Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
Misc

View:



GraphQL: a systematic mapping study : ACM Computing Surveys

Software architects ought to continuously strive to develop secure, dependable, and effective software services that can cope with the scalability, revival, idleness, multi-occupancy, and other operational...
Software Architectures (D.2.11) | Sep 5 23

Trustworthy AI: from principles to practices : ACM Computing Surveys

As computing technology continues to evolve, artificial intelligence (AI) is playing an increasing role in various aspects of our lives. Although AI dates back many decades--I took an AI subject in my university studies, in 1988--only recently have dramatic advances...
General (I.2.0) | Mar 12 24

Trustworthy AI: from principles to practices : ACM Computing Surveys

As systems based on AI have become the backbone of various public services such as transportation, finance, medicine, security, academics, medicine, and entertainment, the reliability and trustworthiness of AI artifacts/products, including robustness...
General (I.2.0) | Jan 30 24

A demographic analysis on prerequisite preparation in an advanced data structures course : ACM Inroads

This survey article aims to investigate the effects that prerequisite course proficiency has on course outcomes in an advanced data structure (ADS) course, specifically for Black, Latinx, Native American, and Pacific Islander (BLNPI)...
Computer Science Education (K.3.2...) | Aug 24 23

Faking it and breaking it: responsible AI is needed now : ACM SIGCAS Computers and Society

The paper’s title is catchy and promising. However, readers will find themselves immersed in another trendy cry that criticizes artificial intelligence (AI) evolution while at the same time promoting it, because the paper is just nonsense. I have never reviewed for...
Ethics (K.4.1...) | Aug 16 23

Online learning for network resource allocation : ACM SIGMETRICS Performance Evaluation Review

Network resource allocation is still a challenge in many scenarios where fast services need to be provided in changing and unpredictable situations, for example, the ones...
Allocation/Deallocation Strategies (D.4.2...) | Aug 25 23

Vitruvius+: an area-efficient RISC-V decoupled vector coprocessor for high performance computing applications : ACM Transactions on Architecture and Code Optimization

Vector processors had their heyday in the 1980s, before classical supercomputers were mostly replaced by multiprocessors. Today, however, vector processors are experiencing a renaissance: their efficient...
Efficiency (G.4...) | Aug 2 23

Efficient instruction scheduling using real-time load delay tracking : ACM Transactions on Computer Systems

Central processing unit (CPU) architectures with out-of-order instruction scheduling use, among other data, static instruction-timing information to create good schedules. The work reported in this paper...
Scheduling (D.4.1...) | Oct 27 23

Emerging technologies in K–12 education: a future HCI research agenda : ACM Transactions on Computer-Human Interaction

Technologies like artificial intelligence (AI), virtual reality (VR), augmented reality (AR), machine learning (ML), and the Internet of Things (IoT) are becoming more and more popular, not only in academia but also in...
Education (J.1...) | Sep 27 23

Lane compression: a lightweight lossless compression method for machine learning on embedded systems : ACM Transactions on Embedded Computing Systems

Yonsun Ko’s paper presents an innovative approach to compressing machine learning models for use on embedded systems. The paper proposes lane...
Embedded Systems (D.4.7...) | May 17 23



A history of fake things on the Internet

With the advent of the Internet, changing perceptions of reality and “fakeness” have impacted user decisions to expose or hide their social identities. The positives of using or working with the Internet encourage real identities, whereas humor or bad behavior fills Internet...
Social Issues (K.4.2) | Mar 20 24

A new history of modern computing

A new history of modern computing supplants Paul Ceruzzi’s A history of modern computing, released in its second edition over two decades ago [1]. It features a new lead author, historian Thomas Haigh. I will not compare the two versions beyond reference to the...
History of Computing (K.2) | May 17 24

Artificial intelligence in business management

As artificial intelligence (AI) gains momentum there are both growing concerns such as deepfakes and advantages such as the high availability of virtual agents, consistent results, increased productivity, and so on. AI programs imitate human cognitive skills that include learning, reasoning, self-correction, and...
Artificial Intelligence (I.2) | Apr 17 24

Automata theory: an algorithmic approach

Novices to automata theory may want to start with Dines Bjørner’s narrative on principles and techniques, found in the automata theory chapter of his enjoyable three-volume set [1], which covers intuition, motivation, and pragmatics. Bjørner’s objective: to help...
General (G.1.0) | Feb 27 24

Beginning AWS security: build secure, effective, and efficient AWS architecture

Beginning AWS security: build secure, effective, and efficient AWS architecture is an essential guide for anyone looking to understand and implement security measures within Amazon Web Services. This book is particularly valuable for system administrators...
Security & Protection (C.2.0...) | Mar 4 24

Building a data culture: the usage and flow data culture model

Building a data culture provides an introduction to the concepts of organizational culture and data culture. It emphasizes that, for an organization’s strategy to succeed, there must be alignment between the strategy and the prevailing organizational culture. This idea is...
General (K.6.0) | Apr 5 24

Cloud computing: concepts, technology, security, and architecture

The COVID-19 pandemic accelerated digital transformations and led companies to digitize large parts of their services. As a result, companies are changing their technical reference architecture and moving from an on-premises infrastructure to a...
Computer-Communication Networks (C.2) | Apr 29 24

Coding art: a guide to unlocking your creativity with the Processing language and p5.js in four simple steps

Design thinking may be considered as a set of important constructive processes and precepts used in the design and launch of products and solutions to human design problems. Coding art, now in its second edition...
Arts & Humanities (J.5) | Apr 15 24

Cognitive robotics

I have been exploring robotics over the last few years, so access to a book on the topic from a highly reputed publisher like MIT Press was an attractive proposition. And I was not disappointed! Best of all: this comprehensive book is available under a Creative Commons (CC) license--perhaps hard to believe...
Robotics (I.2.9) | May 15 24

Constructed truths: truth and knowledge in a post-truth world

Families gather during the holiday season, and heated discussions often erupt over politics and cultural values. This situation has become so frequent that it is standard fare in comedy sketches, jokes, and cartoons. It seems as though the opposing viewpoints come from...
Theory (K.2...) | Mar 11 24


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy