Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
October 20, 2020
Search
Highlight

Essential logic for computer science
The “for computer science” part of this excellent book’s title initially gave me pause, as it connoted for me a possible compromise of the “logic” part. As a matter of fact, the very opposite is the case here. The book’s predicate logic, equational reasoning, and natural deduction [1,2,3] are complete and rigorous, and are further enforced... more
Quote
If the mind, in its capacity of formal reasoning, obeys, whether consciously or unconsciously, mathematical laws, it claims through its other... more
- George Boole (1854)
Articles
Massively parallel polar decomposition on distributed-memory systems: ACM Transactions on Parallel Computing

For solving problems with high computational demands, it is nowadays essential to apply parallel algorithms that scale effectively to a large number of computational cores: microprocessors may integrate dozens... more

Mathematical Software (G.4) | Oct 20 20

Nonhomogeneous place-dependent Markov chains, unsynchronised AIMD, and optimisation: Journal of the ACM

The TCP that underpins most Internet traffic has a simple yet intuitively beautiful algorithm for congestion control. Every connection will gradually ramp up the bandwidth... more

Probability & Statistics (G.3) | Oct 19 20

A survey on deep learning: algorithms, techniques, and applications: ACM Computing Surveys

Deep learning (DL) algorithms, characterized by mapping from input to output (labels or classes) with multiple hidden layers in between, have revived the excitement of artificial intelligence (AI) to get... more

Learning (I.2.6) | Oct 16 20

Neural graph collaborative filtering: SIGIR 19

Typically, collaborative filtering (CF) is simply a nearest neighbor (NN) algorithm used either in its original form or in machine learning (ML), especially in supervised learning, to predict user preferences in recommender systems. Here, neural graph collaborative... more

Filtering (I.4.3...) | Oct 14 20

Systematically ensuring the confidence of real-time home automation IoT systems: ACM Transactions on Cyber-Physical Systems

The quick expansion of computing technology in many areas leads to different new paradigms; among them is the paradigm of cyber-physical systems... more

Real-Time & Embedded Systems (D.4.7...) | Oct 13 20

Scratchpad-memory management for multi-threaded applications on many-core architectures: ACM Transactions on Embedded Computing Systems

This paper focuses on improving many-core architectures via software programmable or scratchpad memory (SPM): An SPM contains an... more

Real-Time And Embedded Systems (C.3...) | Oct 7 20

Hierarchies in inclusion logic with lax semantics: ACM Transactions on Computational Logic

A natural interest of computational logic is to investigate decidable subsets of first-order logic. One such subset is the formalism of inclusion logic (FOI), introduced by Galliani as an evolution of dependence logic [1]... more

General (F.0) | Oct 1 20

Credulous acceptability, poison games and modal logic: AAMAS 19

Abstract argumentation theory is based on the notion that argument x attacks argument y. A set of arguments S is “admissible” if no arguments within the set attack each other, and for every argument y that attacks an argument... more

Modal Logic (F.4.1...) | Sep 30 20

Detection of crop pests and diseases based on deep convolutional neural network and improved algorithm: ICMLT 19

Especially in large monoculture-based agricultural settings, an outbreak of pests or diseases can have a major impact on yield or quality of a crop. Advances in image processing based on convolutional... more

Neural Nets (C.1.3...) | Sep 29 20

Blockchain technology: What is it good for?: Communications of the ACM

Cryptocurrency has been the origin of an evolution in financial and monetary relations the world over, and its domain of influence continues to spread. Bitcoin is its well-known symbol. In addition to security, trust... more

General (D.2.0) | Sep 28 20

Books
Python for probability, statistics, and machine learning (2nd ed.)

The aim of this book is to offer programmers a tutorial on how to use Python libraries, like NumPy, Matplotlib, Pandas, SciPy, and SymPy, to perform probability evaluations and statistical analyses as the foundations for... more
Python (D.3.2...) | Oct 15 20

Machine understanding: machine perception and machine perception MU

This is a difficult book to define/describe. Some parts are very interesting, presenting good research questions and discussions; other parts lack detail and depth--readers are sometimes just sent to the author's... more
KR Formalisms & Methods (I.2.4) | Oct 12 20

Guide to automotive connectivity and cybersecurity

Information technology (IT) specialists are very involved in vehicle design and maintenance. The technologies that support modern engine monitoring, navigation, driver information, and safety systems would be... more
General (C.0) | Oct 9 20

Numerical methods

According to my experience, teaching numerical methods can be an ordeal: students typically do not like the related courses. The reason stems from the fact that the topic is difficult, that is, not easy to follow; additionally, the attendees sometimes cannot... more
Numerical Analysis (G.1) | Oct 8 20

Essentials of cloud computing

Why do we need cloud computing? What are the core components of cloud computing architecture and its technological foundations? What is the impact of virtualization and multitenancy on cloud security? What is the best way to migrate to cloud computing?... more
Distributed Architectures (C.1.4...) | Oct 6 20

Finite-state techniques

The mathematical theory of automata is one of the great ideas of computer science, easy to state and understand, yet with great explanatory power and potential for problem solving. When I first encountered finite-state machines many years ago [1], the... more
Automata (F.1.1...) | Oct 5 20

Essential logic for computer science

The “for computer science” part of this excellent book’s title initially gave me pause, as it connoted for me a possible compromise of the “logic” part. As a matter of fact, the very opposite is the case here. The book's predicate logic, equational reasoning, and... more
General (F.0) | Oct 2 20

The era of Internet of Things

A very short text of just over 100 pages, this book has a catchy title and the author claims it contains everything needed to start working with the Internet of Things (IoT). Unfortunately, such a claim is an enormous exaggeration. The book consists of five chapters... more
General (C.0) | Sep 25 20

Game theory, the Internet of Things and 5G networks

Sustained by the much-improved capabilities of 5G technology, the new Internet of Things (IoT) applications will benefit from an increased number of interconnected sensors and devices, as well as from a significantly larger data transfer, improved... more
Games (I.2.1...) | Sep 24 20

Privacy in mobile and pervasive computing

Mobile and pervasive computing can offer really valuable benefits, such as making our lives more convenient, efficient, and safe. This is done through tailored and context-aware services that anticipate what we need, as... more
Security, Integrity & Protection (H.2.7...) | Sep 23 20


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2020 ThinkLoud, Inc.
Terms of Use
| Privacy Policy