Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Best of 2016 Recommended by Editor Recommended by Reviewer Recommended by Reader
Search


These reviews have been chosen by the editors to be highlighted.
Options:
Year:
1-10 of 50 results Date
Data-driven concurrency for high performance computing
Matheou G., Evripidou P.  ACM Transactions on Architecture and Code Optimization 14(4): 1-26, 2017. Type: Article, Reviews: (1 of 2)

Fine-grained dataflow computing creates circumstances that technologies, particularly hardware technologies, have difficulty handling. However, techniques like coarsening computational grain and substituting software for hardware, as described in ...

Dec 17 2018
Software systems engineering programmes a capability approach
Landwehr C., Ludewig J., Meersman R., Parnas D., Shoval P., Wand Y., Weiss D., Weyuker E.  Journal of Systems and Software 125(C): 354-364, 2017. Type: Article

This excellent paper “focuses on things that a software developer must be able to do when developing and maintaining a product” and proposes a body of fundamental capabilities that were needed when the software engineering profession w...

Dec 10 2018
Deception in the digital age: exploiting and defending human targets through computer-mediated communications
Malin C., Gudaitis T., Holt T., Kilger M.,  ACADEMIC PRESS, Cambridge, MA, 2017. 284 pp. Type: Book (978-0-124116-30-6), Reviews: (4 of 4)

The basis of deception is misdirection: it amounts to making something insignificant seem important, while really relevant things go unnoticed. This strategy is used not only by spammers, crackers, cyber criminals, and cyber terrorists, but also b...

Dec 3 2018
Dawn of the new everything: encounters with reality and virtual reality
Lanier J.,  Henry Holt and Co, Inc., New York, NY, 2017. 368 pp. Type: Book (978-1-627794-09-1)

Virtual reality (VR) apps with inexpensive smartphone attachments are widely available today, but what would it have been like to obsess over VR long before it was technologically feasible? It would likely have taken a unique character, and Jaron ...

Nov 26 2018
Linux hardening in hostile networks: server security from TLS to Tor
Rankin K.,  Addison-Wesley Professional, Boston, MA, 2017. 272 pp. Type: Book (978-0-134173-26-9)

The book’s preface notes that many of the available hardening guides were written some years ago. Its chapters are therefore intended to replace the outdated information found in those guides with recommendations that provide maximum impact ...

Nov 19 2018
Formalization of the resolution calculus for first-order logic
Schlichtkrull A.  Journal of Automated Reasoning 61(1-4): 455-484, 2018. Type: Article

Are you interested in proof assistants in which human experts guide automatic theorem provers to verify subgoals? The paper focuses on research dedicated to a theoretical aim: applying a special proof assistant to produce human-readable rigorous p...

Nov 12 2018
Guide to competitive programming: learning and improving algorithms through contests
Laaksonen A.,  Springer International Publishing, New York, NY, 2017. 283 pp. Type: Book (978-3-319725-46-8)

Competitive programming is not new, but is now widely available through different online competitions. As Laaksonen notes, competitive programming provides opportunities for practice and helps to bridge the gap between theory and practice by forci...

Nov 5 2018
Software engineering (10th ed.)
Sommerville I.,  Pearson, Boston, MA, 2016. 816 pp. Type: Book (978-0-133943-03-0), Reviews: (2 of 2)

This book has been around for about three decades. This newest version is the tenth edition. Software engineering is--has become--an enormous subject. The book is very long--over 800 pages--and yet it does not actually cover al...

Oct 29 2018
How to teach computer ethics through science fiction
Burton E., Goldsmith J., Mattei N.  Communications of the ACM 61(8): 54-64, 2018. Type: Article

This is one of those very strange articles that makes one happy, just by its very existence....

Oct 22 2018
Codes, cryptology and curves with computer algebra
Pellikaan R., Wu X., Bulygin S., Jurrius R.,  Cambridge University Press, New York, NY, 2018. 606 pp. Type: Book (978-0-521520-36-2)

This volume offers a terse, highly formal exposition of the relation between the four subjects named in the title: codes (transformations of a stream of information), cryptology (transformations that seek to hide the original content), curves (spe...

Oct 15 2018
 
Display per page
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy