Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Conferences Tutorials
VLSI Routing Arrays Validation Optimization Verification
Neural nets RISC/CISC,VLIW architectures Distributed architectures Portable devices Servers Network architecture Distributed systems
Networks Security Embedded systems Object-oriented Java OO design State diagrams Software evolution UML C# Methodologies Coding Tools Correctness proofs Design
Structures Arrays Graphs Stacks Hash-tables Encryption Compression Objects Standards
Automata Parallelism Transforms Geometric Algorithms Patterns Invariants
Numerical Linear Algebra PDEs Finite element methods Combinatorics Graph Theory Probability and statistics Mathematical software
Human factors Data models Systems Information interfaces User interfaces Ergonomics Evaluation/methodology Interaction styles Warehouses Data mining Web Digital libraries
AI Expert systems Knowledge representation Learning Robotics Vision Geometry and modeling Graphics and realism Scene analysis Simulation theory Document preparation Learning Discrete event simulation Deduction Robotics Video analysis XML
Business Engineering Biosciences Humanities Arts Linguistics CAD Publishing
Privacy Regulation Systems design Security Crime Patents Strategic planning
Design Human factors Languages Performance Theory
Reviews limited to
Date Reviewed
Cloud computing and software services: theory and techniques
Ahson S., Ilyas M.,  CRC Press, Inc., Boca Raton, FL, 2017. 458 pp. Type: Book (978-1-138114-97-5)
Nov 20 2018
Minimal equivalent subgraphs containing a given set of arcs
Reimers A., Reimers A., Goldstein Y.  Theoretical Computer Science 67556-63, 2017. Type: Article
Nov 19 2018
SCION: a secure Internet architecture
Perrig A., Szalachowski P., Reischuk R., Chuat L.,  Springer International Publishing, New York, NY, 2017. 432 pp. Type: Book (978-3-319670-79-9)
Nov 16 2018
 Linux hardening in hostile networks: server security from TLS to Tor
Rankin K.,  Addison-Wesley Professional, Boston, MA, 2017. 272 pp. Type: Book (978-0-134173-26-9)
Nov 15 2018
A ternary unification framework for optimizing TCAM-based packet classification systems
Norige E., Liu A., Torng E.  IEEE/ACM Transactions on Networking 26(2): 657-670, 2018. Type: Article
Nov 14 2018
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy