Browse All Reviews
Computing Methodologies (I)
> General (I.0)
All Media Types
1-10 of 66 Reviews about "
Modelling and simulation (3rd ed.)
Birta L., Arbez G., Springer International Publishing, New York, NY, 2019. 551 pp. Type: Book (978-3-030188-68-9)
Modeling and simulation are powerful tools for helping us understand complex real-world situations. More than that, they can be fun. Simple discrete event simulations of common situations like cashiers in a grocery store are easy enough for beginn...
Aug 6 2021
DARPA’s explainable artificial intelligence (XAI) program
Gunning D. IUI 2019 (Proceedings of the 24th International Conference on Intelligent User Interfaces, Marina del Ray, California, Mar 17-20, 2019) ii-ii, 2019. Type: Proceedings
This very interesting survey talk provides extensive, high-level insight into the midterm progress of this advanced research endeavor....
Jul 21 2021
Using BPM technology to deploy and manage distributed analytics in collaborative IoT-driven business scenarios
d’Hondt T., Wilbik A., Grefen P., Ludwig H., Baracaldo N., Anwar A. IoT 2019 (Proceedings of the 9th International Conference on the Internet of Things, Bilbao, Spain, Oct 22-25, 2019) 1-8, 2019. Type: Proceedings
The Internet of Things (IoT), with its ability to create vast amounts of previously impossible-to-collect sensor-based data from physical objects, creates both an opportunity and a challenge for enterprises. The opportunity arises from the chance ...
Jul 15 2021
Simplicity is best: addressing the computational cost of machine learning classifiers in constrained edge devices
Gómez-Carmona O., Casado-Mansilla D., López-de-Ipiña D., García-Zubia J. IoT 2019 (Proceedings of the 9th International Conference on the Internet of Things, Bilbao, Spain, Oct 22-25, 2019) 1-8, 2019. Type: Proceedings
Implementing data processing toward the edge of the Internet of Things (IoT) is an important requirement in order to produce real-time feedback according to some decision-based approach....
Jul 7 2021
An innovative approach for ad hoc network establishment in disaster environments by the deployment of wireless mobile agents
Su X., Zhang M., Bai Q. ACM Transactions on Autonomous and Adaptive Systems 13(4): 1-22, 2019. Type: Article
This paper considers the challenges to mobile wireless robots (WRs) in disaster environments: the unknown environment; the complexity of the environment, namely obstacles in the environment; and the limited capability and number of robots. The goa...
Jul 6 2021
Automated machine learning: methods, systems, challenges
Hutter F., Kotthoff L., Vanschoren J., Springer International Publishing, New York, NY, 2019. 219 pp. Type: Book (978-3-030053-17-8)
A dataset, generically speaking, is a collection of numbers. It constitutes an information element when structure and context are assigned. The objective of machine learning (ML) is to interpret an information element as a human would. This requir...
Jun 14 2021
Evaluating the effects of missing values and mixed data types on social sequence clustering using t-SNE visualization
Lazar A., Jin L., Spurlock C., Wu K., Sim A., Todd A. Journal of Data and Information Quality 11(2): 1-22, 2019. Type: Article
The authors discuss how one can compensate for missing values when clustering joint categorical sequences. For example, one might have a set of sequences with both nominal values, such as family size, and binary values, for example, marriage statu...
Apr 21 2021
Artificial intelligence and judicial modernization
Cui Y., Springer International Publishing, New York, NY, 2020. 224 pp. Type: Book (978-9-813298-80-4)
Artificial intelligence (AI) has been an important branch of computer science for more than three decades. AI has found applications in games like chess, natural language processing (NLP), robotics, social media, and so on. Several countries deplo...
Feb 19 2021
Walling up backdoors in intrusion detection systems
Bachl M., Hartl A., Fabini J., Zseby T. Big-DAMA 2019 (Proceedings of the 3rd ACM CoNEXT Workshop on Big DAta, Machine Learning and Artificial Intelligence for Data Communication Networks, Orlando, FL, Dec 9, 2019) 8-13, 2019. Type: Proceedings
Intrusion detection systems (IDSs) detect anomalies in a network. However, backdoors instated for profit, political gain, and/or other reasons can be hard to detect and may introduce security vulnerabilities....
Feb 4 2021
Research on text location and recognition in natural images with deep learning
Zhang P., Shi Z., Gao H. ICAAI 2018 (Proceedings of the 2nd International Conference on Advances in Artificial Intelligence, Barcelona, Spain, Oct 6-8, 2018) 1-6, 2018. Type: Proceedings
A technical account, this paper reports on experiments carried out with combinations of deep learning techniques. The purpose of the proposed research is to explore and evaluate methods for text location and recognition in images....
Jan 14 2021
Reproduction in whole or in part without permission is prohibited. Copyright © 2000-2021 ThinkLoud, Inc.