Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
October 19, 2018
Search
Highlight

Codes, cryptology and curves with computer algebra
This volume offers a terse, highly formal exposition of the relation between the four subjects named in the title: codes (transformations of a stream of information), cryptology (transformations that seek to hide the original content), curves (specifically, algebraic geometry, the study of zeros of multivariate polynomials), and computer algebra... more
Quote
On the horizon is ubiquitous computing. The Internet is now a web, still strung sparsely across most of the land. But imagine drawing the threads tighter... more
- George Johnson (2000)
Articles
Systematically understanding the cyber attack business: a survey: ACM Computing Surveys

Cybercrime is a lucrative business with a very positive return on investment. To combat the cybercrime business, it helps to understand how it operates. The authors use the value chain analysis method... more

Security & Protection (K.6.5) | Oct 19 18

Mitigating risks of digitalization through managed industrial security services: AI & Society

This paper discusses the risks of industrial security services. Moreover, the authors consider future automation scenarios as well as the major concepts involved in industrial security... more

Security & Protection (K.6.5) | Oct 19 18

Sleep behavior assessment via smartwatch and stigmergic receptive fields: Personal and Ubiquitous Computing

A stigmergic receptive field (SRF) is suggested as an improved variant of machine learning (ML). The authors successfully prove their proposed variant. They analyze heartbeat rate and accelerometer data coming... more

Sensor Networks (C.2.1...) | Oct 18 18

On k-abelian palindromes: Information and Computation

This paper explores words (finite strings over a fixed finite alphabet Σ with at least two letters) that are k-abelian equivalent to their reversals. Two words are k-abelian equivalent if and only if their multisets of factors of length no greater... more

Nonnumerical Algorithms & Problems (F.2.2) | Oct 17 18

OWL reasoning: subsumption test hardness and modularity: Journal of Automated Reasoning

This paper is aimed at web ontology language (OWL) authors and tool developers. These people know that SROIQ(D), the logic that underpins OWL, has a... more

Ontologies (I.2.4...) | Oct 16 18

Making machine learning robust against adversarial inputs: Communications of the ACM

Machine learning (ML) has become ubiquitous in recent times. It is used in numerous (important) applications and its use will seemingly only increase. The current ML state of the art can be attributed to “nearly 50... more

Machine Translation (I.2.7...) | Oct 15 18

How to teach computer ethics through science fiction: Communications of the ACM

This is one of those very strange articles that makes one happy, just by its very existence. The article opens with a general statement that, most unfortunately, is not obvious to many (perhaps most) people... more

Ethics (K.4.1...) | Oct 15 18

From hidden to visible: Theoretical Computer Science

Algebraic specification is a technique in which a system is modeled by equations or conditional equations. This approach was originally used for defining data types and operations on them. An added benefit is that the equational... more

General (F.0) | Oct 12 18

A scalable preference model for autonomous decision-making: Machine Learning

In some consumer markets, prices are determined by the limited availability of goods and customers choose from a small set of options. The outcome is often determined by simple tradeoffs between the... more

Intelligent Agents (I.2.11...) | Oct 12 18

Comparing loops misconceptions in block-based and text-based programming languages at the K-12 level: Education and Information Technologies

What are the specifics of the computer programming learning process in primary and secondary schools (K-12)? Are there significant differences... more

General (K.3.0) | Oct 11 18

Books
Fundamentals of computer vision

The fundamental principles of computer vision based on image processing technologies are presented in this book. The style of the content is informal; meanwhile, a lot of equations are involved. The reader should have enough math background, including linear... more
Computer Vision (I.5.4...) | Oct 19 18

Introduction to modeling and simulation with MATLAB and Python

This is a very unusual book. It is concise and well written on the one hand, with bewildering content on the other. If one steps back far enough, the book could be described as a tutorial on writing programs... more
General (I.6.0) | Oct 18 18

Software engineering (10th ed.)

This book has been around for about three decades. This newest version is the tenth edition. Software engineering is--has become--an enormous subject. The book is very long--over 800 pages--and yet it... more
General (D.2.0) | Oct 17 18

Data science fundamentals for Python and MongoDB

Data science is an important and growing field in computing. This book purports to provide an introduction to data science with Python and MongoDB. It fails on pretty much every level. Here are... more
Object-Oriented Programming (D.1.5) | Oct 17 18

Big data factories

In the technology world, ABCD is a buzzword. “A” stands for artificial intelligence (AI), “B” for blockchain, “C” for cloud, and “D” for big data. “D” especially is the origin of the others: you need the cloud because you have to store big data; blockchains can be used to... more
Content Analysis & Indexing (H.3.1) | Oct 16 18

The diversity bonus

Diversity, perhaps appropriately, means different things to different people. To some it is a quasi-religious norm and a central motivation in political discussions and policy debates. To others, such as cognitive scientists and experts in machine learning, it refers to... more
Business (J.1...) | Oct 15 18

Microservices and containers

Microservices and containers is an interesting book, albeit a flawed one. It addresses two important topics, but only loosely justifies putting the two topics in the same work. It is divided into three sections... more
General (D.2.0) | Oct 12 18

Reinforcement learning

The success of reinforcement learning (RL) in everything from AlphaGo to intelligent decision making for services in everyday life has made RL a hot topic. The concept has been around since the birth of artificial intelligence (AI) via Turing’s ideas, especially in Marvin... more
Python (D.3.2...) | Oct 11 18

A journey through discrete mathematics: a tribute to Jiří Matoušek

Professor Jiří Matoušek was a distinguished scientist with significant achievements in the areas of discrete and “computational geometry, topology, and some aspects of metric space theory.” His work in discrete and computational geometry provides solutions for... more
General (G.2.0) | Oct 11 18

A formal theory of commonsense psychology

In introducing commonsense psychology, this book motivates readers to consider computational psychology. It describes the foundational building blocks of such computations. It provides not only purely... more
Psychology (J.4...) | Oct 5 18


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy