Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
April 19, 2025
Search
Highlight

Stochastic approximation: a dynamical systems viewpoint (2nd ed.)
Borkar’s Stochastic approximation provides a deep mathematical treatment of stochastic approximation (SA) methods, making it a valuable resource for researchers and graduate students in applied mathematics, control theory, and machine learning. The book presents SA from a... more
Quote
Suppose we had asked it to find the smallest integer whose square ended in 269697. Now we know, but the machine does not, that there is no integer whose square ends in 7. If we were to... more
- B. V. Bowden (1953)
Articles
A systematic literature review on automated software vulnerability detection using machine learning: ACM Computing Surveys

Software vulnerabilities pose a critical security risk, allowing attackers to exploit weaknesses in code. Traditional detection methods, such as static and dynamic analysis, often produce high false... more

Software/Program Verification (D.2.4) | Apr 16 25

Multi-camera tracking of mechanically thrown objects for automated in-plant logistics by cognitive robots in Industry 4.0: The Visual Computer

This paper addresses four questions that perhaps have been keeping you awake at night: (1) Can cognitive robots play baseball? (2) If so, can they play baseball in a factory? (Spoiler... more

General (I.2.0) | Apr 14 25

How economically marginalized adolescents of color negotiate critical pedagogy in a computing classroom: ACM Transactions on Computing Education (TOCE)

This is an extraordinary paper for extraordinary times. It reports on the challenges of designing and teaching a six-week summer computer science (CS) course, originally conducted in 2022, for first-generation 14- to 18-year-old secondary students, drawing upon... more

Computer Science Education (K.3.2...) | Apr 10 25

Towards a sustainable blockchain: a peer-to-peer federated learning based approach: ACM Transactions on Internet Technology

Agarwal et al. conduct an in-depth exploration of integrating peer-to-peer federated learning (P2P-FL) with blockchain technology, aiming to enhance the sustainability and efficiency of blockchain... more

Electronic Commerce (K.4.4) | Apr 9 25

Replication in requirements engineering: the NLP for RE case: ACM Transactions on Software Engineering and Methodology

This paper presents a novel solution to a common problem: how to better share and replicate research. The “NLP” in the title refers to natural language processing, a research method for requirements... more

Requirements/Specifications (D.2.1) | Mar 20 25

Measuring GitHub Copilot's impact on productivity: Communications of the ACM

Artificial intelligence (AI)-powered coding assistants are transforming how developers write, debug, and optimize code. Leveraging machine learning and natural language processing (NLP), these tools offer real-time... more

Software Development (K.6.3...) | Mar 7 25

Variational inference based adversarial domain adaptation: Pattern Analysis & Applications

Zonoozi et al. present a novel approach to unsupervised domain adaptation by integrating variational autoencoders (VAEs) with adversarial learning. Their proposed model... more

Learning (I.2.6) | Mar 4 25

ChatGPT is bullshit: Ethics and Information Technology

As people around the world understand how large language models (LLMs) behave, more and more of us wonder why these models “hallucinate”--and what can be done to reduce it. Hicks et al.’s provocatively named paper is an excellent primer for understanding... more

Ethics (K.4.1...) | Feb 25 25

A disruptive research playbook for studying disruptive innovations: ACM Transactions on Software Engineering and Methodology

This paper introduces a novel tool, useful for high-level analysis of innovation in software engineering and long-term impacts on the software engineering community. The authors call it a “playbook” to distinguish it... more

Methodologies (D.2.1...) | Feb 20 25

Diversity, equity, and inclusion in artificial intelligence: an evaluation of guidelines: Applied Artificial Intelligence

In her book The age of surveillance capitalism [1], Shoshana Zuboff asks: “Are we all going to be working for a smart machine, or will we have smart people around the machine?” This is an equal opportunity review... more

Artificial Intelligence (I.2) | Feb 19 25

Books
Management innovation and big data

In the fields of management and information technology (IT), as in any other scientific or business field, buzzwords come and go. One of the most frequently used buzzwords these days is “big data.” This book is an interesting and helpful reference, albeit very concise, to the most... more
General (K.6.0) | Apr 17 25

Exploring complex survey data analysis using R: a tidy introduction with {srvyr} and {survey}

Exploring complex survey data analysis using R, by Stephanie Zimmer, Rebecca Powell, and Isabella Velásquez, is a comprehensive guide that delves into the intricacies of survey data analysis using R. This book is a must-read for intermediate R users who are... more
General (D.3.0) | Apr 15 25

Life as no one knows it: the physics of life’s emergence

Sara Walker’s Life as no one knows it arrives on the heels of extensive media coverage and promotional efforts that have catapulted it into bestseller status. I approached this book with a sense of anticipation, especially eager to explore her ideas on algorithmic probability and open-endedness--topics we... more
Biology & Genetics (J.3...) | Apr 11 25

Generative artificial intelligence: exploring the power and potential of generative AI

This book explains generative artificial intelligence (AI) in simple terms, making it easy for readers to understand how it works and how it can be used. The authors aim to teach both beginners and professionals about the basics of AI tools like neural networks... more
Artificial Intelligence (I.2) | Apr 8 25

Exploiting the power of group differences: using patterns to solve data analysis problems

In our day-to-day activities, we often divide things--both living and nonliving--into categories or groups, and then use the group differences to make our decisions. These decisions are sometimes intuitive, but at other times demand... more
Algorithms (I.5.3...) | Apr 7 25

The science-music borderlands: reckoning with the past and imagining the future

We all know that pressing the keys of a piano in a random fashion will not create music (although each key corresponds to a musical note); one has to create patterns in the notes in order to convey (musical) emotion. A scientist, too, believes that patterns... more
Music (J.5...) | Apr 2 25

Raising robots to be good: a practical foray into the art and science of machine ethics

Machine ethics has become increasingly important as autonomous technologies permeate society [1,2,3]. Philosophers have developed various ethical frameworks--from Aristotelian virtue ethics to Kantian deontology to utilitarian consequentialism--but... more
Ethics (K.4.1...) | Apr 1 25

Beyond AI: ChatGPT, Web3, and the business landscape of tomorrow

Beyond AI: ChatGPT, Web3, and the business landscape of tomorrow, edited by Ken Huang et al., is an impressive exploration into the transformative potential of generative AI (GenAI), particularly ChatGPT, and its integration with Web3 technologies. As a part of... more
Business (J.1...) | Mar 31 25

Effective software architecture: building better software faster

With the enormous strides in digitalization across the world, processes are moving to the online world. As more processes come online, the complexity of the resulting software increases and the ability to connect a variety of other softwares becomes a key parameter... more
Software Architectures (D.2.11) | Mar 28 25

Stochastic approximation: a dynamical systems viewpoint (2nd ed.)

Borkar’s Stochastic approximation: a dynamical systems viewpoint provides a deep mathematical treatment of stochastic approximation (SA) methods, making it a valuable resource for researchers and graduate students in applied mathematics, control theory, and... more
Approximation (G.1.2) | Mar 27 25


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2025 ThinkLoud®
Terms of Use
| Privacy Policy