Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
June 26, 2019
Search
Highlight

Understanding image representations by measuring their equivariance and equivalence
As the number of artificial intelligence (AI)-based systems that support key aspects of our life, including health and security, increases exponentially, the demand for explainable AI has reached a peak in recent years. In the field of computer vision, image representations are... more
Quote
There is little common or stereotypical about the women who make their careers in computing. We are from all walks of life. We are all types of people. Whatever else, we are drawn... more
- Anita Borg (1994)
Articles
A study on software fault prediction techniques: Artificial Intelligence Review

Software developers and managers struggle with the increasing number of software problems and defects. Such problems can rapidly increase the costs of software maintenance and development. Traditional... more

Metrics (D.2.8) | Jun 24 19

Guidelines for human-AI interaction: CHI 19

From a human-computer interaction (HCI) perspective, the arrival of virtual assistants (for example, Alexa, Siri, Google Assistant, and Bixby) has led to a shift in interaction mode from visual to to speech-based: instead of... more

General (I.2.0) | Jun 20 19

EmerGence: a delay tolerant web application for disaster relief: HotMobile 19

Providing communication services in disaster-affected areas is important. The authors introduce an app for such situations that runs on the back of networks powered by unmanned aircraft systems (drones)... more

Network Architecture & Design (C.2.1) | Jun 19 19

NV-clustering: normally-off computing using non-volatile datapaths: IEEE Transactions on Computers

The much-needed downscaling of different core system architectures is significantly challenged by static power dissipation. The authors present a solution via middleware-transparent... more

Logic Design (B.6) | Jun 19 19

Three bits suffice: explicit support for passive measurement of Internet latency in QUIC and TCP: IMC 18

The Internet measurement of round-trip time (RTT) is important as an indication of performance and latency. While the Ping utility can and does measure RTT, widespread use increases overhead. This... more

Network Protocols (C.2.2) | Jun 17 19

Understanding image representations by measuring their equivariance and equivalence: International Journal of Computer Vision

As the number of artificial intelligence (AI)-based systems that support key aspects of our life, including health and security, increases exponentially, the... more

Image Representation (I.4.10) | Jun 17 19

Empirically-based secure OS design: NSPW 17

In this New Security Paradigms Workshop (NSPW) panel, four people discuss research methods and the actual meaning of a secure operating system (OS). The panelists do not tackle this aspect as a purely... more

Security & Protection (D.4.6) | Jun 13 19

A comparative study on two XML editors (Oxygen and UltraEdit): ICCSP 19

The authors compare two Extensible Markup Language (XML)-aware editors, Oxygen and UltraEdit. The comparison comprises three parts: an unstructured interview and observation, and two hands-on tests. One hands-on test requires reconfiguring the... more

XML (I.7.2...) | Jun 12 19

Did we just travel to the past? Building and evaluating with cultural presence different modes of VR-mediated experiences in virtual archaeology: Journal on Computing and Cultural Heritage

Virtual archaeology seeks to develop ways of using computer-based visualization for the... more

Archaeology (J.2...) | Jun 10 19

Technologizing agriculture: Communications of the ACM

New technologies continue to revolutionize agricultural business processes. Today, farmers use technologies such as drones, robots, and sensors to cautiously and resourcefully track and manage agricultural assets and operative... more

Earth & Atmospheric Sciences (J.2...) | Jun 6 19

Books
Declarative logic programming

What is declarative logic programming and why is it relevant? These are just two of the many questions answered in Declarative logic programming, edited by Michael Kifer and Yanhong Annie Liu. The compiled chapters aim to fill in any gaps in the current literature related to... more
Logic Programming (D.1.6) | Jun 26 19

Vector extrapolation methods with applications

Most nontrivial data in engineering and science is composed of vectors. Linear algebra and multivariate statistics provide the well-known tools for the analysis of vector data, but an often overlooked problem is... more
Engineering (J.2...) | Jun 25 19

Essential engineering thermodynamics

The relationship between computer science and physics is many-faceted, from the quantum mechanics principles that make semiconductors hum, to the concept of entropy that is the foundation of information theory. Entropy is a key concept of thermodynamics... more
Physics (J.2...) | Jun 21 19

Comprehensive healthcare simulation: neurosurgery

There have been many changes in the ways in which surgeons gain early experience. These include a worldwide reduction in working hours and a migration from hands-on apprenticeship-type training. There have also been changes in patient expectations... more
Life & Medical Sciences (J.3) | Jun 19 19

Migrating to Azure

Migrating to Azure covers the fundamentals of migrating, securing, and deploying legacy applications on the Microsoft Azure cloud. Due to their high availability and cost effectiveness, cloud computing technologies have been increasingly used for application deployment... more
Cloud Computing (C.2.4...) | Jun 18 19

Cyber-physical security and privacy in the electric smart grid

The book presents an interesting selection of papers within the domain of cyber-physical security. It provides a starting point for researchers trying to navigate security and privacy issues within a smart grid... more
Security & Protection (K.6.5) | Jun 14 19

Managing cyber risk in the financial sector

I would classify this book as a buffet of articles, studies, research, and references spanning the spectrum of cyber risk domains across various economies around the world. Just like a buffet, there is a lot of very valuable information packed in here; however, just like a... more
Security (K.4.4...) | Jun 12 19

Dynamics and control of DC-DC converters

This book is about designing controllers using simulation and mathematical software packages. It deals with direct current (DC)-to-DC controllers, and develops foundational circuit equations and ways to design such... more
Physical Sciences & Engineering (J.2) | Jun 11 19

Scalable big data analytics for protein bioinformatics

High-performance computing (HPC) refers to the use of large computational resources for solving computationally hard and data-intensive problems. Big data refers to “the exponential growth ... of data, both structured and unstructured.” The challenges... more
Biology & Genetics (J.3...) | Jun 6 19

Technology for efficient learner support services in distance education

While open and distance learning generates huge revenues for educational institutions in more developed nations, it is quite interesting to know that this phenomenon is also catching on in developing... more
Distance Learning (K.3.1...) | Jun 5 19


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy