Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
September 9, 2024
Search
Highlight

ChatGPT and Bard for business automation: achieving AI-driven growth
ChatGPT and Bard for business automation is a nice work by Tom Taulli. He provides step-by-step instructions on how to get started with ChatGPT and Google Bard, and offers tips on how to improve prompt-writing skills in order to optimize their use for different business needs. This work compiles the emerging trends of generative artificial intelligence... more
Quote
In my study of youth participation in social media I wanted to understand what everyday teen life looked like once technology was commonplace .... I was a part of the first cohort of youth to have access to the internet as a teenager... more
- danah boyd (2016)
Articles
Free and open source software and other market failures: Communications of the ACM

Understanding the free and open-source software (FOSS) movement has, since its beginning, implied crossing many disciplinary boundaries. This article describes FOSS’s history, explaining its undeniable success throughout the 1990s, and why the... more

General (D.0) | Sep 2 24

The Internet of batteryless things: Communications of the ACM

The world is moving toward a future of very small, Internet-connected intelligent devices, that is, the Internet of Things (IoT). However, at present, providing power to these devices is a problem--the inconvenient, expensive, and... more

General (K.6.0) | Aug 16 24

A review of semi-supervised learning for text classification: Artificial Intelligence Review

Duarte and Berton address the challenges of text classification in the context of big data, emphasizing the difficulties and costs associated with obtaining large labeled datasets. They explore the field of semi-supervised learning as a solution, presenting... more

Text Analysis (I.2.7...) | Aug 14 24

10 things software developers should learn about learning: Communications of the ACM

In today’s fast-changing world where groundbreaking technologies are emerging to eclipse their predecessors at an unprecedented pace, continuous learning is not an option but a necessity for practitioners. Understanding how humans learn and memorize can help us do... more

Software Development (K.6.3...) | Jul 29 24

ContraMTD: an unsupervised malicious network traffic detection method based on contrastive learning: WWW 24

The methodology utilized in this study is innovative, as the procedure used to identify malicious network traffic involves an unsupervised method in contrastive learning. This unsupervised technique aims to surpass both supervised and unsupervised methods... more

Security & Protection (C.2.0...) | Jul 19 24

The temporal logic of coalitional goal assignments in concurrent multiplayer games: ACM Transactions on Computational Logic

Enqvist and Goranko’s temporal logic of coalitional goal assignments (TL-CGA) extends Alur, Henzinger, and Kupferman’s 1997 alternating-time temporal logic (ATL) and de Pauly’s 2002 coalition logic (CL). TL-CGA... more

Games (K.8.0...) | Jun 25 24

Backdoor attacks and defenses in federated learning: survey, challenges and future research directions: Engineering Applications of Artificial Intelligence

Machine learning (ML) technologies are becoming mainstream, particularly for the analysis of bulk data. The success of ML systems, however... more

Security (K.4.4...) | Jun 17 24

The nature of computational models: Computing in Science and Engineering

Scientific computing is one of the oldest, if not the oldest, types of computational science. The venerable Fortran programming language was created to help scientists expand the frontier of what theory could produce as numerical results. In the seven... more

Physical Sciences & Engineering (J.2) | May 27 24

A deep learning technique for intrusion detection system using a recurrent neural networks based framework: Computer Communications

Kasongo’s paper focuses on enhancing network security through an advanced intrusion detection system (IDS) utilizing machine learning (ML) techniques. The study... more

Neural Nets (I.5.1...) | May 21 24

Language-based software testing: Communications of the ACM

Testing remains as the prime technique to check whether software satisfies the specified requirement. Owing to the high volume of potential inputs and expected outputs in very large systems, the process is laborious and error-prone if conducted manually... more

Testing & Debugging (D.2.5) | May 1 24

Books
Nexus: a brief history of information networks from the Stone Age to AI

Nexus: a brief history of information networks from the Stone Age to AI provides an expansive overview of how information networks have evolved throughout human history, influencing societies, economies, and technologies in profound ways. The book traces... more
History of Computing (K.2) | Sep 6 24

Data analysis: a gentle introduction for future data scientists

Data analysis by Graham Upton and Dan Brawn is a concise and to-the-point guide to data analysis. Compared to other statistics and data analysis books, this one is well written without delving into extensive details on each topic, making it accessible to... more
Probability & Statistics (G.3) | Sep 4 24

Text mining with R: a tidy approach

Text mining, also known as text analytics or natural language processing (NLP), is a field of study and practice that involves extracting meaningful information and knowledge from unstructured textual data. The goal of text mining is to convert large volumes of text into structured... more
General (D.3.0) | Aug 30 24

Programming languages: principles and paradigms (2nd ed.)

Once students are proficient in a programming language and start to learn another one, they often identify familiar concepts in new syntactic forms. This may lead to wondering about the fundamental building blocks of programming languages. This second edition... more
Programming Languages (D.3) | Aug 28 24

Middle tech: software work and the culture of good enough

I’ll start with a quote from Albert Einstein as an epigraph for this review: “The world as we have created it is a process of our thinking. It cannot be changed without changing our thinking.“ Middle tech: software work and the culture of good enough by Paula Bialski is an evidence... more
General (D.0) | Aug 26 24

Using R for Bayesian spatial and spatio-temporal health modeling

Embarking on a journey through the intricate landscape of Bayesian statistics can be a daunting task, but Andrew B. Lawson’s Using R for Bayesian spatial and spatio-temporal health modeling is a welcoming guide that transforms complexity into clarity for... more
Statistical Computing (G.3...) | Aug 21 24

Remote sensing land surface changes: the 1981-2020 intensive global warming

The subject of the book is global warming and its impact on human life. Kogan analyzes various technical aspects of this subject, and readers interested in various data analysis reports will find the book very useful. The book also serves as a survey with its many references... more
Sensors (I.2.9...) | Aug 19 24

Architecting data and machine learning platforms: enable analytics and AI-driven innovation in the cloud

Architecting data and machine learning platforms is a comprehensive guide to building robust data and machine learning platforms in the cloud. It provides practical insights and strategies for leveraging cloud technologies to drive innovation in analytics and... more
Business (J.1...) | Aug 12 24

Beginning Git and GitHub: version control, project management and teamwork for the new developer (2nd ed.)

Mariot Tsitoara’s Beginning Git and GitHub is a comprehensive guide tailored for new developers who want to master version control through practical, step-by-step tutorials. This updated edition introduces readers to GitHub workflows and includes new... more
Version Control (D.2.7...) | Aug 7 24

Evaluating participatory mapping software

The social impacts of technology have been a concern and a focus of research for many decades. This only accelerated as the computing industry evolved from mainframes to smartphones and laptops. Powerful computing technologies became ubiquitous, concurrently heightening both social implications and societal... more
Maps (H.2.4...) | Aug 5 24


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy