Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
View:  Show:    

Hardware (B)
Machine learning algorithms to forecast air quality: a survey : Artificial Intelligence Review

Forecasting air pollution levels can enable important public health actions such as traffic modification, self-protection steps by individuals at risk, and measures such as burn bans. The authors...
Algorithms (B.2.4...) | Dec 11 23

Computer Systems Organization (C)
On the adaptation of recurrent neural networks for system identification : Automatica

In this pape, Forgione et al. propose a transfer learning methodology to adapt recurrent neural network (RNN) models for dynamic system identification to new operating...
Neural Nets (C.1.3...) | Apr 9 24

A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks : Ad Hoc Networks

FANET was coined for flying ad hoc networks, for example, unmanned aerial vehicles (UAVs). This survey paper is an in-depth discussion of the cybersecurity concerns and shortcomings unique to UAVs, as...
Security & Protection (C.2.0...) | Feb 8 24

ACE: toward application-centric, edge-cloud, collaborative intelligence : Communications of the ACM

Futuristic artificial intelligence (AI) applications in electronic business, urban surveillance, and medicine require more teamwork among researchers and practitioners. But with the rising number of autonomous AI applications in different domains, including...
Cloud Computing (C.2.4...) | Aug 4 23

H-Container: enabling heterogeneous-ISA container migration in edge computing : ACM Transactions on Computer Systems

Xing et al. describe a novel approach to dealing with the difficulties posed by container migration in edge computing settings with heterogeneous ISAs. By putting forth a mechanism that permits effective and...
Distributed Systems (C.2.4) | May 10 23

Software (D)
Democratizing domain-specific computing : Communications of the ACM

As computer professionals, we mostly envision computers as general-purpose tools by default. Over the past decades, Moore’s law and Dennard scaling have, year after year, given us consistently better “toys”: faster computers, larger storage spaces. With...
General (D.0) | Jun 22 23

BCGen: a comment generation method for bytecode : Automated Software Engineering

The authors have undertaken a project to make bytecode more readable by interspersing it with machine-generated comments. There are two salient questions regarding this project: Did they...
General (D.2.0) | Dec 6 23

(Re)use of research results (is rampant) : Communications of the ACM

The point of this article is that scholars often make research contributions that do not fit neatly into the category of peer-reviewed journal papers, and that impacts the advance of knowledge negatively. First, the products of research simply do not always...
General (D.2.0) | Jul 18 23

Software assistants in software engineering: a systematic mapping study : Software—Practice & Experience

The authors note the considerable research and engineering efforts to create numerous software assistants (SAs) that have higher autonomy and intelligence for various stages and aspects of the software life cycle, including...
General (D.2.0) | May 24 23

GraphQL: a systematic mapping study : ACM Computing Surveys

Software architects ought to continuously strive to develop secure, dependable, and effective software services that can cope with the scalability, revival, idleness, multi-occupancy, and other operational...
Software Architectures (D.2.11) | Sep 5 23

Hardware (B)

Algorithms for big data

This book is an output from the German Research Foundation’s priority programme SPP 1736 on “Algorithms for Big Data.” SPP 1736 funded 15 projects, and a few projects with their own funding were also associated with the programme. There are eight papers under the...
Algorithms (B.2.4...) | Feb 7 24

Algorithmic modernity

In this edited volume on “algorithmic modernity,” uniting several historians of science, no formal definition for “algorithm” is actually provided. Instead the authors start with popular perceptions of the role of algorithms in society, that is, as instruments of both liberation...
Algorithms (B.2.4...) | Jan 5 24

Exercises in cellular automata and groups

This book has been published as part of the “Springer Monographs in Mathematics” series. It complements the book Cellular automata and groups [1] and its forthcoming second edition by the same authors. The authors have also written many other mathematics books...
Cellular Arrays & Automata (B.6.1...) | Feb 6 24

Computer Systems Organization (C)

Beginning AWS security: build secure, effective, and efficient AWS architecture

Beginning AWS security: build secure, effective, and efficient AWS architecture is an essential guide for anyone looking to understand and implement security measures within Amazon Web Services. This book is particularly valuable for system administrators...
Security & Protection (C.2.0...) | Mar 4 24

Software (D)

Software architecture: research roadmaps from the community

This short work is a compendium of six papers that arose from an International Conference on Software Architectures (ICSA) workshop held in Honolulu, Hawaii, in August 2022. The authors gathered around a common interest in a topic. These international teams...
Software Architectures (D.2.11) | Feb 19 24

Introduction to statistical and machine learning methods for data science

With this book, Dr. Carlos Pinheiro and Mike Patetta present a comprehensive and detailed exploration of data science techniques and applications. Introduction to statistical and machine learning methods for data science offers a broad overview of various...
Statistical Methods (D.2.4...) | Jan 15 24

Modeling and simulation in Python: an introduction for scientists and engineers

Allen B. Downey’s Modeling and simulation in Python is a comprehensive guide to Python-based simulations for physical systems. Downey skillfully teaches Python syntax for modeling spring forces, universal gravitation, and more, emphasizing practical skills with libraries like...
Python (D.3.2...) | Feb 28 24

Better Python code: a guide for aspiring experts

The Python programming language’s versatility and ease of learning has made it a popular choice in both industry and academia. This has also led to the production of many Python books and tutorials. Better Python code by David Mertz is not another tutorial, but rather...
Python (D.3.2...) | Jan 23 24

Pro Bash: learn to script and program the GNU/Linux shell (3rd ed.)

This is an excellent reference book for those who need to write Bash scripts. It is well organized, logically presented, and covers all the major commands and structures that are necessary to write useful scripts. The book makes few assumptions about the reader’s...
Linux (D.4.0...) | Feb 15 24

Data (E)

Business data ethics: emerging models for governing AI and advanced analytics

Data ethics is an evidence-based approach to understanding the use of data analytics and artificial intelligence (AI) technologies [1]. Hirsch et al.’s Business data ethics reports findings from a 2017 to 2019 empirical study of the motivations and...
Data (E) | Feb 2 24

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy