Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
July 22, 2024
Search
Highlight

Jung vs borg: finding the deeply human in a posthuman age
Glen Slater’s Jung vs borg: finding the deeply human in a posthuman age is a thought-provoking exploration of the potential threats to human nature posed by rapid advancements in technology and the posthumanist movement. The author juxtaposes the insights of... more
Quote
The ... thing that’s clear about our future password system is which trade-off--convenience or privacy--we’ll need to make. It’s true that a multifactor system will involve some minor... more
- Mat Honan (2012)
Articles
ContraMTD: an unsupervised malicious network traffic detection method based on contrastive learning: WWW 24

The methodology utilized in this study is innovative, as the procedure used to identify malicious network traffic involves an unsupervised method in contrastive learning. This unsupervised technique aims to... more

Security & Protection (C.2.0...) | Jul 19 24

The temporal logic of coalitional goal assignments in concurrent multiplayer games: ACM Transactions on Computational Logic

Enqvist and Goranko’s temporal logic of coalitional goal assignments (TL-CGA) extends Alur, Henzinger, and Kupferman’s 1997 alternating-time temporal logic (ATL) and de... more

Games (K.8.0...) | Jun 25 24

Backdoor attacks and defenses in federated learning: survey, challenges and future research directions: Engineering Applications of Artificial Intelligence

Machine learning (ML) technologies are becoming mainstream, particularly for the analysis of bulk data. The success of ML systems, however, hinges on the input of high-quality data and the ability to train... more

Security (K.4.4...) | Jun 17 24

The nature of computational models: Computing in Science and Engineering

Scientific computing is one of the oldest, if not the oldest, types of computational science. The venerable Fortran programming language was created to help scientists expand the frontier of what theory could produce as numerical results. In the seven... more

Physical Sciences & Engineering (J.2) | May 27 24

A deep learning technique for intrusion detection system using a recurrent neural networks based framework: Computer Communications

Kasongo’s paper focuses on enhancing network security through an advanced intrusion detection system (IDS) utilizing machine learning (ML) techniques. The study implements... more

Neural Nets (I.5.1...) | May 21 24

Language-based software testing: Communications of the ACM

Testing remains as the prime technique to check whether software satisfies the specified requirement. Owing to the high volume of potential inputs and expected outputs in very large systems, the process is laborious and error-prone if conducted manually... more

Testing & Debugging (D.2.5) | May 1 24

Industry 5.0 and its technologies: a systematic literature review upon the human place into IoT- and CPS-based industrial systems: Computers and Industrial Engineering

The emergence of Industry 5.0 signifies “a paradigm shift that emphasizes the integration of advanced technologies with human-centric approaches” [1]. Valette et al. critically analyze Industry 5.0 and... more

Computers In Other Systems (J.7) | Apr 18 24

Writing by hand or digitally in first grade: effects on rate of learning to compose text: Computers & Education

This paper is one outcome of the DigiHand project (2018-2022), funded by the Research Council of Norway (grant number 273422). It is divided into five sections: “Introduction,” “Method,” “Statistical Analysis,” “Results,” and “Discussion... more

Education (J.1...) | Apr 10 24

On the adaptation of recurrent neural networks for system identification: Automatica

In this pape, Forgione et al. propose a transfer learning methodology to adapt recurrent neural network (RNN) models for dynamic system identification to new operating conditions. The approach is premised... more

Neural Nets (C.1.3...) | Apr 9 24

Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges: Journal of Intelligent Information Systems

Today, machine learning is applied to threat detection and classification problems in the important field of industrial control. This paper reviews different ML papers that apply supervised learning, unsupervised learning, deep learning, and ensemble learning in the... more

General (H.1.0) | Mar 18 24

Books
From deep learning to rational machines: what the history of philosophy can teach us about the future of artificial intelligence

Deep learning, as the most abstract form of artificial intelligence (AI), is currently changing many things in our lives on a massive scale and developing human-like abilities, which the... more
Arts & Humanities (J.5) | Jul 22 24

Digital transformation success: achieving alignment and delivering results with the process inventory framework

In the 1986 movie Hoosiers, a seasoned basketball coach, played by actor Gene Hackman, prepares his doubting team for success in the final state championship game with intense practice, taking key measurements, listening to stakeholders, and... more
Business (J.1...) | Jul 17 24

The book of chatbots: from ELIZA to ChatGPT

The book of chatbots: from ELIZA to ChatGPT provides a thorough examination of the history, development, and impact of chatbots in the field of artificial intelligence (AI). Authored by Robert Ciesla, this book serves as “both a retrospective and a review of current... more
General (I.2.0) | Jul 16 24

Jung vs borg: finding the deeply human in a posthuman age

Glen Slater’s Jung vs borg: finding the deeply human in a posthuman age is a thought-provoking exploration of the potential threats to human nature posed by rapid advancements in technology and the posthumanist movement. The author juxtaposes the insights... more
Psychology (J.4...) | Jul 15 24

More than a chatbot: language models demystified

More than a chatbot provides an insightful exploration of the world of artificial intelligence (AI)-driven conversational agents and their broader societal implications. The book takes readers on a journey from the early days of chatbots, in the 1960s, to their present-day applications and future potential... more
Language Models (I.2.7...) | Jul 12 24

ChatGPT and Bard for business automation: achieving AI-driven growth

ChatGPT and Bard for business automation is a nice work by Tom Taulli. He provides step-by-step instructions on how to get started with ChatGPT and Google Bard, and offers tips on how to improve prompt-writing skills in order to optimize their use for... more
Business (J.1...) | Jul 10 24

How computers make books: from graphics rendering, search algorithms, and functional programming to indexing and typesetting

While the book’s main title sounds somehow suggestive, its subtitle--from graphics rendering, search algorithms, and functional programming to indexing and typesetting--explains the core concepts presented. Whitington introduces the subject matter in a... more
Publishing (J.7...) | Jul 9 24

Quantum information science

The traditional representation of information uses bits, which can be in one of two states: 0 or 1. Quantum computing representation of information relies on qubits. A qubit or quantum bit can be in one of the two states, 0 or 1, but can also be a linear combination of both states. Quantum information science is... more
Physics (J.2...) | Jul 8 24

Demystifying digital transformation: non-technical toolsets for business professionals thriving in the digital age

Attul Sehgal’s Demystifying digital transformation: non-technical toolsets for business professionals thriving in the digital age is the second in a pair of recent books published by Apress about the future of work in a world of digital innovation and transformation [1]... more
Business (J.1...) | Jul 5 24

Microsoft Azure AI fundamentals certification companion: guide to prepare for the AI-900 exam

This well-structured, readable, and concise guide is for readers who are preparing for the AI-900 certification exam. The author presents various concepts and techniques related to artificial intelligence in a clear and accessible... more
General (K.6.0) | Jul 1 24


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy