|
|
|
|
|
|
Date Reviewed |
|
|
1 - 10 of 35
reviews
|
|
|
|
|
|
|
|
iOS application security: the definitive guide for hackers and developers Thiel D., No Starch Press, San Francisco, CA, 2016. 296 pp. Type: Book (978-1-593276-01-0), Reviews: (1 of 2)
Developing secure software applications (apps) for Apple’s mobile operating system (iOS) running on more than one billion iOS devices worldwide poses significant technical challenges. To learn about potential iOS application ...
|
Nov 3 2016 |
|
|
|
|
|
|
Mathematical and numerical modeling in porous media: applications in geosciences Diaz Viera M. (ed), Sahay P. (ed), Coronado M. (ed), Ortiz Tapia A. (ed), CRC Press, Inc., Boca Raton, FL, 2012. 370 pp. Type: Book (978-0-415665-37-7)
This book contains 16 highly technical papers selected from two international workshops on numerical modeling. It is an excellent reference source for university researchers and “professionals, including geoscientists, hydrog...
|
Sep 30 2013 |
|
|
|
|
|
|
Incorporating household structure into a discrete-event simulation model of tuberculosis and HIV Mellor G., Currie C., Corbett E. ACM Transactions on Modeling and Computer Simulation 21(4): 1-17, 2011. Type: Article
Human immunodeficiency virus (HIV) is known to increase the probability of developing tuberculosis (TB) and accelerating its progression. During the last 20 years, as a result of the rise in the number of HIV infections, the number of ...
|
Aug 7 2012 |
|
|
|
|
|
|
Simplicity betrayed Phillips G. Communications of the ACM 53(6): 52-58, 2010. Type: Article
Would it be easy to develop a software application for a modern computer to mimic the operation of a 30-plus-year-old computer’s video display unit? One would think so, given the fact that a modern computer is exceedingly mor...
|
Jun 10 2011 |
|
|
|
|
|
|
Software model checking takes off Miller S., Whalen M., Cofer D. Communications of the ACM 53(2): 58-64, 2010. Type: Article
A commonly used dictum in software testing indicates that “the only exhaustive means of testing is testing until the tester is exhausted!” Not so, say the authors of this paper, if your software is implementing a mo...
|
Apr 8 2010 |
|
|
|
|
|
|
Continuum modeling in the physical sciences (Monographs on Mathematical Modeling and Computation) Groesen E., Molenaar J., Society for Industrial and Applied Mathematics, Philadelphia, PA, 2007. 228 pp. Type: Book (089871625X9780898716252)
Teaching mathematical modeling poses significant technical challenges, partly due to the multidisciplinary nature of the topic. Each discipline or problem domain employs its own theoretical foundation, and many types of mathematical mo...
|
Oct 23 2008 |
|
|
|
|
|
|
Diagnosis of discrete event systems using decentralized architectures Wang Y., Yoo T., Lafortune S. Discrete Event Dynamic Systems 17(2): 233-263, 2007. Type: Article
This long, heavily theoretical paper introduces and analyzes a general hierarchical framework for the decentralized diagnosis of discrete event systems, consisting of detecting unobservable significant events (such as faults)....
|
Mar 6 2008 |
|
|
|
|
|
|
Modelling driver behaviour in automotive environments: critical issues in driver interactions with intelligent transport systems Cacciabue P., Springer-Verlag New York, Inc., Secaucus, NJ, 2007. 428 pp. Type: Book (9781846286179)
Thirty-seven authors contribute 21 papers to this book. The authors come from academia, industry, and government, and a number of different countries. They provide a multifaceted description of driver-behavior modeling based on their e...
|
Nov 12 2007 |
|
|
|
|
|
|
Modeling and Simulation in Security Evaluation Nicol D. IEEE Security and Privacy 3(5): 71-74, 2005. Type: Article
Nicol provides an excellent overview of how modeling and simulation can be used to evaluate the security of network-centric software systems. Security is becoming an increasingly important concern, as more and more systems become netwo...
|
Feb 27 2006 |
|
|
|
|
|
|
Modelling incentives for collaboration in mobile ad hoc networks Crowcroft J., Gibbens R., Kelly F., Östring S. Performance Evaluation 57(4): 427-439, 2004. Type: Article
When the nodes (users) of a mobile ad hoc network are enabled in collaboration, they form the necessary ad hoc infrastructure that makes multi-hop communication achievable. The collaboration requires each node to forward traffic for ot...
|
Jan 10 2005 |
|
|
|
|
|
|
|
|
|
|
|