Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Wang, De
Google Inc.
Mountain View, California
 
   Reviewer Selected
Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 10 of 10 reviews

   
   Data stewardship: an actionable guide to effective data management and data governance
Plotkin D., Morgan Kaufmann Publishers Inc., San Francisco, CA, 2014. 248 pp.  Type: Book

Almost every aspect of data stewardship, from the definition to implementation of the whole concept, is described in this book. It is an excellent guide for any organization that involves user data management and protection....

Jun 3 2015  
   Spam nation: the inside story of organized cybercrime--from global epidemic to your front door
Krebs B., Sourcebooks, Incorporated, Naperville, IL, 2014. 272 pp.  Type: Book (978-1-402295-61-4)

In this book, Brian Krebs, a famous journalist and investigative reporter known for his coverage of profit-seeking cyber criminals, covers the spam business and the spammers behind it, explaining the details of how spam businesses earn...

Apr 10 2015  
  Secure and efficient anonymization of distributed confidential databases
Herranz J., Nin J. International Journal of Information Security 13(6): 497-512, 2014.  Type: Article

Preserving user data privacy while providing utility at the same time requires good system and protocol design and implementation in practice. This paper targets the anonymization of user data from distributed database systems belongin...

Feb 17 2015  
   Risks and myths of cloud computing and cloud storage
Neumann P. Communications of the ACM 57(10): 25-27, 2014.  Type: Article

This article focuses on risks in cloud computing when designing, selecting, and configuring cloud services. Cloud computing has brought many benefits, such as low cost and simple management. However, it also comes with many risks, incl...

Dec 4 2014  
   Big data architecture evolution: 2014 and beyond
Mohammad A., Mcheick H., Grant E.  DIVANet 2014 (Proceedings of the 4th ACM International Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications, Montreal, QC, Canada, Sep 21-26, 2014) 139-144, 2014.  Type: Proceedings, Reviews: (1 of 2)

Big data architecture is rapidly evolving due to the recent dramatic growth of information. People search for useful information and at the same time generate more information. Efficiently retrieving information and effectively managin...

Nov 12 2014  
   Security, cybercrime, and scale
Herley C. Communications of the ACM 57(9): 64-71, 2014.  Type: Article

This article analyzes the traditional threat model for cybersecurity and proposes a new model that considers scalability and financial motivation. In the new threat model, the author splits cybercrime into two categories: financial and...

Sep 30 2014  
  Survey on mobile social networking in proximity (MSNP): approaches, challenges and architecture
Wang Y., Vasilakos A., Jin Q., Ma J. Wireless Networks 20(6): 1295-1311, 2014.  Type: Article

Mobile social networking in proximity (MSNP), also called local social networks and proximity mobile social networks (PMSNs), describes the use of Bluetooth, Wi-Fi Direct, and/or peer-to-peer (P2P) Wi-Fi enabled mobile devices to allow...

Sep 25 2014  
   Understanding SMS spam in a large cellular network
Jiang N., Jin Y., Skudlark A., Zhang Z. ACM SIGMETRICS Performance Evaluation Review 41(1): 381-382, 2013.  Type: Article

Jiang et al. conducted a good study of SMS spam in a large cellular network in the US. They collected a large set of SMS spam through user-generated spam reports, which are more reliable and cleaner compared with other sources. After t...

Sep 24 2014  
   Russian web spam evolution: yandex experience
Pevtsov S., Pevtsov S., Volkov S., Volkov S.  Proceedings of the 22nd International Conference on World Wide Web (Proceedings of the 22nd International World Wide Web Conference, Rio de Janeiro, Brazil, May 13-17, 2013) Comite Gestor da Internet no Brazil, 1137-1140, 2013.  Type: Proceedings

“Web spam is defined as web pages that are created to manipulate search engines and deceive web users” [1]. The evolution of Russian web spam is the topic of this paper. The authors introduce detection approaches in...

Sep 3 2014  
  A regularization approach to learning task relationships in multitask learning
Zhang Y., Yeung D. ACM Transactions on Knowledge Discovery from Data 8(3): 1-31, 2013.  Type: Article

Multitask learning is very popular in many domains and has been applied in numerous applications. This paper proposes a novel regularization approach, multitask relationship learning (MTRL), to learn task relationships in multitask lea...

Jul 1 2014  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy