These reviews are the most popular with readers.
All Media Types
For the last:
Guide to graph algorithms: sequential, parallel and distributed
Erciyes K., Springer International Publishing, New York, NY, 2018. 471 pp. Type: Book (978-3-319732-34-3)
This comprehensive text focuses on graph data structures and consequent graph algorithms as fundamental to the analysis of various types of networks, from social to biological ones. The book consists of three parts, with 15 chapters including an e...
Environmental sound recognition using short-time feature aggregation
Roma G., Herrera P., Nogueira W. Journal of Intelligent Information Systems 51(3): 457-475, 2018. Type: Article
Enabling the automatic human-level (or better) detection and classification of audio events and sound environments would be a clear plus for artificial intelligence (AI)-based applications such as robotics and social signal processing. Typical mac...
The physics of quantum information: quantum cryptography, quantum teleportation, quantum computation
Bouwmeester D., Ekert A., Zeilinger A. Springer-Verlag, London, UK, 2000. Type: Divisible Book
A century ago, the discovery of quantum mechanics initiated a revolution in physics that challenged many deeply-held intuitions. Within the last 20 years, the application of quantum mechanics to computation has opened the door to a similar revolu...
Swarms and network intelligence in search
Altshuler Y., Pentland A., Bruckstein A., Springer International Publishing, New York, NY, 2018. 238 pp. Type: Book (978-3-319636-02-3)
The book provides a unified and systematic view of the authors’ research in the area of swarm robotics, with an emphasis on swarm applications for search missions. A lot of the included work is previously published material. The book focuses...
The book of PF (3rd ed.): a no-nonsense guide to the OpenBSD firewall
Hansteen P., No Starch Press, San Francisco, CA, 2014. 248 pp. Type: Book (978-1-593275-89-1)
PF is a packet filter developed originally on the OpenBSD operating system, and now also available on NetBSD, FreeBSD, and FreeBSD derivatives such as DragonFly BSD. It can be used to control access to your network, mitigate spam attacks, redirect...
Grady Booch. YouTube, 01:04:09, published on Mar 16, 2016, Association for Computing Machinery (ACM),
. Type: Video
This one-hour lecture by Grady Booch is a walk through history seen as an evolution toward computational thinking, which will culminate in a symbiotic relationship between people and computers/machines....
Basic elements of computational statistics
Härdle W., Okhrin O., Okhrin Y., Springer International Publishing, New York, NY, 2017. 305 pp. Type: Book (978-3-319553-35-1)
Researchers frequently use statistics to analyze their results. Statistical analysis is a vital tool to confirm or reject hypotheses. In this context, R, one of the most famous programs used for data analysis and statistics, is a powerful, time-sa...
Asset attack vectors: building effective vulnerability management strategies to protect organizations
Haber M., Hibbert B., Apress, New York, NY, 2018. 371 pp. Type: Book (978-1-484236-26-0)
Haber and Hibbert give readers a grand tour of the vulnerability management landscape in 24 chapters....
The innovation navigator: transforming your organization in the era of digital design and collaborative culture
Marion T., Fixson S., UNIVERSITY OF TORONTO PRESS, Toronto, Canada, 2018. 208 pp. Type: Book (978-1-487501-11-2)
As French author and 1947 Nobel Prize in Literature winner André Gide once remarked, “Everything has been said before, but since nobody listens we have to keep going back and beginning all over again.” So, we have another book on ...
A survey of methods for explaining black box models
Guidotti R., Monreale A., Ruggieri S., Turini F., Giannotti F., Pedreschi D. ACM Computing Surveys 51(5): 1-42, 2019. Type: Article
Computerized decision support systems have significant social consequences, and yet they are capable of mistakes or bias. Can an autonomous driving system be trusted, for example, when its visual scene recognition was implemented as a neural netwo...
Reproduction in whole or in part without permission is prohibited. Copyright © 2000-2019 ThinkLoud, Inc.