







Exact algorithms via monotone local search Many important problems are NPcomplete; this means that, unless P = NP, we cannot have a polynomialtime (feasible) algorithm for solving all instances of this problem. For each such problem, there is an exhaustive search algorithm that requires exponential time.
How can we solve these problems faster? There are two main... more









“…Jean, earlier on, when you were explaining your insect work, the question of senior authorship, and why you thought it appropriate for a chemistry professor to add... more 

 Carl Djerassi (1991) 









Implementing a modal dependent type theory: Proceedings of the ACM on Programming Languages
Modalities are widely used in mathematics and computer science as an abstraction tool, but it turns out to be difficult to incorporate them in rich type theories... more
General (D.3.0)  Apr 27 21
Exact algorithms via monotone local search: Journal of the ACM
Many important problems are NPcomplete; this means that, unless P = NP, we cannot have a polynomialtime (feasible) algorithm for solving all instances of this problem. For each such problem, there is an... more
Search Process (H.3.3...)  Apr 26 21
Evaluating the effects of missing values and mixed data types on social sequence clustering using tSNE visualization: Journal of Data and Information Quality
The authors discuss how one can compensate for missing values when clustering joint categorical sequences. For example, one might have a... more
Learning (I.2.6)  Apr 21 21
SOD: making smartphone smart on demand with radio interface management: ACM Transactions on Autonomous and Adaptive Systems
Smartphone batteries don’t last as long as they used to. Why? Applications consume a lot of energy. However, the authors show that, besides the display... more
General (B.0)  Apr 20 21
Dataparallel structural optimisation in agentbased models: ACM SIGEVOlution
Modeling is a tool for studying a natural phenomenon. The accuracy of such a model depends on how well the model mimics the behavior of the system under study.
The modeling of phenomena in ecology, microbiology, social... more
Multiagent Systems (I.2.11...)  Apr 16 21
Data transparency with blockchain and AI ethics: Journal of Data and Information Quality
With the evergrowing use of digital technology, especially the use of big data technologies and machine learning, questions related to the proper use of data collected from social networks led to the... more
Ethics (K.4.1...)  Apr 14 21
An analysis of inheritance hierarchy evolution: EASE 19
This is a refreshing paper on ten opensource systems and their use of “inheritance” programing concepts. Computer languages have evolved with the typesafe extensibility concept of inheritance, which is embodied in object... more
General (D.2.0)  Apr 13 21
Modeling information retrieval by formal logic: a survey: ACM Computing Surveys
As the title indicates, formal logic is used for modeling information retrieval (IR). Readers can expect a literature review (of IR models), supported with graphs, mathematical formulas, and examples that... more
Retrieval Models (H.3.3...)  Apr 12 21
Codingdata portability in systematic literature reviews: a W3C’s open annotation approach: EASE 19
Systematic literature reviews (SLRs) involve several steps: the planning step, which identifies the scope of literature according to the research goals, and develops a coding protocol; the analysis step, which... more
Software Engineering (D.2)  Apr 9 21
Multigrid for matrixfree highorder finite element computations on graphics processors: ACM Transactions on Parallel Computing
Discretization is a method for transforming continuous variables, equations, functions, and models into their discrete equivalents. A... more
DifferentialAlgebraic Equations (G.1.7...)  Apr 7 21









Deep learning applications for cyber security
Research in the field of artificial intelligence (AI) provides new information about deep neural network (DNN)based methods, also known as deep learning. This allows computational models, composed of countless processing... more
Learning (I.2.6)  May 7 21
Rewiring education: how technology can unlock every student’s potential
Back in 2001, Marc Prensky stated:
“the single biggest problem facing education today is that our digital immigrant instructors, who speak an outdated language (that of the predigital age), are struggling to... more
Computer Uses in Education (K.3.1)  May 6 21
Modern data mining algorithms in C++ and CUDA C
In his earlier book from 2018, Data mining algorithms in C++ [1], the author indicated that a “volume 2 will appear some day.” This is it. It builds on the techniques and tools of the earlier book and follows a similar style of presentation.... more
C++ (D.3.2...)  May 5 21
Reasoning with probabilistic and deterministic graphical models: exact algorithms (2nd ed.)
Many problems related to learning and reasoning can make use of graphical models where a knowledge structure is compactly encoded into a graph. When dependencies (or independencies) among... more
Graphical Environments (D.2.6...)  May 4 21
Bandit algorithms
This book is on bandit algorithms. The word “bandit” is commonly understood to mean an armed thief who is usually a member of a group or band. However, in the context of this book, bandit refers to a type of slot machine with a large metal pole or handle... more
Learning (I.2.6)  May 3 21
The kollected Kode Vicious: opinionated advice for programmers
Readers of Communications of the ACM and ACM Queue are surely familiar with the magazines’ “Dear Abby”like column, written by George V. NevilleNeil, under his persona Kode Vicious, or KV. This book is a... more
General (D.3.0)  Apr 30 21
Software product management: finding the right balance for YourProduct Inc.
Software product management is at the core of the software product development life cycle. It takes into consideration all of the factors needed to bring a product to market. Furthermore, software product... more
Project & People Management (K.6.1)  Apr 29 21
Data visualization and knowledge engineering: spotting data points with artificial intelligence
Data is the new gold in the 21st century. Artificial intelligence (AI), data visualization, and knowledge engineering are important fields that provide concepts, techniques, and methods that... more
KR Formalisms & Methods (I.2.4)  Apr 28 21
Algorithms for optimization
Anyone wanting to publish a book in a respectable and classical research field needs to find a niche to justify the originality. This statement includes the area of mathematical optimization, which interests Kochenderfer and Wheeler. They decided to focus on the... more
Optimization (B.1.4...)  Apr 27 21
Computational methods for deep learning: theoretic, practice and applications
Computational methods for deep learning is written for the typical secondyear graduate student at a US university, working in this area for his/her PhDlevel dissertation research on the application of... more
Learning (I.2.6)  Apr 23 21





