Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
July 24, 2014
Search
Highlight

Cowboys, ankle sprains, and keepers of quality: How is video game development different from software development?
Occasionally, when reviewing a really bad paper, I will point out that its only redeeming value is that it can be used as a bad example in a research methods class. So, to be fair, when a really good paper comes along... more
Quote
Forget Moore’s law, but not because it’s merely a commitment by the semiconductor industry to drive silicon gate technology forward 67 percent a year... more
- Michael S. Malone (2002)
Articles
The adoption of software measures: a technology acceptance model (TAM) perspective: Information and Management

Wallace and Sheetz present their research to explain and predict who will adopt and begin to use a software measure utilizing an extension of the... more

Software Management (K.6.3) | Jul 23 14

Mobile data offloading: a host-based distributed mobility management approach: IEEE Internet Computing

The advancement of smartphones and tablets, combined with recent upgrades to the cellular infrastructure, has paved the way for an explosion of mobile Internet traffic. Video traffic in... more

Wireless Communication (C.2.1...) | Jul 23 14

Software testing with code-based test generators: Software Quality Journal

This paper is an interesting indictment of the current state of test generators for software programs. The authors provide a very good overview of the available test... more

Testing Tools (D.2.5...) | Jul 23 14

"Bring Your Own Device (BYOD)" for seamless science inquiry in a primary school: Computers & Education

No one should be surprised to find that students learn more in an environment rich with engagement, interaction, and additional resources. That’s... more

Computer Uses In Education (K.3.1) | Jul 22 14

Designing green network architectures using the ten commandments for a mature ecosystem: Computer Communications

Drouant et al. clarify from the beginning of the paper that their goal is to check if philosophical concepts from ecology make sense when considering a... more

Network Architecture & Design (C.2.1) | Jul 22 14

Improving Colorwave with the probabilistic approach for reader-to-reader anti-collision TDMA protocols: Wireless Networks

Colorwave is a time division multiple access (TDMA) approach for collision resolution among radio frequency identification (RFID)... more

Network Protocols (C.2.2) | Jul 22 14

Firewall placement in cloud data centers: SOCC 13

This paper addresses the question of how many firewalls are required to secure data flows between an arbitrary number of virtual machines in a data center. While the problem is both relevant and timely... more

Cloud computing (C.2.4...) | Jul 21 14

Compressed matrix multiplication: ACM Transactions on Computation Theory

This paper is concerned with approximating a matrix product, that is, finding the large entries (AB){i,j} [and the corresponding indices (i,j)] from A and B... more

Hash-Table Representations (E.2...) | Jul 18 14

Why teachers use digital learning materials: The role of self-efficacy, subjective norm and attitude: Education and Information Technologies

This paper examines why teachers use digital learning materials (DLMs) in their teaching activities, with the ultimate goal of... more

Computer Uses in Education (K.3.1) | Jul 18 14

Anonymous and distributed community cyberincident detection: IEEE Security and Privacy

Countering cyberattacks on specific communities requires community cooperation. The success of community cooperation depends on an... more

Privacy (K.4.1...) | Jul 17 14

Books
Introduction to computational science: modeling and simulation for the sciences (2nd ed.)

This book’s table of contents has, perhaps through style, organization, and its own expressiveness, a motivational quality that prevails over its conceivably intimidating display of the book’s... more
General (I.6.0) | Jul 24 14

Cloud storage forensics

Cloud computing is quickly becoming a significant utility in our lives, not unlike water, electricity, and gas. It has numerous advantages, such as cloud storage, which allows a great deal of data to be recorded, stored, and processed for research and business... more
Cloud Computing (C.2.4...) | Jul 23 14

Learn Java for Android development (3rd ed.)

Current academic curricula for computer science programs across the US focus on traditional subjects and adhere to official guidelines for programming, theory, and project development. In many... more
Object-Oriented Programming (D.1.5) | Jul 23 14

Computational intelligence in digital forensics: forensic investigation and applications

This edited book introduces the reader to various aspects of digital forensics and digital investigation techniques. The introduction chapter, the only chapter in Section 1, sets the scene for the book... more
Abuse & Crime Involving Comp. (K.4.1...) | Jul 23 14

Computer organization and design: the hardware/software interface (5th ed.)

With the advent of the post-personal computer (PC) era, computing systems have been evolving from traditional desktop computers to cloud-based mobile devices. Energy and reliability concepts gain... more
General (C.0) | Jul 22 14

Guide to OSI and TCP/IP models

Teaching networking basics to beginners is by no means an easy task, especially when it comes to abstract models such as OSI and TCP/IP. Fortunately, I must compliment the author of this book on a... more
Data Communications (C.2.0...) | Jul 22 14

Security and privacy in mobile social networks

Security and privacy are two important issues in social networks. With the expansion of mobile devices, such as smartphones, access to social networks has become almost constant. This convergence of... more
Wireless Communication (C.2.1...) | Jul 21 14

Cloud storage forensics

In recent years, there has been rapid growth in the take up of cloud services, from simple personal use of cloud storage to significant cloud service uptake by large organizations. Like everyone else... more
Cloud Computing (C.2.4...) | Jul 21 14

Distributed graph coloring: fundamentals and recent developments

Distributed computing has been an active area of research for a few decades now; we have witnessed significant advances in the principles of distributed computing and the design and analysis of... more
Graph Theory (G.2.2) | Jul 21 14

Advanced SOA tools and applications

Service-oriented architecture (SOA) is a very popular computing model for distributed applications that should meet certain requirements in terms of reusability, composability, scalability, and performance. All application areas can benefit... more
Software Architectures (D.2.11) | Jul 21 14


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2014 ThinkLoud, Inc.
Terms of Use
| Privacy Policy