Search
for Topics
All Reviews
Conferences
Tutorials
Validation
Routing
VLSI
Arrays
Verification
Optimization
Servers
Neural nets
Distributed systems
Portable devices
Network architecture
Distributed architectures
RISC/CISC,VLIW architectures
C#
Design
Java
Software evolution
Correctness proofs
UML
Embedded systems
Coding Tools
Methodologies
Security
State diagrams
Object-oriented
Networks
OO design
Compression
Structures
Standards
Stacks
Encryption
Graphs
Objects
Hash-tables
Arrays
Patterns
Geometric Algorithms
Parallelism
Transforms
Automata
Invariants
Finite element methods
Probability and statistics
Graph Theory
Numerical Linear Algebra
Mathematical software
Combinatorics
PDEs
Interaction styles
Data mining
Data models
Evaluation/methodology
Warehouses
Human factors
Systems
Ergonomics
Digital libraries
Information interfaces
User interfaces
Web
Expert systems
Discrete event simulation
Robotics
Robotics
AI
Document preparation
Deduction
Learning
Graphics and realism
Knowledge representation
Vision
Simulation theory
Learning
Video analysis
XML
Geometry and modeling
Scene analysis
Business
Linguistics
Publishing
Humanities
CAD
Biosciences
Engineering
Arts
Strategic planning
Privacy
Regulation
Patents
Security
Systems design
Crime
Design
Human factors
Languages
Performance
Theory
Reviews limited to
All General Terms
Algorithms
Design
Documentation
Economics
Experimentation
Human factors
Languages
Legal Aspects
Management
Measurement
Performance
Reliability
Security
Standardization
Theory
Verification
Date Reviewed
Image recognition tools for blind and visually impaired users: an emphasis on the design considerations
Fernando S., Ndukwe C., Virdee B., Djemai R. ACM Transactions on Accessible Computing 18(1): 1-21, 2025. Type: Article
Jun 16 2025
Beyond the algorithm: AI, security, privacy, and ethics
Santos O., Radanliev P., Pearson, Hoboken, NJ, 2024. 336 pp. Type: Book (9780138268459), Reviews: (2 of 2)
Jun 13 2025
Confessions of an AI brain
Fersman E., Pettersson P., Karapantelakis A., Springer International Publishing, Cham, Switzerland, 2023. 178 pp. Type: Book (9783031259340)
Jun 12 2025
Exploiting cross-layer vulnerabilities: off-path attacks on the TCP/IP protocol suite
Feng X., Li Q., Sun K., Xu K., Wu J. Communications of the ACM 68(3): 48-59, 2025. Type: Article
Jun 11 2025
Architecting data and machine learning platforms: enable analytics and AI-driven innovation in the cloud
Tranquillin M., Lakshmanan V., Tekiner F., OReilly Media, Inc., Sebastopol, CA, 2023. 361 pp. Type: Book (9781098151614), Reviews: (3 of 3)
Jun 10 2025
more..
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2025 ThinkLoud
®
Terms of Use
|
Privacy Policy