Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Best of 2013 Recommended by Editor Recommended by Reviewer Recommended by Reader
Search


These reviews have been chosen by the editors to be highlighted.
Options:
Year:
1-9 of 9 results Date
Bloom filter-based workflow management to enable QoS guarantee in wireless sensor networks
Tong E., Niu W., Li G., Tang D., Chang L., Shi Z., Ci S.  Journal of Network and Computer Applications 3938-51, 2014. Type: Article

In service-oriented architectures (SOAs), workflow quality of service (QoS) composed of a hierarchically organized set of services ultimately depends on the reliability of the individual atomic services at the very bottom of the service...

Mar 2 2015
Linux Mint essentials
LaCroix J.,  Packt Publishing, Birmingham, UK, 2014. 300 pp. Type: Book (978-1-782168-15-7), Reviews: (2 of 2)

Until now, Computing Reviews sent me books to review by snail mail. This time I received a portable document format (PDF) file, so I had to read the book on my computer screen. Although I have a large screen (24-inch), I found the...

Feb 23 2015
Texterra: a framework for text analysis
Turdakov D., Astrakhantsev N., Nedumov Y., Sysoev A., Andrianov I., Mayorov V., Fedorenko D., Korshunov A., Kuznetsov S.  Programming and Computing Software 40(5): 288-295, 2014. Type: Article

Turdakov et al. describe the Texterra framework developed at the Institute for System Programming (ISP) of the Russian Academy of Sciences (RAS). Texterra’s intended use is for multi-language text analysis using knowledge extracted from the ...

Feb 16 2015
Countdown to zero day: Stuxnet and the launch of the world’s first digital weapon
Zetter K.,  Crown Publishing Group, New York, NY, 2014. 448 pp. Type: Book (978-0-770436-17-9)

This deeply researched, masterful narrative tells several stories. The principal one about the discovery and decipherment of Stuxnet by cybersecurity researchers is contextualized with accounts of the Iranian uranium enrichment program, its...

Feb 9 2015
Nature-inspired optimization algorithms
Yang X.,  ELSEVIER, Waltham, MA, 2014. 300 pp. Type: Book (978-0-124167-43-8)

Solving optimization problems has been the bane of scientific and combinatorial computing. Even though polynomial-time algorithms exist for some problems such as linear programming, matching, and network flow, most problems are intractable (or...

Feb 2 2015
Combining human error verification and timing analysis: a case study on an infusion pump
Ruknas R., Curzon P., Blandford A., Back J.  Formal Aspects of Computing 26(5): 1033-1076, 2014. Type: Article

A poor design interface can contribute to major problems within a medical computing environment. The biggest problem is user error. This can range from treating the wrong patient to entering the wrong value into a medical device....

Jan 26 2015
Bayesian probability theory: applications in the physical sciences
von der Linden W., Dose V., von Toussaint U.,  Cambridge University Press, New York, NY, 2014. 672 pp. Type: Book (978-1-107035-90-4)

I did not know enough, a half century ago, to decide between being a frequentist or being a Bayesian at the time an application of Bayes’ theorem forced itself into my physics thesis. Of course, “as everyone knows,” that theorem ...

Jan 19 2015
Numerical integration on GPUs for higher order finite elements
Banaś K., Paszewski P., Macio P.  Computers & Mathematics with Applications 67(6): 1319-1344, 2014. Type: Article

Finite element methods (FEMs) are numerical methods for finding approximate solutions to partial differential equations. When a problem is presented, a mesh and a finite element space are required to be defined. Regular choices for meshes are...

Jan 12 2015
Linear network error correction coding
Guang X., Zhang Z.,  Springer Publishing Company, Incorporated, New York, NY, 2014. 107 pp. Type: Book (978-1-493905-87-4)

Make a friend on Facebook, send an email to a friend or colleague, pay your credit card bills, or make a phone call--you are always using a computer network. They are the fundamental backbone of information and communications technology...

Jan 5 2015
 
Display per page
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2015 ThinkLoud, Inc.
Terms of Use
| Privacy Policy