Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
Misc

View:



Opinions of people: factoring in privacy and trust : ACM SIGAPP Applied Computing Review

As online social networks have become part of daily life, social aware recommendation has progressively emerged aiming at more sophisticated...
Information Filtering (H.3.3...) | Nov 20 14

Cloudsweeper and data-centric security : ACM SIGCAS Computers and Society

Internet users want their data on the Internet--for example, emails and Facebook data--to be well protected against malicious attacks. Current...
Information Storage (H.3.2) | Nov 20 14

A certified reduction strategy for homological image processing : ACM Trans. on Computational Logic

True-life biomedical images, such as the synapses of neurons, are too large and onerous to process. How should the data structures of huge digital images be reliably condensed without losing their...
Mechanical Theorem Proving (F.4.1...) | Nov 6 14

Trust prediction via belief propagation : ACM Transactions on Information Systems

Assessing trust relationships in social networks is vital for a lot of applications. However, the problem is challenging as trust relationships are often not directly observable. The goal of this paper...
Human Information Processing (H.1.2...) | Nov 11 14

Pattern-based verification for multithreaded programs : ACM Transactions on Programming Languages and Systems

The verification of some program properties via model checking has matured in recent years for sequential programming. However, for multithreaded...
Software/Program Verification (D.2.4) | Nov 19 14

Network reconnaissance, attack, and defense laboratories for an introductory cyber-security course : ACMSE 13

Anyone setting up a hands-on cybersecurity training course should read this paper. Greenlaw and associates describe a clear set of learning objectives, and the steps they took. While there are...
Curriculum (K.3.2...) | Nov 3 14

Model-driven development of content management systems based on Joomla : ASE 14

This paper describes at a high level a model-driven development (MDD) approach to extensions of a content management system (CMS) like Joomla. Through factoring models of these extensions...
Design Tools & Techniques (D.2.2) | Nov 5 14

Wireless sensor network lifetime maximization by optimal sensor deployment, activity scheduling, data routing and sink mobility : Ad Hoc Networks

Energy conservation is vital to wireless sensor networks (WSNs) in light of the inherently limited sensor power budget and the need for...
Sensor Networks (C.2.1...) | Nov 3 14

Staging the self-assembly process: inspiration from biological development : Artificial Life

This work, by Bhalla et al., is very useful for the design of nanoscale and microscale structures and DNA computing using self-assembly. It is also...
General (I.2.0) | Nov 17 14

Trust in client-vendor relations: an empirical study of collaboration across national and organizational boundaries : CABS 14

Trust among team members is a crucial variable for the success of a project. Consequently, trust has been studied extensively in all kinds of teams, including global virtual teams. This paper examines...
General (K.6.0) | Nov 6 14



Agile project management: managing for success

Agile, the new development paradigm, is used today throughout software development life cycles, but also for other information technology (IT) product development. Under the “agile” name is a whole family of related modern development methodologies...
Software Management (K.6.3) | Nov 11 14

Agile risk management

In this book, the author introduces a methodology for agile risk management in software development. Risk management for information technology (IT) projects is not new and has always been an integral part of various software engineering and IT project...
Project & People Management (K.6.1) | Oct 17 14

Beginning T-SQL (3rd ed.)

If you are interested in teaching yourself SQL, this 400-plus-page softcover book is a gem. It provides a complete walkthrough, from installing SQL Server Express free of charge and a working...
SQL (H.2.3...) | Nov 20 14

Big data

The challenges of handling the data produced by new application areas are evolving enormously in this century. The life cycle of data, the tools to handle it, the application areas in need of solutions, the application of working but immature technology, open...
Database Applications (H.2.8) | Nov 21 14

Big data integration theory: theory and methods of database mappings, programming languages, and semantics

“Big data” is a catchy term used to refer to high-volume, high-velocity information assets, either structured or unstructured, that appear in a huge variety of forms. The idea behind big data is...
Logical Design (H.2.1) | Nov 10 14

Computational finance: an introductory course with R

A person who is starting to learn quantitative investment, is acquainted with statistics, and has some experience with data processing tools like R, Statistica, or MATLAB will enjoy this book. It really...
Financial (J.1...) | Nov 17 14

Computer games for learning: an evidence-based approach

With the advent of technology in academia, one of the age-old questions has been: Has all that technology facilitated learning? There seems to be a constant division between those who swear to the usefulness of computers, games, and technology in the...
Computer Uses In Education (K.3.1) | Oct 31 14

Constraint programming and decision making

Constraint programming plays an ever more important role in many real-life applications that require automated decision making. This somewhat poorly edited collection of papers attempts to bridge the gap between researchers working on constraint...
Logic & Constraint Programming (F.4.1...) | Nov 5 14

Design thinking research: building innovators

This is a peculiar book. Although the title clearly says the book is about research into design approaches, it is easy to imagine that the reader of the book would come away with some new thoughts on doing design. That would be naive. The book is actually a...
User-Centered Design (H.5.2...) | Nov 17 14

Disconnected: youth, new media, and the ethics gap

This short book presents survey results about the moral and ethical attitudes of young people, between the ages of ten and 25 years, toward Internet behavior. The narrative is organized around...
Ethics (K.4.1...) | Oct 28 14


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2014 ThinkLoud, Inc.
Terms of Use
| Privacy Policy