Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
View:  Show:    
 
 

Hardware (B)
Machine learning algorithms to forecast air quality: a survey : Artificial Intelligence Review

Forecasting air pollution levels can enable important public health actions such as traffic modification, self-protection steps by individuals at risk, and measures such as burn bans. The authors...
Algorithms (B.2.4...) | Dec 11 23


Computer Systems Organization (C)
On the adaptation of recurrent neural networks for system identification : Automatica

In this pape, Forgione et al. propose a transfer learning methodology to adapt recurrent neural network (RNN) models for dynamic system identification to new operating conditions. The approach is premised on the concept that the dynamics of real-world systems...
Neural Nets (C.1.3...) | Apr 9 24

A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks : Ad Hoc Networks

FANET was coined for flying ad hoc networks, for example, unmanned aerial vehicles (UAVs). This survey paper is an in-depth discussion of the cybersecurity concerns and shortcomings unique to UAVs, as compared to...
Security & Protection (C.2.0...) | Feb 8 24

ACE: toward application-centric, edge-cloud, collaborative intelligence : Communications of the ACM

Futuristic artificial intelligence (AI) applications in electronic business, urban surveillance, and medicine require more teamwork among researchers and practitioners. But with the rising number of autonomous AI applications in different domains, including...
Cloud Computing (C.2.4...) | Aug 4 23

H-Container: enabling heterogeneous-ISA container migration in edge computing : ACM Transactions on Computer Systems

Xing et al. describe a novel approach to dealing with the difficulties posed by container migration in edge computing settings with heterogeneous ISAs. By putting forth a mechanism that permits effective and...
Distributed Systems (C.2.4) | May 10 23


Software (D)
Democratizing domain-specific computing : Communications of the ACM

As computer professionals, we mostly envision computers as general-purpose tools by default. Over the past decades, Moore’s law and Dennard scaling have, year after year, given us consistently better “toys”: faster computers, larger storage spaces. With...
General (D.0) | Jun 22 23

BCGen: a comment generation method for bytecode : Automated Software Engineering

The authors have undertaken a project to make bytecode more readable by interspersing it with machine-generated comments. There are two salient questions regarding this project: Did they...
General (D.2.0) | Dec 6 23

(Re)use of research results (is rampant) : Communications of the ACM

The point of this article is that scholars often make research contributions that do not fit neatly into the category of peer-reviewed journal papers, and that impacts the advance of knowledge negatively. First, the products of research simply do not always...
General (D.2.0) | Jul 18 23

Software assistants in software engineering: a systematic mapping study : Software—Practice & Experience

The authors note the considerable research and engineering efforts to create numerous software assistants (SAs) that have higher autonomy and intelligence for various stages and aspects of the software life cycle, including...
General (D.2.0) | May 24 23

GraphQL: a systematic mapping study : ACM Computing Surveys

Software architects ought to continuously strive to develop secure, dependable, and effective software services that can cope with the scalability, revival, idleness, multi-occupancy, and other operational...
Software Architectures (D.2.11) | Sep 5 23


Computer Systems Organization (C)

Cloud computing: concepts, technology, security, and architecture

The COVID-19 pandemic accelerated digital transformations and led companies to digitize large parts of their services. As a result, companies are changing their technical reference architecture and moving from an on-premises infrastructure to a...
Computer-Communication Networks (C.2) | Apr 29 24

The changing world of mobile communications: 5G, 6G and the future of digital services

Post-4G wireless communication has different business traits from its predecessors; where the earlier generations had a popular and obvious market, future markets are more sophisticated with a tangible shift toward industrial use cases and globalization...
Computer-Communication Networks (C.2) | Apr 19 24

Beginning AWS security: build secure, effective, and efficient AWS architecture

Beginning AWS security: build secure, effective, and efficient AWS architecture is an essential guide for anyone looking to understand and implement security measures within Amazon Web Services. This book is particularly valuable for system administrators...
Security & Protection (C.2.0...) | Mar 4 24

Introduction to wireless networking and its impact on applications

This very short book, or lecture as the publisher refers to it, provides an introductory overview of the two main forms of wireless networking: Wi-Fi and cellular telephony. The approach taken by the author throughout the text is to highlight the differences between...
Wireless Communication (C.2.1...) | May 16 24


Software (D)

The async-first playbook: remote collaboration techniques for agile software teams

In early 2001, frustration over unproductive software development projects led a group of professionals meeting in Utah to declare a manifesto for agile software development, proposing interaction between individuals over formal development processes...
General (D.0) | May 14 24

Understanding software dynamics

In modern computer systems, because of the remarkable progress in multi-processing nodes, graphics processing units (GPUs), and multi-layer caching and their interactions with other storage and communication components, the level of complexity has...
General (D.0) | May 6 24

Software architecture: research roadmaps from the community

This short work is a compendium of six papers that arose from an International Conference on Software Architectures (ICSA) workshop held in Honolulu, Hawaii, in August 2022. The authors gathered around a common interest in a topic. These international teams...
Software Architectures (D.2.11) | Feb 19 24

Modeling and simulation in Python: an introduction for scientists and engineers

Allen B. Downey’s Modeling and simulation in Python is a comprehensive guide to Python-based simulations for physical systems. Downey skillfully teaches Python syntax for modeling spring forces, universal gravitation, and more, emphasizing practical skills with libraries like...
Python (D.3.2...) | Feb 28 24


Mathematics Of Computing (G)

Syllogistic logic and mathematical proof

Philosophical reflection on scientific methodology has long explored whether our reasoning, including mathematical reasoning, aligns with the structures analyzed by formal logic. This enduring inquiry, deeply rooted in Aristotle’s works (such as the ones collectively known as Organon), remains a vibrant subject...
General (G.0) | Apr 26 24

Visual complex analysis (25th anniversary ed.)

Complex analysis has always enhanced the learning of mathematics. The application of complex numbers in other fields has also been widely studied, independent of theoretical studies in mathematics and related subjects. This book looks at the geometrical aspects of...
General (G.0) | Apr 1 24

   
Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy