Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
June 17, 2019

Millions, billions, zillions: defending yourself in a world of too many numbers
This book is simultaneously entertaining, instructive (one might say educational), and worrying. After an (important) opening chapter, the author analyzes a statement from Newsweek that the US should tap into the Strategic Petroleum Reserve (SPR), since it holds 660 billion... more
Now we know that once computers connected us to each other, once we became tethered to the network, we really didn''t need to keep computers busy... more
- Sherry Turkle (2011)
Three bits suffice: explicit support for passive measurement of Internet latency in QUIC and TCP: IMC 18

The Internet measurement of round-trip time (RTT) is important as an indication of performance and latency. While the Ping utility can and does measure RTT, widespread use increases overhead. This... more

Network Protocols (C.2.2) | Jun 17 19

Understanding image representations by measuring their equivariance and equivalence: International Journal of Computer Vision

As the number of artificial intelligence (AI)-based systems that support key aspects of our life, including health and security, increases... more

Image Representation (I.4.10) | Jun 17 19

Empirically-based secure OS design: NSPW 17

In this New Security Paradigms Workshop (NSPW) panel, four people discuss research methods and the actual meaning of a secure operating system (OS). The panelists do not tackle this aspect as a purely... more

Security & Protection (D.4.6) | Jun 13 19

A comparative study on two XML editors (Oxygen and UltraEdit): ICCSP 19

The authors compare two Extensible Markup Language (XML)-aware editors, Oxygen and UltraEdit. The comparison comprises three parts: an unstructured interview and observation, and two hands-on... more

XML (I.7.2...) | Jun 12 19

Did we just travel to the past? Building and evaluating with cultural presence different modes of VR-mediated experiences in virtual archaeology: Journal on Computing and Cultural Heritage

Virtual archaeology seeks to develop ways of using computer-based visualization for the comprehensive dissemination of the past. Compared to... more

Archaeology (J.2...) | Jun 10 19

Technologizing agriculture: Communications of the ACM

New technologies continue to revolutionize agricultural business processes. Today, farmers use technologies such as drones, robots, and sensors to cautiously and resourcefully track and manage agricultural assets and operative... more

Earth & Atmospheric Sciences (J.2...) | Jun 6 19

Can background music facilitate learning?: LAK 19

In my experience, humming a tune or listening to some soft music helps with learning. But does any background music help, or only some specific type? Hu et al. address this question here. The authors conducted an experiment with four different types of music... more

Music (J.5...) | Jun 5 19

Analytics for managerial work: Communications of the ACM

This article describes various surveys for determining the role of analytics in different types of managerial works. It specifically surveys managerial works in finance, human resources, marketing, and... more

General (J.0) | Jun 4 19

Human-centered VR design: IEEE Computer Graphics and Applications

When virtual reality (VR) is not pleasing to see and/or hear, users will remove their headsets or glasses. One main reason is that engineers don’t consider all human aspects of the VR experience when developing... more

Virtual Reality (I.3.7...) | May 29 19

The evolution of an IT service desk: SIGUCCS 18

With the objective of “evolving” an information technology (IT) service desk after 35 years under the same management, Ryan Swan sets out to elaborate on the current status of the service desk and the deficiencies, in his view... more

General (K.6.0) | May 23 19

Cyber-physical security and privacy in the electric smart grid

The book presents an interesting selection of papers within the domain of cyber-physical security. It provides a starting point for researchers trying to navigate security and privacy issues within a smart grid. The book... more
Security & Protection (K.6.5) | Jun 14 19

Managing cyber risk in the financial sector

I would classify this book as a buffet of articles, studies, research, and references spanning the spectrum of cyber risk domains across various economies around the world. Just like a buffet, there is a lot of very valuable information packed in here; however, just like... more
Security (K.4.4...) | Jun 12 19

Dynamics and control of DC-DC converters

This book is about designing controllers using simulation and mathematical software packages. It deals with direct current (DC)-to-DC controllers, and develops foundational circuit equations and ways to design such controllers. It provides step-by-step procedures... more
Physical Sciences & Engineering (J.2) | Jun 11 19

Scalable big data analytics for protein bioinformatics

High-performance computing (HPC) refers to the use of large computational resources for solving computationally hard and data-intensive problems. Big data refers to “the exponential growth ... of data, both structured... more
Biology & Genetics (J.3...) | Jun 6 19

Technology for efficient learner support services in distance education

While open and distance learning generates huge revenues for educational institutions in more developed nations, it is quite interesting to know that this phenomenon is also catching on in developing... more
Distance Learning (K.3.1...) | Jun 5 19

Millions, billions, zillions

This book is simultaneously entertaining, instructive (one might say educational), and worrying. After an (important) opening chapter, the author analyzes a statement from Newsweek that the US should tap into the Strategic Petroleum Reserve (SPR), since it holds 660 billion barrels of oil. A rapid rough... more
Mathematics & Statistics (J.2...) | Jun 4 19

Imaginary mathematics for computer science

This interesting book is very easy to read and understand. While the topics are not new, they are explained in lucid terms for anyone who is interested in sophisticated mathematics. My only quarrel concerns the title: the included mathematics is not... more
Mathematics & Statistics (J.2...) | Jun 4 19

A philosophy of software design

I distinctly recall the first class I taught in software design, in 1980. One student from that course is now a computer science (CS) professor and department head at a major college in Tel Aviv. This anecdote, with its dating, is relevant to this book. It is well known that a... more
General (D.0) | Jun 3 19

Mobile big data

Part of Springer’s “Lecture Notes on Data Engineering and Communications Technologies” series, this edited book is divided into four parts. The editors have chosen 13 different topics (chapters) related to big data. Note that there are only general references to the benefits of using big data, but no source that actually... more
General (H.2.0) | May 31 19

Software fault detection and correction

This book addresses the stages of fault detection and fault correction in software engineering from a dynamic perspective, that is, the life cycle of the software product, including maintenance phases or an agile methodology. Software reliability necessitates... more
Testing & Debugging (D.2.5) | May 30 19

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy