|
|
|
|
|
|
Date Reviewed |
|
|
1 - 10 of 24
reviews
|
|
|
|
|
|
|
|
Discovering user behavioral features to enhance information search on big data Cassavia N., Masciari E., Pulice C., Saccà D. ACM Transactions on Interactive Intelligent Systems 7(2): 1-33, 2017. Type: Article
Cassavia et al. reduce theory into practice in this paper. All too often, the disciplines we live in exist abstractly with theories or dense algorithms. The authors set a great example by showing how their modeling works in practice; i...
|
Nov 10 2017 |
|
|
|
|
|
|
Combining user reputation and provenance analysis for trust assessment Ceolin D., Groth P., Maccatrozzo V., Fokkink W., Van Hage W., Nottamkandath A. Journal of Data and Information Quality 7(1-2): 1-28, 2016. Type: Article
The social engagement enabled by the Internet moved critical evaluation beyond the specialized few and distributed it in the hands of the common many. It is routine to evaluate the reputation of items in an online shopping context by t...
|
May 12 2016 |
|
|
|
|
|
|
A methodology to evaluate important dimensions of information quality in systems Todoran I., Lecornu L., Khenchaf A., Le Caillec J. Journal of Data and Information Quality 6(2): 1-23, 2015. Type: Article, Reviews: (1 of 2)
As the world begins to surf down the “trough of disillusionment” with big data [1], on the journey to sorting out what can be real and what has value, we rediscover the discipline that data and information scientist...
|
Aug 5 2015 |
|
|
|
|
|
|
The UX five-second rules: guidelines for user experience design’s simplest testing technique Doncaster P., Morgan Kaufmann Publishers Inc., San Francisco, CA, 2014. 140 pp. Type: Book (978-0-128005-34-7)
Increasingly, professionals are challenged to do more with less. Unless you work at a mature organization that supports a rich user experience (UX) discipline, it is likely that someone not trained in the domain is playing the role. It...
|
Jan 19 2015 |
|
|
|
|
|
|
Embedded analytics and statistics for big data Louridas P., Ebert C. IEEE Software 30(6): 33-39, 2013. Type: Article
If there is a topic that has been overhyped, it is big data [1]. A confluence of trends has made it possible to start working with previously unimaginable data in all its volume, velocity, and variety. For most, we don’t actu...
|
Aug 19 2014 |
|
|
|
|
|
|
Design and ethics in the era of big data Goodman E. interactions 21(3): 22-24, 2014. Type: Article
There are relatively few sources of really big data, and the best examples tend to be linked to consumer technologies and services. Even then, much of the data is something we agreed to when we engaged in its use. No one ever reads the...
|
Jun 10 2014 |
|
|
|
|
|
|
Traveling the Silk Road: a measurement analysis of a large anonymous online marketplace Christin N. WWW 2013 (Proceedings of the 22nd International World Wide Web Conference, Rio de Janeiro, Brazil, May 13-17, 2013) 213-224, 2013. Type: Proceedings
On October 1, 2013, US federal agencies (the Federal Bureau of Investigation (FBI), the Drug Enforcement Agency (DEA), and the Internal Revenue Service (IRS)) shut down Silk Road [1], a Tor hidden service that was an anonymous marketpl...
|
Apr 15 2014 |
|
|
|
|
|
|
Is cloned code older than non-cloned code? Krinke J. IWSC 2011 (Proc. of the 5th International Workshop on Software Clones, Waikiki, Honolulu, HI, May 23, 2011) 28-33, 2011. Type: Proceedings
One method of reducing software development risk is through the reuse of proven code--typically, source code that a developer or team has used before that is formally an asset or trusted when copied and pasted to perform in a ...
|
Apr 27 2012 |
|
|
|
|
|
|
Enabling context-aware Web services: methods, architectures, and technologies Sheng Q., Yu J., Dustdar S., Chapman & Hall/CRC, Boca Raton, FL, 2010. 558 pp. Type: Book (978-1-439809-85-3)
Context-aware computing focuses on understanding the end user in a more intimate, targeted, and relevant way. It is about considering not simply the declarative elements of an interaction, but also the relevant unspoken artifacts surro...
|
Sep 30 2010 |
|
|
|
|
|
|
Human-centered software engineering: software engineering models, patterns and architectures for HCI Seffah A. (ed), Vanderdonckt J. (ed), Desmarais M. (ed), Springer Publishing Company, Incorporated, London, UK, 2009. 398 pp. Type: Book (9781848009066)
Editing a volume of chapters contributed by individual authors is one of the most challenging acts of authorship. It takes clarity of vision and relentless conviction, both of which are squeezed by the time pressures of publishers and ...
|
Oct 29 2009 |
|
|
|
|
|
|
|
|
|
|
|