Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
Misc

View:



Scaling of capacity and reliability in data center networks : ACM SIGMETRICS Performance Evaluation Review

The interconnection of servers has a critical impact on data center performance, so the internal network requires an efficient design. As data center sizes scale up, a significant tradeoff between...
General (C.0) | Oct 6 14

Inferring visualization task properties, user performance, and user cognitive abilities from eye gaze data : ACM Trans. on Interactive Intelligent Systems

This research project tries to answer two questions: (1) Can a user’s current visualization task properties, performance, and long-term cognitive abilities...
Miscellaneous (H.5.m) | Oct 27 14

Discovering social circles in ego networks : ACM Trans. on Knowledge Discovery from Data

A social circle in a user’s ego network is a group of interconnected people that have common attributes between themselves and the user. In...
Information Search & Retrieval (H.3.3) | Oct 9 14

Cost-aware cloud bursting for enterprise applications : ACM Transactions on Internet Technology

Seagull, a system to optimally manage cloud bursting, is described in this paper; optimization is with respect to the number and size of virtual machine (VM) images and total data...
Cloud Computing (C.2.4...) | Oct 6 14

Computing petaflops over terabytes of data: the case of genome-wide association studies : ACM Transactions on Mathematical Software

With its catchy but somewhat misleading title, this paper proposes a method for efficiently solving multiple instances of the same problem when...
Algorithm Design & Analysis (G.4...) | Oct 16 14

RIVER: reconfigurable flow and fabric for real-time signal processing on FPGAs : ACM Transactions on Reconfigurable Technology and Systems

Field-programmable gate arrays have become the most effective, powerful, and generic logic design and verification tools...
Real-Time & Embedded Systems (C.3...) | Oct 14 14

On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment : ASIA CCS 14

In recent years, virtual machines (VMs) have become clearly very important for the computing infrastructure of companies. It is therefore not surprising...
Security & Protection (D.4.6) | Oct 8 14

A semantic knowledge management system for laminated composites : Advanced Engineering Informatics

In many application domains, the management of large volumes of unstructured and inconsistent information processes is a challenging task...
Semantic Web (H.3.4...) | Oct 27 14

Adaptable, model-driven security engineering for SaaS cloud-based applications : Automated Software Engineering

This paper presents a novel approach to security for applications that are run on a central server and supplied to multiple consuming organizations (tenants) as a service. The issues associated with...
Software Engineering (D.2) | Oct 29 14

Cloud refactoring: automated transitioning to cloud-based services : Automated Software Engineering

Refactoring is the process of changing how a program works without changing what it does; even before the term was coined, it was practiced by programmers as “program restructuring” from...
Software Development (K.6.3...) | Oct 7 14



Advanced C and C++ compiling

The title of this book is a bit misleading since it implies a book presenting a detailed explanation of compiler documentation often skipped or misunderstood by most users. This is not true. Instead...
Compilers (D.3.4...) | Oct 13 14

Agile risk management

In this book, the author introduces a methodology for agile risk management in software development. Risk management for information technology (IT) projects is not new and has always been an integral part of various software engineering and IT project...
Project & People Management (K.6.1) | Oct 17 14

Android recipes: a problem-solution approach (3rd ed.)

Staying up to date with new versions of mobile platforms can be a challenge, and few are more challenging than Android as it is frequently updated. As of this writing, we’re up to KitKat, version 4.4...
Object-Oriented Prog. (D.1.5) | Oct 2 14

Beginning JavaScript charts: with jqPlot, d3, and Highcharts

There are many texts and reference books for use with JavaScript, of course. One of the major uses of JavaScript involves web-based and interactive visualizations. This book is quite extensive...
Mathematical Software (G.4) | Sep 26 14

Commercial data mining: processing, analysis and modeling for predictive analytics projects

Author's Rebuttal: Bellin has not done his homework on this review. Let’s begin with the author, who he says is a Brazilian professor. On the back cover of the book, it...
Data Mining (H.2.8...) | Oct 13 14

Commercial data mining: processing, analysis and modeling for predictive analytics projects

Reviewer’s Re-rebuttal: For confusing Universitat Pompeu Fabra of Barcelona, Spain with Brazil, I am deeply regretful and apologize fully. As to the substance of the review, there seems to be...
Data Mining (H.2.8...) | Oct 13 14

Computational intelligence for decision support in cyber-physical systems

Cyber-physical systems (CPSs) consist of cyber components that implement the control of a physical system. They are usually designed as networks of sensors, actuators, and processing devices, so as to help humans and machines to interact and...
Real-Time & Embedded Systems (C.3...) | Oct 17 14

Computer games for learning: an evidence-based approach

With the advent of technology in academia, one of the age-old questions has been: Has all that technology facilitated learning? There seems to be a constant division between those who swear to the...
Computer Uses In Education (K.3.1) | Oct 31 14

Constraints meet concurrency

Constraint-based execution and concurrency are valuable allies, but they are not natural ones. This book examines ways in which constraints and concurrency can be brought into harmony. The results reported show how constraints can be trimmed...
Constraint & Logic Languages (D.3.2...) | Oct 1 14

Data center virtualization fundamentals

The design, architectures, and protocols used in modern data centers are the core topics of this book. Published by Cisco Press, it illustrates many examples with Cisco-specific hardware and configuration settings, but from a content point of view, the material...
Data Warehouse & Repository (H.2.7...) | Oct 3 14


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2014 ThinkLoud, Inc.
Terms of Use
| Privacy Policy