 |
|
 |
|
 |
 |
 |
 |
 |
After a rare speech at the National Center for Atmospheric Research in Boulder, Colorado, in 1976, programmers in the audience had suddenly fallen silent when... more |
 |
- Charles J. Murray (1997) |
|
 |
|
 |
 |
 |
 |
 |
 |
UR-YOLO: an urban road small object detection algorithm: Pattern Analysis & Applications

Detecting small objects such as pedestrians, bicycles, or traffic cones is a major challenge for autonomous driving systems. These objects often appear partially hidden, small, or in low-visibility conditions like rain, night, or fog. Current systems work well with large... more
Image Processing & Computer Vision (I.4) | Jul 7 25

Image recognition tools for blind and visually impaired users: an emphasis on the design considerations: ACM Transactions on Accessible Computing

Digital images are essential to communication, but pose accessibility challenges to people with visual impairments (VIPs). Image recognition (IR) technology bridges the... more
Assistive Technologies (K.4.2...) | Jul 3 25

Local load migration in high-capacity fog computing: ACM Transactions on Internet Technology

This paper introduces a novel approach to processing data-intensive and delay-sensitive requests. It utilizes a heterogeneous fleet of fog nodes where super fog (SF) nodes (high computational resources local to terminal) are always active and handle incoming requests... more
Network Architecture & Design (C.2.1) | Jul 2 25

Gaze analysis: a survey on its applications: Image and Vision Computing

Thanks to recent developments, gaze analysis and eye-tracking applications are now highly accurate and effective in many practical uses. This survey paper presents a comprehensive summary of work from the last... more
Human Factors (H.1.2...) | Jun 30 25

One schema to rule them all: how Schema.org models the world of search: JASIST

The evolution of search engines has made structured data essential for effective information organization and retrieval. Schema.org emerged as a joint project of Google, Microsoft, Yahoo, and Yandex, in 2011, to standardize metadata across different online... more
Data Models (H.2.1...) | Jun 26 25

Understanding misunderstandings: evaluating LLMs on networking questions: SIGCOMM CCR

Large language models (LLMs) have awed the world, emerging as the fastest-growing
application of all time--ChatGPT reached 100 million active users in January
2023, just two months after its launch. After an initial cycle, they have gradually been mostly accepted... more
Language Models (I.2.7...) | Jun 20 25

Are disruptive papers more likely to impact technology and society?: JASIST

The significance of science, technology, engineering, and mathematics (STEM)-related research on society is an interesting subject of debate. To what extent are the published research results from STEM areas truly impacting the advancements of technology and... more
General (K.3.0) | Jun 17 25

Image recognition tools for blind and visually impaired users: an emphasis on the design considerations: ACM Transactions on Accessible Computing

This paper offers a timely and comprehensive overview of assistive image recognition technologies (IRTs), focusing on the inclusion of blind or low vision (BLV) users. It contextualizes the topic within broader digital inclusion goals, referencing United Nations SDGs... more
Assistive Technologies (K.4.2...) | Jun 16 25

Exploiting cross-layer vulnerabilities: off-path attacks on the TCP/IP protocol suite: Communications of the ACM

The transmission control protocol/Internet protocol (TCP/IP) suite has been the backbone of the Internet since the 1970s. This suite of protocols operates in five distinct layers; however, the Internet control message protocol (ICMP) in the Internet layer--and used... more
TCP/IP (C.2.2...) | Jun 11 25

How games can support misinformation education: a sociocultural perspective: JASIST

Is false information intentionally or accidentally spread? How should the distribution of false information be minimized? Perhaps civilized societies should become more cognizant... more
Education (J.1...) | May 23 25

|
 |
|
 |
 |
 |
 |
 |
 |
LLM engineer’s handbook: master the art of engineering large language models from concept to production

LLM engineer’s handbook is suitable for a wide range of information technology (IT) professionals and people interested in the practical applications of large language models (LLMs). It is useful for software engineers to build AI... more
Language Models (I.2.7...) | Jul 8 25

Modulated apertures and resolution in microscopy

Modulated apertures and resolution in microscopy is a concise yet impactful exploration of the critical relationship between aperture modulation techniques and resolution enhancement in optical microscopy. Spanning 100 pages, the book is designed as a specialized resource aimed at researchers... more
Biology & Genetics (J.3...) | Jul 4 25

The foundations of computability theory (2nd ed.)

After my review of the first edition (referred to as 1e going forward) was published [1], the author contacted me by email to request the full list (reduced in the final review) of issues I had compiled for CR. He was already seriously involved in producing this second (called 2e here) and poised to correct whatever I had... more
Theory (K.2...) | Jul 2 25

Just enough data science and machine learning: essential tools and techniques

As the title implies, the book provides very good coverage of essential data science and machine learning methods. The language of the book is very clear, giving readers an intuitive understanding of the concepts without the burden of heavy technical details... more
Learning (I.2.6) | Jul 1 25

Explainable uncertain rule-based fuzzy systems

Explainable uncertain rule-based fuzzy systems is an in-depth exploration of rule-based fuzzy systems with a strong emphasis on uncertainty modeling and explainability. With 550-plus pages of comprehensive analysis, the book provides an advanced framework for understanding and implementing fuzzy systems... more
Fuzzy Set (I.5.1...) | Jun 27 25

Your Stone Age brain in the Screen Age: coping with digital distraction and sensory overload

An interesting cultural phenomena that has arisen over the last few years is the grassroots fight against the increasingly dominant role that technology, particularly mobile phones and social media, plays in our children’s... more
Social & Behavioral Sciences (J.4) | Jun 25 25

Streaming linked data: from vision to practice

Many of today’s big data applications are web applications, or they depend on data from the web. The Internet of Things (IoT), monitoring systems, some data mining and generative artificial intelligence (AI), for example, process data streams as they are produced to make decisions or evaluate hypotheses. Web... more
Data Mining (H.2.8...) | Jun 24 25

Developing cybersecurity programs and policies in an AI-driven world (4th ed.)

This book explains how to build strong cybersecurity plans and rules, especially with new artificial intelligence (AI) tools. It shows how to protect data, systems, and networks using simple steps. The author gives real examples and uses well-known frameworks like the National... more
Security & Protection (K.6.5) | Jun 23 25

Quick start guide to large language models: strategies and best practices for using ChatGPT and other LLMs

This book is a short and practical guide to large language models (LLMs). It explains what LLMs are and how they work. The author, Sinan Ozdemir, gives clear examples to help readers understand hard topics in an easy way. The goal of the book is to help... more
Language Models (I.2.7...) | Jun 19 25

High-performance big data computing

The recent convergence of high-performance computing (HPC), big data, cloud computing, and machine learning techniques has led to new processing, storage, communication, and data analytic methods for extracting information. Tremendous innovations have greatly impacted the scientific approaches that... more
General (C.2.0) | Jun 18 25

|
 |
|
|
|
 |