Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help


A survey on DHT-based routing for large-scale mobile ad hoc networks : ACM Computing Surveys

Mobile ad hoc networks (MANETs) are critical in the mobile era. There are more and more people using mobile networks, meaning more and more...
Network Protocols (C.2.2) | Dec 8 14

Matrix calculus for classical and quantum circuits : ACM Journal on Emerging Technologies in Computing Systems

Excepting the final measurement, quantum computations are reversible computations. Quantum computers are infamously hard to construct...
General (F.0) | Dec 17 14

Opinions of people: factoring in privacy and trust : ACM SIGAPP Applied Computing Review

As online social networks have become part of daily life, social aware recommendation has progressively emerged aiming at more sophisticated...
Information Filtering (H.3.3...) | Nov 20 14

Cloudsweeper and data-centric security : ACM SIGCAS Computers and Society

Internet users want their data on the Internet--for example, emails and Facebook data--to be well protected against malicious attacks. Current...
Information Storage (H.3.2) | Nov 20 14

Exploring smart grid and data center interactions for electric power load balancing : ACM SIGMETRICS Performance Evaluation Review

Cloud computing requires huge data centers that consume significant amounts of electric energy. Such a significant energy consumer may be a risk...
Performance Of Systems (C.4) | Dec 15 14

RIVER: reconfigurable flow and fabric for real-time signal processing on FPGAs : ACM Trans. on Reconfigurable Technology and Systems

The authors of this paper describe an architecture called RIVER and a design flow for field-programmable gate arrays. They...
Real-Time & Embedded Systems (C.3...) | Dec 11 14

Mining unit tests for discovery and migration of math APIs : ACM Trans. on Software Engineering & Methodology

Unit tests are not just about testing [1]. A unit test is a piece of code that executes a part of a program (the unit) and checks to see if it worked. Therefore...
Comp.-Aided SW Eng. (D.2.2...) | Dec 2 14

User vulnerability and its reduction on a social networking site : ACM Transactions on Knowledge Discovery from Data

Social media users sometimes expose their friends to confidentiality and safety breaches. To what extent are companionable users vulnerable to security...
Database Administration (H.2.7) | Dec 8 14

Pattern-based verification for multithreaded programs : ACM Transactions on Programming Languages and Systems

The verification of some program properties via model checking has matured in recent years for sequential programming. However, for multithreaded...
Software/Program Verification (D.2.4) | Nov 19 14

Staging the self-assembly process: inspiration from biological development : Artificial Life

This work, by Bhalla et al., is very useful for the design of nanoscale and microscale structures and DNA computing using self-assembly. It is also...
General (I.2.0) | Nov 17 14

Agile project management: managing for success

Agile, the new development paradigm, is used today throughout software development life cycles, but also for other information technology (IT) product development. Under the “agile” name is a whole family of related modern development methodologies...
Software Management (K.6.3) | Nov 11 14

Analytic tomography

Mathematicians and practitioners working in the area of tomography will enjoy this book. For engineers and developers, the author offers a gentle mathematical introduction delineating the importance of the Radon transform and filtered backprojection...
Computation of Transforms (F.2.1...) | Nov 26 14

Applied networking labs

Computer networks have become an integral part of our daily lives. Anyone working with networked computers should have at least basic knowledge of establishing these networks, checking their functionality, and ensuring their smooth...
Network Management (C.2.3...) | Dec 15 14

Beginning Java 8 language features

This book covers all the main language features that are Java specific, providing an extensive and detailed discussion of these components. Therefore, its main audience consists of developers with an already good...
Java (D.3.2...) | Nov 25 14

Beginning T-SQL (3rd ed.)

If you are interested in teaching yourself SQL, this 400-plus-page softcover book is a gem. It provides a complete walkthrough, from installing SQL Server Express free of charge and a working...
SQL (H.2.3...) | Nov 20 14

Big data

The challenges of handling the data produced by new application areas are evolving enormously in this century. The life cycle of data, the tools to handle it, the application areas in need of solutions, the...
Database Applications (H.2.8) | Nov 21 14

Big data: a revolution that will transform how we live, work, and think

Being continually updated on new trends in computing through social networks and specialized publications, I must admit that the term “big data” has flooded the web over the last few years. I also witnessed...
Database Applications (H.2.8) | Dec 11 14

Body sensor networks (2nd ed.)

With the growing importance of proactive human healthcare and well-being needs, pervasive body sensing capabilities, the corresponding networking of sensors, and health data analytics are getting important attention when it comes to research...
Sensor Networks (C.2.1...) | Dec 9 14

Computational finance: an introductory course with R

A person who is starting to learn quantitative investment, is acquainted with statistics, and has some experience with data processing tools like R, Statistica, or MATLAB will enjoy this book. It really...
Financial (J.1...) | Nov 17 14

Conformal prediction for reliable machine learning: theory, adaptations and applications

Conformal prediction is based on a family of measures that are based on a combination of algorithmic information theory and machine learning techniques, providing a means for reliable estimation with...
Learning (I.2.6) | Dec 4 14

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2014 ThinkLoud, Inc.
Terms of Use
| Privacy Policy