Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
May 11, 2021
Search
Highlight

The kollected Kode Vicious: opinionated advice for programmers
Readers of Communications of the ACM and ACM Queue are surely familiar with the magazines’ “Dear Abby”-like column, written by George V. Neville-Neil, under his persona Kode Vicious, or KV. This book is a collection of 87 columns on a variety of topics. KV gives “frank”... more
Quote
The primary question of artificial life is “What is life?” No satisfactory answers to this question exist at this time; the individual scientific disciplines have failed... more
- Edward Rietman (1993)
Articles
Implementing a modal dependent type theory: Proceedings of the ACM on Programming Languages

Modalities are widely used in mathematics and computer science as an abstraction tool, but it turns out to be difficult to incorporate them in rich type theories... more

General (D.3.0) | Apr 27 21

Exact algorithms via monotone local search: Journal of the ACM

Many important problems are NP-complete; this means that, unless P = NP, we cannot have a polynomial-time (feasible) algorithm for solving all instances of this problem. For each such problem, there is an exhaustive search... more

Search Process (H.3.3...) | Apr 26 21

Evaluating the effects of missing values and mixed data types on social sequence clustering using t-SNE visualization: Journal of Data and Information Quality

The authors discuss how one can compensate for missing values when clustering joint categorical sequences. For example, one might have a... more

Learning (I.2.6) | Apr 21 21

SOD: making smartphone smart on demand with radio interface management: ACM Transactions on Autonomous and Adaptive Systems

Smartphone batteries don’t last as long as they used to. Why? Applications consume a lot of energy. However, the authors show that, besides the display... more

General (B.0) | Apr 20 21

Data-parallel structural optimisation in agent-based models: ACM SIGEVOlution

Modeling is a tool for studying a natural phenomenon. The accuracy of such a model depends on how well the model mimics the behavior of the system under study. The modeling of phenomena in ecology, microbiology, social... more

Multiagent Systems (I.2.11...) | Apr 16 21

Data transparency with blockchain and AI ethics: Journal of Data and Information Quality

With the ever-growing use of digital technology, especially the use of big data technologies and machine learning, questions related to the proper use of data collected from social networks led to the... more

Ethics (K.4.1...) | Apr 14 21

An analysis of inheritance hierarchy evolution: EASE 19

This is a refreshing paper on ten open-source systems and their use of “inheritance” programing concepts. Computer languages have evolved with the type-safe extensibility concept of inheritance, which is embodied in object... more

General (D.2.0) | Apr 13 21

Modeling information retrieval by formal logic: a survey: ACM Computing Surveys

As the title indicates, formal logic is used for modeling information retrieval (IR). Readers can expect a literature review (of IR models), supported with graphs, mathematical formulas, and examples that... more

Retrieval Models (H.3.3...) | Apr 12 21

Coding-data portability in systematic literature reviews: a W3C’s open annotation approach: EASE 19

Systematic literature reviews (SLRs) involve several steps: the planning step, which identifies the scope of literature according to the research goals, and develops a coding protocol; the analysis step, which... more

Software Engineering (D.2) | Apr 9 21

Multigrid for matrix-free high-order finite element computations on graphics processors: ACM Transactions on Parallel Computing

Discretization is a method for transforming continuous variables, equations, functions, and models into their discrete equivalents. A multigrid technique... more

Differential-Algebraic Equations (G.1.7...) | Apr 7 21

Books
Righting software

The history of software systems development is filled with projects that have either failed or experienced severe problems, ranging from cost or schedule overruns to falling short of customer needs and serious quality defects. The rollout of the federal health insurance exchange... more
General (D.0) | May 11 21

Formal verification of control system software

This outstanding work manages to deal with key topics, many of which are highly advanced, while also being encyclopedic (in a good sense) within a mere 200 pages. In spite of its advanced nature, all levels of reader will be informed or well directed by it... more
Verification (D.4.5...) | May 10 21

Deep learning applications for cyber security

Research in the field of artificial intelligence (AI) provides new information about deep neural network (DNN)-based methods, also known as deep learning. This allows computational models, composed of countless... more
Learning (I.2.6) | May 7 21

Rewiring education: how technology can unlock every student’s potential

Back in 2001, Marc Prensky stated: “the single biggest problem facing education today is that our digital immigrant instructors, who speak an outdated language (that of the pre-digital age), are struggling to... more
Computer Uses in Education (K.3.1) | May 6 21

Modern data mining algorithms in C++ and CUDA C

In his earlier book from 2018, Data mining algorithms in C++ [1], the author indicated that a “volume 2 will appear some day.” This is it. It builds on the techniques and tools of the earlier book and follows a similar style of presentation. Each chapter presents a... more
C++ (D.3.2...) | May 5 21

Reasoning with probabilistic and deterministic graphical models: exact algorithms (2nd ed.)

Many problems related to learning and reasoning can make use of graphical models where a knowledge structure is compactly encoded into a graph. When dependencies (or independencies) among... more
Graphical Environments (D.2.6...) | May 4 21

Bandit algorithms

This book is on bandit algorithms. The word “bandit” is commonly understood to mean an armed thief who is usually a member of a group or band. However, in the context of this book, bandit refers to a type of slot machine with a large metal pole or handle... more
Learning (I.2.6) | May 3 21

The kollected Kode Vicious: opinionated advice for programmers

Readers of Communications of the ACM and ACM Queue are surely familiar with the magazines’ “Dear Abby”-like column, written by George V. Neville-Neil, under his persona Kode Vicious, or KV. This book is a... more
General (D.3.0) | Apr 30 21

Software product management: finding the right balance for YourProduct Inc.

Software product management is at the core of the software product development life cycle. It takes into consideration all of the factors needed to bring a product to market. Furthermore, software product... more
Project & People Management (K.6.1) | Apr 29 21

Data visualization and knowledge engineering: spotting data points with artificial intelligence

Data is the new gold in the 21st century. Artificial intelligence (AI), data visualization, and knowledge engineering are important fields that provide concepts, techniques, and methods that... more
KR Formalisms & Methods (I.2.4) | Apr 28 21


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2021 ThinkLoud, Inc.
Terms of Use
| Privacy Policy