Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
December 15, 2019

Practical modelling of dynamic decision making
Computational models hold considerable promise for planning and prediction in applied domains such as military operations. But such models face a knowledge acquisition bottleneck when applying them to complex real-world problems. For example, agent-based models are typically... more
IX. General Conclusions, and Recommendation.
1. We are of opinion that the labours of Mr. Babbage, firstly on his Difference Engine... more
- C. W. Merrifield (1879)
Deep learning in the IT curriculum: SIGITE 19

Mathematical principles continue to revolutionize and expand the application domains related to artificial neural networks (ANNs), a subfield of machine learning (ML). How should deep learning, a form of ANNs, be effectively incorporated into the information... more

Comp. & Info. Science Education (K.3.2) | Dec 13 19

A multi-level-optimization framework for FPGA-based cellular neural network implementation: ACM Journal on Emerging Technologies in Computing Systems

Multi-level optimizations for cellular neural network design with Zybo and ZedBoard field-programmable gate arrays (FPGAs), including the system... more

General (B.0) | Dec 3 19

Assessing neural network scene classification from degraded images: ACM Trans. on Applied Perception

Image processing and understanding human vision have shared interests and methods since the beginning of computer vision research. In recent years, deep learning and in particular... more

General (I.4.0) | Nov 27 19

Schedulability analysis of tasks with corunner-dependent execution times: ACM Trans. on Embedded Computing Systems

Scarce computer memory and processor core resources create crucial challenges to the real-time execution of concurrent software. How should a multicore... more

Real-Time & Embedded Systems (D.4.7...) | Nov 22 19

Contextual visualization: IEEE Computer Graphics and Applications

If users cannot see the breakdown of data hidden behind summaries visualized as charts or pies, they will go to another website to find the information. Unseen information can lead to biased findings presented by summaries... more

General (I.3.0) | Nov 22 19

On the impact of programming languages on code quality: a reproduction study: ACM Trans. on Programming Languages and Systems

E. W. Dijkstra’s classic A discipline of programming [1] has rightly achieved the sort of permanent validity that mathematician G. H. Hardy spoke of in his... more

General (D.2.0) | Nov 21 19

A first look at Certification Authority Authorization (CAA): ACM SIGCOMM Computer Communication Review

The cornerstone of information and communications technology (ICT), security provides and maintains robustness, sustainability, and reliability. Using web services by referring to different web pages... more

Security & Protection (C.2.0...) | Nov 21 19

DeepFL: integrating multiple fault diagnosis dimensions for deep fault localization: ISSTA 19

Testing is a very important activity in software development. With testing comes the need to find the origin of the defects detected. This need is also important when failures occur in production.... more

Testing & Debugging (D.2.5) | Nov 21 19

Deep item-based collaborative filtering for top-N recommendation: ACM Trans. on Information Systems

Recommender systems are an essential component in digital platforms, nudging consumers toward more efficient decision making by predicting and... more

General (H.0) | Nov 19 19

Reproducibility in scientific computing: ACM Computing Surveys

The authors discuss reproducible research, that is, research where the same task produces the same result as the original research. Researchers in the computing community are encouraged to make their... more

Computer & Info. Science Edu. (K.3.2) | Nov 19 19

Bayesian statistics the fun way

My expectations for this book were great in light of its intriguing title, and as far as the writing goes, the author delivers. Technically, however, there are some serious issues that make it unsuitable barring some revisions. Its four parts--“Introduction to Probability,” “Bayesian... more
Probability & Statistics (G.3) | Dec 13 19

Demystifying Internet of Things security

When a paper on Internet of Things (IoT) security is too brief, experienced users will look for other papers. This book covers many aspects of IoT security, from hardware to applications and systems. The first chapter covers why Stuxnet happened and what could have been... more
Security & Protection (C.2.0...) | Dec 12 19

Humans and machines at work

The unprecedented pace of the so-called fourth industrial revolution, which is characterized by the fusion of technologies and automation with humans, thus forming new physical, digital, and biological spheres for cognitive and manual workplaces... more
Economics (J.4...) | Dec 12 19

Centrality and diversity in search

This book is part of the “SpringerBriefs in Intelligent Systems” series, which covers diverse areas of intelligent systems, including artificial intelligence (AI), multiagent systems, and cognitive robotics. From their web profiles I gather that Dr. Murty is a... more
Sorting/Searching (E.5...) | Dec 10 19

Learning Java with games

True to its title, this book will guide readers through Java with an appealing, well-structured sequence of increasingly complex coding tasks, leading eventually to journeyman fluency in writing a graphical user interface (GUI) application--that is, if one is willing to... more
Java (D.3.2...) | Dec 6 19

Theory of modeling and simulation (3rd ed.)

By the authors’ reckoning, modeling needs an established body of knowledge, usable by all specialists in the discipline. This work begins by explaining concepts related to the levels of system specification and their formalism (both computationally and... more
General (I.6.0) | Dec 5 19

Lie group machine learning

Machine learning, one of the evergreen fields of electrical engineering, has recently gained momentum and has a number of new and innovative applications. Related fields, such as artificial intelligence, deep learning, brain learning, tensor flow, and so on... more
Neural Nets (I.5.1...) | Dec 4 19

Integer linear programming in computational and systems biology

Integer linear programming (ILP) is an optimization method that depends on the satisfaction of a set of linear equality or inequality relationships and has solutions with integer (rather than continuous)... more
Linear Programming (G.1.6...) | Dec 2 19

Quantitative intertextuality

Intertextuality is a term used to denote the idea that there are relationships between texts. This includes the conscious modeling of one text on another, allusions to phrases from other texts, and even plagiarism. The goal of this book is to introduce readers to the use of... more
Learning (I.2.6) | Nov 26 19

Cryptographic and information security approaches for images and videos

Cryptography is the art of securing communications transmitted through insecure channels. It consists of mechanisms to keep the data confidential by preventing access to unapproved individuals, maintaining... more
Cryptographic Controls (D.4.6...) | Nov 26 19

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy