Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Computer
IEEE Computer Society Press
 
   
 
Options:
 
  1-10 of 297 reviews Date Reviewed 
  Augmented reading: the present and future of electronic scientific publications
Montuschi P., Benso A.  Computer 47(1): 64-74, 2014. Type: Article

The traditional reading experience is changing with new information technologies making multimedia content converge with publishing. It becomes noticeably true with augmented reality, in which publishers try to connect various multimedia assets to...

Sep 25 2014
  An extensible framework for online testing of choreographed services
Ali M., Bertolino A., De Angelis F., De Angelis G., Fani D., Polini A.  Computer 47(2): 23-29, 2014. Type: Article

Services computing is widely adopted in the information technology (IT) industry because of the popularity of social networks, mobile computing, cloud computing, and big data. A composite service may be supported by service orchestration or servic...

Aug 6 2014
  Big data’s big unintended consequences
Wigan M., Clarke R.  Computer 46(6): 46-53, 2013. Type: Article

Is that what they’re using my data for?...

Dec 31 2013
  Empirical research through ubiquitous data collection
Henze N., Shrazi A., Schmidt A., Pielot M., Michahelles F.  Computer 46(6): 74-76, 2013. Type: Article

In the context of research, experiments are designed to confirm or refute a hypothesis formulated by the investigators. The setup of the experiment is often tightly controlled to focus on a small number of independent variables that are key to the...

Sep 12 2013
  Toward uninterrupted operation of wireless sensor networks
De S., Singhal R.  Computer 45(9): 24-30, 2012. Type: Article

A foundational concept of wireless sensor networks is that they are not tied down by wires, neither for data transmission nor power transmission. The traditional approach to providing power to sensors is with batteries, but batteries eventually di...

Jan 29 2013
  Using protein interaction networks to understand complex diseases
Koyutürk M.  Computer 45(3): 31-38, 2012. Type: Article

Koyut├╝rk centers his discussion on the opportunity to focus on protein-to-protein interaction (PPI) networks rather than on classical enrichment analysis methods to discover dysregulated genes related to complex diseases. Interestingly, he grounds...

Oct 18 2012
  Defending against cross-site scripting attacks
Shar L., Tan H.  Computer 45(3): 55-62, 2012. Type: Article

In this article, the authors provide an overview of cross-site scripting (XSS) attacks and defenses against them. After a brief introduction to XSS, which ranks at or near the top of widely used software security risk lists, the authors describe t...

Jul 6 2012
  Software development for infrastructure
Stroustrup B.  Computer 45(1): 47-58, 2012. Type: Article

Bjarne Stroustrup’s C++ manuals have always been near my desk. They go beyond the usual language reference manual to demonstrate powerful features and knotty points. This short article and video (http://ieeexplore.ieee.org/xpl/multimedia.jsp...

Jun 6 2012
  Close encounters of the collaborative kind
Mayhew M., Guo X., Haase S., Hartemink A.  Computer 45(3): 24-30, 2012. Type: Article

Four Duke University researchers created an interdisciplinary project combining biology and computational methods. This seven-page article discusses their experiences in overcoming the cultural barriers present in multidisciplinary work. Researche...

May 14 2012
  Software engineering--missing in action: a personal perspective
Parnas D.  Computer 44(10): 54-58, 2011. Type: Article, Reviews: (2 of 2)

For over 20 years, Parnas has published insightful and thought-provoking papers on software engineering; this easy-to-read paper continues that practice. Parnas provides a personal perspective on what he regards as the failing of software engineer...

Feb 10 2012
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy