Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Best of 2016 Recommended by Editor Recommended by Reviewer Recommended by Reader
Reviewers have found these items notable and have self-selected them for review.
  1-10 of 7194 results Date Reviewed  
  Java game development with LibGDX: from beginner to professional (2nd ed.)
Stemkoski L.,  Apress, New York, NY, 2018. 433 pp. Type: Book (978-1-484233-23-8)

The LibGDX application framework is a free and open-source framework for the development of multi-platform video games. It allows programmers to develop games on a desktop computer (Windows, macOS, Linux) using the Java programming language and de...

Apr 19 2019  
  A survey of communication performance models for high-performance computing
Rico-Gallego J., Díaz-Martín J., Manumachu R., Lastovetsky A.  ACM Computing Surveys 51(6): 1-36, 2019. Type: Article

Cluster computing is a major trend in scientific high-performance computing (HPC), and the recent evolution of cluster computing requires a revision to the models and methods for evaluating operational performance. The paper’s main achieveme...

Apr 16 2019  
  Statistical and machine-learning data mining: techniques for better predictive modeling and analysis of big data (3rd ed.)
Ratner B.,  CRC Press, Inc., Boca Raton, FL, 2017. 696 pp. Type: Book (978-1-498797-60-3)

There are numerous books about statistics, from short recipe collections to larger theoretical works. There are texts devoted to data science and data mining, the newest expressions of data analysis, which focus on computational techniques. Ratner...

Apr 12 2019  
  Next-generation big data: a practical guide to Apache Kudu, Impala, and Spark
Quinto B.,  Apress, New York, NY, 2018. 557 pp. Type: Book (978-1-484231-46-3)

Since the introduction of Apache Hadoop nearly a decade ago, new tools and methods for analyzing large datasets have evolved rapidly, dramatically improving performance and providing easier and more powerful query languages....

Apr 10 2019  
  An investigation of factors affecting the visits of online crowdsourcing and labor platforms
Mourelatos E., Tzagarakis M.  Netnomics 19(3): 95-130, 2018. Type: Article

This paper reports on the authors’ survey of popular websites that use crowdsourcing to conduct one or more steps in their business processes, for a period between 2012 and 2016. The survey’s objectives were to identify factors affecti...

Apr 9 2019  
  Foundations of programming languages (2nd ed.)
Lee K.,  Springer International Publishing, New York, NY, 2017. 370 pp. Type: Book (978-3-319707-89-1)

Programming is a science-based craft. For a programmer, the better the science, the better the craft. Foundations of programming languages provides a computer science (CS)-based treatment of the foundations of three programming paradigms: i...

Apr 8 2019  
  Impact of virtualization on cloud computing energy consumption: empirical study
Atiewi S., Abuhussein A., Saleh M.  ISCSIC 2018 (Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control, Stockholm, Sweden,  Sep 21-23, 2018) 1-7, 2018. Type: Proceedings

Intensive computation in tasks such as weather forecasting and scientific solar system exploration requires high-speed processors and huge data storage. Very large data centers are likely to consume more energy as the number of servers substantial...

Apr 5 2019  
  Beyond worst-case analysis
Roughgarden T.  Communications of the ACM 62(3): 88-96, 2019. Type: Article

It was the title that caught my attention. To note, I am not an algorithmic complexity theorist, but I am interested in the application of such techniques to complexity problems arising within formal logic, especially in the presence of an inducti...

Apr 4 2019  
   Survey on fog computing
Hu P., Dhelim S., Ning H., Qiu T.  Journal of Network and Computer Applications 98(C): 27-42, 2017. Type: Article

In the Internet of things (IoT), is there a difference between edge and fog computing?...

Apr 3 2019  
  Imperfect forward secrecy: how Diffie-Hellman fails in practice
Adrian D., Bhargavan K., Durumeric Z., Gaudry P., Green M., Halderman J., Heninger N., Springall D., Thomé E., Valenta L., VanderSloot B., Wustrow E., Zanella-Béguelin S., Zimmermann P.  Communications of the ACM 62(1): 106-114, 2019. Type: Article

Prevalent Internet protocols require reliable cryptographic algorithms for approving mutual keys to use for bargaining safe connections. Internet protocols such as secure shell (SSH) and hypertext transfer protocol secure (HTTPS) frequently use th...

Mar 27 2019  
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy