Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Best of 2013 Recommended by Editor Recommended by Reviewer Recommended by Reader

These reviews have been chosen by the editors to be highlighted.
1-10 of 34 results Date
Towards a linear algebra of programming
Oliveira J.  Formal Aspects of Computing 24(4-6): 433-458, 2012. Type: Article

We are, by now, quite used to relational interpretations of program semantics. Such interpretations live in a rich algebraic world. What if we wanted to use a probabilistic interpretation instead? Well, it turns out that this is a conservative...

Aug 25 2014
Enabling things to talk: designing IoT solutions with the IoT architectural reference model
Bassi A., Bauer M., Fiedler M., Kramp T., van Kranenburg R., Lange S., Meissner S.,  Springer Publishing Company, Incorporated, New York, NY, 2013. 350 pp. Type: Book (978-3-642404-02-3)

Nowadays, with the miniaturization of devices with ample computing and storage capabilities, and the proliferation of energy-efficient wireless hardware facilitating the interconnection of such devices, the concept of the Internet of Things (IoT) ...

Aug 18 2014
Enhancing software engineering education through open source projects: four years of students’ perspectives
Papadopoulos P., Stamelos I., Meiszner A.  Education and Information Technologies 18(2): 381-397, 2013. Type: Article

It is often observed that a difficult aspect of teaching software engineering is getting students to appreciate the difference in scale between software written as exercises in programming classes and software that professional developers...

Aug 11 2014
Low power GPGPU computation with imprecise hardware
Zhang H., Putic M., Lach J.  DAC 2014 (Proceedings of the 51st Annual Design Automation Conference, San Francisco, CA,  Jun 1-5, 2014) 1-6, 2014. Type: Proceedings

In high-performance computing, reducing the amount of energy required to perform the actual computations has recently become a highly important issue. In this paper, Zhang et al. deal with this topic in the framework of a general-purpose...

Aug 4 2014
Big data computing
Akerkar R.,  Chapman & Hall/CRC, Boca Raton, FL, 2014. 564 pp. Type: Book (978-1-466578-37-1), Reviews: (2 of 2)

Whenever a new discipline (or buzzword) appears, we feel the need to understand what it is and how it differs from what existed before. A very explicit declaration about what “big data” means can be found in the preface of this book:...

Jul 28 2014
Cowboys, ankle sprains, and keepers of quality: How is video game development different from software development?
Murphy-Hill E., Zimmermann T., Nagappan N.  ICSE 2014 (Proceedings of the 36th International Conference on Software Engineering, Hyderabad, India,  May 31-Jun 7, 2014) 1-11, 2014. Type: Proceedings

Occasionally, when reviewing a really bad paper, I will point out that its only redeeming value is that it can be used as a bad example in a research methods class. So, to be fair, when a really good paper comes along, I should point out that it...

Jul 21 2014
Unsupervised information extraction by text segmentation
Cortez E., da Silva A.,  Springer Publishing Company, Incorporated, New York, NY, 2013. 124 pp. Type: Book (978-3-319025-96-4)

The typical result from a web search is still a ranked list of documents that may contain the information you’re looking for, but it is up to the user to actually extract the sought-after information. In order for search engines to actually ...

Jul 14 2014
Data science for business: what you need to know about data mining and data-analytic thinking
Provost F., Fawcett T.,  O’Reilly Media, Inc., Sebastopol, CA, 2013. 414 pp. Type: Book (978-1-449361-32-7)

As Hal Varian, Google’s renowned chief economist, says,...

Jul 7 2014
FireDroid: hardening security in almost-stock Android
Russello G., Jimenez A., Naderi H., van der Mark W.  ACSAC 2013 (Proceedings of the 29th Annual Computer Security Applications Conference, New Orleans, LA,  Dec 9-13, 2013) 319-328, 2013. Type: Proceedings

This paper proposes a policy-based framework to enforce security policies by intercepting system calls to the Linux kernel beneath the Android operating system (OS). By using this approach it is possible to detect security breaches by third-party ...

Jun 30 2014
Quantum information theory
Wilde M.,  Cambridge University Press, New York, NY, 2013. 669 pp. Type: Book (978-1-107034-25-9)

Information theory is a well-known field of study that in no small measure underlies the modern revolution in communication technologies. It famously grew out of Shannon’s singular 1948 paper [1] that established the core principles and...

Jun 23 2014
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2014 ThinkLoud, Inc.
Terms of Use
| Privacy Policy