Search
These reviews are the most popular with readers.
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Ranking
Date Reviewed
Title
Author
Published Date
Descending
Ascending
For the last:
30 days
60 days
90 days
6 months
1 year
all time
1-10
of
19483
results
Ranking
Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges
Koay A., Ko R., Hettema H., Radke K. Journal of Intelligent Information Systems 601-29, 2023. Type: Article
Today, machine learning (ML) is applied to threat detection and classification problems in the important field of industrial control. This paper reviews different ML papers that apply supervised learning, unsupervised learning, deep learning, and ...
1
Trustworthy AI: from principles to practices
Li B., Qi P., Liu B., Di S., Liu J., Pei J., Yi J., Zhou B. ACM Computing Surveys 55(9): 1-46, 2023. Type: Article, Reviews: (2 of 2)
As computing technology continues to evolve, artificial intelligence (AI) is playing an increasing role in various aspects of our lives. Although AI dates back many decades--I took an AI subject in my university studies, in 1988--only re...
2
Data-driven prototyping via natural-language-based GUI retrieval
Kolthoff K., Bartelt C., Ponzetto S. Automated Software Engineering 30(1): 2023. Type: Article
Reading this paper would leave anyone conflicted. It describes a good contribution ridden with flaws. It is puzzling that the referees and journal editors accepted the paper in its current form. The presentation style is verbose, and some of the l...
3
On the adaptation of recurrent neural networks for system identification
Forgione M., Muni A., Piga D., Gallieri M. Automatica (Journal of IFAC) 1552023. Type: Article
In this pape, Forgione et al. propose a transfer learning methodology to adapt recurrent neural network (RNN) models for dynamic system identification to new operating conditions. The approach is premised on the concept that the dynamics of real-w...
4
Information security planning: a practical approach (2nd ed.)
Lincke S., Springer International Publishing, Cham, Switzerland, 2024. 445 pp. Type: Book (9783031431173)
Information security planning
presents a comprehensive guide to the basics of information security planning. The author’s perspective addresses critical issues and challenges for emerging information security, including security aware...
5
Building a data culture: the usage and flow data culture model
Griffin G., Holcomb D., Apress, New York , NY, 2023. 225 pp. Type: Book (9781484299654)
Building a data culture
provides an introduction to the concepts of organizational culture and data culture. It emphasizes that, for an organization’s strategy to succeed, there must be alignment between the strategy and the prevailin...
6
D-finite functions
Kauers M., Springer International Publishing, Cham, Switzerland, 2023. 664 pp. Type: Book (9783031346514)
D-finite functions
is a comprehensive introduction to computations with functions, particularly the use of D-finite functions, in the design of algorithms targeting proof of presence/lack of relation(s), algorithms dedicated to resolving as...
7
Writing by hand or digitally in first grade: effects on rate of learning to compose text
Spilling E., Rønneberg V., Rogne W., Roeser J., Torrance M. Computers & Education 1982023. Type: Article
This paper is one outcome of the DigiHand project (2018-2022), funded by the Research Council of Norway (grant number 273422). It is divided into five sections: “Introduction,” “Method,” “Statistical Analysis,” ...
8
10 things software developers should learn about learning
Brown N., Hermans F., Margulieux L. Communications of the ACM 6778-87, 2024. Type: Article
As software developers, we understand the detailed workings of the different components of our computer systems. And--probably due to how computers were presented since their appearance as “digital brains” in the 1940s--we so...
9
A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks
Tsao K., Girdler T., Vassilakis V. Ad Hoc Networks 1332022. Type: Article
FANET was coined for flying ad hoc networks, for example, unmanned aerial vehicles (UAVs). This survey paper is an in-depth discussion of the cybersecurity concerns and shortcomings unique to UAVs, as compared to more established mobile ad hoc net...
10
Display
5
10
15
25
50
100
per page
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy