Browse Definitions :
Definition

computational creativity

Contributor(s): Matthew Haughn

Computational creativity is the application of computer technologies to emulate, study, stimulate and enhance human creativity.

Computational creativity involves experimentation with the goal of finding innovative ideas and thought processes in fields like art, literature, cuisine, architecture, engineering and music. Computational creativity often applies artificial intelligence (AI) to create things that were imagined impossible for computers such as paintings, sculptures and written works of fiction.

While computers are known for mathematical precision and logic, creativity was long thought to be the exclusive domain of conscious beings. Much controversy still exists over the possibility of computational creativity, and many creatives, in particular, are vocally against it. While it can be questioned whether computers can be truly creative, computational creativity projects often aim to yield works that human observers might assess as creative. In any case, the simulation of human-level creativity is seen as a lofty goal.

IBM is one company that believes that human-level creativity is possible for computers. The company’s current project applies computational creativity to the development of new culinary recipes. Admittedly, it seems unlikely that a machine  that cannot taste could invent a recipe that humans find not only palatable but enjoyable and novel. IBM claims its secret ingredient is big data and has trained its creative computing model on a huge corpus of recipes. Surprisingly, the results were evaluated by professional chefs with promising feedback.

Creativity is one essential component of artificial general intelligence (AGI), which involves a system that can find solutions to unfamiliar problems.

This was last updated in April 2018

Continue Reading About computational creativity

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • buffer underflow

    Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

  • denial-of-service attack

    A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • secondary storage

    Secondary storage is storage for noncritical data that does not need to be frequently accessed.

  • Pure Storage

    Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

  • yobibyte (YiB)

    A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and ...

Close