Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
July 20, 2019

Guidelines for human-AI interaction
From a human-computer interaction (HCI) perspective, the arrival of virtual assistants (for example, Alexa, Siri, Google Assistant, and Bixby) has led to a shift in interaction mode from visual to speech-based: instead of manipulating objects displayed on a screen, users instruct or query these assistants. Beneath the surface, however, the use of... more
Web social media support a sort of knowledge and information “democratization,” transforming people from content consumers into content producers, or “producers.” In the digital context... more
- Bogdan Patrut & Monica Patrut (2014)
A survey on deep neural network-based image captioning: The Visual Computer

Automated image captioning is the task of generating a useful and accurate description of an image without manual input. An ideal system, when shown an image, generates a summary such as “the mailman is... more

Computer Vision (I.5.4...) | Jul 19 19

Improving lazy decision tree for imbalanced classification by using skew-insensitive criteria: Applied Intelligence

Decision trees are powerful graphic tools representing decisions and their related outcomes as branches of a tree. They enable people to see both the overall picture and the... more

Decision Tables (D.2.2...) | Jul 18 19

Towards a competency model: Education and Information Technologies

This paper has a title that clearly defines its content, but I found section 4, “The Proposed Model and Case Study,” the most interesting. Competency-based education and assessment can be briefly defined as “the... more

Computer Uses in Education (K.3.1) | Jul 16 19

Efficiency through uncertainty: HSCC 19

Hybrid systems are those “with both continuous dynamics and discrete logic” [1]. The discrete logic serves to label or parametrize (my terms) states; state-specific continuous dynamics, modeled largely if not exclusively by differential equations, operate within... more

Formal Methods (D.2.4...) | Jul 12 19

Practical minimum cut algorithms: Journal of Experimental Algorithmics

Due to the ever-increasing deployment of graph theory in natural and artificial phenomena, it is challenging for scientists to utilize it in a more performant manner. One of the most popular topics in graph and... more

Graph Algorithms (G.2.2...) | Jul 10 19

Exploring parent use of early STEM media to inform design for children: IDC 19

From the first sentence of the abstract: “This paper explores how parents identify and use science and math media to engage their preschool children in informal science and math learning.” Existing research... more

Computer Uses in Education (K.3.1) | Jul 3 19

The seven tools of causal inference, with reflections on machine learning: Communications of the ACM

This is one of the most influential and eye-opening articles I’ve read in the last two or three years. The author, an ACM Turing Award recipient, makes clear distinctions between machine learning (ML)... more

Learning (I.2.6) | Jul 2 19

A study on software fault prediction techniques: Artificial Intelligence Review

Software developers and managers struggle with the increasing number of software problems and defects. Such problems can rapidly increase the costs of software maintenance and development. Traditional... more

Metrics (D.2.8) | Jun 24 19

Guidelines for human-AI interaction: CHI 19

From a human-computer interaction (HCI) perspective, the arrival of virtual assistants (for example, Alexa, Siri, Google Assistant, and Bixby) has led to a shift in interaction mode from visual to speech-based... more

General (I.2.0) | Jun 20 19

NV-clustering: normally-off computing using non-volatile datapaths: IEEE Transactions on Computers

The much-needed downscaling of different core system architectures is significantly challenged by static power dissipation. The authors present a solution via middleware-transparent... more

Logic Design (B.6) | Jun 19 19

Low-rank approximation (2nd ed.)

Low-rank approximation (LRA) is an abstract framework for approximately solving many highly complex problems in science and engineering within acceptable time limits. Concrete implementations of LRA-based algorithms for specific problems are therefore highly relevant... more
Approximation (G.1.2) | Jul 18 19

How to build a cyber-resilient organization

Today, cyberattacks on a nation’s infrastructure are an acceptable form of undercover activity. All nations engage in this form of espionage, and every year increasingly sophisticated tools are created and tested to breach private and public networks and... more
Management Audit (K.6.4...) | Jul 17 19

Computational artifacts

The philosophy of any discipline must account for the goals, methodology, and subject matter of the discipline [1]. There is a well-developed body of scholarship on the philosophy of mathematics and of science, especially physics and biology, and more recently... more
General (A.0) | Jul 15 19

From Gutenberg to Google

The author of this book was the Chairman of the US Federal Communications Commission (FCC) from 2013 to 2017. From that experience, Wheeler gained firsthand knowledge of some recent developments in communication networks, and the impact of... more
Hardware (K.2...) | Jul 11 19

The Bitcoin standard

Do we need yet another book about Bitcoin [1,2,3]? After reading The Bitcoin standard, the answer is a resounding yes. Here is why. While Bitcoin is commonly viewed as a technological phenomenon, the author views it as but one “decentralized alternative to... more
Electronic Commerce (K.4.4) | Jul 9 19

Beginning blockchain

Blockchain, a distributed ledger technology, is experiencing a surge of popular interest in the context of various domains, including electronic health records, supply chains, cryptocurrencies, and electronic voting, to name a few. A blockchain is defined as a system of record to... more
Cybercash, Digital Cash (K.4.4...) | Jul 8 19

How the Internet happened

“You’ve come a long way, baby!” For those readers old enough to remember the Virginia Slims advertising campaign, which started in 1969, this phrase refers to the early days of the women’s liberation movement, highlighting momentous changes in the roles of... more
History of Computing (K.2) | Jul 5 19

The ascent of GIM, the global intelligent machine

Part of Springer’s “History of Mechanism and Machine Science” series, this would have been a better title for the book. The author starts with a kind of “fuzzy” introduction to the “Big History of the Machine,” looking at... more
General (I.2.0) | Jul 1 19

New light through old windows

Science fiction has often been prophetic--sometimes wrongly so, sometimes very much on point. New light through old windows is a collection of science fiction stories--the earliest is from the early 19th century and the most recent is from the mid-1930s. Each... more
General (A.0) | Jun 28 19

Building your online store with WordPress and WooCommerce

This is a how-to book on using WordPress and WooCommerce--WooCommerce is a plugin for WordPress, creating an e-commerce store. The text goes through the steps required to configure... more
Electronic Commerce (K.4.4) | Jun 27 19

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy