Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
July 17, 2019

Guidelines for human-AI interaction
From a human-computer interaction (HCI) perspective, the arrival of virtual assistants (for example, Alexa, Siri, Google Assistant, and Bixby) has led to a shift in interaction mode from visual to speech-based: instead of manipulating objects displayed on a screen, users instruct or query these assistants. Beneath the surface, however, the use of... more
Twitter’s uncurated feed certainly has some downsides, and I can see some algorithmic improvements that would make it easier for early users to adopt the service, but... more
- Zeynep Tufekci (2014)
Towards a competency model: Education and Information Technologies

This paper has a title that clearly defines its content, but I found section 4, “The Proposed Model and Case Study,” the most interesting. Competency-based education and assessment can be briefly defined as “the... more

Computer Uses in Education (K.3.1) | Jul 16 19

Efficiency through uncertainty: HSCC 19

Hybrid systems are those “with both continuous dynamics and discrete logic” [1]. The discrete logic serves to label or parametrize (my terms) states; state-specific continuous dynamics, modeled largely if not exclusively by differential equations, operate within each... more

Formal Methods (D.2.4...) | Jul 12 19

Practical minimum cut algorithms: Journal of Experimental Algorithmics

Due to the ever-increasing deployment of graph theory in natural and artificial phenomena, it is challenging for scientists to utilize it in a more performant manner. One of the most popular topics in graph and... more

Graph Algorithms (G.2.2...) | Jul 10 19

Exploring parent use of early STEM media to inform design for children: IDC 19

From the first sentence of the abstract: “This paper explores how parents identify and use science and math media to engage their preschool children in informal science and math learning... more

Computer Uses in Education (K.3.1) | Jul 3 19

The seven tools of causal inference, with reflections on machine learning: Communications of the ACM

This is one of the most influential and eye-opening articles I’ve read in the last two or three years. The author, an ACM Turing Award recipient, makes clear distinctions between machine learning (ML)... more

Learning (I.2.6) | Jul 2 19

A study on software fault prediction techniques: Artificial Intelligence Review

Software developers and managers struggle with the increasing number of software problems and defects. Such problems can rapidly increase the costs of software maintenance and development. Traditional... more

Metrics (D.2.8) | Jun 24 19

Guidelines for human-AI interaction: CHI 19

From a human-computer interaction (HCI) perspective, the arrival of virtual assistants (for example, Alexa, Siri, Google Assistant, and Bixby) has led to a shift in interaction mode from visual to speech-based... more

General (I.2.0) | Jun 20 19

NV-clustering: normally-off computing using non-volatile datapaths: IEEE Transactions on Computers

The much-needed downscaling of different core system architectures is significantly challenged by static power dissipation. The authors present a solution via middleware-transparent... more

Logic Design (B.6) | Jun 19 19

EmerGence: a delay tolerant web application for disaster relief: HotMobile 19

Providing communication services in disaster-affected areas is important. The authors introduce an app for such situations that runs on the back of networks powered by unmanned aircraft systems (drones)... more

Network Architecture & Design (C.2.1) | Jun 19 19

Understanding image representations by measuring their equivariance and equivalence: International Journal of Computer Vision

As the number of artificial intelligence (AI)-based systems that support key aspects of our life, including health and security, increases exponentially, the... more

Image Representation (I.4.10) | Jun 17 19

How to build a cyber-resilient organization

Today, cyberattacks on a nation’s infrastructure are an acceptable form of undercover activity. All nations engage in this form of espionage, and every year increasingly sophisticated tools are created and... more
Management Audit (K.6.4...) | Jul 17 19

Computational artifacts

The philosophy of any discipline must account for the goals, methodology, and subject matter of the discipline [1]. There is a well-developed body of scholarship on the philosophy of mathematics and of science, especially physics and biology, and more recently... more
General (A.0) | Jul 15 19

From Gutenberg to Google

The author of this book was the Chairman of the US Federal Communications Commission (FCC) from 2013 to 2017. From that experience, Wheeler gained firsthand knowledge of some recent developments in communication networks, and the impact of... more
Hardware (K.2...) | Jul 11 19

The Bitcoin standard

Do we need yet another book about Bitcoin [1,2,3]? After reading The Bitcoin standard, the answer is a resounding yes. Here is why. While Bitcoin is commonly viewed as a technological phenomenon, the author views it as but one “decentralized alternative to... more
Electronic Commerce (K.4.4) | Jul 9 19

Beginning blockchain

Blockchain, a distributed ledger technology, is experiencing a surge of popular interest in the context of various domains, including electronic health records, supply chains, cryptocurrencies, and electronic voting, to name a few. A blockchain is defined as a... more
Cybercash, Digital Cash (K.4.4...) | Jul 8 19

How the Internet happened

“You’ve come a long way, baby!” For those readers old enough to remember the Virginia Slims advertising campaign, which started in 1969, this phrase refers to the early days of the women’s liberation movement, highlighting momentous changes in the roles of women... more
History of Computing (K.2) | Jul 5 19

The ascent of GIM, the global intelligent machine

Part of Springer’s “History of Mechanism and Machine Science” series, this would have been a better title for the book. The author starts with a kind of “fuzzy” introduction to the “Big History of the Machine,” looking at concepts related to autonomous robots... more
General (I.2.0) | Jul 1 19

New light through old windows

Science fiction has often been prophetic--sometimes wrongly so, sometimes very much on point. New light through old windows is a collection of science fiction stories--the earliest is from the early 19th century and the most recent is from the mid-1930s. Each... more
General (A.0) | Jun 28 19

Building your online store with WordPress and WooCommerce

This is a how-to book on using WordPress and WooCommerce--WooCommerce is a plugin for WordPress, creating an e-commerce store. The text goes through the steps required to configure... more
Electronic Commerce (K.4.4) | Jun 27 19

Declarative logic programming

What is declarative logic programming and why is it relevant? These are just two of the many questions answered in Declarative logic programming, edited by Michael Kifer and Yanhong Annie Liu. The compiled chapters aim to fill in any gaps in the current literature related to... more
Logic Programming (D.1.6) | Jun 26 19

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy