Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Best of 2014 Recommended by Editor Recommended by Reviewer Recommended by Reader
Search


These reviews have been chosen by the editors to be highlighted.
Options:
Year:
1-10 of 26 results Date
An improved clustering ensemble method based link analysis
Hao Z., Wang L., Cai R., Wen W.  World Wide Web 18(2): 185-195, 2015. Type: Article

A method to improve clustering ensembles of datasets, called WETU, is presented in this paper. The current clustering ensemble methods use measurements, such as the weighted connection-triple (WCT), the weighted triple-quality (WTQ), and the combi...

Jun 29 2015
Strategic information disclosure to people with multiple alternatives
Azaria A., Rabinovich Z., Goldman C., Kraus S.  ACM Transactions on Intelligent Systems and Technology (TIST) 5(4): 1-21, 2014. Type: Article

The issue of persuasion games, where one player, the agent, tries to influence the behavior of the other, the user, is considered in this paper. In the cases considered here, the agent is assumed to have knowledge that the user does not. However, ...

Jun 22 2015
Ubuntu unleashed 2015 edition: covering 14.10 and 15.04
Helmke M.,  Sams publishing, Indianapolis, IN, 2014. 912 pp. Type: Book (978-0-672338-37-3)

Linux has become one of the best operating systems within a short period of time. This success is due to many reasons, two of which are related: Linux is open source, and there is a large active community involved in its improvement and maintenanc...

Jun 15 2015
Quantum algorithms via linear algebra: a primer
Lipton R., Regan K.,  The MIT Press, Cambridge, MA, 2014. 208 pp. Type: Book (978-0-262028-39-4)

To most people, the mysterious word “quantum” often means complex mathematics and advanced physics. This introductory book assumes basic linear algebra and no knowledge of quantum mechanics. The authors did an excellent job of introduc...

Jun 8 2015
Data minimisation in communication protocols: a formal analysis framework and application to identity management
Veeningen M., de Weger B., Zannone N.  International Journal of Information Security 13(6): 529-569, 2014. Type: Article

The amount of data exchanged on the Internet is growing every day, outpacing the growth in speed of communication protocols. So to avoid data congestion, solutions are needed quickly: one of them could be data minimization, which consists of trans...

Jun 1 2015
Introduction to modern cryptography (2nd ed.)
Katz J., Lindell Y.,  Chapman & Hall/CRC, Boca Raton, FL, 2014. 603 pp. Type: Book (978-1-466570-26-9)

In contrast to many introductory cryptography texts, this one concentrates on the theory of cryptography: what is in fact meant by security? How can security be measured? What are the conditions under which a cryptosystem (or hash function, or any...

May 26 2015
Advanced structured prediction
Nowozin S., Gehler P., Jancsary J., Lampert C.,  The MIT Press, Cambridge, MA, 2014. 456 pp. Type: Book (978-0-262028-37-0)

Machine learning has received a lot of attention in recent years and has become common in an ever-growing list of application domains. The simplest forms of learning are concerned with algorithms that predict a single output, such as a class label...

May 18 2015
Using formal reasoning on a model of tasks for FreeRTOS
Cheng S., Woodcock J., D’souza D.  Formal Aspects of Computing 27(1): 167-192, 2015. Type: Article

Z (pronounced Zed) is a rigorous specification language developed in the 1980s. It uses sets to describe system states plus required invariants, operations, and pre- and post-conditions. This paper is a tutorial demonstrating the usability of Z an...

May 11 2015
Willful ignorance: the mismeasure of uncertainty
Weisberg H.,  Wiley Publishing, Hoboken, NJ, 2014. 452 pp. Type: Book (978-0-470890-44-8)

No empirical assertion is absolutely certain, and scientific progress has always required assessing the degree of uncertainty associated with a claimed result. To most researchers trained in the last 50 years, this assessment takes the form of att...

May 4 2015
Baget real-time operating system family (features, comparison, and future development)
Godunov A., Soldatov V.  Programming and Computing Software 40(5): 259-264, 2014. Type: Article

Two versions of Baget, the Russian real-time operating system (RTOS), are presented in this paper. It provides some elements of history that led to the development of the initial versions, and then the fork to two separate tracks. It compares from...

Apr 27 2015
 
Display per page
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2015 ThinkLoud, Inc.
Terms of Use
| Privacy Policy