Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
August 18, 2019
Search
Highlight

A survey on deep neural network-based image captioning
Automated image captioning is the task of generating a useful and accurate description of an image without manual input. An ideal system, when shown an image, generates a summary such as “the mailman is running from a large, scary dog.” Conceptually, the task consists of two... more
Quote
Lots of algorithms go bad unintentionally. Some of them, however, are made to be criminal. Algorithms are formal rules, usually written in computer code, that make predictions on future events based on historical patterns. To train an algorithm you need to provide historical data as well as a definition of success... more
- Cathy O’Neil (2017)
Articles
Smart city system design: ACM Computing Surveys

As the authors state, “smart city applications in healthcare, transportation, utility, safety, and environmental health” are likely to benefit from machine intelligence and Internet of Things (IoT) technology. In this survey article on smart city system design... more

Security & Protection (C.2.0...) | Aug 16 19

Reliable industrial IoT-based distributed automation: IoTDI 19

This paper shows improved reliability in Industrial Internet of Things (IIoT) distributed automation systems by following along at runtime against expected real-world fault models. This novel idea represents models using... more

General (C.2.0) | Aug 16 19

Back to the future: Communications of the ACM

The name of this short article comes from the fact that the dawn of the Internet with the Advanced Research Projects Agency Network (ARPANET) reintroduced the store-and-forward method used for telegraphs, but instead of human nodes that made information... more

Public Networks (C.2.3...) | Aug 15 19

Sentiment analysis for software engineering: ICSE 18

Sentiment analysis continues to be successfully applied to consumer reviews. In other areas, the challenges involved can prove insurmountable. A failed attempt to successfully apply sentiment analysis is reported in this... more

General (D.2.0) | Aug 15 19

Long short-term memory fuzzy finite state machine for human activity modelling: PETRA 19

As sensors become more ubiquitous in smart homes and work environments, the data they provide can offer information about the locations and actions of any occupants. The authors propose using a... more

Memory Design (B.5.1...) | Aug 14 19

Algorithm 993: ACM Trans. on Mathematical Software

The Kronecker product of two matrices replaces each element of the first matrix with a multiple of a copy of the second matrix. The history, applications, and properties of the Kronecker and the symmetric... more

Numerical Algorithms & Problems (F.2.1) | Aug 14 19

The challenge of crafting intelligible intelligence: Communications of the ACM

In the past decade, many algorithms and techniques have been classified as computational intelligence, machine learning, cognitive informatics, or data science, so much so that those approaches now fall... more

General (I.2.0) | Aug 9 19

Virtual machine consolidation using constraint-based multi-objective optimization: Journal of Heuristics

As cloud computing grows, its demands on resources play an ever-increasing role in the economics of machine maintenance. One potential way of addressing this issue is by improving usage. For example... more

General (I.0) | Aug 8 19

Cooperative heterogeneous multi-robot systems: a survey: ACM Computing Surveys

To automatically solve complex tasks--for example, in domestic services, intelligent transportation, surveillance, and emergency response--we expect that one single robot cannot succeed; so... more

Robotics (I.2.9) | Aug 7 19

An architecture for translating sequential code to parallel: ICISDM 18

Processor architectures have grown in leaps and bounds over the last couple of decades, but the software systems used for computational purposes have not kept up with these changes. This paper proposes a new approach to... more

General (H.0) | Aug 6 19

Books
Computational texture and patterns

This slim volume considers the question of representing and matching textures and similar patterns. This question is closely related to recognition--for example, recognizing that something is a picture of a leafless tree--and segmentation, that is, picking out the... more
Vision & Scene Understanding (I.2.10) | Aug 16 19

Location-based gaming

Location-based games, an offshoot of more traditional video games, provide unique opportunities for interaction in shared public spaces, experiments in social dynamics, artistic exploration, and of course fun. In order to more fully understand the... more
Games (K.8.0...) | Aug 15 19

Contactless 3D fingerprint identification

I am interested in machine learning (ML)-based image classification. Thus, I thought this book may be an interesting read about how ML techniques are applied to fingerprinting. As it turns out, the book is not about ML, but just plain mathematics and algorithms... more
Computer Vision (I.5.4...) | Aug 13 19

Orthogonal waveforms and filter banks for future communication systems

Filter bank multicarrier (FBMC) signaling policy is the subject of this book. To explain its different features and functionalities in different communication interaction scenarios, the authors present a comprehensive... more
Signal Processing Systems (C.3...) | Aug 12 19

Research advances in cloud computing

This book includes recent research trends in cloud computing. It covers a wide range of research topics, some of which will be of interest to cloud users and others to cloud vendors. This review organizes 18 chapters into topics for cloud users, cloud... more
Cloud Computing (C.2.4...) | Aug 8 19

You’ll see this message when it is too late

It seems not a day goes by without a media headline of some cybersecurity breach somewhere. Whether espionage, financial attack, or theft of personal data, we see a brief burst of hysteria followed by assurances... more
Privacy (K.4.1...) | Aug 7 19

Logic functions and equations (2nd ed.)

Logic functions, commonly known as Boolean functions, arise in many areas of computer science and information technology. On a fundamental technological level, every digital circuit can be modeled as a Boolean function. Design, optimization, and circuit synthesis... more
General (F.3.0) | Aug 6 19

The book of why

In fields such as data science, explainable artificial intelligence (AI), and big data analytics, “why?” is the ultimate question that needs to be answered to make sense of real data. “Why?” has been the simplest question to advance science since the Age of... more
Probability & Statistics (G.3) | Aug 2 19

Calendrical calculations (4th ed.)

Calendrical computation is motivated by a collision between incommensurability and importance. The month (the time from one new moon to another) is not an integral number of days, and the year (the time between successive spring equinoxes) is... more
Mathematics & Statistics (J.2...) | Jul 30 19

Guide to programming for the digital humanities

Ranging from excellent (A+) to very good (A-), although much too brief for me (sigh), Guide to programming for the digital humanities: lessons for introductory Python is written in a voice that is clear, easy to read, and simple to understand. This fantastically well-organized... more
Arts & Humanities (J.5) | Jul 29 19


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy