Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
February 27, 2024
Search
Highlight

Simple type theory: a practical logic for expressing and reasoning about mathematical ideas
What has evolved from the famous century-old (Bertrand) Russell paradox and Russell’s consequent theory of types needs, in my opinion, all the useful elaboration, clarification, explication, and explanation that it can get. Any nontrivial experience in the creation and... more
Quote
There are two important scientific statements that Aristotle makes about memory: First, the elementary unit of memory... more
- James A. Anderson, Andras Pellionisz, and Edward Rosenfeld (2003)
Articles
10 things software developers should learn about learning: Communications of the ACM

As software developers, we understand the detailed workings of the different components of our computer systems. And--probably due to how computers were presented since their appearance as “digital... more

Software Development (K.6.3...) | Feb 22 24

Conversational artificial intelligence in the AEC industry: a review of present status, challenges and opportunities: Advanced Engineering Informatics

Those working in the architecture, engineering, and construction (AEC) domain often get bogged down in day-to-day paperwork and verbally communicated instructions. Natural... more

General (I.2.0) | Feb 14 24

State-of-the-art improvements and applications of position based dynamics: Computer Animation and Virtual Worlds

The physically plausible simulation of objects is an active area of research in computer graphics. It is used in movies and video games and to simulate phenomena that would be expensive to do in a laboratory... more

Animation (I.3.7...) | Feb 12 24

A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks: Ad Hoc Networks

FANET was coined for flying ad hoc networks, for example, unmanned aerial vehicles (UAVs). This survey paper is an in-depth discussion of the cybersecurity concerns and shortcomings unique to UAVs, as compared to... more

Security & Protection (C.2.0...) | Feb 8 24

Trustworthy AI: from principles to practices: ACM Computing Surveys

As systems based on AI have become the backbone of various public services such as transportation, finance, medicine, security, academics, medicine, and entertainment, the reliability and trustworthiness of AI artifacts/products, including robustness... more

General (I.2.0) | Jan 30 24

A deep learning technique for intrusion detection system using a recurrent neural networks based framework: Computer Communications

So let’s assume you already know and understand that artificial intelligence’s main building blocks are perceptrons, that is, mathematical models of neurons. And you know that, while a single perceptron is... more

Neural Nets (I.5.1...) | Jan 19 24

CPFloat: a C library for simulating low-precision arithmetic: ACM Transactions on Mathematical Software

Mixed-mode floating-point arithmetic (MMFPA) is a requirement of modern numerical computing. The need arises, for instance, when computations entail execution on graphics processing units (GPUs) interleaved... more

Mathematical Software (G.4) | Jan 12 24

Hierarchical reinforcement learning for efficient and effective automated penetration testing of large networks: Journal of Intelligent Information Systems

Cybersecurity practitioners require alternative approaches and tools for combating the emerging security threats worldwide. How effective are current penetration testing... more

Learning (I.2.6) | Dec 18 23

Machine learning algorithms to forecast air quality: a survey: Artificial Intelligence Review

Forecasting air pollution levels can enable important public health actions such as traffic modification, self-protection steps by individuals at risk, and measures such as burn bans. The authors use this book to... more

Algorithms (B.2.4...) | Dec 11 23

Detecting deception using machine learning with facial expressions and pulse rate: Artificial Life and Robotics

This is a very important paper because it combines machine learning, facial expressions analysis, and pulse rate in order to detect deception in an interview context. The results are supported by strong machine... more

Learning (I.2.6) | Dec 8 23

Books
Automata theory: an algorithmic approach

Novices to automata theory may want to start with Dines Bjørner’s narrative on principles and techniques, found in the automata theory chapter of his enjoyable three-volume set [1], which covers intuition, motivation, and pragmatics. Bjørner’s objective: to help... more
General (G.1.0) | Feb 27 24

Practical implementation of a data lake: translating customer expectations into tangible technical goals

Practical implementation of a data lake is a puzzling book. Full of buzzwords and acronyms, it rarely provides their explanation. Writing is colloquial to the extreme, similar to the transcripts of informal discussions... more
General (K.6.0) | Feb 26 24

The future of work: challenges and prospects for organisations, jobs and workers

This collection of ten articles written as research papers--each constituting a different chapter of the book--is authored by 27 scholars and edited by four of them. The collection is essentially “a projection of how work, working, workers, and the workplace will evolve... more
General (K.7.0) | Feb 23 24

Cyber malware: offensive and defensive systems

Cyber malware: offensive and defensive systems provides a thorough examination of the constantly changing realm of cyber threats and the defense mechanisms created to fend them off. For those working in the field of cybersecurity, this book is an... more
Security & Protection (K.6.5) | Feb 21 24

Security chaos engineering: sustaining resilience in software and systems

The remarkable progress in data communications and networking necessitates new behaviors, principles, and disciplines concerning security. In addition to security techniques like encryption, authentication, established demilitarized zones (DMZs), and firewalls, a... more
Security & Protection (K.6.5) | Feb 20 24

Software architecture: research roadmaps from the community

This short work is a compendium of six papers that arose from an International Conference on Software Architectures (ICSA) workshop held in Honolulu, Hawaii, in August 2022. The authors gathered around a common interest in a topic. These international teams discussed... more
Software Architectures (D.2.11) | Feb 19 24

Simple type theory: a practical logic for expressing and reasoning about mathematical ideas

What has evolved from the famous century-old (Bertrand) Russell paradox and Russell’s consequent theory of types needs, in my opinion, all the useful elaboration, clarification, explication, and explanation that it can get. Any nontrivial experience in the... more
General (G.0) | Feb 16 24

Pro Bash: learn to script and program the GNU/Linux shell (3rd ed.)

This is an excellent reference book for those who need to write Bash scripts. It is well organized, logically presented, and covers all the major commands and structures that are necessary to write useful scripts. The book makes few assumptions about the reader’s... more
Linux (D.4.0...) | Feb 15 24

Keywords in and out of context

In a literate society, the use of keywords is such a common everyday activity that we rarely reflect on the origins of their use. It seems so normal and inherent to our lives that using keywords is in our DNA. This is an enlightening short book on keywords and their use. They are not inherent to the human species like... more
Word Processing (H.4.1...) | Feb 9 24

Algorithms for big data

This book is an output from the German Research Foundation’s priority programme SPP 1736 on “Algorithms for Big Data.” SPP 1736 funded 15 projects, and a few projects with their own funding were also associated with the programme. There are eight papers under the... more
Algorithms (B.2.4...) | Feb 7 24


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy