|

A systematic literature review on automated software vulnerability detection using machine learning
: ACM Computing Surveys

Software vulnerabilities pose a critical security risk, allowing attackers to exploit weaknesses in code. Traditional detection methods, such as static and dynamic analysis, often produce high false...
Software/Program Verification (D.2.4) | Apr 16 25

Knowledge editing for large language models: a survey
: ACM Computing Surveys

Wang et al. provide a comprehensive survey on knowledge-based model editing (KME) techniques, focusing on methods to efficiently and precisely update large language models (LLMs) without negatively...
Language Models (I.2.7...) | Feb 18 25

Meta-learning approaches for few-shot learning: a survey of recent advances
: ACM Computing Surveys

Gharoun et al. provide a comprehensive overview of meta-learning techniques, with a focus on how these methods facilitate learning from limited data (few-shot learning, FSL). They categorize recent...
General (I.2.0) | Dec 20 24

The temporal logic of coalitional goal assignments in concurrent multiplayer games
: ACM Transactions on Computational Logic

Enqvist and Goranko’s temporal logic of coalitional goal assignments (TL-CGA) extends Alur, Henzinger, and Kupferman’s 1997 alternating-time temporal logic (ATL) and de...
Games (K.8.0...) | Jun 25 24

How economically marginalized adolescents of color negotiate critical pedagogy in a computing classroom
: ACM Transactions on Computing Education (TOCE)

This is an extraordinary paper for extraordinary times. It reports on the challenges of designing and teaching a six-week summer computer science (CS) course, originally conducted in 2022, for first-generation 14- to 18-year-old secondary students, drawing upon...
Computer Science Education (K.3.2...) | Apr 10 25

Towards a sustainable blockchain: a peer-to-peer federated learning based approach
: ACM Transactions on Internet Technology

Agarwal et al. conduct an in-depth exploration of integrating peer-to-peer federated learning (P2P-FL) with blockchain technology, aiming to enhance the sustainability and efficiency of blockchain...
Electronic Commerce (K.4.4) | Apr 9 25

A disruptive research playbook for studying disruptive innovations
: ACM Transactions on Software Engineering and Methodology

This paper introduces a novel tool, useful for high-level analysis of innovation in software engineering and long-term impacts on the software engineering community. The authors call it a “playbook” to distinguish it...
Methodologies (D.2.1...) | Feb 20 25

AceCoder: an effective prompting technique specialized in code generation
: ACM Transactions on Software Engineering and Methodology

In the fast-evolving world of large language models (LLMs), code generation has been a particularly interesting application. However, despite their general success, LLMs often fail when prompts are...
General (D.2.0) | May 7 25

Replication in requirements engineering: the NLP for RE case
: ACM Transactions on Software Engineering and Methodology

This paper presents a novel solution to a common problem: how to better share and replicate research.
The “NLP” in the title refers to natural language processing, a research method for requirements...
Requirements/Specifications (D.2.1) | Mar 20 25

Diversity, equity, and inclusion in artificial intelligence: an evaluation of guidelines
: Applied Artificial Intelligence

In her book The age of surveillance capitalism [1], Shoshana Zuboff asks: “Are we all going to be working for a smart machine, or will we have smart people around the machine?”
This is an equal opportunity review...
Artificial Intelligence (I.2) | Feb 19 25

|
|

AI and the law: a practical guide to using artificial intelligence safely

The title suggests an encouraging exploration of an actual topic, though the depth and rigor of the legal approach may not live up to the promises.
The book touches on the issues that should be considered both during and after the application of artificial...
Legal Aspects of Computing (K.5)
| Mar 25 25

AI for designers

This helpful book shows readers how artificial intelligence (AI) can improve the design process. It gives designers practical ideas on how to use AI tools in their work, and explains the basics of AI and how it can be applied in real-life design tasks. It is an important read...
General (I.2.0)
| Feb 17 25

Architecting data and machine learning platforms: enable analytics and AI-driven innovation in the cloud

Cloud computing offers several advantages for businesses. In the age of energy savings and green information technology (IT), organizations are following the trend of implementing positive green IT and eco-design by redesigning...
Business (J.1...)
| Mar 14 25

Artificial intelligence and human evolution: contextualizing AI in human history

Artificial intelligence and human evolution is a profound and enlightening exploration of the interplay between artificial intelligence (AI) and human evolution. It offers a comprehensive overview that spans the origins of life, the evolution of species, the development of...
History of Computing (K.2)
| Jan 27 25

Artificial intelligence for science (AI4S): frontiers and perspectives based on parallel intelligence

The “SpringerBriefs in Service Science” series aims to provide a concise but thorough description of the evolution of digital service design and delivery in the context of big data and artificial intelligence (AI). The books in this series present comprehensive...
Parallel (B.2.1...)
| Mar 21 25

Beyond AI: ChatGPT, Web3, and the business landscape of tomorrow

Beyond AI: ChatGPT, Web3, and the business landscape of tomorrow, edited by Ken Huang et al., is an impressive exploration into the transformative potential of generative AI (GenAI), particularly ChatGPT, and its integration with Web3 technologies. As a part of...
Business (J.1...)
| Mar 31 25

Calculus for the natural sciences

Helfgott’s textbook aims to provide first-year students in mathematics, engineering, and natural sciences with the fundamentals of calculus and its application in other sciences, including biology, chemistry, and physics. He includes many examples, and step-by-step iterations show readers how to transform mathematical...
Math (I.7.2...)
| Feb 12 25

Computing intelligence in capital market

Computing intelligence in capital market consists of six independent chapters. Due to the topic’s multidisciplinary nature, it is a difficult area to cover. However, the book does a good job of covering critical aspects at a level accessible to nonspecialists.
The first chapter...
Marketing (J.1...)
| Feb 24 25

Critical systems thinking and the management of complexity

This is the first of two books by Dr. Jackson about critical systems thinking (CST). I discussed the other, Critical systems thinking: a practitioner’s guide, in a previous review [1]. That book was essentially a Reader’s Digest version of this one, written for practitioners...
General (K.6.0)
| Jan 21 25

Cyber threat intelligence

Lee’s comprehensive guide to the intricacies of cyber threat intelligence delves into the history, terminology, and techniques of cybersecurity, providing an expansive overview of cyberattacks. The book encourages readers to approach their cybersecurity issues from a threat intelligence perspective.
The book presents...
Security & Protection (K.6.5)
| Feb 13 25

|
|