Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
View:  Show:    
 
 

Computer Systems Organization (C)
Exploding the myths: an introduction to artificial neural networks for prediction and forecasting : Environmental Modelling & Software

Maier et al. examine artificial neural networks (ANNs) in this paper, aiming to clarify misconceptions and outline best practices for their application in prediction and forecasting. The authors first address myths about ANNs, such as the perception of them as black...
Neural Nets (C.1.3...) | Dec 9 24

Local load migration in high-capacity fog computing : ACM Transactions on Internet Technology

This paper introduces a novel approach to processing data-intensive and delay-sensitive requests. It utilizes a heterogeneous fleet of fog nodes where super fog (SF) nodes (high computational resources local to terminal) are always active and handle incoming requests...
Network Architecture & Design (C.2.1) | Jul 2 25

Exploiting cross-layer vulnerabilities: off-path attacks on the TCP/IP protocol suite : Communications of the ACM

The transmission control protocol/Internet protocol (TCP/IP) suite has been the backbone of the Internet since the 1970s. This suite of protocols operates in five distinct layers; however, the Internet control message protocol...
TCP/IP (C.2.2...) | Jun 11 25


Software (D)
AceCoder: an effective prompting technique specialized in code generation : ACM Transactions on Software Engineering and Methodology

In the fast-evolving world of large language models (LLMs), code generation has been a particularly interesting application. However, despite their general success, LLMs often fail when prompts are not tailored to the task--particularly in programming, where...
General (D.2.0) | May 7 25

Replication in requirements engineering: the NLP for RE case : ACM Transactions on Software Engineering and Methodology

This paper presents a novel solution to a common problem: how to better share and replicate research. The “NLP” in the title refers to natural language processing, a research method for requirements...
Requirements/Specifications (D.2.1) | Mar 20 25

A disruptive research playbook for studying disruptive innovations : ACM Transactions on Software Engineering and Methodology

This paper introduces a novel tool, useful for high-level analysis of innovation in software engineering and long-term impacts on the software engineering community. The authors call it a “playbook” to distinguish it...
Methodologies (D.2.1...) | Feb 20 25

A systematic literature review on automated software vulnerability detection using machine learning : ACM Computing Surveys

Software vulnerabilities pose a critical security risk, allowing attackers to exploit weaknesses in code. Traditional detection methods, such as static and dynamic analysis, often produce high false...
Software/Program Verification (D.2.4) | Apr 16 25

Security risks in the encryption of database connection strings : Software—Practice & Experience

This paper talks about a subtle but significant weakness in the way encrypted database connection strings can continue to leak structure, particularly with symmetric ciphers such as the...
Security & Protection (D.4.6) | May 19 25


Mathematics Of Computing (G)
Weighted synchronous automata : Mathematical Structures in Computer Science

The theory of finite automata (FA) is extensively studied, while Zadeh’s sets and fuzzy logic address real-world scenarios. This paper formalizes fuzzy automata’s behavior in dealing with uncertainty and vagueness inherent to computational problems. It assigns...
Mathematics of Computing (G) | Feb 3 25


Information Systems (H)
Gaze analysis: a survey on its applications : Image and Vision Computing

Thanks to recent developments, gaze analysis and eye-tracking applications are now highly accurate and effective in many practical uses. This survey paper presents a comprehensive summary of work from the last...
Human Factors (H.1.2...) | Jun 30 25


Hardware (B)

Optimization-based molecular dynamics studies of SARS-CoV-2 molecular structures: research on COVID- 19

The urgent need to develop COVID-19 vaccines, medications, and treatments led to an unprecedented level of activity in research labs. Computational chemistry was an integral part of the research efforts because it could reveal details of the interactions...
Optimization (B.1.4...) | May 26 25

Phenotropic interaction: improving interfaces with computing with words and perceptions

Colombo’s Phenotropic interaction is a groundbreaking exploration of how computational models rooted in human perception and natural language can enhance human-computer interfaces. The book delves into the concept of phenotropic interaction, a novel...
Interfaces (B.4.3...) | Jul 11 25


Computer Systems Organization (C)

High-performance big data computing

The recent convergence of high-performance computing (HPC), big data, cloud computing, and machine learning techniques has led to new processing, storage, communication, and data analytic methods for extracting information. Tremendous innovations have greatly impacted the scientific approaches that...
General (C.2.0) | Jun 18 25


Software (D)

A concise introduction to software engineering: with open source and GenAI

At just over 200 pages, this well-written book offers a concise yet comprehensive introduction to software engineering--especially when compared to other textbooks that often exceed 800 pages. However, concise should not be mistaken for cursory...
Software Engineering (D.2) | May 13 25

Record weather data with Arduino and solar power: use sensors to record and analyze meteorological data

The core of this book lies in teaching how to use Arduino boards for real-world sensor applications, specifically those focused on weather monitoring. It offers a clear, hands-on path for readers to build complete weather-sensing...
Data Mapping (D.2.12...) | May 15 25

Exploring complex survey data analysis using R: a tidy introduction with {srvyr} and {survey}

Exploring complex survey data analysis using R, by Stephanie Zimmer, Rebecca Powell, and Isabella Velásquez, is a comprehensive guide that delves into the intricacies of survey data analysis using R. This book is a must-read for...
General (D.3.0) | Apr 15 25

The sensory accommodation framework for technology: bridging sensory processing to social cognition

This is a small book with a “big hairy audacious goal (BHAG),” as one of my bosses used to say. The goal: use technology to improve the quality of life for the whole person. In this case, someone experiencing autism. The book is another volume in the...
Frameworks (D.3.3...) | Jun 2 25

Cryptography: a very short introduction

Cryptography: a very short introduction is, true to its name, an accessible primer of refreshing brevity for a centuries-old subject that lately has become of general interest. In just over 100 pages and nine chapters, plus a short appendix, the authors endeavor to explain to a lay audience the intricacies and pitfalls of...
Cryptographic Controls (D.4.6...) | Jul 11 25


Data (E)

Linear algebra in data science

Zizler and La Haye’s comprehensive resource bridges foundational mathematics with practical applications in the field of data science. The authors offer a structured approach to understanding the essential role that linear algebra plays in data processing, machine...
Data (E) | Jun 4 25

Data structures and algorithms in Java: a project-based approach

Data structures and algorithms in Java: a project-based approach is designed to instruct readers on these core computer science principles through hands-on application. The book prioritizes experiential learning by incorporating projects that enable readers to...
Data Structures (E.1) | May 5 25

   
Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2025 ThinkLoud®
Terms of Use
| Privacy Policy