Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help


Security and privacy protection in visual sensor networks: a survey : ACM Computing Surveys

Visual sensor networks (VSNs) consist of devices with image sensors and with processing and networking capabilities, to monitor large quantities...
Security & Protection (K.6.5) | Sep 30 14

Locality analysis: a nonillion time window problem : ACM SIGMETRICS Performance Evaluation Review

Big data analyses provide associations among large datasets for probing business trends, averting diseases, connecting legal citations, fighting crimes, and finding out instantaneous highway traffic...
Metrics (D.2.8) | Oct 1 14

Scaling of capacity and reliability in data center networks : ACM SIGMETRICS Performance Evaluation Review

The interconnection of servers has a critical impact on data center performance, so the internal network requires an efficient design. As data center sizes scale up, a significant tradeoff between...
General (C.0) | Oct 6 14

Discovering social circles in ego networks : ACM Trans. on Knowledge Discovery from Data

A social circle in a user’s ego network is a group of interconnected people that have common attributes between themselves and the user. In...
Information Search & Retrieval (H.3.3) | Oct 9 14

Cost-aware cloud bursting for enterprise applications : ACM Transactions on Internet Technology

Seagull, a system to optimally manage cloud bursting, is described in this paper; optimization is with respect to the number and size of virtual machine (VM) images and total data...
Cloud Computing (C.2.4...) | Oct 6 14

Computing petaflops over terabytes of data: the case of genome-wide association studies : ACM Transactions on Mathematical Software

With its catchy but somewhat misleading title, this paper proposes a method for efficiently solving multiple instances of the same problem when the instances are correlated. The authors propose...
Algorithm Design & Analysis (G.4...) | Oct 16 14

RIVER: reconfigurable flow and fabric for real-time signal processing on FPGAs : ACM Transactions on Reconfigurable Technology and Systems

Field-programmable gate arrays have become the most effective, powerful, and generic logic design and verification tools...
Real-Time & Embedded Systems (C.3...) | Oct 14 14

On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment : ASIA CCS 14

In recent years, virtual machines (VMs) have become clearly very important for the computing infrastructure of companies. It is therefore not surprising...
Security & Protection (D.4.6) | Oct 8 14

Cloud refactoring: automated transitioning to cloud-based services : Automated Software Engineering

Refactoring is the process of changing how a program works without changing what it does; even before the term was coined, it was practiced by programmers as “program restructuring” from...
Software Development (K.6.3...) | Oct 7 14

GUITAR: an innovative tool for automated testing of GUI-driven software : Automated Software Engineering

This paper presents research about the automated testing of graphical user interfaces (GUIs). Although it is addressed to the designers of such tools, it can be useful to anyone who wishes to understand...
Testing & Debugging (D.2.5) | Oct 16 14

Advanced C and C++ compiling

The title of this book is a bit misleading since it implies a book presenting a detailed explanation of compiler documentation often skipped or misunderstood by most users. This is not true. Instead...
Compilers (D.3.4...) | Oct 13 14

Agent-oriented software engineering: reflections on architectures, methodologies, languages, and frameworks

The field of agent-oriented software engineering (AOSE), which is the focus of this book, is around two decades old. An agent-oriented perspective on software engineering exploits the view that the...
General (D.2.0) | Sep 24 14

Agile risk management

In this book, the author introduces a methodology for agile risk management in software development. Risk management for information technology (IT) projects is not new and has always been an integral part of various software engineering and IT project...
Project & People Management (K.6.1) | Oct 17 14

Android recipes: a problem-solution approach (3rd ed.)

Staying up to date with new versions of mobile platforms can be a challenge, and few are more challenging than Android as it is frequently updated. As of this writing, we’re up to KitKat, version 4.4...
Object-Oriented Prog. (D.1.5) | Oct 2 14

Beginning JavaScript charts: with jqPlot, d3, and Highcharts

There are many texts and reference books for use with JavaScript, of course. One of the major uses of JavaScript involves web-based and interactive visualizations. This book is quite extensive...
Mathematical Software (G.4) | Sep 26 14

Beginning Xcode

This well-structured book covers a software application development tool especially for Mac and iOS devices: Xcode. It is intended to provide knowledge to developers who want to start writing applications using...
Programming Environments (D.2.6) | Sep 23 14

Brain-computer interfacing: an introduction

What is necessary to build an interface between a human brain and a machine? Knowledge from several areas of expertise (neuroscience, signal processing, and machine learning) put together: a recipe for a brain-computer interface (BCI). It is a new...
User Interfaces (H.5.2) | Sep 24 14

Cloud computing and digital media

Cloud computing is now a well-known subject. Digital media can also be considered a very clearly defined term. But how is digital media handled using cloud computing technology? This book introduces some digital media processing practices in a cloud...
Cloud Computing (C.2.4...) | Sep 25 14

Cloud computing basics

This book delivers what it promises: it describes the basics of cloud computing. Chapters 1 and 2 give an introduction indicating where cloud computing comes from, and provide an overview of the different types of cloud computing: software, platform, and...
Cloud Computing (C.2.4...) | Sep 24 14

Commercial data mining: processing, analysis and modeling for predictive analytics projects

Author's Rebuttal: Bellin has not done his homework on this review. Let’s begin with the author, who he says is a Brazilian professor. On the back cover of the book, it...
Data Mining (H.2.8...) | Oct 13 14

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2014 ThinkLoud, Inc.
Terms of Use
| Privacy Policy