Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Castelo Branco, Kalinka
Universidade de Sco Paulo
Sco Carlos, Brazil
  Follow this Reviewer
Date Reviewed  
- 10 of 10 reviews

  Security and protection of SCADA: a bigdata algorithmic approach
Shyamasundar R.  SIN 2013 (Proceedings of the 6th International Conference on Security of Information and Networks, Aksaray, Turkey,  Nov 26-28, 2013) 20-27, 2013. Type: Proceedings

Embedded systems work between hardware and software to perform a specific function. These systems are usually part of a larger system, and wireless communication among the components of the larger system is common. Therefore, it is important to gu...

Apr 16 2014  
  Collaborative relaying strategies in autonomic management of mobile robotics
Barraca J., Sadeghi R., Aguiar R.  Wireless Personal Communications: An International Journal 70(3): 1077-1096, 2013. Type: Article

Mobile robots are becoming increasingly common in our domestic and professional environments, from small autonomous vacuum cleaners, such as the iRobot Roomba, and lawnmowers, such as the Husqvarna Automower, to more sophisticated autonomous secur...

Oct 24 2013  
  Explicit coordination to prevent congestion in data center networks
Rajanna V., Jahagirdar A., Shah S., Gopalan K.  Cluster Computing 15(2): 183-200, 2012. Type: Article

An important study on preventing congestion in data centers using cloud computing platforms is presented in this paper. The authors propose a new framework prototype, XCo, that helps in the prevention of network congestion. More than just an expla...

Jan 7 2013  
  Capacity bounds of three-dimensional wireless ad hoc networks
Li P., Pan M., Fang Y.  IEEE/ACM Transactions on Networking 20(4): 1304-1315, 2012. Type: Article

Vehicular ad hoc networks (VANETs), mesh networks, and other kinds of networks are constantly used in the context of unmanned aerial and ground vehicles. This paper proposes the use of 3D wireless ad hoc networks to allow the fusion of the digital...

Dec 11 2012  
  Networks for pervasive services: six ways to upgrade the Internet
Liotta A., Exarchakos G.,  Springer Publishing Company, Incorporated, New York, NY, 2011. 190 pp. Type: Book (978-9-400714-72-4)

In addition to its coverage of computer networks, this book provides a new way to see network concepts. The book’s title makes it clear that its focus is quite different from the approach taken by traditional books. This book presents the ol...

Sep 6 2011  
  Integration of false data detection with data aggregation and confidential transmission in wireless sensor networks
Ozdemir S., Çam H.  IEEE/ACM Transactions on Networking 18(3): 736-749, 2010. Type: Article

Wireless sensor networks (WSNs) are an important topic these days. Their use is related to a wide variety of applications, from sensor nodes placed at strategic locations to detect environmental information, to composing a mobile wireless mesh net...

Jul 20 2011  
  Social networking technology and the virtues
Vallor S.  Ethics and Information Technology 12(2): 157-170, 2010. Type: Article

Social networks are considered important to people’s relationships. However, just like any other network, they have problems--in this case, the inherent problems no longer take the form of communication, but refer to other human-related...

Oct 29 2010  
  Peer-assisted view-dependent progressive mesh streaming
Cheng W., Liu D., Ooi W.  MM 2009 (Proceedings of the 17th ACM International Conference on Multimedia, Beijing, China,  Oct 19-24, 2009) 441-450, 2009. Type: Proceedings

This paper describes new challenges in the use (design) of peer-to-peer (P2P) mesh streaming. It contextualizes and presents all the advantages and disadvantages of using P2P technology to download three-dimensional (3D) meshes. It explains the pr...

May 12 2010  
  On anonymity in an electronic society: a survey of anonymous communication systems
Edman M., Yener B.  ACM Computing Surveys 42(1): 1-35, 2009. Type: Article

Edman and Yener provide in this paper a complete and clear survey of anonymity. They start by defining terms, to unify the terminologies. Some taxonomies found in the paper would allow researchers and developers to classify and define points to in...

Mar 23 2010  
  Numerical computation algorithms for sequential checkpoint placement
Ozaki T., Dohi T., Kaio N.  Performance Evaluation 66(6): 311-326, 2009. Type: Article

In this paper, Ozaki, Dohi, and Kaio discuss the problem of checkpoint placement, focusing on dependability in a centralized system. The dependability measures are steady-state system availability and expected reward per unit time in the steady st...

Nov 12 2009  
Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy