Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Masi, Massimiliano
Tiani ``Spirit'' GmbH
Vienna, Austria
 
   Reader Recommended
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 10 of 42 reviews

   
   Carl Adam Petri: ideas, personality, impact
Reisig W., Rozenberg G.,  Springer International Publishing, New York, NY, 2019. 249 pp. Type: Book (978-3-319961-53-8)

Every computer scientist studies Petri nets in their early academic years. Petri nets are a powerful yet very intuitive modeling tool for concurrent and distributed systems. Such networks were introduced by Carl Adam Petri (1926-2010) in his PhD t...

Mar 25 2021  
   Dynamic malware analysis in the modern era--a state of the art survey
Or-Meir O., Nissim N., Elovici Y., Rokach L.  ACM Computing Surveys 52(5): 1-48, 2019. Type: Article

Malware is a problem. Its spreading within industrial networks and critical infrastructures shows that there is an always increasing need for cybersecurity expertise to detect, protect, and react to infections. Unfortunately, analyzing how malware...

May 14 2020  
  Optimization of diagnosis and treatment of chronic diseases based on association analysis under the background of regional integration
Xia K., Zhong X., Zhang L., Wang J.  Journal of Medical Systems 43(3): 1-8, 2019. Type: Article

Digitized clinical data analysis can help to improve patient care and increase medical quality in regional clinical systems. Specifically, it enables population health queries and clinical research and improves clinical processes through the secon...

Mar 3 2020  
  Challenges of privacy-preserving machine learning in IoT
Zheng M., Xu D., Jiang L., Gu C., Tan R., Cheng P.  AIChallengeIoT 2019 (Proceedings of the First International Workshop on Challenges in Artificial Intelligence and Machine Learning for Internet of Things, New York, NY,  Nov 10-13, 2019) 1-7, 2019. Type: Proceedings

The widespread adoption of Internet of Things (IoT) devices has made available a huge amount of data, thus enabling the development of applications that use machine learning (ML) to gather and dig up information, even from a user’s private l...

Feb 3 2020  
  Automatic software repair: a bibliography
Monperrus M.  ACM Computing Surveys 51(1): 1-24, 2018. Type: Article, Reviews: (2 of 2)

There is a well-known saying in Silicon Valley about the omnipresence of programmable computers in our everyday life: software is eating the world, but unfortunately each bite comes with bugs. Such software can even be a threat to user safety, and...

Nov 13 2019  
  ContractFuzzer: fuzzing smart contracts for vulnerability detection
Jiang B., Liu Y., Chan W.  ASE 2018 (Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, Montpellier, France,  Sep 3-7, 2018) 259-269, 2018. Type: Proceedings

Many fields exploit blockchain technology, including those related to human and life sciences, supply chains, and clinical research. However, especially in the past couple years (namely 2017), almost all transactions running on public blockchains ...

Oct 11 2019  
  Empirically-based secure OS design
Weber S., Shostack A., Solworth J., Zurko M.  NSPW 2017 (Proceedings of the 2017 New Security Paradigms Workshop, Santa Cruz, CA,  Oct 1-4, 2017) 90-93, 2017. Type: Proceedings

In this New Security Paradigms Workshop (NSPW) panel, four people discuss research methods and the actual meaning of a secure operating system (OS)....

Jun 13 2019  
  Mending the patchwork of requirements from multiple standards using participative goal modelling: a case in the food industry
Barata J., Cunha P.  Requirements Engineering 23(4): 425-441, 2018. Type: Article

It is a truth, especially in Europe and the US, that with the emergence of new regulations such as eIDAS (EU 910/2014), the General Data Protection Regulation (GDPR, EU 679/2016), and the Health Insurance Portability and Accountability Act of 1996...

Jan 18 2019  
  Choosing component origins for software intensive systems: in-house, COTS, OSS or outsourcing?--A case survey
Petersen K., Badampudi D., Shah S., Wnuk K., Gorschek T., Papatheocharous E., Axelsson J., Sentilles S., Crnkovic I., Cicchetti A.  IEEE Transactions on Software Engineering 44(3): 237-261, 2018. Type: Article

Software-intensive systems are among the most common systems that run our everyday lives. International Organization for Standardization (ISO) 42010 introduces them as systems “in which software development and/or integration are dominant co...

Nov 5 2018  
  Maintaining architecture-implementation conformance to support architecture centrality: from single system to product line development
Zheng Y., Cu C., Taylor R.  ACM Transactions on Software Engineering and Methodology 27(2): 1-52, 2018. Type: Article

Software architecture plays a vital role in the life cycle of a software product, whether you follow agile principles or not. Software architectures allow one to properly design a system and enable the evaluation of certain quality attributes ex a...

Sep 4 2018  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2021 ThinkLoud, Inc.
Terms of Use
| Privacy Policy