Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
March 23, 2023

Model-driven DevOps: increasing agility and security in your physical network through DevOps
As software development continues to evolve with the aim of faster development cycles, organizations are increasingly turning to model-driven DevOps. Model-driven DevOps enables developers to create and manage applications faster and more efficiently by taking advantage of... more
As members of the ACM and of this new and dynamic field, we have a responsibility for our own continuing education—in computer components, in logic and... more
- John W. Carr III (1957)
AI-based computer vision using deep learning in 6G wireless networks: Computers and Electrical Engineering

The development of sixth-generation (6G) wireless networks is expected to revolutionize the way we use the Internet and handle data. This new network will offer faster speeds, better security, and... more

Wireless Communication (C.2.1...) | Mar 22 23

Effects of organizational controls on employees’ cyber-loafing: the moderating effects of trait mindfulness: ACM SIGMIS Database

The problem addressed here is reducing cyper-loafing via organizational controls. The two controls considered are computer monitoring and Internet usage policy. The general conclusion is... more

Project & People Management (K.6.1) | Mar 15 23

Automated annotations for AI data and model transparency: Journal of Data and Information Quality

Individuals, organizations, and signals from automatic devices produce enormous amounts of heterogenous data. Data lakes for storage needs are suffice. Beyond storing, the quick deployment of enterprise... more

Modeling of Phys. Attributes (I.2.10...) | Mar 1 23

Parallel-and-stream accelerator for computationally fast supervised learning: Computational Statistics & Data Analysis

Large enterprises with massive amounts of data require reliable and efficient algorithms for exploring and forecasting trends in available supplies, user purchases, and advertisements... more

Statistical Computing (G.3...) | Feb 20 23

A review on virtual reality and augmented reality use-cases of brain computer interface based applications for smart cities: Microprocessors & Microsystems

Current computing and user interface technologies permit increasingly direct connections between the human brain and computers. The technologies include various types of displays, such as traditional... more

Input/Output Devices (B.4.2) | Feb 2 23

One-hop out-of-band control planes for multi-hop wireless sensor networks: ACM Transactions on Sensor Networks

Wireless sensor networks (WSNs) have expanded in the last decade. Sensors are deployed in an environment to control the data generated within that area, without any wiring. Data is sensed by the deployed devices... more

General (C.0) | Jan 26 23

On the model of computation: counterpoint: parallel programming wall and multicore software spiral: denial hence crisis: Communications of the ACM

Vishkin’s counterpoint to Dally [1] talks about what the model of computation should now be in light of multicore processors (and their programming difficulties) and parallel processing... more

General (D.1.0) | Jan 24 23

On the model of computation: point: we must extend our model of computation to account for cost and location: Communications of the ACM

The model of any process demonstrates its functionality and is useful for its study and analysis. For example, the Turing machine is a model for computation. However, the random-access machine (RAM) model is... more

General (D.1.0) | Jan 23 23

Block Walsh-Hadamard transform based binary layers in deep neural networks: ACM Transactions on Embedded Computing Systems

Convolution is a mathematical operation that calculates the integral of the product of two functions or signals with one of the signals flipped. Modern deep neural networks consider convolution as the core... more

General (G.0) | Jan 17 23

RxNet: Rx-refill graph neural network for overprescribing detection: CIKM 21

The intensifying rates of opioid overuse and drug misuse require effective drug prescription scrutinizing tools. Despite the available prescription drug monitoring programs (PDMPs) in countries like the US, how... more

Health (J.3...) | Jan 6 23

Agile transformation: using the integral agile transformation framework to think and lead differently

Agile methodology is not a new way of managing projects or conducting business. It has been used since approximately 1980, without much publicity. Nowadays, however, as we have the Internet and communication has become... more
Software Development (K.6.3...) | Mar 20 23

Model-driven DevOps: increasing agility and security in your physical network through DevOps

As software development continues to evolve with the aim of faster development cycles, organizations are increasingly turning to model-driven DevOps. Model-driven DevOps enables developers to create and manage applications faster and more efficiently... more
Software Development (K.6.3...) | Mar 16 23

Jerusalem online: critical cartography for the digital age

While cartography studies the making and using of maps, this book focuses on a specific case study of critical cartography, that is, when power relations and differing understandings of reality and politics change or shape the making of maps for a given location or... more
Cartography (I.2.1...) | Mar 14 23

Sustainable cities: big data, artificial intelligence and the rise of green, "cy-phy" cities

The book’s central theme is the fashionable “smart city”; however, it is difficult to define the genre of the book, for example, it was published under business management. The book is rather a kind of empirical philosophy that overviews vast areas of human... more
Engineering (J.2...) | Mar 9 23

Computational intelligence: a methodological introduction (3rd ed.)

Ideas, more than inventions, change the world. Seen from this perspective, computational intelligence should be viewed, in my opinion, as a set of ideas that find applications in intelligent systems or devices that exhibit intelligent behaviour in some sense (such as the... more
General (I.0) | Mar 7 23

Augmented reality and virtual reality: the power of AR and VR for business

The concept of virtual reality (VR)--that is, when one’s senses and perception can be shifted to experience something that is not real--has been around for decades. The growth in computing power and display technology over the past 40 years has resulted... more
Virtual Reality (I.3.7...) | Mar 3 23

IoT for sustainable smart cities and society

Before reading this review, take two minutes to reflect upon the following questions: (1) Can we learn to make the world a better place? (2) Are there examples of people doing so? (3) Can we move toward a future where everyone protects the global commons?... more
General (K.4.0) | Feb 28 23

Artificial intelligence: an introduction for the inquisitive reader

Chen and Chen present a comprehensive overview of the past decades from a computer science (CS) and artificial intelligence (AI) point of view. The book is not a scientific or technical/technology elaboration since a part of it, or more exactly several parts of it... more
General (I.2.0) | Feb 27 23

The story of proof: logic and the history of mathematics

Years ago, several of my colleagues in the university’s mathematics department told me that many high school students no longer study classic plane geometry, the kind of instruction that emphasizes careful logic applied to axioms, postulates, and theorems. I asked... more
History of Computing (K.2) | Feb 23 23

Advances in data science

Advances in data science, published as volume 26 in Springer’s “Association for Women in Mathematics” series, summarizes the results from two related workshops--the first one held at the Institute for Computational and Experimental Research in Mathematics (ICERM), Providence, Rhode... more
General (G.0) | Feb 21 23

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2023 ThinkLoud®
Terms of Use
| Privacy Policy