|
Hardware (B)
Machine learning algorithms to forecast air quality: a survey
: Artificial Intelligence Review
Forecasting air pollution levels can enable important public health actions such as traffic modification, self-protection steps by individuals at risk, and measures such as burn bans. The authors...
Algorithms (B.2.4...) | Dec 11 23
Computer Systems Organization (C)
On the adaptation of recurrent neural networks for system identification
: Automatica
In this pape, Forgione et al. propose a transfer learning methodology to adapt recurrent neural network (RNN) models for dynamic system identification to new operating conditions. The approach is premised...
Neural Nets (C.1.3...) | Apr 9 24
ContraMTD: an unsupervised malicious network traffic detection method based on contrastive learning
: WWW 24
The methodology utilized in this study is innovative, as the procedure used to identify malicious network traffic involves an unsupervised method in contrastive learning. This unsupervised technique aims to surpass both supervised and unsupervised methods...
Security & Protection (C.2.0...) | Jul 19 24
A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks
: Ad Hoc Networks
FANET was coined for flying ad hoc networks, for example, unmanned aerial vehicles (UAVs). This survey paper is an in-depth discussion of the cybersecurity concerns and shortcomings unique to UAVs, as compared to...
Security & Protection (C.2.0...) | Feb 8 24
ACE: toward application-centric, edge-cloud, collaborative intelligence
: Communications of the ACM
Futuristic artificial intelligence (AI) applications in electronic business, urban surveillance, and medicine require more teamwork among researchers and practitioners. But with the rising number of autonomous AI applications in different domains, including...
Cloud Computing (C.2.4...) | Aug 4 23
Software (D)
Free and open source software and other market failures
: Communications of the ACM
Understanding the free and open-source software (FOSS) movement has, since its beginning, implied crossing many disciplinary boundaries. This article describes FOSS’s history, explaining its undeniable success throughout the 1990s, and why the...
General (D.0) | Sep 2 24
BCGen: a comment generation method for bytecode
: Automated Software Engineering
The authors have undertaken a project to make bytecode more readable by interspersing it with machine-generated
comments. There are two salient questions regarding this project: Did they...
General (D.2.0) | Dec 6 23
(Re)use of research results (is rampant)
: Communications of the ACM
The point of this article is that scholars often make research contributions that do not fit neatly into the category of peer-reviewed journal papers, and that impacts the advance of knowledge negatively. First, the products of research simply do not always...
General (D.2.0) | Jul 18 23
GraphQL: a systematic mapping study
: ACM Computing Surveys
Software architects ought to continuously strive to develop secure, dependable, and effective software services that can cope with the scalability, revival, idleness, multi-occupancy, and other operational...
Software Architectures (D.2.11) | Sep 5 23
Language-based software testing
: Communications of the ACM
Testing remains as the prime technique to check whether software satisfies the specified requirement. Owing to the high volume of potential inputs and expected outputs in very large systems, the process is laborious and error-prone if conducted manually...
Testing & Debugging (D.2.5) | May 1 24
|
|
Hardware (B)
Robust and adaptive optimization
Specialists in optimization looking for a comprehensive and authoritative resource on robust optimization will be pleased to add Bertsimas and den Hertog’s work to their collection. Robust optimization addresses the critical issue of ensuring the validity of optimization...
Optimization (B.1.4...) | Jul 25 24
Computer Systems Organization (C)
Introduction to wireless networking and its impact on applications
This very short book, or lecture as the publisher refers to it, provides an introductory overview of the two main forms of wireless networking: Wi-Fi and cellular telephony. The approach taken by the author throughout the text is to highlight the differences between...
Wireless Communication (C.2.1...) | May 16 24
Software (D)
Middle tech: software work and the culture of good enough
I’ll start with a quote from Albert Einstein as an epigraph for this review: “The world as we have created it is a process of our thinking. It cannot be changed without changing our thinking.“ Middle tech: software work and the culture of good enough by Paula Bialski is an...
General (D.0) | Aug 26 24
The async-first playbook: remote collaboration techniques for agile software teams
In early 2001, frustration over unproductive software development projects led a group of professionals meeting in Utah to declare a manifesto for agile software development, proposing interaction between individuals over formal development processes...
General (D.0) | May 14 24
Understanding software dynamics
In modern computer systems, because of the remarkable progress in multi-processing nodes, graphics processing units (GPUs), and multi-layer caching and their interactions with other storage and communication components, the level of complexity has...
General (D.0) | May 6 24
Functional design: principles, patterns, and practices
Do you believe that mutable state is the root of all evil? Aficionados of functional programming certainly do, and they have a point. There are many types of bugs that don’t exist in purely functional programs, especially concurrent ones. On the other hand, the world...
Object-Oriented Programming (D.1.5) | Jun 5 24
Beginning Git and GitHub: version control, project management and teamwork for the new developer (2nd ed.)
Mariot Tsitoara’s Beginning Git and GitHub is a comprehensive guide tailored for new developers who want to master version control through practical, step-by-step tutorials. This updated edition introduces readers to GitHub workflows and includes new...
Version Control (D.2.7...) | Aug 7 24
Programming languages: principles and paradigms (2nd ed.)
Once students are proficient in a programming language and start to learn another one, they often identify familiar concepts in new syntactic forms. This may lead to wondering about the fundamental building blocks of programming languages. This second edition...
Programming Languages (D.3) | Aug 28 24
Text mining with R: a tidy approach
Text mining, also known as text analytics or natural language processing (NLP), is a field of study and practice that involves extracting meaningful information and knowledge from unstructured textual data. The goal of text mining is to convert large volumes of...
General (D.3.0) | Aug 30 24
Programming language design and implementation: texts in computer science
Most books on the construction of compilers and interpreters consider either the fundamental mathematics that underpin them or the practice of implementing them. This book is different. It provides a refreshing discussion on...
General (D.3.0) | May 31 24
|
|