Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Best of 2013 Recommended by Editor Recommended by Reviewer Recommended by Reader

These reviews have been chosen by the editors to be highlighted.
1-10 of 30 results Date
Big data computing
Akerkar R.,  Chapman & Hall/CRC, Boca Raton, FL, 2014. 564 pp. Type: Book (978-1-466578-37-1), Reviews: (2 of 2)

Whenever a new discipline (or buzzword) appears, we feel the need to understand what it is and how it differs from what existed before. A very explicit declaration about what “big data” means can be found in the preface of this book:...

Jul 28 2014
Cowboys, ankle sprains, and keepers of quality: How is video game development different from software development?
Murphy-Hill E., Zimmermann T., Nagappan N.  ICSE 2014 (Proceedings of the 36th International Conference on Software Engineering, Hyderabad, India,  May 31-Jun 7, 2014) 1-11, 2014. Type: Proceedings

Occasionally, when reviewing a really bad paper, I will point out that its only redeeming value is that it can be used as a bad example in a research methods class. So, to be fair, when a really good paper comes along, I should point out that it...

Jul 21 2014
Unsupervised information extraction by text segmentation
Cortez E., da Silva A.,  Springer Publishing Company, Incorporated, New York, NY, 2013. 124 pp. Type: Book (978-3-319025-96-4)

The typical result from a web search is still a ranked list of documents that may contain the information you’re looking for, but it is up to the user to actually extract the sought-after information. In order for search engines to actually ...

Jul 14 2014
Data science for business: what you need to know about data mining and data-analytic thinking
Provost F., Fawcett T.,  O’Reilly Media, Inc., Sebastopol, CA, 2013. 414 pp. Type: Book (978-1-449361-32-7)

As Hal Varian, Google’s renowned chief economist, says,...

Jul 7 2014
FireDroid: hardening security in almost-stock Android
Russello G., Jimenez A., Naderi H., van der Mark W.  ACSAC 2013 (Proceedings of the 29th Annual Computer Security Applications Conference, New Orleans, LA,  Dec 9-13, 2013) 319-328, 2013. Type: Proceedings

This paper proposes a policy-based framework to enforce security policies by intercepting system calls to the Linux kernel beneath the Android operating system (OS). By using this approach it is possible to detect security breaches by third-party ...

Jun 30 2014
Quantum information theory
Wilde M.,  Cambridge University Press, New York, NY, 2013. 669 pp. Type: Book (978-1-107034-25-9)

Information theory is a well-known field of study that in no small measure underlies the modern revolution in communication technologies. It famously grew out of Shannon’s singular 1948 paper [1] that established the core principles and...

Jun 23 2014
Walter Gautschi: selected works with commentaries (3 vols.)
Brezinski C., Sameh A.,  Springer, New York, NY, 2014. 669 pp. Type: Book (978-1-461470-33-5)

Walter Gautschi is one of the leading numerical analysts of the second half of the 20th and the beginning of the 21st century. He has contributed to almost all areas of numerical analysis, and many of his results have proven to be highly...

Jun 16 2014
Targeted cyberattacks: a superset of advanced persistent threats
Sood A., Enbody R.  IEEE Security and Privacy 11(1): 54-61, 2013. Type: Article

Insight into the many threats that lurk in our software is presented in this paper. It also provides a useful introduction to the state of the art of malware. It will be especially useful for those doing research on malware or for practitioners...

Jun 9 2014
CopyCatch: stopping group attacks by spotting lockstep behavior in social networks
Beutel A., Xu W., Guruswami V., Palow C., Faloutsos C.  WWW 2013 (Proceedings of the 22nd International World Wide Web Conference, Rio de Janeiro, Brazil,  May 13-17, 2013) 119-130, 2013. Type: Proceedings

In Web 2.0, the content is no longer static, but rather dynamically user generated. In this universe, the more interaction a product page or user profile gets, the greater the potential profits an individual or company may achieve with...

Jun 2 2014
The handbook of personal area networking technologies and protocols
Gratton D.,  Cambridge University Press, New York, NY, 2013. 411 pp. Type: Book (978-0-521197-26-7)

Only a decade or so ago, having a Bluetooth headset connected to your mobile phone made you stand out from the crowd. Now, newer and evolving technologies are making the interconnection of mobile electronic devices ubiquitous. We’ve all...

May 27 2014
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2014 ThinkLoud, Inc.
Terms of Use
| Privacy Policy