Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help


GraphQL: a systematic mapping study : ACM Computing Surveys

Software architects ought to continuously strive to develop secure, dependable, and effective software services that can cope with the scalability, revival, idleness, multi-occupancy, and other operational...
Software Architectures (D.2.11) | Sep 5 23

A demographic analysis on prerequisite preparation in an advanced data structures course : ACM Inroads

This survey article aims to investigate the effects that prerequisite course proficiency has on course outcomes in an advanced data structure (ADS) course, specifically for Black, Latinx, Native American, and Pacific Islander (BLNPI)...
Computer Science Education (K.3.2...) | Aug 24 23

Faking it and breaking it: responsible AI is needed now : ACM SIGCAS Computers and Society

The paper’s title is catchy and promising. However, readers will find themselves immersed in another trendy cry that criticizes artificial intelligence (AI) evolution while at the same time promoting it, because the paper is just nonsense. I have never reviewed for...
Ethics (K.4.1...) | Aug 16 23

Online learning for network resource allocation : ACM SIGMETRICS Performance Evaluation Review

Network resource allocation is still a challenge in many scenarios where fast services need to be provided in changing and unpredictable situations, for example, the ones encountered in streaming data applications...
Allocation/Deallocation Strategies (D.4.2...) | Aug 25 23

Effects of organizational controls on employees’ cyber-loafing: the moderating effects of trait mindfulness : ACM SIGMIS Database

The problem addressed here is reducing cyper-loafing via organizational controls. The two controls considered are computer monitoring and Internet usage policy. The general conclusion is that the effectiveness of...
Project & People Management (K.6.1) | Mar 15 23

Vitruvius+: an area-efficient RISC-V decoupled vector coprocessor for high performance computing applications : ACM Transactions on Architecture and Code Optimization

Vector processors had their heyday in the 1980s, before classical supercomputers were mostly replaced by multiprocessors. Today, however, vector processors are experiencing a renaissance: their efficient...
Efficiency (G.4...) | Aug 2 23

Efficient instruction scheduling using real-time load delay tracking : ACM Transactions on Computer Systems

Central processing unit (CPU) architectures with out-of-order instruction scheduling use, among other data, static instruction-timing information to create good schedules. The work reported in this paper describes the result of augmenting out-of-order instruction...
Scheduling (D.4.1...) | Oct 27 23

H-Container: enabling heterogeneous-ISA container migration in edge computing : ACM Transactions on Computer Systems

Xing et al. describe a novel approach to dealing with the difficulties posed by container migration in edge computing settings with heterogeneous ISAs. By putting forth a mechanism that permits effective and...
Distributed Systems (C.2.4) | May 10 23

Emerging technologies in K–12 education: a future HCI research agenda : ACM Transactions on Computer-Human Interaction

Technologies like artificial intelligence (AI), virtual reality (VR), augmented reality (AR), machine learning (ML), and the Internet of Things (IoT) are becoming more and more popular, not only in academia but also in...
Education (J.1...) | Sep 27 23

Block Walsh-Hadamard transform based binary layers in deep neural networks : ACM Transactions on Embedded Computing Systems

Convolution is a mathematical operation that calculates the integral of the product of two functions or signals with one of the signals flipped. Modern deep neural networks consider convolution as the core...
General (G.0) | Jan 17 23

A new history of modern computing

Whether this book achieves biblical status as a paradigm of the history of modern computing rests with the reader. However, I can say with confidence that if you are a computing historian, a graduate student with a dissertation to complete, or an industry...
History of Computing (K.2) | Sep 12 23

Algorithms for constructing computably enumerable sets

Computational complexity (historically called recursive functions in logic) is a very specific area of computational theory, and even within this domain the book discusses a very specific subfield: the theoretical construction of enumerable sets. The book is...
Algorithms (B.2.4...) | Nov 15 23

Algorithms for the people: democracy in the age of AI

The roles of artificial intelligence (AI) and machine learning (ML) in society and everyday pursuits continue to be a subject of intellectual debate for business executives, politicians, and research practitioners. Furthermore, how should AI global influence be...
Government (J.1...) | Aug 7 23

Ansible for VMware by examples: a step-by-step guide to automating your VMware infrastructure

This book’s stated audience is twofold: Ansible beginners and intermediate/expert users looking for code examples. This is true, but with some very significant caveats. The author’s style is patient but annoying, with a tendency to overly repeat...
Vm/370 (K.2...) | Aug 31 23

Artificial intelligence, machine learning, and optimization tools for smart cities: designing for sustainability

The book’s 11 chapters deal with digital “vitalism” in cities, unbuildable cities, smart cities and identities, services and data representation of information and communication technology (ICT), strategies for...
Architecture (J.5...) | May 22 23

Big data and public policy: course, content, and outcome

Big data and public policy: course, content, and outcome, by Rebecca Moody and Victor Bekkers, is an excellent book for those who are involved in policy-making processes and looking to learn how big data and public policy are strengthened together. The...
Public Policy Issues (K.4.1) | May 25 23

Computer security fundamentals (5th ed.)

Computer security fundamentals, by Chuck Easttom, is a compilation of concepts and tools used in computer security. The book is composed of 15 chapters that can be gathered into four distinct distinct parts. Chapters 1 through 5 expose the main computer security...
Security & Protection (K.6.5) | Jun 7 23

Data analysis for social science: a friendly and practical introduction

Earl Babbie’s classic textbook The practice of social research, which went to its 15th edition in 2021 [1], is a standard reference for social science students and researchers. Its comprehensive review of research methods is still of great value even to modern data analysts in...
General (E.0) | May 31 23

Data science and analytics for SMEs: consulting, tools, practical use cases

This book aims to minimize barriers to data collection and analysis for smaller businesses, both those that may not have the resources for a dedicated data science department as well as those that would benefit from the services of a large analytics firm. Here, small...
Business (J.1...) | Oct 2 23

Deep learning for cognitive computing systems: technological advancements and applications

Deep learning for cognitive computing systems is a bird’s-eye view of deep learning and the neighboring, whether loosely or strongly coupled, areas. It is a collection of several authors’ publications. The...
Health (J.3...) | Jun 9 23

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2023 ThinkLoud®
Terms of Use
| Privacy Policy