Computing Reviews, the leading online review service for computing literature. (original) (raw)
Exploiting cross-layer vulnerabilities: off-path attacks on the TCP/IP protocol suite: Communications of the ACM The transmission control protocol/Internet protocol (TCP/IP) suite has been the backbone of the Internet since the 1970s. This suite of protocols operates in five distinct layers; however, the Internet control message protocol (ICMP) in the Internet layer--and used... more TCP/IP (C.2.2...) | Jun 11 25 How games can support misinformation education: a sociocultural perspective: JASIST Is false information intentionally or accidentally spread? How should the distribution of false information be minimized? Perhaps civilized societies should become more cognizant... more Education (J.1...)
May 23 25 The rise of the AI co-pilot: lessons for design from aviation and beyond: Communications of the ACM Sellen and Horvitz look at how artificial intelligence (AI) functions similarly to an aircraft co-pilot by enhancing human operations while maintaining human control authority. The authors support human-centered design through insights from human–computer... more Aerospace (J.2...)
May 21 25 Security risks in the encryption of database connection strings: Software—Practice & Experience This paper talks about a subtle but significant weakness in the way encrypted database connection strings can continue to leak structure, particularly with symmetric ciphers such as the... more Security & Protection (D.4.6)
May 19 25 The role of online search platforms in scientific diffusion: JASIST Drivas’s paper explores the influence of online search platforms like Google Scholar on the dissemination and application of scientific knowledge. The paper tackles a relevant and timely issue regarding the impact of digital tools on scientific research. The author contends... more General (K.3.0)
May 14 25 Online reading lists: a mixed-method analysis of the academic perspective: International Journal on Digital Libraries You can’t judge a book by its cover. This review begins with a question and ends with a challenge about the future of reading lists in higher education. Reading lists in this context are curated collections of recommended reading and resources, compiled by academics... more Education (J.1...)
May 8 25 AceCoder: an effective prompting technique specialized in code generation: ACM Transactions on Software Engineering and Methodology In the fast-evolving world of large language models (LLMs), code generation has been a particularly interesting application. However, despite their general success, LLMs often fail when prompts are not tailored to the task--particularly in programming, where... more General (D.2.0)
May 7 25 Variational inference based adversarial domain adaptation: Pattern Analysis & Applications This paper is based on Tzeng et al.’s work, which introduced adversarial discriminative domain adaptation (ADDA) eight years ago [1]. To adapt a model to a new domain, the ADDA paper proposed a method that combines adversarial learning with... more Learning (I.2.6)
May 6 25 Towards understanding and mitigating the hallucinations in NLP and speech: CODS-COMAD ’24 Mittal et al.’s comprehensive tutorial explores the problem of hallucinations in neural language generation, focusing on both natural language processing and speech recognition systems. It provides a structured overview of hallucination types, their underlying... more Speech Recognition & Synthesis (I.2.7...)
May 5 25 Model-based deep learning: Foundations and Trends in Signal Processing Deep learning has revolutionized fields such as computer vision and natural language processing (NLP), but its application in signal processing remains challenging due to the complexity and interpretability of deep models. Traditional... more General (I.2.0)
May 1 25
Beyond the algorithm: AI, security, privacy, and ethics The book can be considered as both a monograph and a textbook on the application of algorithms associated with artificial intelligence (AI) methods. Each chapter concludes with test questions, which may include open-ended and essay-style prompts. The first chapter... more Ethics (K.4.1...) | Jun 13 25 Confessions of an AI brain Confessions can be difficult for humans. Artificial intelligence (AI) continues to grow in importance, “transcending boundaries of specialized applications and research labs, and affecting larger parts of society and the general population than ever.” The author is clear that AI is still like a baby: “not very intelligent... more General (I.2.0)
Jun 9 25 Machine learning for engineers: using data to solve problems for physical systems It is rare to find a machine learning book that balances fundamentals with practical relevance, especially for those working with physical systems. What stands out most in this book is the smart and approachable way it explains RL... more Physical Sciences & Engineering (J.2)
Jun 5 25 Linear algebra in data science Zizler and La Haye’s comprehensive resource bridges foundational mathematics with practical applications in the field of data science. The authors offer a structured approach to understanding the essential role that linear algebra plays in data processing, machine... more Data (E)
Jun 4 25 Fundamentals of data science: theory and practice Data science has been a hot topic for a decade or so now, reincarnating from the equally popular term “data mining.” With the massive growth in deep learning (DL)-related technologies, the interest has picked up much more, with an expanded list of tasks driven by... more General (J.0)
Jun 2 25 AI for designersAI for designers is a concise and timely book that bridges the gap between artificial intelligence (AI) technologies and the design community. It offers an accessible introduction to the applications of AI in design processes, making it a valuable resource for designers, product developers, and creative professionals... more General (I.2.0)