Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
September 21, 2014
Search
Highlight

The incremental commitment spiral model
This book is chock-full of accumulated knowledge, collective wisdom, and engineering best practices about what makes systems development successful. The incremental commitment spiral model (ICSM) extends and uses Boehm’s earlier conceptualization of software development as a spiral [1]. A key strength of the... more
Quote
As computing becomes exponentially more powerful, it will ... enable more natural interactions... more
- Craig Mundie (2009)
Articles
Semantic security against web application attacks: Information Sciences: an International Journal

Security concerns are progressively increasing with the unstoppable penetration of technology in everyday life, as the world becomes ever more interconnected. Hackers, attracted by lucrative targets... more

Online Information Services (H.3.5) | Sep 19 14

Personalized recommendations of locally interesting venues to tourists via cross-region community matching: ACM Transactions on Intelligent Systems and Technology

A challenging problem is presented in this paper: recommending interesting places to tourists. The authors address the different challenges... more

Information Search & Retrieval (H.3.3) | Sep 19 14

Document clustering method using dimension reduction and support vector clustering to overcome sparseness: Expert Systems with Applications: An International Journal

In this paper, the authors aim to address three problems associated with document clustering: determining the number of clusters... more

Document & Text Processing (I.7) | Sep 19 14

Information centric services in Smart Cities: Journal of Systems and Software

Motivating and describing the use of content-centric networks (CCNs) in the Smart Cities domain are the goals of this paper. In a CCN, users do not... more

Information Search & Retrieval (H.3.3) | Sep 19 14

The impact of advanced analytics and data accuracy on operational performance: a contingent resource based theory (RBT) perspective: Decision Support Systems

This paper describes a study that focuses on advanced analytics and accurate manufacturing data as two primary resources for influencing... more

Types of Systems (H.4.2) | Sep 18 14

Semantic concept-enriched dependence model for medical information retrieval: Journal of Biomedical Informatics

The importance of semantics in search techniques is well known. This is especially true in medical terminologies, where semantics... more

Information Search & Retrieval (H.3.3) | Sep 18 14

A formal systems engineering approach in practice: an experience report: SER&IPs 14

For many years, formal methods have been advertised as being on the verge of practical applications. Therefore, it would be nice to read a report... more

Design Tools & Techniques (D.2.2) | Sep 17 14

Analyzing PHP frameworks for use in a project-based software engineering course: SIGCSE 13

There are many PHP frameworks that can be used to develop web applications. Which one is most suitable for an undergraduate software engineering... more

Reusable Software (D.2.13) | Sep 17 14

The effect of developer-specified explanations for permission requests on smartphone user behavior: CHI 14

The relationship between the smartphone user and the permission requests by applications to access the user space on the smartphone is discussed in this paper. These... more

User Interfaces (H.5.2) | Sep 16 14

Enhancing visitors’ experience in art museums using mobile technologies: Information Systems Frontiers

This paper describes the development of a mobile museum guide. The proposed application incorporates interesting features like automatic positioning... more

Multimedia Information Systems (H.5.1) | Sep 16 14

Books
Beginning Fedora desktop: Fedora 20 edition

This book is an updated version of the author’s previous book on an earlier Fedora release [1]. It is intended for novice to intermediate users who are looking to install Fedora 20 as their primary computing... more
Systems Programs & Utilities (D.4.9) | Sep 19 14

Certified programming with dependent types: a pragmatic introduction to the Coq proof assistant

Chilpala intends, by means of this book, “to convince you that the technology of program verification is mature enough today that it makes sense to use it in a support role in many kinds of research... more
Spec., Ver. & Reas. about Prog. (F.3.1) | Sep 19 14

Mathematical tools for data mining: set theory, partial orders, combinatorics (2nd ed.)

The goal of this book is to present the basic mathematical theory and principles used in data mining tools and techniques. Accordingly, a variety of foundational theoretical concepts... more
Data Mining (H.2.8...) | Sep 18 14

Agile!: The good, the hype and the ugly

The purpose of this excellent book is to “enable readers to benefit from the good ideas in agile methods and stay away from the bad ones.” The author provides both a description and a deep and justified... more
General (D.2.0) | Sep 18 14

Handbook of human computation

The editor-in-chief, Pietro Michelucci, and nine other section editors have compiled research surveys (and written several of them) on human computation (HC), arguably definable as computers outsourcing to humans. There are 80 chapters grouped into... more
Human Information Processing (H.1.2...) | Sep 17 14

Bas van Fraassen’s approach to representation and models in science

The Philosophy of Science Association gives the Hempel Award for lifetime achievement every two years. The most recent recipient was Bas van Fraassen in 2012. This award was the impetus... more
Model Development (I.6.5) | Sep 15 14

R quick syntax reference

Data analysis and statistical computing have become important due to their numerous and ever-increasing applications in business and other areas. R is a widely used programming language suitable for applications involving statistics, data analysis, and data... more
Mathematical Software (G.4) | Sep 12 14

Cyberpatterns: unifying design patterns with security and attack patterns

This is a collection of academic papers. It falls toward the theory end of the theory-practice spectrum. Blackwell and Zhu are major contributors to the work as well as being joint editors. The papers, as a... more
Patterns (D.3.3...) | Sep 11 14

Planning and decision making for aerial robots

The robot intelligence aspect of aerial robots is the core part that allows a robot to reason about the environment and its current status in order to accomplish a required mission. This book... more
Robotics (I.2.9) | Sep 11 14

Molecular communications and nanonetworks: from nature to practical systems

Communication in the context of distributed computation on distributed data structures is one of the brightest frontiers in information processing. Locally, it involves the... more
Data Communications Devices (B.4.1) | Sep 11 14


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2014 ThinkLoud, Inc.
Terms of Use
| Privacy Policy