|

A systematic literature review on automated software vulnerability detection using machine learning
: ACM Computing Surveys

Software vulnerabilities pose a critical security risk, allowing attackers to exploit weaknesses in code. Traditional detection methods, such as static and dynamic analysis, often produce high false...
Software/Program Verification (D.2.4) | Apr 16 25

Knowledge editing for large language models: a survey
: ACM Computing Surveys

Wang et al. provide a comprehensive survey on knowledge-based model editing (KME) techniques, focusing on methods to efficiently and precisely update large language models (LLMs) without negatively...
Language Models (I.2.7...) | Feb 18 25

Meta-learning approaches for few-shot learning: a survey of recent advances
: ACM Computing Surveys

Gharoun et al. provide a comprehensive overview of meta-learning techniques, with a focus on how these methods facilitate learning from limited data (few-shot learning, FSL). They categorize recent...
General (I.2.0) | Dec 20 24

Security and privacy challenges of large language models: a survey
: ACM Computing Surveys

Text generation systems based on large language models (LLMs) have a mixed reputation--many question the reliability of their advice and their discretion in protecting sensitive...
Language Models (I.2.7...) | Jul 9 25

Image recognition tools for blind and visually impaired users: an emphasis on the design considerations
: ACM Transactions on Accessible Computing

Digital images are essential to communication, but pose accessibility challenges to people with visual impairments (VIPs). Image recognition (IR) technology bridges the divide by converting visuals into...
Assistive Technologies (K.4.2...) | Jul 3 25

Image recognition tools for blind and visually impaired users: an emphasis on the design considerations
: ACM Transactions on Accessible Computing

This paper offers a timely and comprehensive overview of assistive image recognition technologies (IRTs), focusing on the inclusion of blind or low vision (BLV) users. It contextualizes the topic within broader digital inclusion goals, referencing United Nations SDGs...
Assistive Technologies (K.4.2...) | Jun 16 25

How economically marginalized adolescents of color negotiate critical pedagogy in a computing classroom
: ACM Transactions on Computing Education (TOCE)

This is an extraordinary paper for extraordinary times. It reports on the challenges of designing and teaching a six-week summer computer science (CS) course, originally conducted in 2022, for first-generation 14- to 18-year-old secondary students, drawing upon...
Computer Science Education (K.3.2...) | Apr 10 25

Local load migration in high-capacity fog computing
: ACM Transactions on Internet Technology

This paper introduces a novel approach to processing data-intensive and delay-sensitive requests. It utilizes a heterogeneous fleet of fog nodes where super fog (SF) nodes (high computational resources local to terminal) are always active and handle incoming requests...
Network Architecture & Design (C.2.1) | Jul 2 25

Towards a sustainable blockchain: a peer-to-peer federated learning based approach
: ACM Transactions on Internet Technology

Agarwal et al. conduct an in-depth exploration of integrating peer-to-peer federated learning (P2P-FL) with blockchain technology, aiming to enhance the sustainability and efficiency of blockchain...
Electronic Commerce (K.4.4) | Apr 9 25

A disruptive research playbook for studying disruptive innovations
: ACM Transactions on Software Engineering and Methodology

This paper introduces a novel tool, useful for high-level analysis of innovation in software engineering and long-term impacts on the software engineering community. The authors call it a “playbook” to distinguish it...
Methodologies (D.2.1...) | Feb 20 25

|
|

A concise introduction to software engineering: with open source and GenAI

At just over 200 pages, this well-written book offers a concise yet comprehensive introduction to software engineering--especially when compared to other textbooks that often exceed 800 pages. However, concise should not be mistaken for cursory...
Software Engineering (D.2)
| May 13 25

AI for designers

AI for designers is a concise and timely book that bridges the gap between artificial intelligence (AI) technologies and the design community. It offers an accessible introduction to the applications of AI in design processes, making it a valuable resource for...
General (I.2.0)
| May 30 25

Architecting data and machine learning platforms: enable analytics and AI-driven innovation in the cloud

In the rapidly changing realm of technology, data has become a pivotal asset, driving advancements and strategic decision-making in various sectors. Architecting data and machine learning platforms presents a thorough examination of constructing...
Business (J.1...)
| Jun 10 25

Artificial intelligence and brain research: neural networks, deep learning and the future of cognition

Currently, with the introduction of ChatGPT and similar artificial intelligence (AI) tools, the influence of AI has become prominent worldwide. Countries have taken advantage of these developments and continue to invest a lot of money into this research field. Artificial...
General (I.2.0)
| May 27 25

Artificial intelligence and the future of international law: bridging rights, trade, and arbitration

Poorhashemi’s Artificial intelligence and the future of international law is an insightful and comprehensive examination of the profound ways artificial intelligence (AI) is transforming the framework of international law. This short book brings together interdisciplinary...
Government (J.1...)
| Jun 18 25

Beyond the algorithm: AI, security, privacy, and ethics

The book can be considered as both a monograph and a textbook on the application of algorithms associated with artificial intelligence (AI) methods. Each chapter concludes with test questions, which may include open-ended and essay-style prompts.
The first chapter provides an overview of the history of AI and...
Ethics (K.4.1...)
| Jun 13 25

Confessions of an AI brain

Confessions can be difficult for humans. Artificial intelligence (AI) continues to grow in importance, “transcending boundaries of specialized applications and research labs, and affecting larger parts of society and the general population than ever.” The author is clear that AI is still like a baby: “not very intelligent...
General (I.2.0)
| Jun 12 25

Counterterrorism and cybersecurity: total information awareness (3rd ed.)

In an age when national security battles are increasingly fought across digital landscapes, Newton Lee’s Counterterrorism and cybersecurity: total information awareness is a timely and authoritative contribution. Now in its third edition, the book serves as a...
General (K.0)
| May 29 25

Cryptography: a very short introduction

Cryptography: a very short introduction is, true to its name, an accessible primer of refreshing brevity for a centuries-old subject that lately has become of general interest. In just over 100 pages and nine chapters, plus a short appendix, the authors endeavor to explain to a lay audience the intricacies and pitfalls of...
Cryptographic Controls (D.4.6...)
| Jul 11 25

Data structures and algorithms in Java: a project-based approach

Data structures and algorithms in Java: a project-based approach is designed to instruct readers on these core computer science principles through hands-on application. The book prioritizes experiential learning by incorporating projects that enable readers to...
Data Structures (E.1)
| May 5 25

|
|