Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
October 1, 2014
Search
Highlight

Risk: a multidisciplinary introduction
Risk is diverse, diffuse, and multi-faceted; it cannot be addressed assuming fixed event propagation paths from root causes, or within sectorial bounds, as in traditional risk and reliability analysis. Furthermore, the information flow alongside or part of this event propagation carries its own additional risks. These are the multi... more
Quote
Mathematical reasoning may be regarded rather schematically as the exercise of a combination of two faculties... more
- Alan Turing (1939)
Articles
Negotiating autonomy and responsibility in military robots: Ethics and Information Technology

A military robot’s autonomy and responsibility are of concern due to the substantial innovation introduced in real operations of devices that show some... more

Ethics (K.4.1...) | Sep 30 14

Security, cybercrime, and scale: CACM

This article analyzes the traditional threat model for cybersecurity and proposes a new model that considers scalability and financial motivation. In the new threat model, the author splits cybercrime... more

Security & Protection (C.2.0...) | Sep 30 14

Systematic analyses and comparison of development performance and product quality of incremental process and agile process: Information and Software Technology

Agile software development is a well-established process in an industry (and in academia) where humans need to tackle software development... more

Software Development (K.6.3...) | Sep 30 14

Security and privacy protection in visual sensor networks: a survey: ACM Computing Surveys

Visual sensor networks (VSNs) consist of devices with image sensors and with processing and networking capabilities, to monitor large quantities... more

Security & Protection (K.6.5) | Sep 30 14

Testing scientific software: a systematic literature review: Information and Software Technology

A systematic literature review was conducted to identify the difficulties of testing scientific software. A keyword-based search returned more than 6000 hits. Filtering criteria... more

Testing & Debugging (D.2.5) | Sep 26 14

Reward-based radio interface selection of hybrid 4G UMTS and LTE communications for fast cloud accesses: Wireless Personal Communications: An International Journal

The 3rd Generation Partnership Project (3GPP) specifies a hybrid cellular system that includes long-term evolution (LTE) cooperated with the... more

Wireless Communication (C.2.1...) | Sep 26 14

Behavior-based clustering and analysis of interestingness measures for association rule mining: Data Mining and Knowledge Discovery

A thorough survey and detailed account of methods for association rule mining, this paper outlines a new approach to calculate interestingness by... more

Clustering (H.3.3...) | Sep 25 14

Security concepts for the dynamics of autonomous vehicle networks: Automatica (Journal of IFAC)

The basic idea of the paper is to look at whether an attacker who measures vehicle motions locally can estimate the full network’s state. In a double-integrator-network (DIN) model there are... more

Security & Protection (C.2.0...) | Sep 25 14

Visualising a knowledge mapping of information systems investment evaluation: Expert Systems with Applications

Information systems (IS) typically represent a considerable investment for organizations. Failure to properly evaluate an investment in IS can... more

Strategic IS Planning (K.6.1...) | Sep 25 14

Convergence agent model for developing u-healthcare systems: Future Generation Computer Systems

The future use of innovative computing technologies to provide ubiquitous healthcare will radically change the delivery... more

Medical Info. Systems (J.3...) | Sep 25 14

Books
Pragmatic enterprise architecture

Enterprise architecture (EA) is the combination of the analysis, planning, and frameworks necessary to successfully implement strategies for an enterprise. In earlier times, the success of an organization... more
System Management (K.6.4) | Sep 30 14

Introduction to software quality

If you are looking for a good, compact overview of software quality, this book is for you. It is not a textbook for a course, but a concise overview including in chapter 1 a general introduction to the history and state of the art. The book covers many... more
SQA (D.2.9...) | Sep 29 14

Pro AngularJS

AngularJS is an open-source framework, maintained by Google and the community, intended for those who need to build web-based client-side applications. AngularJS is based on the model-view-controller (MVC) pattern, encouraging the decoupling of view and logic, making the source code more maintainable... more
Frameworks (D.3.3...) | Sep 29 14

Beginning JavaScript charts: with jqPlot, d3, and Highcharts

There are many texts and reference books for use with JavaScript, of course. One of the major uses of JavaScript involves web-based and interactive visualizations. This book is quite extensive... more
Mathematical Software (G.4) | Sep 26 14

The economics of information security and privacy

Information security and privacy are political hot buttons, and more so as we become, personally and as a society, increasingly dependent on IT. From Heartland Payment Systems to Target to... more
Security & Protection (K.6.5) | Sep 26 14

Learn Raspberry Pi programming with Python

This book is bizarrely titled. What “learn programming” book has a section called “Bonus: Soldering Techniques,” or contains the sentence, “You’ll need to purchase or rent a tank of helium from a party supply store... more
General (D.1.0) | Sep 26 14

Introduction to evolutionary genomics

Evolutionary genomics is the study of genetic data with the intent to understand two main areas: how closely related are different species or individuals of a species, and how living things evolved... more
Biology & Genetics (J.3...) | Sep 25 14

Secure cloud computing

The increased prevalence of cloud computing has led to fears of more and more damaging cloud security attacks. In the cloud environment, three levels of access have traditionally been defined... more
Cloud Computing (C.2.4...) | Sep 25 14

Cloud computing and digital media

Cloud computing is now a well-known subject. Digital media can also be considered a very clearly defined term. But how is digital media handled using cloud computing technology? This book introduces some digital media processing practices in a cloud... more
Cloud Computing (C.2.4...) | Sep 25 14

Innovative computational intelligence: a rough guide to 134 clever algorithms

Computational intelligence is distinguished from classic algorithmic development because it is based on or inspired by real-world mechanisms as opposed to a mostly pure mathematical or logical analysis... more
App. & Expert Systems (I.2.1) | Sep 25 14


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2014 ThinkLoud, Inc.
Terms of Use
| Privacy Policy