Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Best of 2016 Recommended by Editor Recommended by Reviewer Recommended by Reader
Search
Reviewers have found these items notable and have self-selected them for review.
 
Options:
 
  1-10 of 7366 results Date Reviewed  
  Data architecture: a primer for the data scientist (2nd ed.)
Inmon W., Linstedt D., Levins M.,  Academic Press, Inc., San Diego, CA, 2019. 431 pp. Type: Book (978-0-128169-16-2)

Showing a perceptible pattern as a line-edited transcript consolidated from one or more slide-based seminars, this book provides many illustrations that would otherwise have been the focus of a presenter’s lecture and interactive session. Ho...

Jul 31 2020  
  Should researchers use data from security breaches?
Douglas D.  Communications of the ACM 62(12): 22-24, 2019. Type: Article

The use of data derived from publicly exposed and security loophole databases will continue to be a controversial subject of debate for legal scholars and information technology (IT) computing ethics specialists. Should computing research practiti...

Jul 30 2020  
  Future automation: changes to lives and to businesses
Carone T.,  World Scientific Publishing Co, Inc., River Edge, NJ, 2018. 230 pp. Type: Book

Timothy Carone provides a visionary outlook on what will probably be called our digitized future. The book is split into 11 chapters. First, the author introduces autonomous systems (ASs). ASs are (in addition to the Internet of Things, IoT) the c...

Jul 29 2020  
  Practical Flutter: improve your mobile development with Google’s latest open-source SDK
Zammetti F.,  Apress, New York, NY, 2019. 416 pp. Type: Book (978-1-484249-71-0)

One of the reasons a business may develop an application for mobile devices is for its branding and digital presence. In today’s market, that requires making the application available for both Android and iOS. The traditional way to accompli...

Jul 27 2020  
  Management system for secure mobile application development
Guo W.  ACM TURC 2019 (Proceedings of the ACM Turing Celebration Conference - China, Chengdu, China,  May 17-19, 2019) 1-4, 2019. Type: Proceedings

Our increasing reliance on mobile apps elevates their insecurities and shines a spotlight on their vulnerabilities. The author introduces a secure mobile app development approach that is proactive and provides verifiable security. Application secu...

Jul 22 2020  
  What makes a great manager of software engineers?
Kalliamvakou E., Bird C., Zimmermann T., Begel A., DeLine R., German D.  IEEE Transactions on Software Engineering 45(1): 87-106, 2019. Type: Article

The non-physical nature of software is unique among products developed in the field of engineering; this fact places extreme importance on the qualities that the members of the software engineering team provide. The role of the manager within such...

Jul 21 2020  
  Social practices and dynamic non-humans: nature, materials and technologies
Maller C., Strengers Y.,  Palgrave Macmillan, Cham, Switzerland, 2019. 264 pp. Type: Book (978-3-319921-88-4)

In the contemporary world, there is perhaps an implicit, or even explicit, presumption that human experience matters above all--human society and actions seek to quash, or at least subjugate to the extreme, all nonhuman actors and their effec...

Jul 20 2020  
  Applied machine learning
Forsyth D.,  Springer International Publishing, New York, NY, 2019. 494 pp. Type: Book (978-3-030181-13-0)

Machine learning methods find application in almost any domain that makes use of some form of computation. These algorithms build appropriate models that help in making predictions; thus, they are of interest in industry as well as in business sce...

Jul 17 2020  
  Information technology for peace and security: IT applications and infrastructures in conflicts, crises, war, and peace
Reuter C.,  Springer International Publishing, New York, NY, 2019. 448 pp. Type: Book (978-3-658256-51-7)

A book with this title might seem to be only marginally relevant for corporate security personnel who are not fighting wars or keeping peace. However, in a typical contextual security analysis, you will find terms like “state actors” a...

Jul 16 2020  
  Local distance restricted bribery in voting
Dey P.  AAMAS 2019 (Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, Montreal, QC, Canada,  May 13-17, 2019) 1925-1927, 2019. Type: Proceedings

The bribery problem asks whether there exists an appropriate-“cost” collection of voters in an election such that, if one strategically changes their votes, one’s favored candidate will win. In that model, each voter comes with a...

Jul 6 2020  
 
 
 
Display per page
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2020 ThinkLoud, Inc.
Terms of Use
| Privacy Policy