Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
September 29, 2023

Parallel programming: for multicore and cluster systems (3rd ed.)
Parallel programming: for multicore and cluster systems is now in its third English edition (2023). The original German text had, in turn, its three editions in 2000, 2007, and 2012. The current third English edition includes selected (as opposed to pervasive) updates and unspecified... more
Next we turn to a feedback loop that again includes a human element, but with a difference. Here man does not have the controlling functions of sensing and corrective... more
- Otto Mayr (1970)
Emerging technologies in K–12 education: a future HCI research agenda: ACM Transactions on Computer-Human Interaction

Technologies like artificial intelligence (AI), virtual reality (VR), augmented reality (AR), machine learning (ML), and the Internet of Things (IoT) are becoming more and more popular, not only in academia but also in... more

Education (J.1...) | Sep 27 23

GraphQL: a systematic mapping study: ACM Computing Surveys

Software architects ought to continuously strive to develop secure, dependable, and effective software services that can cope with the scalability, revival, idleness, multi-occupancy, and other operational issues of cloud applications. To... more

Software Architectures (D.2.11) | Sep 5 23

Online learning for network resource allocation: ACM SIGMETRICS Performance Evaluation Review

Network resource allocation is still a challenge in many scenarios where fast services need to be provided in changing and unpredictable situations, for example, the ones encountered in streaming data applications... more

Allocation/Deallocation Strategies (D.4.2...) | Aug 25 23

A demographic analysis on prerequisite preparation in an advanced data structures course: ACM Inroads

This survey article aims to investigate the effects that prerequisite course proficiency has on course outcomes in an advanced data structure (ADS) course, specifically for Black, Latinx, Native American, and Pacific Islander (BLNPI)... more

Computer Science Education (K.3.2...) | Aug 24 23

Towards a validated self-efficacy scale for data management: SIGCSE 23

I found this paper to be a challenging read as it required me to learn some new concepts. I still don’t have a full understanding of the topic, but I appreciate the author’s goals and approach. If I’d been reviewing a draft of this paper, I would have requested some additional... more

General (H.2.0) | Aug 23 23

Should robots have rights or rites?: Communications of the ACM

Imagining a future where robots routinely interact with people has raised debate about whether robots deserve special treatment, and eventually rights. Instead of discussing the legal status of robots, the authors... more

General (K.4.0) | Aug 18 23

Faking it and breaking it: responsible AI is needed now: ACM SIGCAS Computers and Society

The paper’s title is catchy and promising. However, readers will find themselves immersed in another trendy cry that criticizes artificial intelligence (AI) evolution while at the same time promoting it, because the paper is just nonsense. I have never reviewed for CR... more

Ethics (K.4.1...) | Aug 16 23

Neurosymbolic AI: Communications of the ACM

Can deep learning and machine learning systems based on neural nets do anything? Deep learning systems are capable of writing, translating, and analyzing texts; driving autonomous vehicles; and even writing... more

General (I.2.0) | Aug 14 23

Reinforcement learning for quantitative trading: ACM Transactions on Intelligent Systems and Technology

This paper is a good starting point for both learners and practitioners in the fields of algorithmic trading, portfolio management, order execution, market making, and even RL, as they launch their deep dives into... more

Learning (I.2.6) | Aug 10 23

ACE: toward application-centric, edge-cloud, collaborative intelligence: Communications of the ACM

Futuristic artificial intelligence (AI) applications in electronic business, urban surveillance, and medicine require more teamwork among researchers and practitioners. But with the rising number of autonomous AI applications in different domains, including... more

Cloud Computing (C.2.4...) | Aug 4 23

Zero trust architecture

“Don’t trust anyone” is common advice in many spy novels and movies. Good advice as well for modern Internet-connected network infrastructures, where there are no longer demarcations between internal-only and external access points. Moreover, hacks and other security... more
Security & Protection (K.6.5) | Sep 25 23

Randomness and elements of decision theory applied to signals

Communication and image processing systems are commonly modeled using random processes and are of immense interest in electronics engineering. This short volume attempts to provide an introduction to various topics related to this subject. Organized into... more
Decision Problems (F.4.3...) | Sep 21 23

Simple type theory: a practical logic for expressing and reasoning about mathematical ideas

The book is an introduction to one of the dialects of type theory. All type theories are grounded in logic. The promise of simple type theory is that it can be understood and handled much easier than other versions of type theory, for example, dependent... more
Computability Theory (F.4.1...) | Sep 19 23

Parallel programming: for multicore and cluster systems (3rd ed.)

Parallel programming: for multicore and cluster systems is now in its third English edition (2023). The original German text had, in turn, its three editions in 2000, 2007, and 2012. The current third English edition includes selected (as opposed to pervasive)... more
Parallel Programming (D.1.3...) | Sep 14 23

A new history of modern computing

Whether this book achieves biblical status as a paradigm of the history of modern computing rests with the reader. However, I can say with confidence that if you are a computing historian, a graduate student with a dissertation to complete, or an industry... more
History of Computing (K.2) | Sep 12 23

Living with algorithms: agency and user culture in Costa Rica

This book focuses on how people in Costa Rica live with algorithms. More specifically, the author studies how Netflix, Spotify, and TikTok users in that country associate with those platforms. The book is divided into seven chapters. The introductory chapter is on... more
Social Issues (K.4.2) | Sep 7 23

Ansible for VMware by examples: a step-by-step guide to automating your VMware infrastructure

This book’s stated audience is twofold: Ansible beginners and intermediate/expert users looking for code examples. This is true, but with some very significant caveats. The author’s style is patient but annoying, with a tendency to overly repeat... more
Vm/370 (K.2...) | Aug 31 23

The NICE cyber security framework: cyber security intelligence and analytics (2nd ed.)

Demand for skilled workers in the field of cybersecurity is currently strong and expected to remain so for the next few years. At the same time, many countries are experiencing skill shortages in this area. This book describes the NICE framework, an initiative of... more
Occupations (K.7.1) | Aug 29 23

Practical explainable AI using Python: artificial intelligence model explanations using Python-based libraries, extensions, and frameworks

In this comprehensive guide, the author aims to provide practical insights into artificial intelligence (AI) model explainability and interpretability using Python frameworks. While Mishra doesn’t explicitly state... more
Python (D.3.2...) | Aug 21 23

Genius: theory, history and technique

Most of us stand in awe of the great intellectual giants who exemplified, or even created, the character of the eras in which they lived. Newton, Einstein, Euler, J. S. Bach, Beethoven, Botticelli, Picasso, and Shakespeare are just a few of these individuals who are well... more
History of Computing (K.2) | Aug 11 23

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2023 ThinkLoud®
Terms of Use
| Privacy Policy