Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
November 28, 2023

The stuff games are made of
What do we consider the “stuff” that makes up a video game? Is it interesting gameplay? Compelling graphics? Lifelike effects and fast-paced first-person shooter (FPS)? Deep strategy? Engaging mechanics that don’t let you go, that glue you to your favorite gaming device? How simple can a game be without losing its essence as a... more
You were gay with your bride
But your great gaiety did hide.
Your bride renewed your gaiety
And you reviewed the... more
- (1967)
Developing a workflow management system simulation for capturing internal IaaS behavioural knowledge: Journal of Grid Computing

Scientific datasets are huge compared to even the most complex business ones, and their analysis methods are accordingly complex. These methods, called scientific workflows, consist of a large number of... more

Workflow Management (H.4.1...) | Nov 13 23

Humble AI: Communications of the ACM

While readers of Computing Reviews are more aware than the general population when it comes to whether artificial intelligence (AI) is a magical panacea or the probability of a general intelligence that will develop thinking capabilities and make decisions on its... more

Ethics (K.4.1...) | Nov 8 23

A future-oriented approach to the selection of artificial intelligence technologies for knowledge platforms: JASIST

The idea of taking a future-oriented approach to selecting artificial intelligence (AI) technologies for knowledge platforms is an important one. It recognizes that the field of AI is rapidly evolving, and decisions made today can have a significant impact on... more

General (I.2.0) | Nov 1 23

Efficient instruction scheduling using real-time load delay tracking: ACM Transactions on Computer Systems

Central processing unit (CPU) architectures with out-of-order instruction scheduling use, among other data, static instruction-timing information to create good schedules. The work reported in... more

Scheduling (D.4.1...) | Oct 27 23

Eight reasons to prioritize brain-computer interface cybersecurity: Communications of the ACM

In this thought-provoking article, the authors astutely highlight the significance of prioritizing brain-computer interface (BCI) cybersecurity. Their comprehensive work sheds light on the emerging field of BCI and the critical need to protect these technologies from... more

Security & Protection (K.6.5) | Sep 29 23

Emerging technologies in K–12 education: a future HCI research agenda: ACM Transactions on Computer-Human Interaction

Technologies like artificial intelligence (AI), virtual reality (VR), augmented reality (AR), machine learning (ML), and the Internet of Things (IoT) are becoming more and more popular, not only in academia but also in... more

Education (J.1...) | Sep 27 23

GraphQL: a systematic mapping study: ACM Computing Surveys

Software architects ought to continuously strive to develop secure, dependable, and effective software services that can cope with the scalability, revival, idleness, multi-occupancy, and other operational... more

Software Architectures (D.2.11) | Sep 5 23

Online learning for network resource allocation: ACM SIGMETRICS Performance Evaluation Review

Network resource allocation is still a challenge in many scenarios where fast services need to be provided in changing and unpredictable situations, for example, the ones encountered in streaming data applications... more

Allocation/Deallocation Strategies (D.4.2...) | Aug 25 23

A demographic analysis on prerequisite preparation in an advanced data structures course: ACM Inroads

This survey article aims to investigate the effects that prerequisite course proficiency has on course outcomes in an advanced data structure (ADS) course, specifically for Black, Latinx, Native American, and Pacific Islander (BLNPI) and transfer students in a university... more

Computer Science Education (K.3.2...) | Aug 24 23

Towards a validated self-efficacy scale for data management: SIGCSE 23

I found this paper to be a challenging read as it required me to learn some new concepts. I still don’t have a full understanding of the topic, but I appreciate the author’s goals and approach. If I’d been reviewing a draft of this paper, I... more

General (H.2.0) | Aug 23 23

Ethical and social issues in the Information Age (7th ed.)

The curricular standards for a bachelor’s degree in computer science (and related programs) requires instruction on the ethics and professional conduct of practitioners. Often there is a separate course that students are required to take. It is a challenging course to... more
Social Issues (K.4.2) | Nov 27 23

Deep learning in solar astronomy

Astronomy began with observations of things visible in the sky. In the Modern Era, observations of radio waves as well as visible light further advanced human knowledge. In solar astronomy we observe images, events such as solar flares, and magnetic fields active on the surface of the sun. The primary reasons... more
Astronomy (J.2...) | Nov 22 23

The stuff games are made of

What do we consider the “stuff” that makes up a video game? Is it interesting gameplay? Compelling graphics? Lifelike effects and fast-paced first-person shooter (FPS)? Deep strategy? Engaging mechanics that don’t let you go, that glue you to your favorite gaming... more
Games (K.8.0...) | Nov 20 23

Algorithms for constructing computably enumerable sets

Computational complexity (historically called recursive functions in logic) is a very specific area of computational theory, and even within this domain the book discusses a very specific subfield: the theoretical construction of enumerable sets. The book is... more
Algorithms (B.2.4...) | Nov 15 23

Ethics of artificial intelligence: case studies and options for addressing ethical challenges

The ethical challenges presented by artificial intelligence (AI) are not entirely new; rather, they are an extension and amplification of existing ethical and societal issues. Subjects like surveillance, manipulation, and inequality have long been topics of ethical concern, but... more
Ethics (K.7.m...) | Nov 10 23

Managing IT projects: how to pragmatically deliver projects for external customers

This book provides a precise analysis of typical information technology (IT) project (procurement to delivery) life cycles, written from the supplier’s perspective. It offers a broad set of tips and tricks for how to succeed and how to... more
General (K.6.0) | Nov 9 23

Gradient expectations: structure, origins, and synthesis of predictive neural networks

A very interesting and well-grounded work, Gradient expectations provides a thorough overview and explanation of the structure and origins of prediction and predictive neural networks. The book is structured into eight chapters, starting with an introduction... more
General (I.2.0) | Nov 6 23

Human-machine interaction for automated vehicles: driver status monitoring and the takeover process

Are you interested in the sophisticated application of computer vision, machine learning, and deep learning approaches to enhance cooperation between an intelligent vehicle and its driver? In this book, the authors describe... more
Autonomous Vehicles (I.2.9...) | Oct 30 23

From net neutrality to ICT neutrality

The Internet has become the backbone of modern life, sometimes nicknamed “digital society,” where activities (including banking, commerce, accounting, social interactions, advertising, referencing, and entertainment) are conducted over the Internet... more
Communications Applications (H.4.3) | Oct 25 23

Genius: theory, history and technique

Athletes spend a lot of time analyzing Olympic performances; scientists, engineers, and artists are also fascinated by “genius.” But what is a genius? How is one made? Can I be one, or can I at least raise my children to be geniuses? And should I even do that?... more
History of Computing (K.2) | Oct 23 23

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2023 ThinkLoud®
Terms of Use
| Privacy Policy