Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Conferences Tutorials
 
Arrays Validation Routing Verification VLSI Optimization
 
Portable devices Servers Distributed architectures RISC/CISC,VLIW architectures Distributed systems Neural nets Network architecture
 
Software evolution Networks Security Embedded systems Java OO design C# Coding Tools Correctness proofs Design Object-oriented Methodologies UML State diagrams
 
Arrays Graphs Stacks Structures Compression Objects Encryption Standards Hash-tables
 
Transforms Geometric Algorithms Parallelism Invariants Automata Patterns
 
Mathematical software Numerical Linear Algebra Finite element methods Probability and statistics Combinatorics Graph Theory PDEs
 
Information interfaces Ergonomics Evaluation/methodology Interaction styles User interfaces Data models Warehouses Data mining Web Digital libraries Human factors Systems
 
Knowledge representation XML Expert systems Video analysis Vision Deduction Robotics Geometry and modeling Learning Learning Robotics Scene analysis Simulation theory Graphics and realism Document preparation Discrete event simulation AI
 
Business Engineering Biosciences Publishing Linguistics Arts CAD Humanities
 
Crime Patents Privacy Regulation Systems design Security Strategic planning
 
Design Human factors Languages Performance Theory
 
 
Reviews limited to
Date Reviewed
 
 
Assessment of human perceptual sensitivity to physically non-conforming motion in virtual environments
Choi M., Alquzi M., Hong M.  The Journal of Supercomputing 69(3): 1311-1323, 2014. Type: Article
Apr 24 2015
 
 
Social networks: analysis and case studies
Gündüz-Ogüdücü S. (ed), Etaner-Uyar A.,  Springer Publishing Company, Incorporated, New York, NY, 2014. 249 pp. Type: Book (978-3-709117-96-5)
Apr 24 2015
 
 
Compulsive Internet use in adults: a study of prevalence and drivers within the current economic climate in the UK
Quiñones-García C., Korak-Kakabadse N.  Computers in Human Behavior 30171-180, 2014. Type: Article
Apr 24 2015
 
 
Secure encrypted steganography graphical password scheme for near field communication smartphone access control system
Cheong S., Ling H., Teh P.  Expert Systems with Applications: An International Journal 41(7): 3561-3568, 2014. Type: Article
Apr 23 2015
 
 
Reliability and usability of an Internet-based computerized cognitive testing battery in community-dwelling older people
Darby D., Fredrickson J., Pietrzak R., Maruff P., Woodward M., Brodtmann A.  Computers in Human Behavior 30199-205, 2014. Type: Article
Apr 23 2015
 
  more..    
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2015 ThinkLoud, Inc.
Terms of Use
| Privacy Policy