Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Ray, Subhankar
AAfter Corporation
Plano, Texas
 
   Reviewer Selected
Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 10 of 21 reviews

   
  Machine learning safety
Huang X., Jin G., Ruan W., Springer International Publishing, Singapore, 2023. 321 pp.  Type: Book (9789811968136)

Machine learning safety delves into the growing field of verification, robustness, training against adversarial attacks, privacy enhancement, and other safety concerns in the context of deep learning (DL) and deep reinforcement learning (DR...

Mar 29 2024  
  Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges
Koay A., Ko R., Hettema H., Radke K. Journal of Intelligent Information Systems 601-29, 2023.  Type: Article

Today, machine learning (ML) is applied to threat detection and classification problems in the important field of industrial control. This paper reviews different ML papers that apply supervised learning, unsupervised learning, deep learning, and ...

Mar 18 2024  
  Distributional reinforcement learning
Bellemare M., Dabney W., Rowland M., MIT Press, Cambridge, Massachucetts, 2023. 384 pp.  Type: Book (0262048019)

Rarely does a book introduce a new field of study at the intersection of computer science, deep reinforcement learning (RL), probability theory, statistics, and applied math. In their work at Google DeepMind, the authors applied technologies like ...

Feb 5 2024  
  Reinforcement learning for quantitative trading
Sun S., Wang R., An B. ACM Transactions on Intelligent Systems and Technology 12(2): 2023.  Type: Article

This paper is a good starting point for both learners and practitioners in the fields of algorithmic trading, portfolio management, order execution, market making, and even reinforcement learning (RL), as they launch their deep dives into the inte...

Aug 10 2023  
  Deanonymisation of clients in bitcoin P2P network
Biryukov A., Khovratovich D., Pustogarov I.  CCS 2014 (Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, Nov 3-7, 2014) 15-29, 2014.  Type: Proceedings

Detailed descriptions of some parts of the bitcoin code that are not documented well are contained in this paper. Those trying to understand how the bitcoin code works should read this paper to start their journey. However, I am concer...

Nov 11 2015  
  Zerocash: decentralized anonymous payments from Bitcoin
Ben Sasson E., Chiesa A., Garman C., Green M., Miers I., Tromer E., Virza M.  SP 2014 (Proceedings of the 2014 IEEE Symposium on Security and Privacy,May 18-21, 2014) 459-474, 2014.  Type: Proceedings

Bitcoin and its underlying blockchain technology have solved the Byzantine generals problem [1]. However, blockchain associated with the Bitcoin currency is a public ledger, and it does not provide the basic privacy offered by financia...

Jun 22 2015  
  Selfish routing and the price of anarchy
Roughgarden T., The MIT Press, 2005. 240 pp.  Type: Book (9780262182430)

Original results from the author’s PhD thesis are presented in this book. It also contains a compilation of results and concepts that could jump-start a newcomer in the field, as well as offer practical tools for network desi...

Apr 21 2006  
  Estimating point-to-point and point-to-multipoint traffic matrices: an information-theoretic approach
Zhang Y., Roughan M., Lund C., Donoho D. IEEE/ACM Transactions on Networking 13(5): 947-960, 2005.  Type: Article

Dimensioning, planning, and expanding a large-scale Internet protocol (IP) network is challenging. The task gets harder without traffic matrices, even though there are simplified network management protocol/management information bases...

Apr 5 2006  
  Computing on large-scale distributed systems: XtremWeb architecture, programming models, security, tests and convergence with grid
Cappello F., Djilali S., Fedak G., Herault T., Magniette F., Néri V., Lodygensky O. Future Generation Computer Systems 21(3): 417-437, 2005.  Type: Article

Grid computing (GC) refers to the middleware used to support resource sharing among large numbers of computers, to increase computing power by sharing tasks. GC is mature enough to have an industry of its own. A simple search on any ma...

Dec 13 2005  
  Towards a semantic, deep archival file system
Mahalingam M., Tang C., Xu Z.  Future trends of distributed computing systems (Proceedings of the Ninth IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS ’03),May 28-30, 2003) 1152003.  Type: Proceedings

With the advent of the Internet and search engines, converting data into information and useful knowledge is becoming more and more important. Search engines like Google, Yahoo!, and Microsoft Network (MSN) catalog world data and infor...

Sep 24 2004  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy