

Best Reviews  Notable Books & Articles  "Best of" Archive 









Computing Reviews is happy to bring you the 19th annual list of notable items published in computing—this time for 2014. We reached out to many in the computing community for nominations: our reviewers, CR category editors, the editors in chief of journals we cover, and computer scientists in both industry and academia. In addition, we included proceedings papers that were recognized as "Best Papers" at their respective conferences, as well as the most downloaded journal papers from some of the top journals covered in CR.
Read more about our selection process.
All reviews with the symbol are freely available on the site. Download the full list as a PDF.






Notable Books and Articles in Computing of 2014 



A. General Literature
Downey, R. (Ed.) Turing's legacy: developments from Turing's ideas in logic. Cambridge University Press.
Hodges A. Alan Turing: the enigma. Princeton University Press.
Review
Isaacson W. The innovators: how a group of hackers, geniuses, and geeks created the digital revolution. Simon & Schuster.
Munroe, R. What if?: Serious scientific answers to absurd hypothetical questions. Houghton Mifflin Harcourt.
B. Hardware
Poza M.; Domínguez C.; Heras J.; Rubio J. A certified reduction strategy for homological image processing. ACM Transactions on Computational Logic 15, 3 (July 2014), Article No. 23.
Review
C. Computer Systems Organization
Andrews, J. G.; Buzzi, S.; Choi, W.; Hanly, S. V.; Lozano, A.; Soong, A. C. K.; Zhang, J. C. What will 5G be? IEEE Journal on Selected Areas in Communications 32, 6 (June 2014), 10651082.
Bahga A.; Madisetti V. Cloud computing: a handson approach. CreateSpace Independent Publishing Platform.
Farooqia, M. Z.; Tabassuma, S. M.; Rehmania, M. H.; Saleem, Y. A survey on network coding: from traditional wireless networks to emerging cognitive radio networks. Journal of Network and Computer Applications. 46 (Nov. 2014), 66181.
Liu E.; Theodoropoulos G. Spacetime matching algorithms for interest management in distributed virtual environments. ACM Transactions on Modeling and Computer Simulation 24, 3 (May 2014), Article No. 15.
Review
Srikant R.; Ying L. Communication networks: an optimization, control and stochastic networks perspective. Cambridge University Press.
Walton N. Concave switching in single and multihop networks. ACM SIGMETRICS Performance Evaluation Review 42, 1 (June 2014), 139151.
Yang G. Body sensor networks (2nd ed.). Springer Publishing Company, Incorporated.
Review
Zamir R. Lattice coding for signals and networks: a structured coding approach to quantization, modulation, and multiuser information theory. Cambridge University Press.
D. Software
Barnes J. Programming in Ada 2012. Cambridge University Press.
Baumann A.; Peinado M.; Hunt G. Shielding applications from an untrusted cloud with Haven. In Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation (OSDI 2014), USENIX Association, 2014, 267283.
Review
CruzFilipe L.; Lanese I.; Martins F.; Ravara A.; Thudichum Vasconcelos V. The streambased servicecentred calculus: a foundation for serviceoriented programming. Formal Aspects of Computing 26, 5 (September 2014), 865918.
Review
de Lara J.; Guerra E.; Cuadrado J. When and how to use multilevel modelling. ACM Transactions on Software Engineering and Methodology 24, 2 (December 2014), Article No. 12.
Dobrescu M.; Argyraki K. Software dataplane verification. In Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation (NSDI 2014), USENIX Association, 2014, 101114.
Doncaster P. The UX fivesecond rules: guidelines for user experience design’s simplest testing technique. Morgan Kaufmann Publishers Inc.
Review
Drebes A.; Heydemann K.; Drach N.; Pop A.; Cohen A. Topologyaware and dependenceaware scheduling and memory allocation for taskparallel languages. ACM Transactions on Architecture and Code Optimization 11, 3 (July 2014), Article No. 30.
Gonzalez T.; DiazHerrera J.; Tucker A. Computing handbook: computer science and software engineering (3rd ed.). Chapman & Hall/CRC.
Hudson S. JavaScript creativity: exploring the modern capabilities of JavaScript and HTML5. Apress.
Review
Lopes C. Exercises in programming style. Chapman & Hall/CRC.
Review1
Review2
Review3
Meyer B. Agile!: The good, the hype and the ugly. Springer Publishing Company, Incorporated.
Review
Zieliska E.; Mazurczyk W.; Szczypiorski K. Trends in steganography. Communications of the ACM 57, 3 (March 2014), 8695.
E. Data
Brakerski Z.; Gentry C.; Vaikuntanathan V. (Leveled) fully homomorphic encryption without bootstrapping. ACM Transactions on Computation Theory 6, 3 (July 2014), Article No. 13.
Kamp P. Please put OpenSSL out of its misery. Queue 12, 3 (March 2014), 2023.
Lima, M. The book of trees: visualizing branches of knowledge. Princeton Architectural Press.
F. Theory of Computation
Cook J.; Etesami O.; Miller R.; Trevisan L. On the oneway function candidate proposed by Goldreich. ACM Transactions on Computation Theory 6, 3 (July 2014), Article No. 14.
Emek Y.; Feldman M.; Gamzu I.; PaesLeme R.; Tennenholtz M. Signaling schemes for revenue maximization. ACM Transactions on Economics and Computation 2, 2 (June 2014), Article No. 5.
Lee Y.; Sidford A. Path finding methods for linear programming: solving linear programs in Õ(√rank) iterations and faster algorithms for maximum flow. In Proceedings of the 2014 IEEE 55th Annual Symposium on Foundations of Computer Science (FOCS 2014), IEEE Computer Society, 2014, 424433.
Rothvoss T. The matching polytope has exponential extension complexity. In Proceedings of the 46th Annual ACM Symposium on Theory of Computing (STOC 2014), ACM, 2014, 263272.
Valiant G.; Valiant P. An automatic inequality prover and instance optimal identity testing. In Proceedings of the 2014 IEEE 55th Annual Symposium on Foundations of Computer Science (FOCS 2014), IEEE Computer Society, 2014, 5160.
G. Mathematics of Computing
Figuera C.; BarqueroPérez Ó.; RojoÁlvarez J.; MartínezRamón M.; GuerreroCurieses A.; Caamaño A. Spectrally adapted Mercer kernels for support vector nonuniform interpolation. Signal Processing 94 (January 2014), 421433.
Review
Grigoryeva, L.; Henriques, J.; Larger, L.; Ortega, J.P. Stochastic nonlinear time series forecasting using timedelay reservoir computers: performance and universality. Neural Networks 55 (July 2014), 5971.
Guo R.; Xu Y. Efficient solvers of discontinuous Galerkin discretization for the CahnHilliard equations. Journal of Scientific Computing 58, 2 (February 2014), 380408.
Perotto S.; Veneziani A. Coupled model and grid adaptivity in hierarchical reduction of elliptic problems. Journal of Scientific Computing 60, 3 (September 2014), 505536.
Ye, Y. Efficiency of the simplex and policyiteration methods for Markov decision processes. In Proc. of the SIAM Conference on Optimization, SIAM, 2014.
Zhang, G.; Shen, Y. Exponential synchronization of delayed memristorbased chaotic neural networks via periodically intermittent control. Neural Networks 55 (July 2014), 110.
H. Information Systems
Ameloot T.; Ketsman B.; Neven F.; Zinn D. Weaker forms of monotonicity for declarative networking: a more finegrained answer to the calmconjecture. In Proceedings of the 33rd ACM SIGMODSIGACTSIGART Symposium on Principles of Database Systems (PODS 2014), ACM, 2014, 6475.
Chen, C. L. P.; Zhang, C.Y. Dataintensive applications, challenges, techniques and technologies: a survey on big data. Information Sciences 275 (Aug. 2014), 314347.
Ellis B. Realtime analytics: techniques to analyze and visualize streaming data. Wiley Publishing.
Ghinea G.; Timmerer C.; Lin W.; Gulliver S. Mulsemedia: state of the art, perspectives, and challenges. ACM Transactions on Multimedia Computing, Communications, and Applications 11, 1s (September 2014), Article No. 17.
Giannakopoulos T.; Pikrakis A. Introduction to audio analysis: a MATLAB approach. Academic Press, Inc.
Review
Hara K.; Sun J.; Moore R.; Jacobs D.; Froehlich J. Tohme: detecting curb ramps in Google street view using crowdsourcing, computer vision, and machine learning. In Proceedings of the 27th Annual ACM Symposium on User Interface Software and Technology (UIST 2014), ACM, 2014, 189204.


H. Information Systems (Cont'd.)
Hu, H.; Wen, Y.; Chua, T.S.; Li, X. Toward scalable systems for big data analytics: a technology tutorial. IEEE Access 2 (June 2014), 652687.
Kambatla, K.; Kollias, G.; Kumar, V.; Grama, A. Trends in big data analytics. Journal of Parallel and Distributed Computing 74, 7 (July 2014), 25613573.
Krempl G.; Žliobaite I.; Brzeziski D.; Hüllermeier E.; Last M.; Lemaire V.; Noack T.; Shaker A.; Sievi S.; Spiliopoulou M.; Stefanowski J. Open challenges for data stream mining research. ACM SIGKDD Explorations Newsletter 16, 1 (June 2014), 110.
Li A.; Ahmed A.; Ravi S.; Smola A. Reducing the sampling complexity of topic models. In Proceedings of the 20th ACM SIGKDD international conference (Knowledge discovery and data mining), ACM, 2014, 891900.
Mitzenmacher M.; Pagh R.; Pham N. Efficient estimation for high similarities using odd sketches. In Proceedings of the 23rd International Conference on the World Wide Web (WWW 2014), ACM, 2014, 109118.
MĂ¶ller S.; Raake A. Quality of experience: advanced concepts, applications and methods. Springer Publishing Company, Incorporated.
Review
Nahin A.; Alam J.; Mahmud H.; Hasan K. Identifying emotion by keystroke dynamics and text pattern analysis. Behaviour & Information Technology 33, 9 (September 2014), 987996.
Olson J.; Kellogg W. Ways of knowing in HCI. Springer International Publishing.
Ottaviano G.; Venturini R. Partitioned EliasFano indexes. In Proceedings of the 37th International ACM SIGIR Conference on Research & Development in Information Retrieval (SIGIR 2014), ACM, 2014, 273282.
Rudder C. Dataclysm: who we are (when we think no one’s looking). Crown Publishing Group.
Review
Song W.; Liu Y.; Li J. Mining high utility itemsets by dynamically pruning the tree structure. Applied Intelligence 40, 1 (January 2014), 2943.
Tew C.; GiraudCarrier C.; Tanner K.; Burton S. Behaviorbased clustering and analysis of interestingness measures for association rule mining. Data Mining and Knowledge Discovery 28, 4 (July 2014), 10041045.
Review
Walmsley W.; Snelgrove W.; Truong K. Disambiguation of imprecise input with onedimensional rotational text entry. ACM Transactions on ComputerHuman Interaction 21, 1 (February 2014), Article No. 4.
Wu X.; Zhu X.; Wu G.; Ding W. Data mining with big data. IEEE Transactions on Knowledge and Data Engineering 26, 1 (January 2014), 97107.
Zhang C.; Kumar A.; Ré C. Materialization optimizations for feature selection workloads. In Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data (SIGMOD 2014), ACM, 2014, 265276.
I. Computing Methodologies
Bareinboim, E.; Tian, J.; Pearl, J. Recovering from selection bias in causal and statistical inference. In Proc. of the 28th AAAI Conference on Artificial Intelligence, AAAI, 2014, 24102416.
Beer R. The cognitive domain of a glider in the game of life. Artificial Life 20, 2 (May 2014), 183206.
Chandraker M. What camera motion reveals about shape with unknown BRDF. In Proceedings of the 2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2014), IEEE Computer Society, 2014, 21792186.
Charlesworth A. The comprehensibility theorem and the foundations of artificial intelligence. Minds and Machines 24, 4 (November 2014), 439476.
Davis A.; Rubinstein M.; Wadhwa N.; Mysore G.; Durand F.; Freeman W. The visual microphone: passive recovery of sound from video. ACM Transactions on Graphics 33, 4 (July 2014), Article No. 79.
Howard G.; Bull L.; de Lacy Costello B.; Gale E.; Adamatzky A. Evolving spiking networks with variable resistive memories. Evolutionary Computation 22, 1 (May 2014), 79103.
Ikeuchi, K. (Ed.) Computer vision: a reference guide. Springer.
Khushaba, R. N.; Takruri, M.; Miro, J. V.; Kodagoda, S. Towards limb position invariant myoelectric pattern recognition using timedependent spectral features. Neural Networks 55 (July 2014), 4258.
Liberti, L.; Lavor, C.; Maculan, N.; Mucherino, A. Euclidean distance geometry and applications. SIAM Review 56, 1 (Feb. 2014), 369.
Partridge D. What makes you clever: the puzzle of intelligence. World Scientific Publishing Co, Inc.
Review
Ridel B.; Reuter P.; Laviole J.; Mellado N.; Couture N.; Granier X. The revealing flashlight: interactive spatial augmented reality for detail exploration of cultural heritage artifacts. Journal on Computing and Cultural Heritage 7, 2 (June 2014), Article No. 6.
Riolo R.; Moore J.; Kotanchek M. (Eds.) Genetic programming theory and practice XI. Springer Publishing Company, Incorporated.
Tang, J.; Meng, Z.; Nguyen, X.; Mei, Q.; Zhang, M. Understanding the limiting factors of topic modeling via posterior contraction analysis. In Proc. of the 31st International Conference on Machine Learning, JMLR: Workshop and Conference Proceedings, 2014, 190198.
Zhu, F.; Wang, Y.; Xiang, S.; Fan, B.; Pan, C. Structured sparse method for hyperspectral unmixing. ISPRS Journal of Photogrammetry and Remote Sensing 88 (Feb. 2014), 101118.
J. Computer Applications
Carter, K. Actionable intelligence: a guide to delivering business results with big data fast!. Wiley.
Chierichetti F.; Kleinberg J.; Panconesi A. How to schedule a cascade in an arbitrary graph. SIAM Journal of Computing 43, 6 (2014), 19061920.
Kavelar A.; Zambanini S.; Kampel M. Reading the legends of Roman Republican coins. Journal on Computing and Cultural Heritage 7, 1 (February 2014), 120.
Lepp A.; Barkley J.; Karpinski A. The relationship between cell phone use, academic performance, anxiety, and satisfaction with life in college students. Computers in Human Behavior 31 (February 2014), 343350.
Lyon E.; Knapp R.; Ouzounian G. Compositional and performance mapping in computer chamber music: a case study. Computer Music Journal 38, 3 (November 2014), 6475.
MaillĂ© P.; Tuffin B. Telecommunication network economics: from theory to applications. Cambridge University Press.
Robichau B. Healthcare information privacy and security: regulatory compliance and data security in the age of electronic health records. Apress.
Review
Stubbs, E. Big data, big innovation: enabling competitive differentiation through business analytics. Wiley.
von der Linden W.; Dose V.; von Toussaint U. Bayesian probability theory: applications in the physical sciences. Cambridge University Press.
Review
K. Computing Milieux
Berghel, H. The future of digital money laundering. Computer 47, 8 (Aug. 2014), 7075.
Embar M.; Louis F I.; Wesselman W. Printer watermark obfuscation. In Proceedings of the 3rd Annual Conference on Research in Information Technology (RIIT 2014), ACM, 2014, 1520.
Greenwald G. No place to hide: Edward Snowden, the NSA, and the US surveillance state. Metropolitan Books.
Zetter K. Countdown to zero day: Stuxnet and the launch of the world’s first digital weapon. Crown Publishing Group.
Review





