Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
Misc

View:



GraphQL: a systematic mapping study : ACM Computing Surveys

Software architects ought to continuously strive to develop secure, dependable, and effective software services that can cope with the scalability, revival, idleness, multi-occupancy, and other operational...
Software Architectures (D.2.11) | Sep 5 23

Trustworthy AI: from principles to practices : ACM Computing Surveys

As computing technology continues to evolve, artificial intelligence (AI) is playing an increasing role in various aspects of our lives. Although AI dates back many decades--I took an AI subject in my university studies, in 1988--only recently have dramatic advances...
General (I.2.0) | Mar 12 24

Trustworthy AI: from principles to practices : ACM Computing Surveys

As systems based on AI have become the backbone of various public services such as transportation, finance, medicine, security, academics, medicine, and entertainment, the reliability and trustworthiness of AI artifacts/products, including robustness...
General (I.2.0) | Jan 30 24

A demographic analysis on prerequisite preparation in an advanced data structures course : ACM Inroads

This survey article aims to investigate the effects that prerequisite course proficiency has on course outcomes in an advanced data structure (ADS) course, specifically for Black, Latinx, Native American, and Pacific Islander (BLNPI)...
Computer Science Education (K.3.2...) | Aug 24 23

Faking it and breaking it: responsible AI is needed now : ACM SIGCAS Computers and Society

The paper’s title is catchy and promising. However, readers will find themselves immersed in another trendy cry that criticizes artificial intelligence (AI) evolution while at the same time promoting it, because the paper is just nonsense. I have never reviewed for...
Ethics (K.4.1...) | Aug 16 23

Online learning for network resource allocation : ACM SIGMETRICS Performance Evaluation Review

Network resource allocation is still a challenge in many scenarios where fast services need to be provided in changing and unpredictable situations, for example, the ones...
Allocation/Deallocation Strategies (D.4.2...) | Aug 25 23

Vitruvius+: an area-efficient RISC-V decoupled vector coprocessor for high performance computing applications : ACM Transactions on Architecture and Code Optimization

Vector processors had their heyday in the 1980s, before classical supercomputers were mostly replaced by multiprocessors. Today, however, vector processors are experiencing a renaissance: their efficient...
Efficiency (G.4...) | Aug 2 23

Efficient instruction scheduling using real-time load delay tracking : ACM Transactions on Computer Systems

Central processing unit (CPU) architectures with out-of-order instruction scheduling use, among other data, static instruction-timing information to create good schedules. The work reported in this paper...
Scheduling (D.4.1...) | Oct 27 23

H-Container: enabling heterogeneous-ISA container migration in edge computing : ACM Transactions on Computer Systems

Xing et al. describe a novel approach to dealing with the difficulties posed by container migration in edge computing settings with heterogeneous ISAs. By putting forth a mechanism that permits effective and...
Distributed Systems (C.2.4) | May 10 23

Emerging technologies in K–12 education: a future HCI research agenda : ACM Transactions on Computer-Human Interaction

Technologies like artificial intelligence (AI), virtual reality (VR), augmented reality (AR), machine learning (ML), and the Internet of Things (IoT) are becoming more and more popular, not only in academia but also in...
Education (J.1...) | Sep 27 23



A history of fake things on the Internet

With the advent of the Internet, changing perceptions of reality and “fakeness” have impacted user decisions to expose or hide their social identities. The positives of using or working with the Internet encourage real identities, whereas humor or bad behavior fills Internet...
Social Issues (K.4.2) | Mar 20 24

Algorithmic modernity

In this edited volume on “algorithmic modernity,” uniting several historians of science, no formal definition for “algorithm” is actually provided. Instead the authors start with popular perceptions of the role of algorithms in society, that is, as instruments of both liberation...
Algorithms (B.2.4...) | Jan 5 24

Algorithms for big data

This book is an output from the German Research Foundation’s priority programme SPP 1736 on “Algorithms for Big Data.” SPP 1736 funded 15 projects, and a few projects with their own funding were also associated with the programme. There are eight papers under the...
Algorithms (B.2.4...) | Feb 7 24

Artificial intelligence, game theory and mechanism design in politics

This book serves as guide to the use of artificial intelligence (AI), game theory, and mechanism design in politics. Marwala takes a simple approach to these subjects. He explains AI concepts at a level suitable to readers without technical knowledge. Even readers...
Government (J.1...) | Dec 29 23

Automata theory: an algorithmic approach

Novices to automata theory may want to start with Dines Bjørner’s narrative on principles and techniques, found in the automata theory chapter of his enjoyable three-volume set [1], which covers intuition, motivation, and pragmatics. Bjørner’s objective: to help...
General (G.1.0) | Feb 27 24

Automating empathy: decoding technologies that gauge intimate life

This book is a travel guide to the future. It is a scholarly reimagination of life in the age of artificial intelligence (AI)-powered technologies. It made my head hurt and my heart ache. Automating empathy: decoding technologies that gauge intimate life starts with an initial...
General (K.4.0) | Jan 17 24

Beginning AWS security: build secure, effective, and efficient AWS architecture

Beginning AWS security: build secure, effective, and efficient AWS architecture is an essential guide for anyone looking to understand and implement security measures within Amazon Web Services. This book is particularly valuable for system administrators...
Security & Protection (C.2.0...) | Mar 4 24

Beginning breadboarding: physical computing and the basic building blocks of computers

The maker movement is getting more popular, possibly fueled by the recent coronavirus crisis that left many of us searching for new indoor activities. A niche within this field is electronics, with quite a few books...
Electronics (J.2...) | Jan 10 24

Better Python code: a guide for aspiring experts

The Python programming language’s versatility and ease of learning has made it a popular choice in both industry and academia. This has also led to the production of many Python books and tutorials. Better Python code by David Mertz is not another tutorial, but rather...
Python (D.3.2...) | Jan 23 24

Building a data culture: the usage and flow data culture model

Building a data culture provides an introduction to the concepts of organizational culture and data culture. It emphasizes that, for an organization’s strategy to succeed, there must be alignment between the strategy and the prevailing organizational culture. This idea is...
General (K.6.0) | Apr 5 24


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy