Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
October 5, 2024
Search
Highlight

The right to data protection: individual and structural dimensions of data protection in EU law
The right to data protection is a comprehensive and insightful examination of the complexities surrounding data protection within the European Union (EU). This book provides a thorough analysis of the legal frameworks and principles underpinning data protection in the EU... more
Quote
Your experience of the internet and the language therein is shaped by who you were and who else was around at the time you joined. How much tech savvy was required to participate in conversations? Were you going online because your friends were already there, or to meet new people?... more
- Gretchen McCulloch (2019)
Articles
50 years of queries: Communications of the ACM

The relational model is probably the one innovation that brought computers to the mainstream for business users. This article by Donald Chamberlin, creator of one of the first query languages (that evolved into the ubiquitous SQL), presents its history as a... more

History of Computing (K.2) | Sep 20 24

Free and open source software and other market failures: Communications of the ACM

Understanding the free and open-source software (FOSS) movement has, since its beginning, implied crossing many disciplinary boundaries. This article describes FOSS’s history... more

General (D.0) | Sep 2 24

The Internet of batteryless things: Communications of the ACM

The world is moving toward a future of very small, Internet-connected intelligent devices, that is, the Internet of Things (IoT). However, at present, providing power to these devices is a problem--the inconvenient, expensive, and environmentally unsustainable... more

General (K.6.0) | Aug 16 24

A review of semi-supervised learning for text classification: Artificial Intelligence Review

Duarte and Berton address the challenges of text classification in the context of big data, emphasizing the difficulties and costs associated with obtaining large labeled datasets. They explore... more

Text Analysis (I.2.7...) | Aug 14 24

10 things software developers should learn about learning: Communications of the ACM

In today’s fast-changing world where groundbreaking technologies are emerging to eclipse their predecessors at an unprecedented pace, continuous learning is not an option but a necessity for practitioners. Understanding how humans learn and memorize can help us do... more

Software Development (K.6.3...) | Jul 29 24

ContraMTD: an unsupervised malicious network traffic detection method based on contrastive learning: WWW 24

The methodology utilized in this study is innovative, as the procedure used to identify malicious network traffic involves an unsupervised method in contrastive learning. This unsupervised technique aims to surpass both supervised and unsupervised methods... more

Security & Protection (C.2.0...) | Jul 19 24

The temporal logic of coalitional goal assignments in concurrent multiplayer games: ACM Transactions on Computational Logic

Enqvist and Goranko’s temporal logic of coalitional goal assignments (TL-CGA) extends Alur, Henzinger, and Kupferman’s 1997 alternating-time temporal logic (ATL) and de Pauly’s 2002 coalition logic (CL). TL-CGA... more

Games (K.8.0...) | Jun 25 24

Backdoor attacks and defenses in federated learning: survey, challenges and future research directions: Engineering Applications of Artificial Intelligence

Machine learning (ML) technologies are becoming mainstream, particularly for the analysis of bulk data. The success of ML systems, however... more

Security (K.4.4...) | Jun 17 24

The nature of computational models: Computing in Science and Engineering

Scientific computing is one of the oldest, if not the oldest, types of computational science. The venerable Fortran programming language was created to help scientists expand the frontier of what theory could produce as numerical results. In the seven... more

Physical Sciences & Engineering (J.2) | May 27 24

A deep learning technique for intrusion detection system using a recurrent neural networks based framework: Computer Communications

Kasongo’s paper focuses on enhancing network security through an advanced intrusion detection system (IDS) utilizing machine learning (ML) techniques. The study implements a framework using recurrent neural... more

Neural Nets (I.5.1...) | May 21 24

Books
A comprehensive guide for Web3 security: from technology, economic and legal aspects

The rapidly emerging technologies for Web3 applications and digital assets pose challenges for the creators, legislators and end users of complicated financial ecosystems. Today, security threats continue to be the potent... more
Security (K.4.4...) | Oct 2 24

Nexus: a brief history of information networks from the Stone Age to AI

Yuval Noah Harari offers a sweeping narrative on how information networks have shaped human history. From the early formation of societies, religious texts, and political propaganda to modern artificial intelligence (AI)-driven networks, Harari masterfully... more
History of Computing (K.2) | Sep 30 24

Design patterns with Java: an introduction

Musch’s book is an introduction to design patterns, including their principles and applicability. It also guides readers through software development and Java programming. The first chapter explains the history and considerations of design patterns. The second... more
Java (D.3.2...) | Sep 26 24

Rendering history: the women of ACM-W

Rendering history: the women of ACM-W, edited by Gloria Childress Townsend, celebrates the 30-year history of ACM-W, the Association for Computing Machinery’s Committee on Women in Computing. This book offers an inspiring narrative of trailblazing... more
History of Computing (K.2) | Sep 23 24

OCaml scientific computing: functional programming in data science and artificial intelligence

This monograph is an exposition of the Owl library in OCaml for building applications that make essential use of numerical algorithms. These numerical algorithms are the basis of most engineering applications--mechanical, electrical, and electronic systems grounded in... more
Programming Environments (D.2.6) | Sep 18 24

Tidy modeling with R: a framework for modeling in the tidyverse

Tidymodels is a collection of packages in R designed to provide a consistent and tidy framework for modeling and machine learning tasks. It was developed with the principles of the tidyverse in mind, emphasizing a consistent and intuitive syntax for data analysis... more
Software Libraries (D.2.2...) | Sep 16 24

Calculus for the natural sciences

Calculus is “a part of the name of some branches of mathematics dealing with rules for the computation of and operation with objects of a definite type” [1]. More commonly, it refers to the branch of mathematics that is concerned with limits and the differentiation and... more
Math (I.7.2...) | Sep 13 24

Industry 4.0 and healthcare: impact of artificial intelligence

In this expansive anthology, editors Ashish Mishra and Jerry Chun-Wei Lin have compiled an impressive collection illuminating the boundless versatility of artificial intelligence (AI) that is revolutionizing modern medicine. Masterfully spanning diagnostic... more
Health (J.3...) | Sep 11 24

Build autonomous mobile robot from scratch using ROS: simulation and hardware

Subramanian’s Build autonomous mobile robot from scratch using ROS is a comprehensive guide to creating customized autonomous mobile robots. Part of the “Maker Innovations” series, the book covers a wide array of topics, from basic theoretical concepts... more
Automation (K.4.3...) | Sep 9 24

Nexus: a brief history of information networks from the Stone Age to AI

Nexus: a brief history of information networks from the Stone Age to AI provides an expansive overview of how information networks have evolved throughout human history, influencing societies, economies, and technologies in profound ways. The book traces... more
History of Computing (K.2) | Sep 6 24


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy