine learning (ML) technologies are becoming mainstream, particularly for the analysis of bulk data. The success of ML systems, however, hinges on the input of high-quality data and the ability to... more

Security (K.4.4...) | Jun 17 24

The nature of computational models: Computing in Science and Engineering

Scientific computing is one of the oldest, if not the oldest, types of computational science. The venerable Fortran programming language was created to help scientists expand the frontier of what theory could produce as... more

Physical Sciences & Engineering (J.2) | May 27 24

A deep learning technique for intrusion detection system using a recurrent neural networks based framework: Computer Communications

Kasongo’s paper focuses on enhancing network security through an advanced intrusion detection system (IDS) utilizing machine learning (ML) techniques. The... more

Neural Nets (I.5.1...) | May 21 24

Language-based software testing: Communications of the ACM

Testing remains as the prime technique to check whether software satisfies the specified requirement. Owing to the high volume of potential inputs and expected outputs in very large systems, the process is laborious and error-prone if conducted manually... more

Testing & Debugging (D.2.5) | May 1 24

Books
Tidy modeling with R: a framework for modeling in the tidyverse

Tidymodels is a collection of packages in R designed to provide a consistent and tidy framework for modeling and machine learning tasks. It was developed with the principles of the tidyverse in mind, emphasizing a consistent and intuitive syntax for data analysis... more
Software Libraries (D.2.2...) | Sep 16 24

Calculus for the natural sciences

Calculus is “a part of the name of some branches of mathematics dealing with rules for the computation of and operation with objects of a definite type” [1]. More commonly, it refers to the branch of mathematics that is concerned with limits and the differentiation and integration of functions. This book is concerned... more
Math (I.7.2...) | Sep 13 24

Industry 4.0 and healthcare: impact of artificial intelligence

In this expansive anthology, editors Ashish Mishra and Jerry Chun-Wei Lin have compiled an impressive collection illuminating the boundless versatility of artificial intelligence (AI) that is revolutionizing modern medicine. Masterfully spanning diagnostic... more
Health (J.3...) | Sep 11 24

Build autonomous mobile robot from scratch using ROS: simulation and hardware

Subramanian’s Build autonomous mobile robot from scratch using ROS is a comprehensive guide to creating customized autonomous mobile robots. Part of the “Maker Innovations” series, the book covers a wide... more
Automation (K.4.3...) | Sep 9 24

Nexus: a brief history of information networks from the Stone Age to AI

Nexus: a brief history of information networks from the Stone Age to AI provides an expansive overview of how information networks have evolved throughout human history, influencing societies, economies, and technologies in profound ways. The book traces... more
History of Computing (K.2) | Sep 6 24

Data analysis: a gentle introduction for future data scientists

Data analysis by Graham Upton and Dan Brawn is a concise and to-the-point guide to data analysis. Compared to other statistics and data analysis books, this one is well written without delving into extensive details on each topic, making it accessible to... more
Probability & Statistics (G.3) | Sep 4 24

Text mining with R: a tidy approach

Text mining, also known as text analytics or natural language processing (NLP), is a field of study and practice that involves extracting meaningful information and knowledge from unstructured textual data. The goal of text mining is to convert large volumes of... more
General (D.3.0) | Aug 30 24

Programming languages: principles and paradigms (2nd ed.)

Once students are proficient in a programming language and start to learn another one, they often identify familiar concepts in new syntactic forms. This may lead to wondering about the fundamental building blocks of programming languages. This second edition... more
Programming Languages (D.3) | Aug 28 24

Middle tech: software work and the culture of good enough

I’ll start with a quote from Albert Einstein as an epigraph for this review: “The world as we have created it is a process of our thinking. It cannot be changed without changing our thinking.“ Middle tech: software work and the culture of good enough by Paula Bialski is an... more
General (D.0) | Aug 26 24

Using R for Bayesian spatial and spatio-temporal health modeling

Embarking on a journey through the intricate landscape of Bayesian statistics can be a daunting task, but Andrew B. Lawson’s Using R for Bayesian spatial and spatio-temporal health modeling is a welcoming guide that transforms complexity into clarity for beginners. What sets... more
Statistical Computing (G.3...) | Aug 21 24


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy