Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
October 24, 2016

Safeguarding users’ sensitive data in the cloud and the browser
In this 54-minute video presentation, Brad Karp of University College London talks about “safeguarding users’ sensitive data in the cloud and the browser.” The title is very inviting to those who want to know how to protect sensitive data. Today, the use of cloud services... more
Artificial life’s practical implications are no less sweeping than its scientific implications. It can guide how we use new technologies for extending life and creating... more
- M. Bedau et al (2000)
On BLAS level-3 implementations of common solvers for (quasi-) triangular generalized Lyapunov equations: ACM Transactions on Mathematical Software

Each of the generalized Lyapunov matrix equations can be seen simply as a system of linear equations in the elements of the unknown matrix X. For... more

Numerical Linear Algebra (G.1.3) | Oct 20 16

A high performance QDWH-SVD solver using hardware accelerators: ACM Transactions on Mathematical Software

To make effective use of modern computer hardware, algorithms have to be carefully designed with concurrency in mind: in particular... more

Mathematical Software (G.4) | Oct 20 16

A vision for heart rate health through wearables: UbiComp 16

Mobile health (mHealth) is an increasingly important area of biomedical informatics that is focused on the use of wearable sensors, such as those found in smartphones, to monitor health. This is an... more

Miscellaneous (H.5.m) | Oct 19 16

Developing a comprehensive engagement framework of gamification for reflective learning: DIS 16

Gamification is still one of the great hypes of recent years. Unfortunately, studies that really show positive effects are rare, especially in the area of teaching. The authors propose a new framework... more

Miscellaneous (H.5.m) | Oct 18 16

Rethinking technology on the boundaries of life and work: Personal and Ubiquitous Computing

How can technology better control the boundaries between work and life? The transition between work and life has become seamless because of ubiquitous computing, since... more

Miscellaneous (K.4.m) | Oct 18 16

Algorithms for interactive learning: YouTube

In this 45-minute talk at the University of Southern California, Dasgupta looks at the progress of supervised learning over the years and poses a question about how supervised learning algorithms and... more

Learning (I.2.6) | Oct 14 16

Survey: Live migration and disaster recovery over long-distance networks: ACM Computing Surveys

Live migration (LM) is dealt with in this paper as a one-time task or function, performed by moving a virtual machine from one physical machine to another, located in the same or a different... more

Distributed Systems (C.2.4) | Oct 12 16

After death: big data and the promise of resurrection by proxy: CHI EA 16

This interesting research paper touches on the consequences of personal data shared online, a sensitive yet largely unexplored area. For example, there is the possibility that massive personal data... more

General (H.4.0) | Oct 12 16

Novelty detection in data streams: Artificial Intelligence Review

Novelty detection, an important topic in machine learning, is the ability of a classification system to differentiate between known and unknown objects in a pattern... more

Learning (I.2.6) | Oct 12 16

An architecture to implement the Internet-of-Things using the Prometheus methodology: Int. Journal of Distributed Systems & Technologies

The Prometheus methodology is a set of detailed processes of specifying, designing, implementing, and testing agent-oriented software systems. An... more

Distributed Applications (C.2.4...) | Oct 11 16

OSS reliability measurement and assessment

Free and open-source software (FOSS) projects are often a source of great expectation and acceptance amongst their users. An attempt is made here to explore whether reliability aspects of open... more
Metrics (D.2.8) | Oct 24 16

Debugging game history

Game history has not, according to the editors of this book, emerged from the era of chronicles. This is not necessarily a bad thing. The editors go on to say: “Chronicles have many good qualities. They establish essential chronologies, and their writers often... more
Games (K.8.0...) | Oct 21 16

Graph and model transformation: general framework and applications

In recent years, graph applications have attracted much attention in computer science and several other research fields. The book Graph and model transformation is written from a mathematical... more
Spec., Verif. & Reas. about Prog. (F.3.1) | Oct 20 16

Computer science: an interdisciplinary approach

Sedgewick and Wayne’s book is a systematic treatise on the fundamentals of computer science. At a high level, the book covers the basics, object-oriented programming, algorithms, and plenty of theory. It is geared... more
Object-Oriented Programming (D.1.5) | Oct 20 16

Virtualized cloud data center networks: issues in resource management

The replacement of “real” information and communications technology infrastructure with cloud-based services perhaps reaches its pinnacle in the multitenant cloud data center. The value... more
Distributed Systems (C.2.4) | Oct 20 16

Learning JavaScript: JavaScript essentials for modern application development (3rd ed.)

The JavaScript language was born a chimera. Fortunately, it was born to a web browser, which let JavaScript spread much further and faster than its virtues otherwise suggested. Nevertheless... more
Object-Oriented Programming (D.1.5) | Oct 20 16

US power and the Internet in international relations: the irony of the information age

As the title points out, the author emphasizes throughout the book how the power of the Internet is useful in international relations and how the US wants to shape that growth... more
Organizational Impacts (K.4.3) | Oct 19 16

Edmund Berkeley and the social responsibility of computer professionals

This is a biography. It’s about a computing person you likely have never heard of. But like him or loathe him or don’t care about him, he is probably one of the most visible and intriguing... more
Edmund C. Berkeley (K.2...) | Oct 19 16

Retrogame archeology: exploring old computer games

The recent announcement (September 2016) by Nintendo regarding advances in the production of flash memory was timely information while working on this review, which takes a look at old computer... more
Games (K.8.0...) | Oct 19 16

Learning and teaching mathematics in the global village: math education in the digital age

Readers who follow my reviews are aware that I seldom wax poetic. This book is one of the very best to address what teaching and learning mathematics should be in the age of connected technology. It... more
Computer Uses in Education (K.3.1) | Oct 19 16

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2016 ThinkLoud, Inc.
Terms of Use
| Privacy Policy