Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
October 30, 2020

A survey on deep learning: algorithms, techniques, and applications
Deep learning (DL) algorithms, characterized by mapping from input to output (labels or classes) with multiple hidden layers in between, have revived the excitement of artificial intelligence (AI) to get closer to its initial vision of building intelligent machines. The major DL network... more
All nuclear explosions create EMP [ElectroMagnetic Pulse], although the pulse dissipates rapidly in explosions close to the earth’s surface... more
- David Burnham (2003)
Indonesian automatic text summarization based on a new clustering method in sentence level: BDE 19

A sentence-centered account of text summarization, this work can be applied to any language. Characteristics of the Indonesian language are irrelevant to the proposed approach and are not discussed. Neither is the... more

General (I.2.0) | Oct 30 20

Data mining to increase teaching performance in engineering education: ICEIT 19

A country’s success rate depends on many aspects. It is a mixture of different inner and outer conditions. Some factors are dependent on politics, and there is no possibility of building a strong and innovative... more

General (G.0) | Oct 29 20

Separation logic: Communications of the ACM

Formal reasoning about mutable data can be difficult when concurrency is present, for instance, when attempting mutation of the same data at the same time from multiple processors; or when aliasing is present, for instance, when... more

Classes And Objects (D.3.3...) | Oct 28 20

A calculus for Esterel: Proceedings of the ACM on Programming Languages

Esterel is a synchronous language for reactive programming. Developed in the mid 1980s, it has been used in several safety-critical applications for aviation and nuclear power plant control. In Esterel... more

General (D.3.0) | Oct 27 20

Modern debugging: the art of finding a needle in a haystack: Communications of the ACM

The rapidly emerging smart Internet of Things (IoT) hardware and devices that make our lives comfortable and secure require faultless and reliable software. But what techniques and tools... more

Debugging Aids (D.2.5...) | Oct 26 20

C is not a low-level language: Queue

Early computers were programmed with low-level languages that were very close to their physical architecture. Although those languages guaranteed efficient use of machine resources, they were not particularly user-friendly, meaning it was hard... more

C (D.3.2...) | Oct 21 20

Massively parallel polar decomposition on distributed-memory systems: ACM Transactions on Parallel Computing

For solving problems with high computational demands, it is nowadays essential to apply parallel algorithms that scale effectively to a large number of... more

Mathematical Software (G.4) | Oct 20 20

Nonhomogeneous place-dependent Markov chains, unsynchronised AIMD, and optimisation: Journal of the ACM

The TCP that underpins most Internet traffic has a simple yet intuitively beautiful algorithm for congestion control. Every connection will gradually ramp up the bandwidth it uses until... more

Probability & Statistics (G.3) | Oct 19 20

A survey on deep learning: algorithms, techniques, and applications: ACM Computing Surveys

Deep learning (DL) algorithms, characterized by mapping from input to output (labels or classes) with multiple hidden layers in between, have revived the excitement of artificial intelligence (AI) to get... more

Learning (I.2.6) | Oct 16 20

Neural graph collaborative filtering: SIGIR 19

Typically, collaborative filtering (CF) is simply a nearest neighbor (NN) algorithm used either in its original form or in machine learning (ML), especially in supervised learning, to predict user preferences in recommender systems. Here, neural graph collaborative... more

Filtering (I.4.3...) | Oct 14 20

Beginning Azure functions

This interesting book describes getting started with Azure. It includes a substantial tutorial that goes through all the basic steps to create an Azure account. Step-by-step details for creating a first Azure function follow. The book then covers programming with the Azure... more
General (D.2.0) | Oct 23 20

Beginning Perl programming

Beginning Perl programming covers the basics of Perl: its origin, scalar variables, array variables, associative array variables, flow control, conditional expressions, basic input/output (I/O), advanced I/O, pattern matching, its utilities, filesystem and process... more
Multiparadigm Languages (D.3.2...) | Oct 22 20

Python for probability, statistics, and machine learning (2nd ed.)

The aim of this book is to offer programmers a tutorial on how to use Python libraries, like NumPy, Matplotlib, Pandas, SciPy, and SymPy, to perform probability evaluations and statistical analyses as the... more
Python (D.3.2...) | Oct 15 20

Machine understanding: machine perception and machine perception MU

This is a difficult book to define/describe. Some parts are very interesting, presenting good research questions and discussions; other parts lack detail and depth--readers are sometimes just sent to the author's... more
KR Formalisms & Methods (I.2.4) | Oct 12 20

Guide to automotive connectivity and cybersecurity

Information technology (IT) specialists are very involved in vehicle design and maintenance. The technologies that support modern engine monitoring, navigation, driver information, and safety systems would be... more
General (C.0) | Oct 9 20

Numerical methods

According to my experience, teaching numerical methods can be an ordeal: students typically do not like the related courses. The reason stems from the fact that the topic is difficult, that is, not easy to follow; additionally, the attendees sometimes cannot... more
Numerical Analysis (G.1) | Oct 8 20

Essentials of cloud computing

Why do we need cloud computing? What are the core components of cloud computing architecture and its technological foundations? What is the impact of virtualization and multitenancy on cloud security? What is the best way to migrate to cloud computing?... more
Distributed Architectures (C.1.4...) | Oct 6 20

Finite-state techniques

The mathematical theory of automata is one of the great ideas of computer science, easy to state and understand, yet with great explanatory power and potential for problem solving. When I first encountered finite-state machines many years ago [1], the... more
Automata (F.1.1...) | Oct 5 20

Essential logic for computer science

The “for computer science” part of this excellent book’s title initially gave me pause, as it connoted for me a possible compromise of the “logic” part. As a matter of fact, the very opposite is the case here. The book's predicate logic, equational reasoning, and... more
General (F.0) | Oct 2 20

The era of Internet of Things

A very short text of just over 100 pages, this book has a catchy title and the author claims it contains everything needed to start working with the Internet of Things (IoT). Unfortunately, such a claim is an enormous exaggeration. The book consists of five chapters... more
General (C.0) | Sep 25 20

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2020 ThinkLoud, Inc.
Terms of Use
| Privacy Policy