Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Best of 2014 Recommended by Editor Recommended by Reviewer Recommended by Reader

These reviews have been chosen by the editors to be highlighted.
1-10 of 30 results Date
Model emergent dynamics in complex systems
Roberts A.,  SIAM, Philadelphia, PA, 2014. 760 pp. Type: Book (978-1-611973-55-6)

The beginning of the 20th century saw several revolutions in physics, including quantum theory with its strange dualism of waves and particles, relativity with its invocation of nonintuitive geometries, and the intractability of conventional mathe...

Jul 27 2015
iOS 8 for programmers: an app-driven approach with Swift (3rd ed.)
Deitel P., Deitel H., Deitel A.,  Prentice Hall Press, Upper Saddle River, NJ, 2014. 450 pp. Type: Book (978-0-133965-26-1)

Introduced in 2014, the Swift programming language is becoming the language of choice for programming on Apple’s latest mobile operating system, iOS 8. Combined with Cocoa Frameworks and Xcode 6 development tools, it forms a set of leading-e...

Jul 20 2015
TouchCut: fast image and video segmentation using single-touch interaction
Wang T., Han B., Collomosse J.  Computer Vision and Image Understanding 12014-30, 2014. Type: Article

Have you ever used the magic wand tool in Photoshop? If so, it accomplishes 90 percent of the work described in this paper. The only difference is that this work uses finger touch instead of a mouse click, thanks to the prevailing touchscreen tech...

Jul 13 2015
15 fundamentals for higher performance in software development: includes discussions on CMMI, lean Six Sigma, agile and SEMAT’s essence framework
McMahon P.,  PEM Systems, 2014. 336 pp. Type: Book (978-0-990450-83-2)

Readers will find a good bridge between real-world practice and theoretical guidelines and measures for software process improvements for practicing professionals in this book. It begins by highlighting that collectively we fall short of achieving...

Jul 6 2015
An improved clustering ensemble method based link analysis
Hao Z., Wang L., Cai R., Wen W.  World Wide Web 18(2): 185-195, 2015. Type: Article

A method to improve clustering ensembles of datasets, called WETU, is presented in this paper. The current clustering ensemble methods use measurements, such as the weighted connection-triple (WCT), the weighted triple-quality (WTQ), and the combi...

Jun 29 2015
Strategic information disclosure to people with multiple alternatives
Azaria A., Rabinovich Z., Goldman C., Kraus S.  ACM Transactions on Intelligent Systems and Technology (TIST) 5(4): 1-21, 2014. Type: Article

The issue of persuasion games, where one player, the agent, tries to influence the behavior of the other, the user, is considered in this paper. In the cases considered here, the agent is assumed to have knowledge that the user does not. However, ...

Jun 22 2015
Ubuntu unleashed 2015 edition: covering 14.10 and 15.04
Helmke M.,  Sams publishing, Indianapolis, IN, 2014. 912 pp. Type: Book (978-0-672338-37-3)

Linux has become one of the best operating systems within a short period of time. This success is due to many reasons, two of which are related: Linux is open source, and there is a large active community involved in its improvement and maintenanc...

Jun 15 2015
Quantum algorithms via linear algebra: a primer
Lipton R., Regan K.,  The MIT Press, Cambridge, MA, 2014. 208 pp. Type: Book (978-0-262028-39-4)

To most people, the mysterious word “quantum” often means complex mathematics and advanced physics. This introductory book assumes basic linear algebra and no knowledge of quantum mechanics. The authors did an excellent job of introduc...

Jun 8 2015
Data minimisation in communication protocols: a formal analysis framework and application to identity management
Veeningen M., de Weger B., Zannone N.  International Journal of Information Security 13(6): 529-569, 2014. Type: Article

The amount of data exchanged on the Internet is growing every day, outpacing the growth in speed of communication protocols. So to avoid data congestion, solutions are needed quickly: one of them could be data minimization, which consists of trans...

Jun 1 2015
Introduction to modern cryptography (2nd ed.)
Katz J., Lindell Y.,  Chapman & Hall/CRC, Boca Raton, FL, 2014. 603 pp. Type: Book (978-1-466570-26-9)

In contrast to many introductory cryptography texts, this one concentrates on the theory of cryptography: what is in fact meant by security? How can security be measured? What are the conditions under which a cryptosystem (or hash function, or any...

May 26 2015
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2015 ThinkLoud, Inc.
Terms of Use
| Privacy Policy