Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Best of 2014 Recommended by Editor Recommended by Reviewer Recommended by Reader
Search


These reviews have been chosen by the editors to be highlighted.
Options:
Year:
1-10 of 21 results Date
Introduction to modern cryptography (2nd ed.)
Katz J., Lindell Y.,  Chapman & Hall/CRC, Boca Raton, FL, 2014. 603 pp. Type: Book (978-1-466570-26-9)

In contrast to many introductory cryptography texts, this one concentrates on the theory of cryptography: what is in fact meant by security? How can security be measured? What are the conditions under which a cryptosystem (or hash function, or any...

May 26 2015
Advanced structured prediction
Nowozin S., Gehler P., Jancsary J., Lampert C.,  The MIT Press, Cambridge, MA, 2014. 456 pp. Type: Book (978-0-262028-37-0)

Machine learning has received a lot of attention in recent years and has become common in an ever-growing list of application domains. The simplest forms of learning are concerned with algorithms that predict a single output, such as a class label...

May 18 2015
Using formal reasoning on a model of tasks for FreeRTOS
Cheng S., Woodcock J., D’souza D.  Formal Aspects of Computing 27(1): 167-192, 2015. Type: Article

Z (pronounced Zed) is a rigorous specification language developed in the 1980s. It uses sets to describe system states plus required invariants, operations, and pre- and post-conditions. This paper is a tutorial demonstrating the usability of Z an...

May 11 2015
Willful ignorance: the mismeasure of uncertainty
Weisberg H.,  Wiley Publishing, Hoboken, NJ, 2014. 452 pp. Type: Book (978-0-470890-44-8)

No empirical assertion is absolutely certain, and scientific progress has always required assessing the degree of uncertainty associated with a claimed result. To most researchers trained in the last 50 years, this assessment takes the form of att...

May 4 2015
Baget real-time operating system family (features, comparison, and future development)
Godunov A., Soldatov V.  Programming and Computing Software 40(5): 259-264, 2014. Type: Article

Two versions of Baget, the Russian real-time operating system (RTOS), are presented in this paper. It provides some elements of history that led to the development of the initial versions, and then the fork to two separate tracks. It compares from...

Apr 27 2015
Computational thinking in a non-majors CS course requires a programming component
Walker H.  ACM Inroads 6(1): 58-61, 2015. Type: Article

Modern academic disciplines make use of computers in teaching and learning. Computational thinking is a valuable concept for helping students to reason precisely about accurate and efficient solutions to a variety of real-world problems. However, ...

Apr 20 2015
Data and Goliath: the hidden battles to capture your data and control your world
Schneier B.,  W. W. Norton & Co., Inc., New York, NY, 2015. 320 pp. Type: Book (978-0-393244-81-6), Reviews: (2 of 2)

The Internet birthed unprecedented freedom of communication, interconnecting individuals from every corner of the globe and every walk of life. This free flow of information has the potential to establish a world of truly free and equal citizens, ...

Apr 13 2015
In-cloud malware analysis and detection: state of the art
Alam S., Sogukpinar I., Traore I., Coady Y.  SIN 2014 (Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, UK,  Sep 9-11, 2014) 473-478, 2014. Type: Proceedings

Among the many “as a service” functions of the cloud, one of the least explored is the use of the cloud’s computational power to detect malware. This paper discusses the state of the art of this service. The survey analyzes only ...

Apr 6 2015
The book of PF (3rd ed.): a no-nonsense guide to the OpenBSD firewall
Hansteen P.,  No Starch Press, San Francisco, CA, 2014. 248 pp. Type: Book (978-1-593275-89-1)

PF is a packet filter developed originally on the OpenBSD operating system, and now also available on NetBSD, FreeBSD, and FreeBSD derivatives such as DragonFly BSD. It can be used to control access to your network, mitigate spam attacks, redirect...

Mar 30 2015
Alan Turing: the enigma
Hodges A.,  Princeton University Press, Princeton, NJ, 2014. 768 pp. Type: Book (978-0-691164-72-4)

Rereading and reviewing a biography more than 30 years after its first publication subjects the work to the added scrutiny of evaluating it on its own terms and in relation to all that has happened since its first appearance. Not many books can wi...

Mar 23 2015
 
Display per page
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2015 ThinkLoud, Inc.
Terms of Use
| Privacy Policy