Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help


Algorithmic nuggets in content delivery : ACM SIGCOMM Computer Communication Review

Those who design and operate content delivery networks look for speed, dependability, and consistency. Though several methods are required to achieve these objectives, this paper focuses...
Client/Server (C.2.4...) | Nov 13 15

Differences and similarities between finger and pen stroke gestures on stationary and mobile devices : ACM Trans. on Computer-Human Interaction

Before the advent of the iPhone, touch-based interaction between users and personal computational devices was dominated...
User Interfaces (H.5.2) | Oct 30 15

Does automated unit test generation really help software testers? A controlled empirical study : ACM Trans. on Software Engineering and Methodology

If you are a developer of an automated test generation tool, you may want to know how this type of software impacts the testing process. In general, automated test generation software is...
Testing & Debugging (D.2.5) | Oct 22 15

Concurrent dynamic algebra : ACM Transactions on Computational Logic

Furusawa and Struth construct an algebra of multirelations (where an element is related to a set of elements) motivated by Peleg’s concurrent dynamic logic [1]. Sequential composition is no longer...
Alg. Approaches to Semantics (F.3.2...) | Nov 5 15

Deterring cheating in online environments : ACM Transactions on Computer-Human Interaction

All educational institutions have faced issues of plagiarism and academic dishonesty; this has been partially resolved by requiring students to agree to an honor code. However, these same institutions...
Computers & Education (K.3) | Nov 6 15

The effect of data caps upon ISP service tier design and users : ACM Transactions on Internet Technology

Data caps are known as an effective tool to manage people’s data usage over cellular or Internet service provider (ISP) networks. Since many people control their data usage to avoid overage charges...
Network Protocols (C.2.2) | Nov 12 15

Affine refinement types for secure distributed programming : ACM Transactions on Programming Languages and Systems

Security of communication in modern applications is an increasingly important issue. Although there are strong cryptographic techniques, security is often broken nevertheless due to weaknesses in the...
Software/Program Verification (D.2.4) | Oct 27 15

Automated support for reproducing and debugging field failures : ACM Transactions on Software Engineering and Methodology

Field failures are difficult to reproduce for debugging in-house. This paper applies a BugRedux technique to capture the essential execution data and...
Testing And Debugging (D.2.5) | Oct 26 15

Frog: a framework for context-based file systems : ACM Transactions on Storage

Context-aware computing allows modern storage systems to dynamically optimize performance and energy efficiency as the function of a given context. However, existing context-aware techniques...
Database Management (H.2) | Nov 12 15

Engineering simulated evolution for virtual machine assignment problem : Applied Intelligence

Nowadays, computing tends to be performed less and less on single computers, but rather on centralized pools of resources collectively...
Cloud Computing (C.2.4...) | Oct 27 15

A guide to numerical modelling in systems biology

I had hoped to acquire further notions in systems biology, a new interdisciplinary area aimed at modeling and identifying the parameters of biochemical, physiological, molecular, and genetic processes, while also finding tools to build such...
Model Development (I.6.5) | Nov 24 15

A practical guide to SysML: the systems modeling language (3rd ed.)

The primary goal of this book is to introduce model-based engineering through SysML, a graphical systems modeling language that is being promoted as an alternative to the unified modeling language...
Software Engineering (D.2) | Oct 28 15

A practical guide to Ubuntu Linux (4th ed.)

This book is not for a faint-hearted reader: 1,400 pages are not easy to handle on your desk, especially since the book is printed on thin paper. The book is not really about Ubuntu; rather, it’s about Unix and Linux. You will not learn anything about the...
Systems Programs & Utilities (D.4.9) | Nov 6 15

Agile IT organization design: for digital transformation and continuous delivery

Continuous delivery is often viewed from a technical side. Instead, Narayan addresses it from an organizational and business side. He focuses on agile organization design. The book considers the 12...
Business (J.1...) | Nov 24 15

Anticipation: learning from the past

The best place to start while trying to understand this volume is to define the science of anticipation. In the introduction, the volume provides a definition: “an anticipatory system is a system whose current state depends not only upon previous states, but...
Cognitive Simulation (I.2.0...) | Nov 16 15

Beginning Node.js

Software developers or computer-savvy people who need an excellent introduction to this relatively recent alternative to well-established web servers and web server coding are the audience for this book. It is well written and logical, with gradually increasing...
Object-Oriented Programming (D.1.5) | Oct 29 15

Big data and the Internet of Things

The book’s subtitle best describes what it’s all about. The book does not focus on selling the concepts of big data and the Internet of Things (IoT). Rather, it assumes that big data and IoT are ushering in a new age of information technology (IT). This new age...
Distributed Systems (C.2.4) | Nov 10 15

Building great software engineering teams: recruiting, hiring, and managing your team from startup to success

It is commonly accepted in the software engineering field that “the best programmers are up to 28 times better than the worst programmers, according to ‘individual differences’...
Management (D.2.9) | Oct 23 15

Building your next big thing with Google Cloud Platform

Web-based services can be confusing to deploy, and this title attempts to make it less so for the Google Cloud Platform (whose major public competitor is AWS). It is written by two experienced coders...
Distributed Programming (D.1.3...) | Nov 18 15

Business intelligence: 4th European Summer School, eBISS 2014, Berlin, Germany, July 6-11, 2014, Tutorial Lectures

Business intelligence is usually perceived to be associated closely with the corporate world of business. It is common to expect a discussion on business-related activities when one comes...
Business (J.1...) | Nov 11 15

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2015 ThinkLoud, Inc.
Terms of Use
| Privacy Policy