Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
April 1, 2023
Search
Highlight

Agile transformation: using the Integral Agile Transformation Framework to think and lead differently
Agile methodology is not a new way of managing projects or conducting business. It has been used since approximately 1980, without much publicity. Nowadays, however, as we have the Internet and... more
Quote
Mr. Babbage, consciously or unconsciously, mixes up mind and matter in a way which is sure to puzzle less philosophic readers. The workings of the intellect and... more
- Anonymous (1866)
Articles
Software assistants in software engineering: a systematic mapping study: Software—Practice & Experience

Imagine finding an error while developing a new product and then just clicking on your software assistant that then displays an appropriate debugging technique. Perhaps the tool also identifies the possible... more

General (D.2.0) | Mar 30 23

A theoretical perspective on hyperdimensional computing: Journal of Artificial Intelligence Research

Thomas, Dasgupta, and Rosing offer a tricky essay on hyperdimensional (HD) computing, a representational-transformational-retrieval computing paradigm that is brain-inspired, starting from... more

General (F.0) | Mar 27 23

AI-based computer vision using deep learning in 6G wireless networks: Computers and Electrical Engineering

The development of sixth-generation (6G) wireless networks is expected to revolutionize the way we use the Internet and handle data. This new network will offer faster speeds, better security, and more... more

Wireless Communication (C.2.1...) | Mar 22 23

Effects of organizational controls on employees’ cyber-loafing: the moderating effects of trait mindfulness: ACM SIGMIS Database

The problem addressed here is reducing cyper-loafing via organizational controls. The two controls considered are computer monitoring and Internet usage policy. The general conclusion is... more

Project & People Management (K.6.1) | Mar 15 23

Automated annotations for AI data and model transparency: Journal of Data and Information Quality

Individuals, organizations, and signals from automatic devices produce enormous amounts of heterogenous data. Data lakes for storage needs are suffice. Beyond storing, the quick deployment of enterprise... more

Modeling of Phys. Attributes (I.2.10...) | Mar 1 23

Parallel-and-stream accelerator for computationally fast supervised learning: Computational Statistics & Data Analysis

Large enterprises with massive amounts of data require reliable and efficient algorithms for exploring and forecasting trends in available supplies, user purchases, and advertisements. The scalability of the... more

Statistical Computing (G.3...) | Feb 20 23

A review on virtual reality and augmented reality use-cases of brain computer interface based applications for smart cities: Microprocessors & Microsystems

Current computing and user interface technologies permit increasingly direct connections between the human brain and computers. The technologies include various types of displays, such as traditional... more

Input/Output Devices (B.4.2) | Feb 2 23

One-hop out-of-band control planes for multi-hop wireless sensor networks: ACM Transactions on Sensor Networks

Wireless sensor networks (WSNs) have expanded in the last decade. Sensors are deployed in an environment to control the data generated within that area, without any wiring... more

General (C.0) | Jan 26 23

On the model of computation: counterpoint: parallel programming wall and multicore software spiral: denial hence crisis: Communications of the ACM

Vishkin’s counterpoint to Dally [1] talks about what the model of computation should now be in light of multicore processors (and their programming difficulties) and parallel processing. His view... more

General (D.1.0) | Jan 24 23

On the model of computation: point: we must extend our model of computation to account for cost and location: Communications of the ACM

The model of any process demonstrates its functionality and is useful for its study and analysis. For example, the Turing machine is a model for computation. However, the random-access machine (RAM) model is... more

General (D.1.0) | Jan 23 23

Books
Big breaches: cybersecurity lessons for everyone

This large work begins with an introductory preface that provides historical perspective on cybercriminals and introduces the authors and the basic tenets of the book. The work is divided into two broad parts: the first gives detailed descriptions, root cause analyses, and key... more
Security and Protection (K.6.5) | Mar 31 23

A hacker’s mind: how the powerful bend society’s rules, and how to bend them back

By thinking like a hacker, that is, understanding why and how complex systems can fail by finding and taking unfair advantage of imperfections, we might be able to minimize or eliminate unwanted and potentially... more
General (K.4.0) | Mar 29 23

Agile transformation: using the integral agile transformation framework to think and lead differently

Agile methodology is not a new way of managing projects or conducting business. It has been used since approximately 1980, without much publicity. Nowadays, however, as we have the Internet and... more
Software Development (K.6.3...) | Mar 20 23

Model-driven DevOps: increasing agility and security in your physical network through DevOps

As software development continues to evolve with the aim of faster development cycles, organizations are increasingly turning to model-driven DevOps. Model-driven DevOps enables developers to create and manage applications faster and more efficiently... more
Software Development (K.6.3...) | Mar 16 23

Jerusalem online: critical cartography for the digital age

While cartography studies the making and using of maps, this book focuses on a specific case study of critical cartography, that is, when power relations and differing understandings of reality and politics change or shape the making of maps for a given location or... more
Cartography (I.2.1...) | Mar 14 23

Sustainable cities: big data, artificial intelligence and the rise of green, "cy-phy" cities

The book’s central theme is the fashionable “smart city”; however, it is difficult to define the genre of the book, for example, it was published under business management. The book is rather a kind of empirical philosophy that... more
Engineering (J.2...) | Mar 9 23

Computational intelligence: a methodological introduction (3rd ed.)

Ideas, more than inventions, change the world. Seen from this perspective, computational intelligence should be viewed, in my opinion, as a set of ideas that find applications in intelligent systems or devices that exhibit intelligent behaviour in some sense (such as the... more
General (I.0) | Mar 7 23

Augmented reality and virtual reality: the power of AR and VR for business

The concept of virtual reality (VR)--that is, when one’s senses and perception can be shifted to experience something that is not real--has been around for decades. The growth in computing power and display technology over the past 40 years has resulted... more
Virtual Reality (I.3.7...) | Mar 3 23

IoT for sustainable smart cities and society

Before reading this review, take two minutes to reflect upon the following questions: (1) Can we learn to make the world a better place? (2) Are there examples of people doing so? (3) Can we move toward a future where everyone protects the global commons?... more
General (K.4.0) | Feb 28 23

Artificial intelligence: an introduction for the inquisitive reader

Chen and Chen present a comprehensive overview of the past decades from a computer science (CS) and artificial intelligence (AI) point of view. The book is not a scientific or technical/technology elaboration since a part of it, or more exactly several parts of it... more
General (I.2.0) | Feb 27 23


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2023 ThinkLoud®
Terms of Use
| Privacy Policy