Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
View:  Show:    
 
 

Hardware (B)
Machine learning algorithms to forecast air quality: a survey : Artificial Intelligence Review

Forecasting air pollution levels can enable important public health actions such as traffic modification, self-protection steps by individuals at risk, and measures such as burn bans. The authors...
Algorithms (B.2.4...) | Dec 11 23


Computer Systems Organization (C)
On the adaptation of recurrent neural networks for system identification : Automatica

In this pape, Forgione et al. propose a transfer learning methodology to adapt recurrent neural network (RNN) models for dynamic system identification to new operating conditions. The approach is premised...
Neural Nets (C.1.3...) | Apr 9 24

ContraMTD: an unsupervised malicious network traffic detection method based on contrastive learning : WWW 24

The methodology utilized in this study is innovative, as the procedure used to identify malicious network traffic involves an unsupervised method in contrastive learning. This unsupervised technique aims to surpass both supervised and unsupervised methods...
Security & Protection (C.2.0...) | Jul 19 24

A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks : Ad Hoc Networks

FANET was coined for flying ad hoc networks, for example, unmanned aerial vehicles (UAVs). This survey paper is an in-depth discussion of the cybersecurity concerns and shortcomings unique to UAVs, as compared to...
Security & Protection (C.2.0...) | Feb 8 24

ACE: toward application-centric, edge-cloud, collaborative intelligence : Communications of the ACM

Futuristic artificial intelligence (AI) applications in electronic business, urban surveillance, and medicine require more teamwork among researchers and practitioners. But with the rising number of autonomous AI applications in different domains, including...
Cloud Computing (C.2.4...) | Aug 4 23


Software (D)
Free and open source software and other market failures : Communications of the ACM

Understanding the free and open-source software (FOSS) movement has, since its beginning, implied crossing many disciplinary boundaries. This article describes FOSS’s history, explaining its undeniable success throughout the 1990s, and why the...
General (D.0) | Sep 2 24

BCGen: a comment generation method for bytecode : Automated Software Engineering

The authors have undertaken a project to make bytecode more readable by interspersing it with machine-generated comments. There are two salient questions regarding this project: Did they...
General (D.2.0) | Dec 6 23

(Re)use of research results (is rampant) : Communications of the ACM

The point of this article is that scholars often make research contributions that do not fit neatly into the category of peer-reviewed journal papers, and that impacts the advance of knowledge negatively. First, the products of research simply do not always...
General (D.2.0) | Jul 18 23

GraphQL: a systematic mapping study : ACM Computing Surveys

Software architects ought to continuously strive to develop secure, dependable, and effective software services that can cope with the scalability, revival, idleness, multi-occupancy, and other operational...
Software Architectures (D.2.11) | Sep 5 23

Language-based software testing : Communications of the ACM

Testing remains as the prime technique to check whether software satisfies the specified requirement. Owing to the high volume of potential inputs and expected outputs in very large systems, the process is laborious and error-prone if conducted manually...
Testing & Debugging (D.2.5) | May 1 24


Hardware (B)

Robust and adaptive optimization

Specialists in optimization looking for a comprehensive and authoritative resource on robust optimization will be pleased to add Bertsimas and den Hertog’s work to their collection. Robust optimization addresses the critical issue of ensuring the validity of optimization...
Optimization (B.1.4...) | Jul 25 24


Computer Systems Organization (C)

Introduction to wireless networking and its impact on applications

This very short book, or lecture as the publisher refers to it, provides an introductory overview of the two main forms of wireless networking: Wi-Fi and cellular telephony. The approach taken by the author throughout the text is to highlight the differences between...
Wireless Communication (C.2.1...) | May 16 24


Software (D)

Middle tech: software work and the culture of good enough

I’ll start with a quote from Albert Einstein as an epigraph for this review: “The world as we have created it is a process of our thinking. It cannot be changed without changing our thinking.“ Middle tech: software work and the culture of good enough by Paula Bialski is an...
General (D.0) | Aug 26 24

The async-first playbook: remote collaboration techniques for agile software teams

In early 2001, frustration over unproductive software development projects led a group of professionals meeting in Utah to declare a manifesto for agile software development, proposing interaction between individuals over formal development processes...
General (D.0) | May 14 24

Understanding software dynamics

In modern computer systems, because of the remarkable progress in multi-processing nodes, graphics processing units (GPUs), and multi-layer caching and their interactions with other storage and communication components, the level of complexity has...
General (D.0) | May 6 24

Functional design: principles, patterns, and practices

Do you believe that mutable state is the root of all evil? Aficionados of functional programming certainly do, and they have a point. There are many types of bugs that don’t exist in purely functional programs, especially concurrent ones. On the other hand, the world...
Object-Oriented Programming (D.1.5) | Jun 5 24

Beginning Git and GitHub: version control, project management and teamwork for the new developer (2nd ed.)

Mariot Tsitoara’s Beginning Git and GitHub is a comprehensive guide tailored for new developers who want to master version control through practical, step-by-step tutorials. This updated edition introduces readers to GitHub workflows and includes new...
Version Control (D.2.7...) | Aug 7 24

Programming languages: principles and paradigms (2nd ed.)

Once students are proficient in a programming language and start to learn another one, they often identify familiar concepts in new syntactic forms. This may lead to wondering about the fundamental building blocks of programming languages. This second edition...
Programming Languages (D.3) | Aug 28 24

Text mining with R: a tidy approach

Text mining, also known as text analytics or natural language processing (NLP), is a field of study and practice that involves extracting meaningful information and knowledge from unstructured textual data. The goal of text mining is to convert large volumes of...
General (D.3.0) | Aug 30 24

Programming language design and implementation: texts in computer science

Most books on the construction of compilers and interpreters consider either the fundamental mathematics that underpin them or the practice of implementing them. This book is different. It provides a refreshing discussion on...
General (D.3.0) | May 31 24

   
Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy