Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
Misc

View:



Manipulative design of scoring systems : AAMAS 19

Scoring systems, where each candidate gets a number of points from each voter based on the candidate’s position in the voter’s vote, are the most important broad class of voting rules. For example, plurality elections are scoring systems...
Multiagent Systems (I.2.11...) | Apr 28 20

Dynamic malware analysis in the modern era—a state of the art survey : ACM Computing Surveys

Malware is a problem. Its spreading within industrial networks and critical infrastructures shows that there is an always increasing need for cybersecurity expertise to detect...
Security & Protection (D.4.6) | May 14 20

Security and privacy on blockchain : ACM Computing Surveys

While still controversial in terms of mainstream use, the study, research, and development of all things blockchain has been moving ahead full steam. Interestingly, while distributed ledger technology (DLT) is...
Security & Protection (D.4.6) | May 27 20

Visual SLAM and structure from motion in dynamic environments: a survey : ACM Computing Surveys

Reconstructing an environment’s 3D models is traditionally a computer vision problem, crucial for virtual reality (VR) applications and mobile robots that have to estimate the pose of the camera...
Reconstruction (I.4.5) | Feb 26 20

Epistemology in the era of fake news: an exploration of information verification behaviors among social networking site users : ACM SIGMIS Database

Factors that influence social networking site users when it comes to verifying information include perceptions about the network’s composition, perceptions...
Social Networking (H.3.4...) | Mar 2 20

Blending human and artificial intelligence to support autistic children’s social communication skills : ACM Transactions on Computer-Human Interaction

Children with autism spectrum conditions (ASC) experience various levels of difficulty in...
Social & Behavioral Sciences (J.4) | Mar 12 20

Quantifying the utility-privacy tradeoff in the Internet of Things : ACM Transactions on Cyber-Physical Systems

The Internet of Things (IoT), much more than other fields in computer science (CS), introduces new issues related to inferential and differential privacy. The...
Security & Protection (C.2.0...) | Mar 10 20

Overcoming security vulnerabilities in deep learning-based indoor localization frameworks on mobile devices : ACM Transactions on Embedded Computing Systems

This paper analyzes “the vulnerability of a convolutional neural network (CNN)–based indoor localization...
Security & Protection (D.4.6) | Apr 22 20

Discrete geodesic nets for modeling developable surfaces : ACM Transactions on Graphics

Developable surfaces are those that can be flattened to the plane isometrically, that is, without stretching or tearing. They play an important role in manufacturing and architecture, for...
General (I.0) | Feb 25 20

Interactive recommendation with user-specific deep reinforcement learning : ACM Transactions on Knowledge Discovery from Data

Recommender systems are widely used, especially by online applications with a view to enhancing user experience. In most conventional systems, past...
Retrieval Models (H.3.3...) | Mar 2 20



AI in marketing, sales and service

Artificial intelligence (AI) is a catchy term that you see every day in the media. Every chief executive must be thinking about how to apply AI to their company. But, lacking the necessary knowledge, they don’t know how to start. This book comes to the rescue. It uses...
Marketing (J.1...) | Mar 10 20

Advanced Boolean techniques

Boolean functions--functions on the domain of the logical values “true” and “false”--represent a fundamental concept of computer science with applications in many areas, including the design of digital circuits, the specification and verification of hardware...
General (I.1.0) | Apr 27 20

Advances in Physarum machines

The idea of computing with deoxyribonucleic acid (DNA) molecules first received attention in 1987, from the mathematician Tom Head [1]. In 1994, in a seminal paper [2], Adleman solved an instance of a Hamiltonian path problem using DNA in a wet lab, thus giving...
Biology And Genetics (J.3...) | Mar 13 20

Agile machine learning

The application of agile principles to applied machine learning teams is the topic of this book. Machine learning relies heavily on data. This poses new types of challenges, that is, data is generally noisy, follows unknown patterns, and can be biased. The authors tackle...
Learning (I.2.6) | Mar 27 20

An introduction to machine learning

Rebala et al. try to explain, in the simplest of terms, the wide diversity of data analysis techniques, that is, machine learning. The book claims to assume no prior knowledge of machine learning,and the authors emphasize a "conceptual understanding of the...
Learning (I.2.6) | Apr 13 20

Applied reinforcement learning with Python: with OpenAI Gym, Tensorflow, and Keras

This is a small book on the broader topic of reinforcement learning (RL), written by a practitioner for practitioners. It is very practically oriented, but with limited theoretical background. The book...
Learning (I.2.6) | May 22 20

Argumentation mining

The development of computing technology for natural language has followed a hierarchical structure familiar to linguists. Early work at Bell Laboratories focused on phonology, recognizing and generating the basic sounds. Then researchers began to detect words and...
Natural Language Processing (I.2.7) | Mar 17 20

Beginning security with Microsoft technologies

This book is written for a very specific audience. If you are a junior technical person (say a programmer, systems administrator, or even an entry-level security specialist) in an organization running Office 365, Windows 10, and Azure web services, and you...
Security & Protection (D.4.6) | Apr 24 20

Big data and the computable society: algorithms and people in the digital world

The rapid growth and pervasiveness of the digital revolution means that the relationships between people, the traceability of their actions, and the behavior of individuals...
Decision Support (H.4.2...) | Mar 4 20

Business model innovation in the era of the Internet of Things

Being myself responsible for innovation at a large software firm in the Internet of Things (IoT) domain, this book sounded like a perfect match for me and my role. It certainly provides a selected set of...
Business (J.1...) | May 18 20


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2020 ThinkLoud, Inc.
Terms of Use
| Privacy Policy