Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
Misc

View:



A survey of methods for explaining black box models : ACM Computing Surveys

Computerized decision support systems have significant social consequences, and yet they are capable of mistakes or bias. Can an autonomous driving system be trusted, for example, when its visual scene...
Decision Support (H.4.2...) | Jan 25 19

Large-scale ontology matching: state-of-the-art analysis : ACM Computing Surveys

The ontology matching or alignment task identifies inconsistencies among concepts, relationships, and instances in two different ontologies and then resolves correspondence relationships. The authors...
Ontologies (I.2.4...) | Jan 25 19

Triclustering algorithms for three-dimensional data analysis: a comprehensive survey : ACM Computing Surveys

The rapid increase in data streams poses significant challenges to their interpretation. Algorithms increasingly target 3D datasets, which plot observations, attributes, and contexts, to capture patterns...
Clustering (H.3.3...) | Jan 18 19

An automatic proving approach to parameterized verification : ACM Transactions on Computational Logic

Network and security protocols occasionally require important but difficult to authenticate parameters such as the number in a communication party. The existing formal proofs of algorithms for verifying the...
Security & Protection (C.2.0...) | Feb 20 19

From being there to watching : ACM Transactions on Computer-Human Interaction

“I was there” is a sentence that in the future might be synonymous with remotely watching, or being telepresent. When the “being there“ means attending scientific events aimed at increasing scientific...
Robotics (I.2.9) | Mar 1 19

Assessing students’ IT professional values in a global project setting : ACM Transactions on Computing Education

This paper is on developing a set of questions to assess students’ professional values. The context for the development is a project-based course involving three universities, two in the US and one in Sweden...
General (K.3.0) | Feb 25 19

Cross-dependency inference in multi-layered networks : ACM Transactions on Knowledge Discovery from Data

Current and emerging networks have a duty to promote interconnections for new collaborative research and business between academia and industry. Multi-layered networks require...
Database Applications (H.2.8) | Feb 11 19

An autotuning protocol to rapidly build autotuners : ACM Transactions on Parallel Computing

While autotuning has become a valuable tool for the high-performance computing (HPC) community to achieve “performance portability,” that is, the program runs on the new architecture correctly and...
Parallel Programming (D.1.3...) | Mar 7 19

STADS: software testing as species discovery : ACM Transactions on Software Engineering and Methodology

Software testing is an exercise in extrapolation--we attempt to infer the correctness of software by exercising it using test cases. However, as Dijkstra famously observed, testing demonstrates...
Testing & Debugging (D.2.5) | Jan 17 19

Spectrum-based fault localization in model transformations : ACM Transactions on Software Engineering and Methodology

Model transformation is a recognized cornerstone in software engineering. Any nontrivial software system involves some kind of model transformation (for example, a large and...
Reliability (D.4.5) | Jan 31 19



Absolute FreeBSD (3rd ed.)

There are more than 700 pages in this book, and the author suggests that it should be read in entirety, from front to back! Most readers will be happy to skip the introductory text and jump straight to chapter 2, “Before You Install,” where they can learn what sort of...
Unix (D.4.0...) | Mar 15 19

Advance compression and watermarking technique for speech signals

In a time of increased interest in security assurance, all topics related to watermarking are important. While the book’s focus is securing speech, a technologically related problem of compression is also covered. While...
Data Compaction & Compression (E.4...) | Feb 14 19

Advances in aeronautical informatics

Let me preface this review by saying that as a small-time hobbyist pilot (single engine land), I fly when I may a little general aviation piston airplane; my day job as a computer professional pays for the gasoline. Advances in aeronautical informatics is a work...
Aerospace (J.2...) | Feb 27 19

An open door to number theory

In 1993, my daughter showed me the New York Times article that announced Andrew Wiles’s 100-plus-page proof (to be successfully corrected two years later) of Fermat’s last theorem (FLT) [1]. Wiles’s “20th-century” proof comprised excursions into algebraic...
General (G.0) | Feb 19 19

Anomaly detection principles and algorithms

Anomaly detection is not only used in cybersecurity and defense, but also in stock markets, finance, and business administration, as well as medicine, astronomy, social networks, fraud, and anti-corruption. This book presents the interesting topic of anomaly detection for a very broad audience. The book is split into...
Security & Protection (K.6.5) | Jan 23 19

Applied minds: how engineers think

This book has been sitting on my shelf for a while; however, I have never had a chance to read it, thinking that being an engineer myself I know “how engineers think,” so why bother? I only recently started browsing it to find out more because I came across a certain quotation...
Engineering (J.2...) | Feb 25 19

Asset attack vectors

Haber and Hibbert give readers a grand tour of the vulnerability management landscape in 24 chapters. Three somewhat longer chapters are noteworthy. Chapter 2, “The Vulnerability Landscape,” contains the usual suspects, with the biggest focus on social...
Security & Protection (K.6.5) | Jan 22 19

Augmented reality and virtual reality

Recent technologies are changing the way we interact with computers and our surroundings, as well as how we perceive information; examples of these technologies include augmented reality (superimposing computer-generated graphics and text onto a real-world...
Artificial, Aug. & Virtual Realities (H.5.1...) | Jan 8 19

Basic elements of computational statistics

Researchers frequently use statistics to analyze their results. Statistical analysis is a vital tool to confirm or reject hypotheses. In this context, R, one of the most famous programs used for data analysis and statistics, is a powerful, time-saving tool. The goal of this book is to present different univariate and multivariate...
Statistical Computing (G.3...) | Jan 24 19

Beginning robotics with Raspberry Pi and Arduino: using Python and OpenCV

The language used in this book is very close to beginner level. It includes many examples, with code, images, and details of the materials needed to assemble the presented robot. The book’s ten chapters cover five key...
Microprocessors & computers (B.7.1...) | Mar 14 19


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy