Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
December 11, 2023

Predicting the unknown: the history and future of data science and artificial intelligence
Physicist Niels Bohr observed: “Prediction is very difficult, especially if it’s about the future!” Despite that warning, scientists, politicians, journalists, doctors, economists--professionals in nearly every knowledge domain--try to anticipate what’s in store for us using everything from... more
We are raising a generation…who will not look at any scientific project which does not have millions of dollars invested in it.…The degradation of the position... more
- Norbert Wiener (1948)
Detecting deception using machine learning with facial expressions and pulse rate: Artificial Life and Robotics

This is a very important paper because it combines machine learning, facial expressions analysis, and pulse rate in order to detect deception in an interview context. The results are supported by strong machine learning validation settings, applying cross validation... more

Learning (I.2.6) | Dec 8 23

BCGen: a comment generation method for bytecode: Automated Software Engineering

The authors have undertaken a project to make bytecode more readable by interspersing it with machine-generated comments. There are two salient questions regarding this... more

General (D.2.0) | Dec 6 23

What came first, math or computing?: Communications of the ACM

The intellectual debate on the emergence of mathematics and computing is long overdue. Did mathematicians create the field of computer science (CS), or have mathematics and CS coexisted for a long time? Vardi offers some succinct insights into... more

History of Computing (K.2) | Dec 1 23

Developing a workflow management system simulation for capturing internal IaaS behavioural knowledge: Journal of Grid Computing

Scientific datasets are huge compared to even the most complex business ones, and their analysis methods are accordingly complex. These methods, called scientific workflows, consist of a large number of... more

Workflow Management (H.4.1...) | Nov 13 23

Humble AI: Communications of the ACM

While readers of Computing Reviews are more aware than the general population when it comes to whether artificial intelligence (AI) is a magical panacea or the probability of a general intelligence that will develop thinking capabilities and make decisions on its... more

Ethics (K.4.1...) | Nov 8 23

A future-oriented approach to the selection of artificial intelligence technologies for knowledge platforms: JASIST

The idea of taking a future-oriented approach to selecting artificial intelligence (AI) technologies for knowledge platforms is an important one. It recognizes that the field of AI is rapidly evolving, and... more

General (I.2.0) | Nov 1 23

Efficient instruction scheduling using real-time load delay tracking: ACM Transactions on Computer Systems

Central processing unit (CPU) architectures with out-of-order instruction scheduling use, among other data, static instruction-timing information to create good schedules. The work reported in this paper describes the result of augmenting out-of-order instruction... more

Scheduling (D.4.1...) | Oct 27 23

Eight reasons to prioritize brain-computer interface cybersecurity: Communications of the ACM

In this thought-provoking article, the authors astutely highlight the significance of prioritizing brain-computer interface (BCI) cybersecurity. Their comprehensive work sheds light on the emerging field of BCI and the critical need to protect these technologies from... more

Security & Protection (K.6.5) | Sep 29 23

Emerging technologies in K–12 education: a future HCI research agenda: ACM Transactions on Computer-Human Interaction

Technologies like artificial intelligence (AI), virtual reality (VR), augmented reality (AR), machine learning (ML), and the Internet of Things (IoT) are becoming more and more popular, not only... more

Education (J.1...) | Sep 27 23

GraphQL: a systematic mapping study: ACM Computing Surveys

Software architects ought to continuously strive to develop secure, dependable, and effective software services that can cope with the scalability, revival, idleness, multi-occupancy, and other operational... more

Software Architectures (D.2.11) | Sep 5 23

Matrix analysis and applied linear algebra (2nd ed.)

This expanded and revamped second edition follows an excellent first edition, and is the culmination of classroom experiences since the first edition’s publication more than two decades ago. While the two editions share the same title, this new edition is longer by 250-plus... more
Numerical Linear Algebra (G.1.3) | Dec 4 23

Predicting the unknown: the history and future of data science and artificial intelligence

Physicist Niels Bohr observed: “Prediction is very difficult, especially if it’s about the future!” Despite that warning, scientists, politicians, journalists, doctors, economists--professionals in nearly every knowledge domain--try to anticipate what’s in store for us... more
Statistical Methods (D.2.4...) | Nov 29 23

Ethical and social issues in the Information Age (7th ed.)

The curricular standards for a bachelor’s degree in computer science (and related programs) requires instruction on the ethics and professional conduct of practitioners. Often there is a separate course that students are required to take. It is a challenging course to... more
Social Issues (K.4.2) | Nov 27 23

Deep learning in solar astronomy

Astronomy began with observations of things visible in the sky. In the Modern Era, observations of radio waves as well as visible light further advanced human knowledge. In solar astronomy we observe images, events such as solar flares, and magnetic fields active on the surface of the sun. The primary reasons... more
Astronomy (J.2...) | Nov 22 23

The stuff games are made of

What do we consider the “stuff” that makes up a video game? Is it interesting gameplay? Compelling graphics? Lifelike effects and fast-paced first-person shooter (FPS)? Deep strategy? Engaging mechanics that don’t let you go, that glue you to your favorite gaming... more
Games (K.8.0...) | Nov 20 23

Algorithms for constructing computably enumerable sets

Computational complexity (historically called recursive functions in logic) is a very specific area of computational theory, and even within this domain the book discusses a very specific subfield: the theoretical construction of enumerable sets. The book is... more
Algorithms (B.2.4...) | Nov 15 23

Ethics of artificial intelligence: case studies and options for addressing ethical challenges

The ethical challenges presented by artificial intelligence (AI) are not entirely new; rather, they are an extension and amplification of existing ethical and societal issues. Subjects like surveillance, manipulation, and inequality have... more
Ethics (K.7.m...) | Nov 10 23

Managing IT projects: how to pragmatically deliver projects for external customers

This book provides a precise analysis of typical information technology (IT) project (procurement to delivery) life cycles, written from the supplier’s perspective. It offers a broad set of tips and tricks for how to succeed and how to avoid the obvious... more
General (K.6.0) | Nov 9 23

Gradient expectations: structure, origins, and synthesis of predictive neural networks

A very interesting and well-grounded work, Gradient expectations provides a thorough overview and explanation of the structure and origins of prediction and predictive neural networks. The book is structured into eight chapters, starting with an introduction... more
General (I.2.0) | Nov 6 23

Human-machine interaction for automated vehicles: driver status monitoring and the takeover process

Are you interested in the sophisticated application of computer vision, machine learning, and deep learning approaches to enhance cooperation between an intelligent vehicle and its driver? In this book... more
Autonomous Vehicles (I.2.9...) | Oct 30 23

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2023 ThinkLoud®
Terms of Use
| Privacy Policy