|
|
|
|
|
Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges: Journal of Intelligent Information Systems
Today, machine learning (ML) is applied to threat detection and classification problems in the important field of industrial control. This paper reviews different ML papers that apply supervised learning... more
General (H.1.0) | Mar 18 24
Trustworthy AI: from principles to practices: ACM Computing Surveys
As computing technology continues to evolve, artificial intelligence (AI) is playing an increasing role in various aspects of our lives. Although AI dates back many decades--I took an AI subject in my university studies, in 1988--only... more
General (I.2.0) | Mar 12 24
Data-driven prototyping via natural-language-based GUI retrieval: Automated Software Engineering
Reading this paper would leave anyone conflicted. It describes a good contribution ridden with flaws. It is puzzling that the referees and journal editors accepted the paper in its current form. The presentation... more
Software Development (K.6.3...) | Mar 7 24
10 things software developers should learn about learning: Communications of the ACM
As software developers, we understand the detailed workings of the different components of our computer systems. And--probably due to how computers were presented since their appearance as “digital brains” in the 1940s--we sometimes believe we can... more
Software Development (K.6.3...) | Feb 22 24
Conversational artificial intelligence in the AEC industry: a review of present status, challenges and opportunities: Advanced Engineering Informatics
Those working in the architecture, engineering, and construction (AEC) domain often get bogged down in day-to-day paperwork and verbally communicated instructions. Natural... more
General (I.2.0) | Feb 14 24
State-of-the-art improvements and applications of position based dynamics: Computer Animation and Virtual Worlds
The physically plausible simulation of objects is an active area of research in computer graphics. It is used in movies and video games and to simulate phenomena that would be expensive to do in a laboratory. In the traditional simulation method, external and... more
Animation (I.3.7...) | Feb 12 24
A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks: Ad Hoc Networks
FANET was coined for flying ad hoc networks, for example, unmanned aerial vehicles (UAVs). This survey paper is an in-depth discussion of the cybersecurity concerns and shortcomings unique to UAVs, as compared to... more
Security & Protection (C.2.0...) | Feb 8 24
Trustworthy AI: from principles to practices: ACM Computing Surveys
As systems based on AI have become the backbone of various public services such as transportation, finance, medicine, security, academics, medicine, and entertainment, the reliability and trustworthiness of AI artifacts/products, including robustness... more
General (I.2.0) | Jan 30 24
A deep learning technique for intrusion detection system using a recurrent neural networks based framework: Computer Communications
So let’s assume you already know and understand that artificial intelligence’s main building blocks are perceptrons, that is, mathematical models of neurons. And you know that, while a single perceptron... more
Neural Nets (I.5.1...) | Jan 19 24
CPFloat: a C library for simulating low-precision arithmetic: ACM Transactions on Mathematical Software
Mixed-mode floating-point arithmetic (MMFPA) is a requirement of modern numerical computing. The need arises, for instance, when computations entail execution on graphics processing units (GPUs) interleaved... more
Mathematical Software (G.4) | Jan 12 24
|
|
|
|
|
|
|
|
|
Exploring the power of ChatGPT: applications, techniques, and implications
The enormous power of ChatGPT lies in its ability to generate coherent and contextually relevant responses to user prompts and to engage in conversational interactions. It can understand and generate human-like text in a way that feels... more
General (I.2.0) | Mar 14 24
Responsible AI: best practices for creating trustworthy AI systems
Responsible AI: best practices for creating trustworthy AI systems appears to be a comprehensive guide focused on the principles and practices of developing responsible AI systems. The book seems to address the critical aspects of responsible AI, including... more
General (I.2.0) | Mar 13 24
Constructed truths: truth and knowledge in a post-truth world
Families gather during the holiday season, and heated discussions often erupt over politics and cultural values. This situation has become so frequent that it is standard fare in comedy sketches, jokes, and cartoons. It seems as though the opposing viewpoints come from... more
Theory (K.2...) | Mar 11 24
Constructed truths: truth and knowledge in a post-truth world
Many of us grew up used to having some news sources we could implicitly trust, such as well-positioned newspapers and radio or TV news programs. We knew they would only hire responsible journalists rather than risk diluting public trust and losing their brand’s... more
Theory (K.2...) | Mar 6 24
Information dynamics: in classical and quantum systems
Nowadays, the ubiquitous nature of information invokes the rapid development of new interdisciplinary sciences integrated with computing. One manifestation of this trend is the dynamism of information expressed in the different sciences with regards to information... more
Information Theory (H.1.1...) | Mar 5 24
Beginning AWS security: build secure, effective, and efficient AWS architecture
Beginning AWS security: build secure, effective, and efficient AWS architecture is an essential guide for anyone looking to understand and implement security measures within Amazon Web Services. This book is particularly valuable for system administrators... more
Security & Protection (C.2.0...) | Mar 4 24
Data science: an introduction to statistics and machine learning
This comprehensive textbook covers a broad spectrum of essential topics for understanding and working in the field of data science. It is structured in a clear, well-organized manner, divided into three main parts.
Part 1, “Basics,” starts with foundational concepts like... more
Statistics (K.1...) | Mar 1 24
The structure of game design
Game design may seem mystifying to the uninitiated, but Wallace Wang’s The structure of game design attempts to demystify the process of turning an idea into an actual playable game. Structured more like a textbook than a trade book, The structure of game design methodically breaks down the... more
Games (K.8...) | Feb 29 24
Modeling and simulation in Python: an introduction for scientists and engineers
Allen B. Downey’s Modeling and simulation in Python is a comprehensive guide to Python-based simulations for physical systems. Downey skillfully teaches Python syntax for modeling spring forces, universal gravitation, and more, emphasizing practical skills with... more
Python (D.3.2...) | Feb 28 24
Automata theory: an algorithmic approach
Novices to automata theory may want to start with Dines Bjørner’s narrative on principles and techniques, found in the automata theory chapter of his enjoyable three-volume set [1], which covers intuition, motivation, and pragmatics. Bjørner’s objective:
to help... more
General (G.1.0) | Feb 27 24
|
|
|