Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Best of 2016 Recommended by Editor Recommended by Reviewer Recommended by Reader
Search
Reviewers have found these items notable and have self-selected them for review.
 
Options:
 
  1-10 of 6677 results Date Reviewed  
  Data deduplication for data optimization for storage and network systems
Kim D., Song S., Choi B.,  Springer International Publishing, New York, NY, 2017. 262 pp. Type: Book (978-3-319422-78-7)

I have always thought of data deduplication as something I might use on a Windows server to reduce the space taken up by library files. Of course, it is much more than that. Storage deduplication has been used in commercial services like Dropbox, ...

Apr 25 2017  
  Becoming a global chief security executive officer: a how to guide for next generation security leaders
Cloutier R.,  Butterworth-Heinemann, Newton, MA, 2016. 392 pp. Type: Book

For many years, a recurring topic in security conference talks and articles has been how to sell security to businesses. There are parallels with the earlier business-IT alignment discussions. In both cases, I would argue that it is not “bus...

Apr 25 2017  
  Interactive web-based visualization for accessibility mapping of transportation networks
Schoedon A., Trapp M., Hollburg H., Döllner J.  EuroVis 2016 (Proceedings of the Eurographics/IEEE VGTC Conference on Visualization, Groningen, the Netherlands,  Jun 6-10, 2016) 79-83, 2016. Type: Proceedings

This work deals with the web-based visualization of transportation network data, with a focus on accessibility maps. The complexity of such networks requires scalable and flexible solutions to address a number of critical tradeoffs involving perfo...

Apr 24 2017  
  Introduction to cyberdeception
Rowe N., Rrushi J.,  Springer International Publishing, New York, NY, 2016. 334 pp. Type: Book (978-3-319411-85-9)

Cyberdeception represents an important issue of cybersecurity and a growing concern that affects more and more activity sectors in the present digital age. Cyberdeception aims to transmit false or counterfeit information on the Internet. On the ne...

Apr 24 2017  
  The fundamentals of computational intelligence: system approach
Zgurovsky M., Zaychenko Y.,  Springer International Publishing, New York, NY, 2016. 373 pp. Type: Book (978-3-319351-60-5)

Not for the faint-hearted or those without mathematical knowledge, the rhythm of this book is as follows: first, it provides a profound formal description grounded in mathematics in some sections of chapters, and then there is a section that is de...

Apr 21 2017  
  Context-based unsupervised ensemble learning and feature ranking
Soltanmohammadi E., Naraghi-Pour M., van der Schaar M.  Machine Learning 105(3): 459-485, 2016. Type: Article

An unsupervised ensemble learning and feature ranking method in which the combiner has no information about the expert’s performance, methods, and the data with which they operate is proposed in this paper. The method uses batch processing a...

Apr 20 2017  
  Designing with Xilinx FPGAs: using Vivado
Churiwala S. (ed),  Springer International Publishing, New York, NY, 2016. 260 pp. Type: Book (978-3-319424-37-8)

This highly practical compendium of articles from different authors covers topics about, as the title of the book says, design methods using field-programmable gate array (FPGA) devices from the vendor Xilinx. FPGA devices are among the most used ...

Apr 20 2017  
  J. Michael Dunn on information based logics
Bimbó K. (ed),  Springer International Publishing, New York, NY, 2016. 436 pp. Type: Book (978-3-319292-98-4)

Apart from introductory material and an “autobio,” these articles on Dunn’s work can be divided into three areas:...

Apr 20 2017  
  Digital wellness services for young elderly: a missed opportunity for mobile services
Carlsson C., Walden P.  Journal of Theoretical and Applied Electronic Commerce Research 11(3): 20-34, 2016. Type: Article

This is a preliminary report/proposal about using mobile digital services to help the “young elderly,” that is, people between 60 and 75 years old. Conclusions are based on the experience of a Finnish company offering corporate wellnes...

Apr 20 2017  
  Cyber-security of SCADA and other industrial control systems
Colbert E., Kott A.,  Springer International Publishing, New York, NY, 2016. 355 pp. Type: Book (978-3-319321-23-3)

Industrial control systems (ICSs) are systems comprising computers and devices that may be electrical and/or mechanical in nature. They are widely used to partially or totally control equipment in chemical plants, electric/power/nuclear utilities,...

Apr 17 2017  
 
 
 
Display per page
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy