Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Davis, Charles
University of St. Thomas
Houston, Texas
 
   Reader Recommended
   Reviewer Selected
Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 10 of 81 reviews

   
  The impact of advanced analytics and data accuracy on operational performance: a contingent resource based theory (RBT) perspective
Chae B., Yang C., Olson D., Sheu C. Decision Support Systems 59119-126, 2014.  Type: Article

This paper describes a study that focuses on advanced analytics and accurate manufacturing data as two primary resources for influencing operational performance in a manufacturing context. The study demonstrates that in order for manuf...

Sep 18 2014  
   Computational business analytics
Das S., Chapman & Hall/CRC, Boca Raton, FL, 2014. 516 pp.  Type: Book (978-1-439890-70-7)

This book provides a comprehensive review of computational analytics methods and techniques. It is a rich and readable summary of the field. The approach here is to augment statistical approaches with techniques from symbolic artificia...

Jun 3 2014  
   Data science and prediction
Dhar V. Communications of the ACM 56(12): 64-73, 2013.  Type: Article, Reviews: (1 of 2)

This is an enlightening treatise on data science. There is no hype here--just a thought-provoking piece that articulates fundamental concepts and implications. The natural audience is the IT or business professional (or manage...

May 13 2014  
  Software projects secrets: why projects fail
Stepanek G., Apress, Berkeley, CA, 2012. 184 pp.  Type: Book (978-1-430251-01-9)

This practical, insightful book is about managing projects using agile software development techniques, and the advantages of using such techniques over more traditional waterfall software development methods. It is based upon a solid ...

Mar 15 2013  
  Internet architecture and innovation
van Schewick B., The MIT Press, Cambridge, MA, 2012. 592 pp.  Type: Book (978-0-262518-04-8)

Society has been, and continues to be, transformed by the Internet. Economic, cultural, social, and political landscapes have undergone dramatic change in the past 30 years. As the Internet has expanded and morphed into its current for...

Jan 11 2013  
  Bootstrapping trust in modern computers
Parno B., McCune J., Perrig A., Springer Publishing Company, Incorporated, New York, NY, 2011. 110 pp.  Type: Book (978-1-461414-59-9)

In this book, the authors deal with techniques for bootstrapping trust into commodity computers by providing relevant security information about the computer’s executing environment to interested entities. It is a survey of a...

May 23 2012  
  Security and game theory: algorithms, deployed systems, lessons learned
Tambe M., Cambridge University Press, New York, NY, 2011. 328 pp.  Type: Book (978-1-107096-42-4)

This book deals with the use of game theory as a tool for combating security threats due to terrorism, drug smuggling, and other criminal activity. These threats have accelerated the need to maximize the effectiveness of limited securi...

May 9 2012  
  Quantitative risk assessment: the scientific platform
Aven T., Cambridge University Press, New York, NY, 2011. 224 pp.  Type: Book (978-0-521760-57-7), Reviews: (1 of 2)

This is a timely topic, and a very interesting book. The basic idea of the book is to provide a unifying scientific framework based upon concepts of reliability and validity for analyzing and discussing risk assessment quality. The foc...

Jun 14 2011  
  Overview of the PMBOK guide: short cuts for PMP certification
Conchúir D., Springer Publishing Company, Incorporated, New York, NY, 2010. 213 pp.  Type: Book (978-3-642111-87-7)

As the title suggests, this book is an overview of A guide to the project management body of knowledge (PMBOK guide) [1]. The PMBOK guide, which is now in its 4th edition, is published by the Project Management Institute ...

Jan 19 2011  
  Enterprise Mac security: Mac OS X Snow Leopard
Edge C., Barker W., Hunter B., Sullivan G., Apress, Berkeley, CA, 2010. 648 pp.  Type: Book (978-1-430227-30-4)

In addition to being an excellent reference on Mac security technology, this volume provides an in-depth review of general network security issues. While Mac users almost universally tend to believe that a Mac platform is more secure t...

Sep 30 2010  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy