 |
 |
 |
 |
 |
Eight reasons to prioritize brain-computer interface cybersecurity: Communications of the ACM

In this thought-provoking article, the authors astutely highlight the significance of prioritizing brain-computer interface (BCI) cybersecurity. Their comprehensive work sheds light on the emerging field of BCI and the... more
Security & Protection (K.6.5) | Sep 29 23

Emerging technologies in K–12 education: a future HCI research agenda: ACM Transactions on Computer-Human Interaction

Technologies like artificial intelligence (AI), virtual reality (VR), augmented reality (AR), machine learning (ML), and the Internet of Things (IoT) are becoming more and more popular, not only... more
Education (J.1...) | Sep 27 23

GraphQL: a systematic mapping study: ACM Computing Surveys

Software architects ought to continuously strive to develop secure, dependable, and effective software services that can cope with the scalability, revival, idleness, multi-occupancy, and other operational issues of cloud applications. To overcome these issues... more
Software Architectures (D.2.11) | Sep 5 23

Online learning for network resource allocation: ACM SIGMETRICS Performance Evaluation Review

Network resource allocation is still a challenge in many scenarios where fast services need to be provided in changing and unpredictable situations, for example, the ones encountered in streaming data applications... more
Allocation/Deallocation Strategies (D.4.2...) | Aug 25 23

A demographic analysis on prerequisite preparation in an advanced data structures course: ACM Inroads

This survey article aims to investigate the effects that prerequisite course proficiency has on course outcomes in an advanced data structure (ADS) course, specifically for Black, Latinx, Native American, and Pacific Islander (BLNPI)... more
Computer Science Education (K.3.2...) | Aug 24 23

Towards a validated self-efficacy scale for data management: SIGCSE 23

I found this paper to be a challenging read as it required me to learn some new concepts. I still don’t have a full understanding of the topic, but I appreciate the author’s goals and approach. If I’d been reviewing a draft of this paper, I would have requested some additional... more
General (H.2.0) | Aug 23 23

Should robots have rights or rites?: Communications of the ACM

Imagining a future where robots routinely interact with people has raised debate about whether robots deserve special treatment, and eventually rights. Instead of discussing the legal status of robots, the authors propose a view rooted in Confucian philosophy... more
General (K.4.0) | Aug 18 23

Faking it and breaking it: responsible AI is needed now: ACM SIGCAS Computers and Society

The paper’s title is catchy and promising. However, readers will find themselves immersed in another trendy cry that criticizes artificial intelligence (AI) evolution while at the same time promoting it, because the paper is just nonsense. I have never reviewed for CR... more
Ethics (K.4.1...) | Aug 16 23

Neurosymbolic AI: Communications of the ACM

Can deep learning and machine learning systems based on neural nets do anything? Deep learning systems are capable of writing, translating, and analyzing texts; driving autonomous vehicles; and even writing... more
General (I.2.0) | Aug 14 23

Reinforcement learning for quantitative trading: ACM Transactions on Intelligent Systems and Technology

This paper is a good starting point for both learners and practitioners in the fields of algorithmic trading, portfolio management, order execution, market making, and even RL, as they launch their deep dives into... more
Learning (I.2.6) | Aug 10 23

|
 |
|
 |
 |
 |
 |
 |
 |
Data science and analytics for SMEs: consulting, tools, practical use cases

This book aims to minimize barriers to data collection and analysis for smaller businesses, both those that may not have the resources for a dedicated data science department as well as those that would benefit from the services of a large analytics firm. Here, small... more
Business (J.1...) | Oct 2 23

Zero trust architecture

“Don’t trust anyone” is common advice in many spy novels and movies. Good advice as well for modern Internet-connected network infrastructures, where there are no longer demarcations between internal-only and external access points. Moreover, hacks and... more
Security & Protection (K.6.5) | Sep 25 23

Randomness and elements of decision theory applied to signals

Communication and image processing systems are commonly modeled using random processes and are of immense interest in electronics engineering. This short volume attempts to provide an introduction to various topics related to this subject.
Organized into... more
Decision Problems (F.4.3...) | Sep 21 23

Simple type theory: a practical logic for expressing and reasoning about mathematical ideas

The book is an introduction to one of the dialects of type theory. All type theories are grounded in logic. The promise of simple type theory is that it can be understood and handled much easier than other... more
Computability Theory (F.4.1...) | Sep 19 23

Parallel programming: for multicore and cluster systems (3rd ed.)

Parallel programming: for multicore and cluster systems is now in its third English edition (2023). The original German text had, in turn, its three editions in 2000, 2007, and 2012. The current third English edition includes selected (as opposed to pervasive)... more
Parallel Programming (D.1.3...) | Sep 14 23

A new history of modern computing

Whether this book achieves biblical status as a paradigm of the history of modern computing rests with the reader. However, I can say with confidence that if you are a computing historian, a graduate student with a dissertation to complete, or an industry... more
History of Computing (K.2) | Sep 12 23

Living with algorithms: agency and user culture in Costa Rica

This book focuses on how people in Costa Rica live with algorithms. More specifically, the author studies how Netflix, Spotify, and TikTok users in that country associate with those platforms.
The book is divided into seven chapters. The introductory chapter is on... more
Social Issues (K.4.2) | Sep 7 23

Ansible for VMware by examples: a step-by-step guide to automating your VMware infrastructure

This book’s stated audience is twofold: Ansible beginners and intermediate/expert users looking for code examples.
This is true, but with some very significant caveats.
The author’s style is patient but annoying, with a tendency to overly repeat... more
Vm/370 (K.2...) | Aug 31 23

The NICE cyber security framework: cyber security intelligence and analytics (2nd ed.)

Demand for skilled workers in the field of cybersecurity is currently strong and expected to remain so for the next few years. At the same time, many countries are experiencing skill shortages in this area. This book describes the NICE framework, an initiative of... more
Occupations (K.7.1) | Aug 29 23

Practical explainable AI using Python: artificial intelligence model explanations using Python-based libraries, extensions, and frameworks

In this comprehensive guide, the author aims to provide practical insights into artificial intelligence (AI) model explainability and interpretability using Python frameworks. While Mishra doesn’t explicitly state... more
Python (D.3.2...) | Aug 21 23

|
 |
|