Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
March 20, 2019
Search
Highlight

Deep learning for computer vision with Python
Internet resources for learning artificial intelligence (AI), especially regarding the subtopic of machine learning (ML), are expanding rapidly. Two resources, presented as online books, are the subject of this review. Both resources overlap in coverage of ML and deep learning (DL), and both are called “books” (PDFs), but other than that... more
Quote
I have been a happy man ever since January 1, 1990, when I no longer had an email address. I’d used email since about... more
- Donald Knuth (2004)
Articles
A robust machine learning technique to predict low-performing students: ACM Transactions on Computing Education (TOCE)

Academic failure is one of the most important problems in higher education institutions around the world. In a continuous cycle, universities admit new students and graduate others, but the road to success in... more

Computer Uses in Education (K.3.1) | Mar 20 19

Symbolic checking of fuzzy CTL on fuzzy program graph: Acta Informatica

This paper presents a new temporal logic for fuzzy logic systems, fuzzy computation tree logic (FzCTL), based on previous work on Kripke structures for fuzzy logic systems, that is, fuzzy program graph (FzPG) [1]. The motivation for... more

Temporal Logic (F.4.1...) | Mar 20 19

Search-based program synthesis: Communications of the ACM

Program synthesis aims at the automatic generation of “an executable implementation ... from a high-level logical specification of the desired input-to-output behavior.” The review article concentrates on... more

General (D.1.0) | Mar 19 19

Digital revolution and its impact on education systems in developing countries: Education and Information Technologies

This paper is a literature review on the use of digital technologies in education. The context is so-called “developing countries.” It discusses... more

General (K.3.0) | Mar 19 19

Blockchains from a distributed computing perspective: Communications of the ACM

Maurice Herlihy has published a book and numerous papers on distributed systems, and in particular concurrency, so he is in a very good position to judge blockchains. He has written here an excellent... more

Cybercash, Digital Cash (K.4.4...) | Mar 18 19

Factors and actors leading to the adoption of a JavaScript framework: Empirical Software Engineering

JavaScript is a front-end and back-end language for producing web content. Hundreds of frameworks aimed at improving some aspect or another of working... more

JavaScript (D.3.2...) | Mar 18 19

Development of eye movement games for students with low vision: Education and Information Technologies

This paper examines the development of computer games that could aid students with low or impaired vision. I found it difficult to read due to typographical errors and poor sentence structure. The text... more

Games (K.8.0...) | Mar 14 19

Blockchains from a distributed computing perspective: Communications of the ACM

This article is an excellent explanation of cybercurrencies, “a tutorial on the basic notions and mechanisms underlying blockchains,” referencing “variations on familiar algorithms... more

Cybercash, Digital Cash (K.4.4...) | Mar 14 19

Quantitative graph theory: Information Sciences

In this paper, the authors provide a description of quantitative graph theory, which is a relatively new branch of graph theory. The key feature of this branch is its measurement approach to quantifying... more

Graph Theory (G.2.2) | Mar 14 19

The application research of digital technology in the education for major of machinery in new engineering background: ICDTE 18

From the outset, the title of the paper presents a problem to the reader. The same goes for much of its grammar throughout. For this paper to be... more

General (K.3.0) | Mar 13 19

Books
Introduction to recursive programming

Self-directed action can challenge the notion of action and defy understanding. It can trap one in a disorienting hall of mirrors or in a contorted posture. Recursion, which employs a function that calls itself, is an example. It is as conceptually elegant as it is subtle and... more
Recursion (D.3.3...) | Mar 20 19

Social interactions in virtual worlds

As the title implies, this book is a compilation of studies on how virtual worlds may have applications to the real world. The editors claim that readers will find data on how individuals and pairs behave within a game; what patterns of behavior exist within groups; how... more
Artificial, Aug. & Virt. Realities (H.5.1...) | Mar 15 19

Absolute FreeBSD (3rd ed.)

There are more than 700 pages in this book, and the author suggests that it should be read in entirety, from front to back! Most readers will be happy to skip the introductory text and jump straight to chapter 2, “Before You Install,” where they can learn what sort of... more
Unix (D.4.0...) | Mar 15 19

Beginning robotics with Raspberry Pi and Arduino

The language used in this book is very close to beginner level. It includes many examples, with code, images, and details of the materials needed to assemble the presented robot. The book’s ten chapters cover five key aspects related to low-cost robots: the robot... more
Microprocessors & computers (B.7.1...) | Mar 14 19

Deep learning for computer vision with Python

Internet resources for learning artificial intelligence (AI), especially regarding the subtopic of machine learning (ML), are expanding rapidly. Two resources, presented as online books, are the subject of this review. Both resources overlap in coverage of ML and deep... more
Computer Vision (I.5.4...) | Mar 12 19

Polar codes

Coding and information theory is at the heart of modern communication and computer technologies. Shannon’s seminal work shows that you can transmit bits on a noisy channel using code, and the probability of error can be made arbitrarily small provided the code rate is less... more
Coding & Information Theory (E.4) | Mar 7 19

Fog computing

In a nutshell, fog computing tries to transfer familiar concepts from cloud computing, like virtualization, elastic scalability, and everything-as-a-service (XaaS), closer to the sensors and devices of the Internet of Things (IoT) or to end users, to the so-called... more
Distributed Networks (C.2.1...) | Mar 6 19

Crowdsourcing of sensor cloud services

With the ubiquitous distribution of mobile devices (smartphones, tablets, and so on equipped with a variety of sensory and wearable devices), users are able to generate different types of real-time information related to ambient air measurements, fire... more
Cloud Computing (C.2.4...) | Feb 28 19

Advances in aeronautical informatics

Let me preface this review by saying that as a small-time hobbyist pilot (single engine land), I fly when I may a little general aviation piston airplane; my day job as a computer professional pays for the gasoline. Advances in aeronautical informatics is a work... more
Aerospace (J.2...) | Feb 27 19

The Internet of Things

The number of connected devices will soon be much bigger than the world population. The Internet of Things (IoT) is changing the Internet at a much faster pace than ever expected, and we are experiencing only the beginning of a new trend leading up to an IoT paradigm... more
Special-Purpose Systems (C.3) | Feb 26 19


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy