Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Best of 2013 Recommended by Editor Recommended by Reviewer Recommended by Reader
Search


These reviews have been chosen by the editors to be highlighted.
Options:
Year:
1-10 of 29 results Date
Cowboys, ankle sprains, and keepers of quality: How is video game development different from software development?
Murphy-Hill E., Zimmermann T., Nagappan N.  ICSE 2014 (Proceedings of the 36th International Conference on Software Engineering, Hyderabad, India,  May 31-Jun 7, 2014) 1-11, 2014. Type: Proceedings

Occasionally, when reviewing a really bad paper, I will point out that its only redeeming value is that it can be used as a bad example in a research methods class. So, to be fair, when a really good paper comes along, I should point out that it...

Jul 21 2014
Unsupervised information extraction by text segmentation
Cortez E., da Silva A.,  Springer Publishing Company, Incorporated, New York, NY, 2013. 124 pp. Type: Book (978-3-319025-96-4)

The typical result from a web search is still a ranked list of documents that may contain the information you’re looking for, but it is up to the user to actually extract the sought-after information. In order for search engines to actually ...

Jul 14 2014
Data science for business: what you need to know about data mining and data-analytic thinking
Provost F., Fawcett T.,  O’Reilly Media, Inc., Sebastopol, CA, 2013. 414 pp. Type: Book (978-1-449361-32-7)

As Hal Varian, Google’s renowned chief economist, says,...

Jul 7 2014
FireDroid: hardening security in almost-stock Android
Russello G., Jimenez A., Naderi H., van der Mark W.  ACSAC 2013 (Proceedings of the 29th Annual Computer Security Applications Conference, New Orleans, LA,  Dec 9-13, 2013) 319-328, 2013. Type: Proceedings

This paper proposes a policy-based framework to enforce security policies by intercepting system calls to the Linux kernel beneath the Android operating system (OS). By using this approach it is possible to detect security breaches by third-party ...

Jun 30 2014
Quantum information theory
Wilde M.,  Cambridge University Press, New York, NY, 2013. 669 pp. Type: Book (978-1-107034-25-9)

Information theory is a well-known field of study that in no small measure underlies the modern revolution in communication technologies. It famously grew out of Shannon’s singular 1948 paper [1] that established the core principles and...

Jun 23 2014
Walter Gautschi: selected works with commentaries (3 vols.)
Brezinski C., Sameh A.,  Springer, New York, NY, 2014. 669 pp. Type: Book (978-1-461470-33-5)

Walter Gautschi is one of the leading numerical analysts of the second half of the 20th and the beginning of the 21st century. He has contributed to almost all areas of numerical analysis, and many of his results have proven to be highly...

Jun 16 2014
Targeted cyberattacks: a superset of advanced persistent threats
Sood A., Enbody R.  IEEE Security and Privacy 11(1): 54-61, 2013. Type: Article

Insight into the many threats that lurk in our software is presented in this paper. It also provides a useful introduction to the state of the art of malware. It will be especially useful for those doing research on malware or for practitioners...

Jun 9 2014
CopyCatch: stopping group attacks by spotting lockstep behavior in social networks
Beutel A., Xu W., Guruswami V., Palow C., Faloutsos C.  WWW 2013 (Proceedings of the 22nd International World Wide Web Conference, Rio de Janeiro, Brazil,  May 13-17, 2013) 119-130, 2013. Type: Proceedings

In Web 2.0, the content is no longer static, but rather dynamically user generated. In this universe, the more interaction a product page or user profile gets, the greater the potential profits an individual or company may achieve with...

Jun 2 2014
The handbook of personal area networking technologies and protocols
Gratton D.,  Cambridge University Press, New York, NY, 2013. 411 pp. Type: Book (978-0-521197-26-7)

Only a decade or so ago, having a Bluetooth headset connected to your mobile phone made you stand out from the crowd. Now, newer and evolving technologies are making the interconnection of mobile electronic devices ubiquitous. We’ve all...

May 27 2014
A surrogate competition approach to enhancing game-based learning
Chen Z., Chen S.  ACM Transactions on Computer-Human Interaction 20(6): 1-24, 2013. Type: Article

This interesting paper clearly describes how the surrogate competition model in game-based learning can lead to a more relaxed and effective student interaction. Using the My-Pet-My-Arena game for learning Chinese, the authors examine and...

May 19 2014
 
Display per page
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2014 ThinkLoud, Inc.
Terms of Use
| Privacy Policy