Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Goodman, Brian
Kalibri Labs
Rockville, Maryland
 
   Reader Recommended
   Reviewer Selected
Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 10 of 24 reviews

   
  Discovering user behavioral features to enhance information search on big data
Cassavia N., Masciari E., Pulice C., Saccà D.  ACM Transactions on Interactive Intelligent Systems 7(2): 1-33, 2017. Type: Article

Cassavia et al. reduce theory into practice in this paper. All too often, the disciplines we live in exist abstractly with theories or dense algorithms. The authors set a great example by showing how their modeling works in practice; it is an inte...

Nov 10 2017  
  Combining user reputation and provenance analysis for trust assessment
Ceolin D., Groth P., Maccatrozzo V., Fokkink W., Van Hage W., Nottamkandath A.  Journal of Data and Information Quality 7(1-2): 1-28, 2016. Type: Article

The social engagement enabled by the Internet moved critical evaluation beyond the specialized few and distributed it in the hands of the common many. It is routine to evaluate the reputation of items in an online shopping context by the five-star...

May 12 2016  
  A methodology to evaluate important dimensions of information quality in systems
Todoran I., Lecornu L., Khenchaf A., Le Caillec J.  Journal of Data and Information Quality 6(2): 1-23, 2015. Type: Article, Reviews: (1 of 2)

As the world begins to surf down the “trough of disillusionment” with big data [1], on the journey to sorting out what can be real and what has value, we rediscover the discipline that data and information scientists have been nurturin...

Aug 5 2015  
  The UX five-second rules: guidelines for user experience design’s simplest testing technique
Doncaster P.,  Morgan Kaufmann Publishers Inc., San Francisco, CA, 2014. 140 pp. Type: Book (978-0-128005-34-7)

Increasingly, professionals are challenged to do more with less. Unless you work at a mature organization that supports a rich user experience (UX) discipline, it is likely that someone not trained in the domain is playing the role. It is not unco...

Jan 19 2015  
  Embedded analytics and statistics for big data
Louridas P., Ebert C.  IEEE Software 30(6): 33-39, 2013. Type: Article

If there is a topic that has been overhyped, it is big data [1]. A confluence of trends has made it possible to start working with previously unimaginable data in all its volume, velocity, and variety. For most, we don’t actually have big da...

Aug 19 2014  
   Design and ethics in the era of big data
Goodman E.  interactions 21(3): 22-24, 2014. Type: Article

There are relatively few sources of really big data, and the best examples tend to be linked to consumer technologies and services. Even then, much of the data is something we agreed to when we engaged in its use. No one ever reads the entire term...

Jun 10 2014  
  Traveling the Silk Road: a measurement analysis of a large anonymous online marketplace
Christin N.  WWW 2013 (Proceedings of the 22nd International World Wide Web Conference, Rio de Janeiro, Brazil,  May 13-17, 2013) 213-224, 2013. Type: Proceedings

On October 1, 2013, US federal agencies (the Federal Bureau of Investigation (FBI), the Drug Enforcement Agency (DEA), and the Internal Revenue Service (IRS)) shut down Silk Road [1], a Tor hidden service that was an anonymous marketplace for merc...

Apr 15 2014  
  Is cloned code older than non-cloned code?
Krinke J.  IWSC 2011 (Proc. of the 5th International Workshop on Software Clones, Waikiki, Honolulu, HI,  May 23, 2011) 28-33, 2011. Type: Proceedings

One method of reducing software development risk is through the reuse of proven code--typically, source code that a developer or team has used before that is formally an asset or trusted when copied and pasted to perform in a stable manner. T...

Apr 27 2012  
  Enabling context-aware Web services: methods, architectures, and technologies
Sheng Q., Yu J., Dustdar S.,  Chapman & Hall/CRC, Boca Raton, FL, 2010. 558 pp. Type: Book (978-1-439809-85-3)

Context-aware computing focuses on understanding the end user in a more intimate, targeted, and relevant way. It is about considering not simply the declarative elements of an interaction, but also the relevant unspoken artifacts surrounding the e...

Sep 30 2010  
  Human-centered software engineering: software engineering models, patterns and architectures for HCI
Seffah A. (ed), Vanderdonckt J. (ed), Desmarais M. (ed),  Springer Publishing Company, Incorporated, London, UK, 2009. 398 pp. Type: Book (9781848009066)

Editing a volume of chapters contributed by individual authors is one of the most challenging acts of authorship. It takes clarity of vision and relentless conviction, both of which are squeezed by the time pressures of publishers and life. Seffah...

Oct 29 2009  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy