Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Conferences Tutorials
Arrays Validation Routing Verification VLSI Optimization
Portable devices Servers Distributed architectures RISC/CISC,VLIW architectures Distributed systems Neural nets Network architecture
Software evolution Networks Security Embedded systems Java OO design C# Coding Tools Correctness proofs Design Object-oriented Methodologies UML State diagrams
Arrays Graphs Stacks Structures Compression Objects Encryption Standards Hash-tables
Transforms Geometric Algorithms Parallelism Invariants Automata Patterns
Mathematical software Numerical Linear Algebra Finite element methods Probability and statistics Combinatorics Graph Theory PDEs
Information interfaces Ergonomics Evaluation/methodology Interaction styles User interfaces Data models Warehouses Data mining Web Digital libraries Human factors Systems
Knowledge representation XML Expert systems Video analysis Vision Deduction Robotics Geometry and modeling Learning Learning Robotics Scene analysis Simulation theory Graphics and realism Document preparation Discrete event simulation AI
Business Engineering Biosciences Publishing Linguistics Arts CAD Humanities
Crime Patents Privacy Regulation Systems design Security Strategic planning
Design Human factors Languages Performance Theory
Reviews limited to
Date Reviewed
Big data: related technologies, challenges and future prospects
Chen M., Mao S., Zhang Y., Leung V.,  Springer Publishing Company, Incorporated, Cham, Switzerland, 2014. 89 pp. Type: Book (978-3-319062-44-0)
Nov 21 2014
Cloudsweeper and data-centric security
Snyder P., Kanich C.  ACM SIGCAS Computers and Society 44(2): 8-10, 2014. Type: Article
Nov 20 2014
Guide to teaching puzzle-based learning
Meyer E., Falkner N., Sooriamurthi R., Michalewicz Z.,  Springer Publishing Company, Incorporated, London, UK, 2014. 345 pp. Type: Book (978-1-447164-75-3)
Nov 20 2014
Opinions of people: factoring in privacy and trust
Basu A., Vaidya J., Corena J., Kiyomoto S., Marsh S., Guo G., Zhang J., Miyake Y.  ACM SIGAPP Applied Computing Review 14(3): 7-21, 2014. Type: Article
Nov 20 2014
Penetration testing: a hands-on introduction to hacking
Weidman G.,  No Starch Press, San Francisco, CA, 2014. 528 pp. Type: Book (978-1-593275-64-8)
Nov 20 2014
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2014 ThinkLoud, Inc.
Terms of Use
| Privacy Policy