Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Communications of the ACM
ACM Press
 
   
 
Options:
 
  1-10 of 1308 reviews Date Reviewed 
  Trustworthy AI
Wing J.  Communications of the ACM 10(64): 64-71, 2021. Type: Article

Artificial intelligence (AI) techniques are useful in creating effective computing tools for diverse applications in areas such as transportation, agriculture, medicine, and justice systems. Yet the credibility of AI is still an interesting subjec...

Dec 14 2021
  DeepXplore: automated whitebox testing of deep learning systems
Pei K., Cao Y., Yang J., Jana S.  Communications of the ACM 62(11): 137-145, 2019. Type: Article

Many of us use trustworthy electronic systems, from self-driving car owners to online bankers and shoppers. How should real-life computer systems be methodically tested for nearly all potential faults and malware threats, to instill confidence in ...

Jan 12 2021
  Unlocking data to improve public policy
Hastings J., Howison M., Lawless T., Ucles J., White P.  Communications of the ACM 62(10): 48-53, 2019. Type: Article

Data-driven decision-making is all the rage these days. Government and public sector organizations, as well as industry and private enterprise, are keen to leverage the flood of data available in the Information Age to make better decisions. Data ...

Nov 20 2020
  Separation logic
O’Hearn P.  Communications of the ACM 62(2): 86-95, 2019. Type: Article

Formal reasoning about mutable data can be difficult when concurrency is present, for instance, when attempting mutation of the same data at the same time from multiple processors; or when aliasing is present, for instance, when the same data is n...

Oct 28 2020
   Modern debugging: the art of finding a needle in a haystack
Spinellis D.  Communications of the ACM 61(11): 124-134, 2018. Type: Article

The rapidly emerging smart Internet of Things (IoT) hardware and devices that make our lives comfortable and secure require faultless and reliable software. But what techniques and tools should programmers and software engineers be cognizant of to...

Oct 26 2020
  Blockchain technology: What is it good for?
Ruoti S., Kaiser B., Yerukhimovich A., Clark J., Cunningham R.  Communications of the ACM 63(1): 46-53, 2019. Type: Article

Cryptocurrency has been the origin of an evolution in financial and monetary relations the world over, and its domain of influence continues to spread. Bitcoin is its well-known symbol. In addition to security, trust is a key criterion in these tr...

Sep 28 2020
   Embedded EthiCS: integrating ethics across CS education
Grosz B., Grant D., Vredenburgh K., Behrends J., Hu L., Simmons A., Waldo J.  Communications of the ACM 62(8): 54-61, 2019. Type: Article

Motivated by a plethora of exemplary “intelligent” information enterprises, this article presents results related to Embedded EthiCS, “a Harvard-based pilot program [that] integrates class sessions on ethical reasoning into cours...

Aug 27 2020
   The effects of mixing machine learning and human judgment
Vaccaro M., Waldo J.  Communications of the ACM 62(11): 104-110, 2019. Type: Article

Automated risk assessment systems are often used in situations that require human judgment. One motivation for doing this is to remove human bias. Even when the automated system has been shown to be more accurate than human assessments, a team com...

Aug 7 2020
  The rise of serverless computing
Castro P., Ishakian V., Muthusamy V., Slominski A.  Communications of the ACM 62(12): 44-54, 2019. Type: Article

In spite of a somewhat confusing introduction--“the server is dead, long live the server”--this informative article gives an overview of the relatively new phenomenon of serverless computing. It includes definitions of the se...

Aug 3 2020
  Should researchers use data from security breaches?
Douglas D.  Communications of the ACM 62(12): 22-24, 2019. Type: Article

The use of data derived from publicly exposed and security loophole databases will continue to be a controversial subject of debate for legal scholars and information technology (IT) computing ethics specialists. Should computing research practiti...

Jul 30 2020
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2022 ThinkLoud, Inc.
Terms of Use
| Privacy Policy