Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Balci, Osman
Virginia Tech
Blacksburg, Virginia
 
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 10 of 35 reviews

   
   iOS application security: the definitive guide for hackers and developers
Thiel D., No Starch Press, San Francisco, CA, 2016. 296 pp.  Type: Book (978-1-593276-01-0), Reviews: (1 of 2)

Developing secure software applications (apps) for Apple’s mobile operating system (iOS) running on more than one billion iOS devices worldwide poses significant technical challenges. To learn about potential iOS application ...

Nov 3 2016  
  Mathematical and numerical modeling in porous media: applications in geosciences
Diaz Viera M. (ed), Sahay P. (ed), Coronado M. (ed), Ortiz Tapia A. (ed), CRC Press, Inc., Boca Raton, FL, 2012. 370 pp.  Type: Book (978-0-415665-37-7)

This book contains 16 highly technical papers selected from two international workshops on numerical modeling. It is an excellent reference source for university researchers and “professionals, including geoscientists, hydrog...

Sep 30 2013  
  Incorporating household structure into a discrete-event simulation model of tuberculosis and HIV
Mellor G., Currie C., Corbett E. ACM Transactions on Modeling and Computer Simulation 21(4): 1-17, 2011.  Type: Article

Human immunodeficiency virus (HIV) is known to increase the probability of developing tuberculosis (TB) and accelerating its progression. During the last 20 years, as a result of the rise in the number of HIV infections, the number of ...

Aug 7 2012  
  Simplicity betrayed
Phillips G. Communications of the ACM 53(6): 52-58, 2010.  Type: Article

Would it be easy to develop a software application for a modern computer to mimic the operation of a 30-plus-year-old computer’s video display unit? One would think so, given the fact that a modern computer is exceedingly mor...

Jun 10 2011  
   Software model checking takes off
Miller S., Whalen M., Cofer D. Communications of the ACM 53(2): 58-64, 2010.  Type: Article

A commonly used dictum in software testing indicates that “the only exhaustive means of testing is testing until the tester is exhausted!” Not so, say the authors of this paper, if your software is implementing a mo...

Apr 8 2010  
  Continuum modeling in the physical sciences (Monographs on Mathematical Modeling and Computation)
Groesen E., Molenaar J., Society for Industrial and Applied Mathematics, Philadelphia, PA, 2007. 228 pp.  Type: Book (089871625X9780898716252)

Teaching mathematical modeling poses significant technical challenges, partly due to the multidisciplinary nature of the topic. Each discipline or problem domain employs its own theoretical foundation, and many types of mathematical mo...

Oct 23 2008  
  Diagnosis of discrete event systems using decentralized architectures
Wang Y., Yoo T., Lafortune S. Discrete Event Dynamic Systems 17(2): 233-263, 2007.  Type: Article

This long, heavily theoretical paper introduces and analyzes a general hierarchical framework for the decentralized diagnosis of discrete event systems, consisting of detecting unobservable significant events (such as faults)....

Mar 6 2008  
  Modelling driver behaviour in automotive environments: critical issues in driver interactions with intelligent transport systems
Cacciabue P., Springer-Verlag New York, Inc., Secaucus, NJ, 2007. 428 pp.  Type: Book (9781846286179)

Thirty-seven authors contribute 21 papers to this book. The authors come from academia, industry, and government, and a number of different countries. They provide a multifaceted description of driver-behavior modeling based on their e...

Nov 12 2007  
  Modeling and Simulation in Security Evaluation
Nicol D. IEEE Security and Privacy 3(5): 71-74, 2005.  Type: Article

Nicol provides an excellent overview of how modeling and simulation can be used to evaluate the security of network-centric software systems. Security is becoming an increasingly important concern, as more and more systems become netwo...

Feb 27 2006  
  Modelling incentives for collaboration in mobile ad hoc networks
Crowcroft J., Gibbens R., Kelly F., Östring S. Performance Evaluation 57(4): 427-439, 2004.  Type: Article

When the nodes (users) of a mobile ad hoc network are enabled in collaboration, they form the necessary ad hoc infrastructure that makes multi-hop communication achievable. The collaboration requires each node to forward traffic for ot...

Jan 10 2005  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy