Search
for Topics
All Reviews
Conferences
Tutorials
Validation
Routing
Arrays
VLSI
Verification
Optimization
Servers
Neural nets
Portable devices
Distributed systems
Network architecture
RISC/CISC,VLIW architectures
Distributed architectures
Correctness proofs
UML
Networks
OO design
Methodologies
Coding Tools
Software evolution
Java
Object-oriented
Embedded systems
Design
C#
State diagrams
Security
Compression
Graphs
Objects
Standards
Arrays
Hash-tables
Structures
Encryption
Stacks
Geometric Algorithms
Parallelism
Transforms
Automata
Invariants
Patterns
Numerical Linear Algebra
Graph Theory
Mathematical software
Combinatorics
PDEs
Probability and statistics
Finite element methods
Web
Ergonomics
Systems
Data models
Data mining
Information interfaces
User interfaces
Human factors
Interaction styles
Digital libraries
Warehouses
Evaluation/methodology
Learning
Simulation theory
Discrete event simulation
AI
Deduction
Scene analysis
Geometry and modeling
Document preparation
Knowledge representation
Vision
Robotics
Video analysis
Learning
Graphics and realism
XML
Robotics
Expert systems
Engineering
Arts
Publishing
Business
Linguistics
Humanities
CAD
Biosciences
Patents
Security
Crime
Systems design
Strategic planning
Regulation
Privacy
Design
Human factors
Languages
Performance
Theory
Reviews limited to
All General Terms
Algorithms
Design
Documentation
Economics
Experimentation
Human factors
Languages
Legal Aspects
Management
Measurement
Performance
Reliability
Security
Standardization
Theory
Verification
Date Reviewed
Image recognition tools for blind and visually impaired users: an emphasis on the design considerations
Fernando S., Ndukwe C., Virdee B., Djemai R. ACM Transactions on Accessible Computing 18(1): 1-21, 2025. Type: Article
Jun 16 2025
Beyond the algorithm: AI, security, privacy, and ethics
Santos O., Radanliev P., Pearson, Hoboken, NJ, 2024. 336 pp. Type: Book (9780138268459), Reviews: (2 of 2)
Jun 13 2025
Confessions of an AI brain
Fersman E., Pettersson P., Karapantelakis A., Springer International Publishing, Cham, Switzerland, 2023. 178 pp. Type: Book (9783031259340)
Jun 12 2025
Exploiting cross-layer vulnerabilities: off-path attacks on the TCP/IP protocol suite
Feng X., Li Q., Sun K., Xu K., Wu J. Communications of the ACM 68(3): 48-59, 2025. Type: Article
Jun 11 2025
Architecting data and machine learning platforms: enable analytics and AI-driven innovation in the cloud
Tranquillin M., Lakshmanan V., Tekiner F., OReilly Media, Inc., Sebastopol, CA, 2023. 361 pp. Type: Book (9781098151614), Reviews: (3 of 3)
Jun 10 2025
more..
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2025 ThinkLoud
®
Terms of Use
|
Privacy Policy