Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
June 27, 2016

Predictive analytics: the power to predict who will click, buy, lie, or die (2nd ed.)
A wise man (reportedly Yogi Berra, but more likely a legislator in the Danish parliament) once observed, “Prediction is difficult, especially of the future.” In spite of the challenge, humanity’s oldest written records attest the demand for tools for prognostication. Today’s... more
Only children keep their eyes open. The only thing they have got is sense; they have highly developed “input systems,” admitting all data indiscriminately... more
- Annie Dillard (1978)
Cloud-assisted industrial cyber-physical systems: Microprocessors & Microsystems

Industry 4.0 is being dubbed the next generation in the manufacturing world. The cloud computing model has introduced so much potential to present... more

Cloud computing (C.2.4...) | Jun 27 16

Toward cluster-based weighted compressive data aggregation in wireless sensor networks: Ad Hoc Networks

It seems surprising that so many users of remote sensing (including wireless networks) have yet to hear the 10-year-old... more

Sensor Networks (C.2.1...) | Jun 27 16

Bruce Schneier on security and privacy in the world-sized web: YouTube

Bruce Schneier presented a talk about security and privacy in the world-sized web at Harvard University’s Berkman Center on February 16, 2016. This hour-long presentation included questions and... more

Privacy (K.4.1...) | Jun 27 16

Algorithm 957: evaluation of the repeated integral of the coerror function by half-range Gauss-Hermite quadrature: ACM Transactions on Mathematical Software

The accurate evaluation of the repeated integrals of the coerror function defined as .... The usual method for evaluating this function is based on three... more

Quad. & Numerical Differentiation (G.1.4) | Jun 24 16

Modelling energy consumption of network transfers and virtual machine migration: Future Generation Computer Systems

The energy consumption of data centers is known to be a critical issue for both costs and environmental impact. Several... more

Model Development (I.6.5) | Jun 23 16

Residual energy-based adaptive data collection approach for periodic sensor networks: Ad Hoc Networks

Wireless sensor networks (WSNs) are a key technology in the big data age. Deployed sensors, equipped with wireless communication... more

Sensor Networks (C.2.1...) | Jun 23 16

Modeling, profiling, and debugging the energy consumption of mobile devices: ACM Computing Surveys

Because mobile devices, like smartphones, are usually powered with small-size batteries that have limited capacity and life, hardware engineers need... more

Performance of Systems (C.4) | Jun 23 16

Protecting software through obfuscation: Can it keep pace with progress in code analysis?: ACM Computing Surveys

Software obfuscation is an attempt to hide the real intent of a piece of software. The first obfuscated malware appeared in 1986, and sophistication... more

Protection Mechanisms (D.2.0...) | Jun 22 16

A language-independent proof system for full program equivalence: Formal Aspects of Computing

The authors consider proving two programs “fully equivalent” (that is, either both do not terminate or both terminate with the same value). Both compute the Collatz sequence starting... more

Correctness Proofs (D.2.4...) | Jun 21 16

Protocol-based verification of message-passing parallel programs: OOPSLA 15

The message-passing interface (MPI) is a parallel computation standard that is widely used, especially in scientific computing. Parallel computation... more

Concurrent Programming (D.1.3) | Jun 21 16

MPEG-V: bridging the virtual and real world

Virtual and augmented reality, such as multiple sensorial media and programmable actuators, has become widespread in recent years. From a technological side, this opens a new spectrum of opportunities at the... more
Data Compaction & Compression (E.4...) | Jun 23 16

Learn Excel 2016 for OS X

The current version of Excel comes with so many bells and whistles that it’s really difficult, if not impossible, to claim that one knows it fully. This book covers only the most common and basic features of the... more
Excel (H.4.1...) | Jun 22 16

A guide to graph colouring: algorithms and applications

Graph coloring is an active field of research that poses many theoretical challenges and has lots of applications in practice. Numerous problems in graph coloring are quite easy to state, but very... more
Graph Algorithms (G.2.2...) | Jun 22 16

Murach’s jQuery (2nd ed.)

A problem with creating, editing, and maintaining webpages is that the complexity of such pages is continually increasing, and basic knowledge of Hypertext Markup Language (HTML), cascading style sheets (CSS), and JavaScript alone is insufficient for creating... more
JavaScript (D.3.2...) | Jun 22 16

Algebraic coding theory: revised edition

Algebraic coding theory has its roots in mathematics and applications in computer science, and its origins in electrical engineering. I was unaware of the area back in 1993, when I joined the PhD program... more
Coding & Information Theory (E.4) | Jun 22 16

Web programming with PHP and MySQL

Web programming with PHP and MySQL fulfills the promise of its subtitle: a practical guide. The writing is friendly and clear, with the author indicating when every alternative to a command is not given and making suggestions on when it is necessary... more
General (D.1.0) | Jun 21 16

Introduction to React

React is Facebook’s library for creating complex responsive user interfaces in JavaScript. I came to this book with some knowledge of what to expect. I have used the ClojureScript Reagent and... more
Object-Oriented Programming (D.1.5) | Jun 20 16

Designing the requirements

Effectively designing large-scale business information technology (IT) applications calls for several talents--functional understanding of what needs to be accomplished, ability to split large development efforts into more manageable projects, and ensuring... more
Requirements/Specifications (D.2.1) | Jun 20 16

CSA guide to cloud computing: implementing cloud privacy and security

The Cloud Security Alliance (CSA) is the leading not-for-profit organization in cloud security, which is evident in the body of research they have produced over the years. This book, written by three... more
Cloud Computing (C.2.4...) | Jun 20 16

Foundations of software and system performance engineering

Andre B. Bondi, the author, has a background in mathematics and statistics, as well as many years of experience in network management. Thus, it is not surprising that his view on system... more
Performance of Systems (C.4) | Jun 20 16

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2016 ThinkLoud, Inc.
Terms of Use
| Privacy Policy