Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
June 10, 2023

Beyond data: reclaiming human rights at the dawn of the metaverse
This book is a short, focused essay on data security and privacy. The author makes it clear that these are two separate matters that are often in conflict both in practice and in law. Each of the book’s three major sections emphasizes a different stage in the evolution of the... more
Somewhere the saving and putting away had to begin again and someone had to do the saving and keeping, one way or another, in books, in records, in... more
- Ray Bradbury (1953)
Responsible data management: Communications of the ACM

There are an abundance of papers and resources that discuss data management, but few have taken the approach that Stoyanovich et al. take in this article. Starting off with a discussion of the ethical and legal requirements and considerations for systems... more

General (H.2.0) | Jun 8 23

Software assistants in software engineering: a systematic mapping study: Software—Practice & Experience

The authors note the considerable research and engineering efforts to create numerous software assistants (SAs) that have higher autonomy and intelligence for various stages and aspects of the software life cycle, including... more

General (D.2.0) | May 24 23

Lane compression: a lightweight lossless compression method for machine learning on embedded systems: ACM Transactions on Embedded Computing Systems

Yonsun Ko’s paper presents an innovative approach to compressing machine learning models for use on embedded systems. The paper proposes lane compression, a new compression method that is... more

Embedded Systems (D.4.7...) | May 17 23

H-Container: enabling heterogeneous-ISA container migration in edge computing: ACM Transactions on Computer Systems

Xing et al. describe a novel approach to dealing with the difficulties posed by container migration in edge computing settings with heterogeneous ISAs... more

Distributed Systems (C.2.4) | May 10 23

HPC forecast : cloudy and uncertain: Communications of the ACM

This article points to possible directions for high-performance computing (HPC) ecosystem development and the related big challenges for the scientific community and the future of advanced scientific... more

Computers in Other Systems (J.7) | May 8 23

A fast approximate EM algorithm for joint models of survival and multivariate longitudinal data: Computational Statistics & Data Analysis

Many longitudinal clinical studies involve the repeated periodic measurement of continuous responses over a period to detect any changes that might occur in the condition of the... more

Algorithms (I.5.3...) | May 4 23

A survey of inverse reinforcement learning: Artificial Intelligence Review

The process of discovering and incorporating knowledge from educators into machine learning (ML) poses major challenges. Beyond coding the known or derived characteristics of systems into ML algorithms... more

Learning (I.2.6) | May 1 23

Identifying informative tweets during a pandemic via a topic-aware neural language model: World Wide Web

Years ago, when Twitter was a new social media tool, I reviewed an article for Computing Reviews that looked at how tweets can be used in emergency situations. This new paper follows along similar lines: Twitter... more

General (K.4.0) | Apr 28 23

AI and neurotechnology: learning from AI ethics to address an expanded ethics landscape: Communications of the ACM

Strategies developed by the artificial intelligence (AI) community for dealing with ethical issues should be useful in dealing with neurotechnology (neurotech). Some ethical issues associated with both AI and... more

Ethics (K.4.1...) | Apr 27 23

Multiple LDPC-encoder layered space-time-frequency architectures for OFDM MIMO multiplexing: Wireless Personal Communications: An International Journal

For many, because of its influence in both everyday life and business, fourth-generation (4G) wireless communication has a distinguished place, where coupling OFDM and MIMO is one of its... more

Wireless Communication (C.2.1...) | Apr 24 23

Deep learning for cognitive computing systems: technological advancements and applications

Deep learning for cognitive computing systems is a bird’s-eye view of deep learning and the neighboring, whether loosely or strongly coupled, areas. It is a collection of several authors’ publications. The first chapter... more
Health (J.3...) | Jun 9 23

Computer security fundamentals (5th ed.)

Computer security fundamentals, by Chuck Easttom, is a compilation of concepts and tools used in computer security. The book is composed of 15 chapters that can be gathered into four distinct distinct parts. Chapters 1 through 5 expose the main computer security attacks and the different ways they may occur. A... more
Security & Protection (K.6.5) | Jun 7 23

Law and artificial intelligence: regulating AI and applying AI in legal practice

Artificial intelligence (AI) has a significant impact on various legal issues, and several books have been written on the subject. These books often explore the intersection between AI and law, discussing topics such as the legal implications of AI, ethics in AI... more
Law (J.1...) | Jun 6 23

Protecting privacy through homomorphic encryption

With the growing use of sensitive personal information, which also corresponds to the term “personally identifiable information (PII)” in information and communications technology (ICT) environments, the requirements for privacy protection are also increasing as a basis... more
Data Encryption (E.3) | Jun 2 23

Data analysis for social science: a friendly and practical introduction

Earl Babbie’s classic textbook The practice of social research, which went to its 15th edition in 2021 [1], is a standard reference for social science students and researchers. Its comprehensive review of research methods is still of great value even to modern... more
General (E.0) | May 31 23

Big data and public policy: course, content, and outcome

Big data and public policy: course, content, and outcome, by Rebecca Moody and Victor Bekkers, is an excellent book for those who are involved in policy-making processes and looking to learn how big data and public policy are strengthened together. The... more
Public Policy Issues (K.4.1) | May 25 23

Artificial intelligence, machine learning, and optimization tools for smart cities: designing for sustainability

The book’s 11 chapters deal with digital “vitalism” in cities, unbuildable cities, smart cities and identities, services and data representation of information and communication technology (ICT), strategies for... more
Architecture (J.5...) | May 22 23

Applied probability and stochastic processes

Natural phenomena are very complicated, and statistical analysis, which is categorized in the stochastic conceptual framework, is an effective tool to formulate, estimate, and predicate their nature, behaviors, and functionalities. Stochastic processes are useful... more
Stochastic Programming (G.1.6...) | May 16 23

Beyond data: reclaiming human rights at the dawn of the metaverse

This book is a short, focused essay on data security and privacy. The author makes it clear that these are two separate matters that are often in conflict both in practice and in law. Each of the book’s three major sections emphasizes a different stage in the... more
General (K.4.0) | May 11 23

Applied linear analysis for chemical engineers: a multi-scale approach with Mathematica

This 750-plus-page book on applied linear analysis is the culmination of the authors’ more than three decades of experience teaching graduate students in chemical engineering, as well as a continuation of their own mentors’... more
General (G.1.0) | May 2 23

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2023 ThinkLoud®
Terms of Use
| Privacy Policy