Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
View:  Show:    
 
 

Computer Systems Organization (C)
SIPAD: SIP-VoIP anomaly detection using a stateful rule tree : Computer Communications

The prevalence of the session initiation protocol (SIP) in communications networks has led to an increase in papers that study...
Security & Protection (C.2.0...) | Apr 14 14

A survey of interdomain routing policies : ACM SIGCOMM Computer Communication Review

Interdomain routing determines the routes for delivering packets between two nodes that belong to different autonomous [network] systems...
Routing Protocols (C.2.2...) | Apr 14 14

Performance analysis of virtual mobility domain scheme vs. IPv6 mobility protocols : Computer Networks

Mobility management in wireless networks has been a hot topic in research for the past ten years. Meanwhile, the Internet Engineering Task Force (IETF)...
Network Protocols (C.2.2) | Mar 20 14

Distributed base station activation for energy-efficient operation of cellular networks : MSWiM 13

Wireless communications are becoming ubiquitous. Wi-Fi and third-generation (3G) or fourth-generation (4G) connections are everywhere. For Wi-Fi, you need access points. For 3G or 4G, you need base...
Network Management (C.2.3...) | Apr 15 14

A survey on cloud interoperability: taxonomies, standards, and practice : ACM SIGMETRICS Performance Evaluation Review

A comprehensive survey of interoperability strategies for various infrastructure as a service (IaaS) cloud platforms is conducted in this paper. The...
Cloud Computing (C.2.4...) | Apr 14 14

MillWheel: fault-tolerant stream processing at Internet scale : Proceedings of the VLDB Endowment

In this paper, the authors introduce MillWheel, a framework for processing real-time streamed data that is used at Google. It is based on the paradigm of streaming computing, in which users specify...
Fault Tolerance (C.4...) | Apr 11 14


Software (D)
Algorithmic trading review : CACM

Three researchers from University College of London, who have spent eight years developing algorithmic trading (AT) systems and an algorithmic trading/risk platform, have written a fascinating review...
Software Architectures (D.2.11) | Apr 9 14

Model-driven engineering of self-adaptive software with EUREMA : ACM Trans. on Autonomous & Adaptive Systems

Self-adaptive software is a very active field of research. Many projects (also sponsored by the European Commission (EC)) have been funded with the goal of providing techniques and tools...
Design Tools & Techniques (D.2.2) | Apr 15 14

Prototyping symbolic execution engines for interpreted languages : ASPLOS 14

While extensive testing is undoubtedly useful, it is also tedious. Automating this task as much as is feasible is an active research area; it has been more successfully...
Symbolic Execution (D.2.5...) | Apr 9 14

Software protection for dynamically generated code : PPREW 13

A process-level virtual machine (PVM) is a layer of software interleaved with the application and the host environment; it executes the application. The application binary is either transformed...
Restruct., Reverse Eng. & Reeng. (D.2.7...) | Apr 9 14


Software (D)

iOS 7 app development essentials

Developing iOS 7 applications is a desirable skill. The iPhone and the iPad are successful and influential devices: millions have been sold, and many people consider them essential. Portable computing...
General (D.1.0) | Apr 9 14

Applications and markets for cooperating objects

There is huge potential, and also recent urgent demand, for connecting the physical world and the cyber world. With the diversity of Internet data and services, with the pervasive reach of networked sensor devices into physical environments...
Object-Oriented Programming (D.1.5) | Mar 27 14

Enterprise architecture patterns: practical solutions for recurring IT-architecture problems

Perroud and Inversini give us a book that discusses issues of “recurring architecture problems” in information technology systems, with the emphasis upon major enterprises. The subject is a...
Software Architectures (D.2.11) | Mar 21 14

An introduction to analysis of financial data with R

This book fits a promising niche in books related to financial analysis and the R programming language. Many books addressing the analysis of financial data either focus extensively on the underlying...
General (D.3.0) | Mar 25 14

Building Java programs (3rd ed.)

This textbook enters a crowded field of titles aimed at the university “how to program” market, which includes many who are not computer science majors but may desire (or require) programming instruction [1,2,3]...
Java (D.3.2...) | Apr 11 14

The advanced iOS 6 developer’s cookbook

I like this book a lot. It is written in a very clear cookbook style, with 12 major chapters and well over 100 individual recipes, each one-to-five pages long. Each recipe includes clear code snippets, and the full source code is available on GitHub...
Apple (D.3.2...) | Mar 19 14

Learn Python the hard way (3rd ed.)

The first class in programming is often very difficult, both for students and instructors. Students must learn to do things that run counter to much of what they’ve already learned (reading code is an entirely...
Python (D.3.2...) | Mar 6 14

iOS 7 programming cookbook

As of February 2014, Apple strongly recommends that all iOS mobile application programmers write their applications so they are optimized to run on iOS 7. Consequently, the submission of optimized...
General (D.4.0) | Mar 26 14

Ubuntu unleashed 2014 edition: covering 13.10 and 14.04

This is the latest in a series of books published since 2006, and it is intended to cover Ubuntu versions 13.10 and 14.04 LTS. A 13.10 32-bit installation DVD is included inside its back cover, and a bonus...
Linux (D.4.0...) | Mar 26 14


Data (E)

A brief history of cryptology and cryptographic algorithms

Despite its brevity, this 96-page book provides a detailed survey of cryptology from Julius Caesar’s time to 2001. Most readers will find the cryptographic algorithms included at specific points...
Data Encryption (E.3) | Mar 26 14

   
Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2014 ThinkLoud, Inc.
Terms of Use
| Privacy Policy