Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search

Select Issue:





Declarative machine learning systems: Communications of the ACM
This article presents future directions for how machine learning (ML) can be easily adopted across applications to take advantage of artificial intelligence (AI). In the past two decades, ML has been improving at a...
Learning (I.2.6) | Jan 3 23

A framework for understanding sources of harm throughout the machine learning life cycle: :
The most recent studies show how machine learning has increasingly started to affect people and society in a positive way, pointing out the main advantages and disadvantages for different areas of activities...
Artificial Intelligence (I.2) | Jan 5 23

RxNet: Rx-refill graph neural network for overprescribing detection: :
The intensifying rates of opioid overuse and drug misuse require effective drug prescription scrutinizing tools. Despite the available prescription drug monitoring programs (PDMPs) in countries like the US, how should...
Health (J.3...) | Jan 6 23

Block Walsh-Hadamard transform based binary layers in deep neural networks: ACM Transactions on Embedded Computing Systems
Convolution is a mathematical operation that calculates the integral of the product of two functions or signals with one of the signals flipped. Modern deep...
General (G.0) | Jan 17 23

On the model of computation: point: we must extend our model of computation to account for cost and location: Communications of the ACM
The model of any process demonstrates its functionality and is useful for its study and analysis. For example, the Turing machine is a model for computation. However, the random-access machine (RAM) model is...
General (D.1.0) | Jan 23 23

On the model of computation: counterpoint: parallel programming wall and multicore software spiral: denial hence crisis: Communications of the ACM
Vishkin’s counterpoint to Dally [1] talks about what the model of computation should now be in light of multicore processors (and their programming difficulties) and parallel processing...
General (D.1.0) | Jan 24 23

One-hop out-of-band control planes for multi-hop wireless sensor networks: : ACM Transactions on Sensor Networks
Wireless sensor networks (WSNs) have expanded in the last decade. Sensors are deployed in an environment to control the data generated within that area, without any wiring. Data is sensed by the deployed devices...
General (C.0) | Jan 26 23




Human-centered AI:

Human-centered AI is a must-read for anyone in charge of designing a software system involving a significant artificial intelligence (AI) component. However, this book is not about how to implement an AI technique to solve a problem. It is about the issues around...
General (I.2.0) | Jan 9 23

Learn enough developer tools to be dangerous: command line, text editor, and Git version control essentials:

The command-line interface (CLI) scares many newcomers to the computing field. It is, however, a most powerful way to interact with the computer, allowing the user a command composition...
Software Development (K.6.3...) | Jan 10 23

Phishing and communication channels: a guide to identifying and mitigating phishing attacks:

It is not far-fetched to say that most (if not all) CR readers have been subjected to some sort of phishing attack--and even more likely if we consider the wide taxonomy of activities that Sonowal’s book covers. Can we as individuals...
Security and Protection (K.6.5) | Jan 12 23

Computational intelligence techniquess for combating Covid-19:

This book looks at the application of computing techniques, especially intelligence techniques. Machine learning (ML) techniques have been developed for many decades now and the practical applications of ML have significantly increased over time. The Covid-19...
Medical Information Systems (J.3...) | Jan 16 23

The story of proof: logic and the history of mathematics

The present book is aimed at a general mathematical audience. My third Stillwell book, it follows Elements of mathematics and Reverse mathematics [1,2] and maintains these predecessors’ high standards in content, sequence, and clarity of expression. Stillwell...
History of Computing (K.2) | Jan 18 23


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2023 ThinkLoud®
Terms of Use
| Privacy Policy