|
|
|
|
|
|
|
|
|
Lots of algorithms go bad unintentionally. Some of them, however, are made to be criminal. Algorithms are formal rules, usually written in computer code, that make predictions on future events based on historical patterns. To train an algorithm you need to provide historical data as well as a definition of success... more |
|
- Cathy O’Neil (2017) |
|
|
|
|
|
|
|
|
|
Free and open source software and other market failures: Communications of the ACM
Understanding the free and open-source software (FOSS) movement has, since its beginning, implied crossing many disciplinary boundaries. This article describes FOSS’s history, explaining its undeniable success throughout the 1990s, and why the... more
General (D.0) | Sep 2 24
The Internet of batteryless things: Communications of the ACM
The world is moving toward a future of very small, Internet-connected intelligent devices, that is, the Internet of Things (IoT). However, at present, providing power to these devices is a problem--the inconvenient, expensive, and... more
General (K.6.0) | Aug 16 24
A review of semi-supervised learning for text classification: Artificial Intelligence Review
Duarte and Berton address the challenges of text classification in the context of big data, emphasizing the difficulties and costs associated with obtaining large labeled datasets. They explore the field of semi-supervised learning as a solution, presenting... more
Text Analysis (I.2.7...) | Aug 14 24
10 things software developers should learn about learning: Communications of the ACM
In today’s fast-changing world where groundbreaking technologies are emerging to eclipse their predecessors at an unprecedented pace, continuous learning is not an option but a necessity for practitioners. Understanding how humans learn and memorize can help us do... more
Software Development (K.6.3...) | Jul 29 24
ContraMTD: an unsupervised malicious network traffic detection method based on contrastive learning: WWW 24
The methodology utilized in this study is innovative, as the procedure used to identify malicious network traffic involves an unsupervised method in contrastive learning. This unsupervised technique aims to... more
Security & Protection (C.2.0...) | Jul 19 24
The temporal logic of coalitional goal assignments in concurrent multiplayer games: ACM Transactions on Computational Logic
Enqvist and Goranko’s temporal logic of coalitional goal assignments (TL-CGA) extends Alur, Henzinger, and Kupferman’s 1997 alternating-time temporal logic (ATL) and de... more
Games (K.8.0...) | Jun 25 24
Backdoor attacks and defenses in federated learning: survey, challenges and future research directions: Engineering Applications of Artificial Intelligence
Machine learning (ML) technologies are becoming mainstream, particularly for the analysis of bulk data. The success of ML systems, however, hinges on the input of high-quality data and the ability to... more
Security (K.4.4...) | Jun 17 24
The nature of computational models: Computing in Science and Engineering
Scientific computing is one of the oldest, if not the oldest, types of computational science. The venerable Fortran programming language was created to help scientists expand the frontier of what theory could produce as... more
Physical Sciences & Engineering (J.2) | May 27 24
A deep learning technique for intrusion detection system using a recurrent neural networks based framework: Computer Communications
Kasongo’s paper focuses on enhancing network security through an advanced intrusion detection system (IDS) utilizing machine learning (ML) techniques. The... more
Neural Nets (I.5.1...) | May 21 24
Language-based software testing: Communications of the ACM
Testing remains as the prime technique to check whether software satisfies the specified requirement. Owing to the high volume of potential inputs and expected outputs in very large systems, the process is laborious and error-prone if conducted manually... more
Testing & Debugging (D.2.5) | May 1 24
|
|
|
|
|
|
|
|
|
Calculus for the natural sciences
Calculus is “a part of the name of some branches of mathematics dealing with rules for the computation of and operation with objects of a definite type” [1]. More commonly, it refers to the branch of mathematics that is concerned with limits and the differentiation and... more
Math (I.7.2...) | Sep 13 24
Industry 4.0 and healthcare: impact of artificial intelligence
In this expansive anthology, editors Ashish Mishra and Jerry Chun-Wei Lin have compiled an impressive collection illuminating the boundless versatility of artificial intelligence (AI) that is revolutionizing modern medicine. Masterfully spanning diagnostic... more
Health (J.3...) | Sep 11 24
Build autonomous mobile robot from scratch using ROS: simulation and hardware
Subramanian’s Build autonomous mobile robot from scratch using ROS is a comprehensive guide to creating customized autonomous mobile robots. Part of the “Maker Innovations” series, the book covers a wide array of topics, from basic theoretical concepts... more
Automation (K.4.3...) | Sep 9 24
Nexus: a brief history of information networks from the Stone Age to AI
Nexus: a brief history of information networks from the Stone Age to AI provides an expansive overview of how information networks have evolved throughout human history, influencing societies, economies, and technologies in profound ways. The book traces... more
History of Computing (K.2) | Sep 6 24
Data analysis: a gentle introduction for future data scientists
Data analysis by Graham Upton and Dan Brawn is a concise and to-the-point guide to data analysis. Compared to other statistics and data analysis books, this one is well written without delving into extensive details on each topic, making it accessible to... more
Probability & Statistics (G.3) | Sep 4 24
Text mining with R: a tidy approach
Text mining, also known as text analytics or natural language processing (NLP), is a field of study and practice that involves extracting meaningful information and knowledge from unstructured textual data. The goal of text mining is to convert large volumes of... more
General (D.3.0) | Aug 30 24
Programming languages: principles and paradigms (2nd ed.)
Once students are proficient in a programming language and start to learn another one, they often identify familiar concepts in new syntactic forms. This may lead to wondering about the fundamental building blocks of programming languages. This second edition... more
Programming Languages (D.3) | Aug 28 24
Middle tech: software work and the culture of good enough
I’ll start with a quote from Albert Einstein as an epigraph for this review: “The world as we have created it is a process of our thinking. It cannot be changed without changing our thinking.“ Middle tech: software work and the culture of good enough by Paula Bialski is an... more
General (D.0) | Aug 26 24
Using R for Bayesian spatial and spatio-temporal health modeling
Embarking on a journey through the intricate landscape of Bayesian statistics can be a daunting task, but Andrew B. Lawson’s Using R for Bayesian spatial and spatio-temporal health modeling is a welcoming guide that transforms complexity into clarity for... more
Statistical Computing (G.3...) | Aug 21 24
Remote sensing land surface changes: the 1981-2020 intensive global warming
The subject of the book is global warming and its impact on human life. Kogan analyzes various technical aspects of this subject, and readers interested in various data analysis reports will find the book very useful. The book also serves as a survey with its many references... more
Sensors (I.2.9...) | Aug 19 24
|
|
|
|
|
|