 |
 |
 |
 |
 |
Integrating control-theoretic predictive deep learning for resource-efficient computing systems: Journal of Intelligent Information Systems

Deep learning (DL) on edge devices is an active area of research due to the growing need for efficient, real-time artificial intelligence (AI) in resource-constrained, low-power, and privacy-sensitive environments [1,2]... more
Control Theory (I.2.8...) | Jul 18 25

Security and privacy challenges of large language models: a survey: ACM Computing Surveys

Text generation systems based on large language models (LLMs) have a mixed reputation--many question the reliability of their advice and their discretion in protecting sensitive... more
Language Models (I.2.7...) | Jul 9 25

UR-YOLO: an urban road small object detection algorithm: Pattern Analysis & Applications

Detecting small objects such as pedestrians, bicycles, or traffic cones is a major challenge for autonomous driving systems. These objects often appear partially hidden, small, or in low-visibility conditions like rain, night, or fog. Current systems work well with large... more
Image Processing & Computer Vision (I.4) | Jul 7 25

Image recognition tools for blind and visually impaired users: an emphasis on the design considerations: ACM Transactions on Accessible Computing

Digital images are essential to communication, but pose accessibility challenges to people with visual impairments (VIPs). Image recognition (IR) technology bridges the divide by converting visuals into... more
Assistive Technologies (K.4.2...) | Jul 3 25

Local load migration in high-capacity fog computing: ACM Transactions on Internet Technology

This paper introduces a novel approach to processing data-intensive and delay-sensitive requests. It utilizes a heterogeneous fleet of fog nodes where super fog (SF) nodes (high computational resources local to terminal) are always active and handle incoming requests... more
Network Architecture & Design (C.2.1) | Jul 2 25

Gaze analysis: a survey on its applications: Image and Vision Computing

Thanks to recent developments, gaze analysis and eye-tracking applications are now highly accurate and effective in many practical uses. This survey paper presents a comprehensive summary of work from the last... more
Human Factors (H.1.2...) | Jun 30 25

One schema to rule them all: how Schema.org models the world of search: JASIST

The evolution of search engines has made structured data essential for effective information organization and retrieval. Schema.org emerged as a joint project of Google, Microsoft, Yahoo, and Yandex, in 2011, to standardize metadata across different online... more
Data Models (H.2.1...) | Jun 26 25

Understanding misunderstandings: evaluating LLMs on networking questions: SIGCOMM CCR

Large language models (LLMs) have awed the world, emerging as the fastest-growing
application of all time--ChatGPT reached 100 million active users in January
2023, just two months after its launch. After an initial cycle, they have gradually been mostly accepted... more
Language Models (I.2.7...) | Jun 20 25

Are disruptive papers more likely to impact technology and society?: JASIST

The significance of science, technology, engineering, and mathematics (STEM)-related research on society is an interesting subject of debate. To what extent are the published research results from STEM areas truly... more
General (K.3.0) | Jun 17 25

Image recognition tools for blind and visually impaired users: an emphasis on the design considerations: ACM Transactions on Accessible Computing

This paper offers a timely and comprehensive overview of assistive image recognition technologies (IRTs), focusing on the inclusion of blind or low vision (BLV) users. It contextualizes the topic within broader digital inclusion goals, referencing United Nations SDGs... more
Assistive Technologies (K.4.2...) | Jun 16 25

|
 |
|
 |
 |
 |
 |
 |
 |
The subjective value of privacy: assessing individuals’ calculus of costs and benefits in the context of state surveillance

Internet users, software developers, academics, entrepreneurs--basically everybody is now aware of the importance of considering privacy as a core part of our online... more
Privacy (K.4.1...) | Jul 17 25

Enterprise cyber risk management as a value creator: leverage cybersecurity for competitive advantage

Bob Chaput’s Enterprise cyber risk management as a value creator offers a groundbreaking perspective on cybersecurity, elevating it from a traditional defensive posture to a strategic enabler of business growth and competitive advantage. The book redefines... more
General (K.6.0) | Jul 16 25

Maths for computing: a beginner's guide

Charatan and Kans’s Maths for computing offers a structured, approachable introduction to the mathematical ideas most relevant to computing. What sets this book apart is its accessible tone--a choice that makes it particularly effective for readers lacking a deep... more
Mathematics of Computing (G) | Jul 15 25

Quantum computer music: foundations, methods and advanced concepts

It is held that those who forget history are condemned to repeat it. When it comes to quantum computing, I would like to recast this saying: those who forget (computer) history are surprisingly shocked to rediscover it. True enough, when computers... more
Music (J.5...) | Jul 14 25

Cryptography: a very short introduction

Cryptography: a very short introduction is, true to its name, an accessible primer of refreshing brevity for a centuries-old subject that lately has become of general interest. In just over 100 pages and nine chapters, plus a short appendix, the authors endeavor to explain to a lay audience the intricacies and pitfalls of... more
Cryptographic Controls (D.4.6...) | Jul 11 25

Phenotropic interaction: improving interfaces with computing with words and perceptions

Colombo’s Phenotropic interaction is a groundbreaking exploration of how computational models rooted in human perception and natural language can enhance human-computer interfaces. The book delves into the concept of phenotropic interaction, a novel... more
Interfaces (B.4.3...) | Jul 11 25

More than a chatbot: language models demystified

More than a chatbot is a basic text on artificial intelligence (AI) and especially generative AI, written for the general public. It could be useful for students outside of computer science, as well as for researchers who want learn how to use AI in their work. The book is concise and well structured, and the language is... more
Language Models (I.2.7...) | Jul 10 25

LLM engineer’s handbook: master the art of engineering large language models from concept to production

LLM engineer’s handbook is suitable for a wide range of information technology (IT) professionals and people interested in the practical applications of large language models (LLMs). It is useful for software engineers to build AI... more
Language Models (I.2.7...) | Jul 8 25

Modulated apertures and resolution in microscopy

Modulated apertures and resolution in microscopy is a concise yet impactful exploration of the critical relationship between aperture modulation techniques and resolution enhancement in optical microscopy. Spanning 100 pages, the book is designed as a specialized resource aimed at researchers... more
Biology & Genetics (J.3...) | Jul 4 25

The foundations of computability theory (2nd ed.)

After my review of the first edition (referred to as 1e going forward) was published [1], the author contacted me by email to request the full list (reduced in the final review) of issues I had compiled for CR. He was already seriously involved in producing this second edition (called 2e here) and poised to correct whatever... more
Theory (K.2...) | Jul 2 25

|
 |
|