Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Best of 2016 Recommended by Editor Recommended by Reviewer Recommended by Reader
Search
Reviewers have found these items notable and have self-selected them for review.
 
Options:
 
  1-10 of 7087 results Date Reviewed  
  VIRTIO-USER: a new versatile channel for kernel-bypass networks
Tan J., Liang C., Xie H., Xu Q., Hu J., Zhu H., Liu Y.  KBNets 2017 (Proceedings of the Workshop on Kernel-Bypass Networks, Los Angeles, CA,  Aug 21, 2017) 13-18, 2017. Type: Proceedings

VIRTIO-USER is a userspace-based channel to facilitate container applications to benefit from kernel-bypass technologies. The authors explain that container networking or operating system (OS) virtualization technologies have historically not been...

Sep 19 2018  
  Using Bayesian network to estimate the value of decisions within the context of value-based software engineering
Mendes E., Perkusich M., Freitas V., Nunes J.  EASE 2018 (Proceedings of the 22nd International Conference on Evaluation and Assessment in Software Engineering, Christchurch, New Zealand,  Jun 28-29, 2018) 90-100, 2018. Type: Proceedings

For longevity, a software company should adopt value-based decision making, in which the focus is on overall value creation rather than the required efforts and costs alone. The paper introduces concepts behind value-based decision making, and ill...

Sep 14 2018  
  Deception in the digital age: exploiting and defending human targets through computer-mediated communications
Malin C., Gudaitis T., Holt T., Kilger M.,  ACADEMIC PRESS, Cambridge, MA, 2017. 284 pp. Type: Book (978-0-124116-30-6), Reviews: (4 of 4)

The basis of deception is misdirection: it amounts to making something insignificant seem important, while really relevant things go unnoticed. This strategy is used not only by spammers, crackers, cyber criminals, and cyber terrorists, but also b...

Sep 14 2018  
  Codes, cryptology and curves with computer algebra
Pellikaan R., Wu X., Bulygin S., Jurrius R.,  Cambridge University Press, New York, NY, 2018. 606 pp. Type: Book (978-0-521520-36-2)

This volume offers a terse, highly formal exposition of the relation between the four subjects named in the title: codes (transformations of a stream of information), cryptology (transformations that seek to hide the original content), curves (spe...

Sep 13 2018  
  Toward the robots of science fiction
Aaron D. Ames. YouTube, 00:49:33, published on Dec 7, 2017, Caltech, https://www.youtube.com/watch?v=ZL8ddCQFuXU. Type: Video

It was a pleasure to watch this presentation about the future of robotics, a hotly debated topic fueled by the controversy between robots defeating humans and robots augmenting and assisting humans, for example, prostheses and exoskeletons. This d...

Sep 12 2018  
  Introduction to inverse problems for differential equations
Hasanoǧlu A., Romanov V.,  Springer International Publishing, New York, NY, 2017. 261 pp. Type: Book (978-3-319627-96-0)

Several mathematical problems in science, engineering, and technology are inverse problems. For example, inverse problem theory is often used in heat and mass transfer, imaging, hydrology, oceanography, and so on. In general, inverse problems are ...

Sep 12 2018  
  A novel stock recommendation system using Guba sentiment analysis
Sun Y., Fang M., Wang X.  Personal and Ubiquitous Computing 22(3): 575-587, 2018. Type: Article

It’s pretty obvious that if you know what investors are thinking, you can predict what stocks they’ll buy and sell. Stock scams have operated for years on the complement of this thought, that is, attempt to change investors’ opin...

Sep 5 2018  
   Attribute-based access control
Hu V., Ferraiolo D., Chandramouli R., Kuhn D.,  Artech House, Inc., Norwood, MA, 2017. 280 pp. Type: Book (978-1-630811-34-1), Reviews: (2 of 2)

In many applications, it becomes a necessity to define who (which user) is allowed to access what (which resource). This is achieved via access control. Several models for access control exist. Attribute-based access control (ABAC) is one of them,...

Sep 5 2018  
  An in-vehicle software defined network architecture for connected and automated vehicles
Fussey P., Parisis G.  CarSys 2017 (Proceedings of the 2nd ACM International Workshop on Smart, Autonomous, and Connected Vehicular Systems and Services, Snowbird, UT,  Oct 16, 2017) 73-74, 2017. Type: Proceedings

The expansion of communication networks has made the efficient configuration and management of these networks challenging. Software-defined networking (SDN) facilitates the rapid provisioning of network services, improved network visibility and pr...

Sep 4 2018  
  Dawn of the new everything: encounters with reality and virtual reality
Lanier J.,  Henry Holt and Co, Inc., New York, NY, 2017. 368 pp. Type: Book (978-1-627794-09-1)

Virtual reality (VR) apps with inexpensive smartphone attachments are widely available today, but what would it have been like to obsess over VR long before it was technologically feasible? It would likely have taken a unique character, and Jaron ...

Aug 31 2018  
 
 
 
Display per page
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy