Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Best of 2013 Recommended by Editor Recommended by Reviewer Recommended by Reader

These reviews have been chosen by the editors to be highlighted.
1-10 of 16 results Date
iOS 7 programming cookbook
Nahavandipoor V.,  O’Reilly Media, Inc., Sebastopol, CA, 2013. 1056 pp. Type: Book (978-1-449372-42-2)

As of February 2014, Apple strongly recommends that all iOS mobile application programmers write their applications so they are optimized to run on iOS 7. Consequently, the submission of optimized iOS 7 mobile applications will become the norm...

Apr 21 2014
Pattern recognition of big nutritional data in RCT
Wang J., Fang H., Wang H., Olendzki G., Wang C., Ma Y.  BodyNets 2013 (Proceedings of the 8th International Conference on Body Area Networks, Boston, MA,  Sep 30-Oct 2, 2013) 394-400, 2013. Type: Proceedings

Categorized broadly as unsupervised learning algorithms, clustering techniques are often used to help reveal underlying patterns, particularly in large datasets. This paper describes research to analyze the effectiveness of different dietary...

Apr 14 2014
Agile contracts: creating and managing successful projects with Scrum
Opelt A., Gloger B., Pfarl W., Mittermayr R.,  Wiley Publishing, Hoboken, NJ, 2013. 304 pp. Type: Book (978-1-118630-94-5)

The proper application of information technology (IT) can provide critical support in meeting an organization’s mission, and in some cases, is the only means to do so. Organizations allocate a great deal of their resources to IT projects to ...

Apr 7 2014
Computing with real numbers, from Archimedes to Turing and beyond
Braverman M.  Communications of the ACM 56(9): 74-83, 2013. Type: Article

Under a concise and a very attractive title, the author invites the reader to a beautiful journey over the computability field....

Mar 31 2014
High-performance deformable image registration algorithms for manycore processors
Shackleford J., Kandasamy N., Sharp G.,  Morgan Kaufmann Publishers Inc., Waltham, MA, 2013. 122 pp. Type: Book (978-0-124077-41-6)

This is more of a booklet than a book, but it is nonetheless a kind of gem for understanding the process of mastering deformable image registration with graphics processing units (GPUs). The 100-plus pages are divided into six chapters. The first ...

Mar 24 2014
MyCloud: supporting user-configured privacy protection in cloud computing
Li M., Zang W., Bai K., Yu M., Liu P.  ACSAC 2013 (Proceedings of the 29th Annual Computer Security Applications Conference, New Orleans, LA,  Dec 9-13, 2013) 59-68, 2013. Type: Proceedings

The authors of this paper propose MyCloud, an architecture for improving the confidentiality of the data in virtual machines (VMs) in cloud systems. The main idea is to remove the privileges of the control VM (which normally gives the cloud...

Mar 17 2014
The technical and social history of software engineering
Jones C.,  Addison-Wesley Professional, Upper Saddle River, NJ, 2014. 496 pp. Type: Book (978-0-321903-42-6)

The author of this book, Capers Jones, has a long and distinguished career in the software engineering field. Consequently, he is ideally positioned to write this history. The 400-plus-page book can be read completely, but can also be rapidly...

Mar 10 2014
Simple steps to data encryption: a practical guide to secure computing
Loshin P.,  Syngress Publishing, Waltham, MA, 2013. 86 pp. Type: Book (978-0-124114-83-8)

Protecting information from unwanted disclosure and modification is of utmost importance in contemporary times. This book provides a step-by-step guide to data encryption and digital signatures using Gnu Privacy Guard (GnuPG) encryption...

Mar 3 2014
Formal verification of information flow security for a simple ARM-based separation kernel
Dam M., Guanciale R., Khakpour N., Nemati H., Schwarz O.  CCS 2013 (Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, Germany,  Nov 4-8, 2013) 223-234, 2013. Type: Proceedings

There has been considerable recent interest in verifying operating systems [1,2]. One of the difficulties with this form of software verification is simply stating the verification problem formally and succinctly. This, combined with the fact...

Feb 24 2014
MATLAB by example: programming basics
Gdeisat M., Lilley F.,  ELSEVIER, Amsterdam, the Netherlands, 2013. 366 pp. Type: Book (978-0-124052-12-3)

For novice programmers who would like to learn how to use the software package MATLAB, this book is an ideal guide. The book assumes that the reader has no prior programming experience and introduces MATLAB by way of programming examples....

Feb 18 2014
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2014 ThinkLoud, Inc.
Terms of Use
| Privacy Policy