Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Saxena, Lalit
Combo Consultancy
Obra, Sonebhadra, India
   Reader Recommended
   Reviewer Selected
Follow this Reviewer
Date Reviewed  
- 10 of 83 reviews

   Readings in formal epistemology: sourcebook
Boensvang H., Rendsvig R., Arl-Costa H., Hendricks V., van Benthem J.,  Springer International Publishing, New York, NY, 2018. 937 pp. Type: Book (978-3-319793-03-0)

The essence of formal epistemology is in developing or formulating models of knowledge using formal tools, including probability, logic, decision theory, and computations. Thus, formal epistemology explains probabilistic models of knowledge and be...

Oct 4 2021  
  Linear programming: Foundations and Extensions (5th ed.)
Vanderbei R.,  Springer International Publishing, New York, NY, 2020. 495 pp. Type: Book (978-3-030394-14-1)

Linear programming (LP) finds the optimal solution to a mathematical problem with given resources or constraints. The optimization of resources in achieving an optimal solution employs various methods; simplex, convex analysis, degeneracy, game th...

Mar 16 2021  
   Digital forensics basics: a practical guide using Windows OS
Hassan N.,  Apress, New York, NY, 2019. 360 pp. Type: Book (978-1-484238-37-0)

Digital forensics, an emerging trend in the field of forensic science, involves electronic media as evidence in the court of law. The term is synonymous with computer forensics or cyber forensics. Digital forensics focuses on the acquisition, anal...

Nov 9 2020  
   Games user research
Drachen A., Mirza-Babaei P., Nacke L.,  Oxford University Press, Inc., New York, NY, 2018. 560 pp. Type: Book (978-0-198794-84-4)

Games user research (GUR) is a developing field that provides insight into game development, testing, and evaluation, incorporating player/user involvement and the playing and development environments. GUR tends to focus on the game playing philos...

Jul 2 2020  
  The continuing arms race: code-reuse attacks and defenses
Larsen P., Sadeghi A.  Association for Computing Machinery and Morgan & Claypool, New York, NY, 2018. Type: Divisible Book

Today’s Internet connections are prone to attacks related to memory errors, control flow, and exploiting security vulnerabilities. Code reuse attacks include return-into-libc, return-oriented programming (ROP), and memory corruption. This bo...

Feb 10 2020  
  Sweetie 2.0: using artificial intelligence to fight webcam child sex tourism
van der Hof S., Georgieva I., Schermer B., Koops B.,  Springer International Publishing, New York, NY, 2019. 542 pp. Type: Book (978-9-462652-87-3)

Webcam-related child sexual abuse, an emerging crime of the 21st century, involves perpetrators using digital media to commit offenses. Adequate amendments to substantive criminal and procedural criminal laws are the means to tackling such crime. ...

Jan 17 2020  
   Accumulation of knowledge in para-scientific areas: the case of analytic philosophy
Petrovich E.  Scientometrics 116(2): 1123-1151, 2018. Type: Article

Without an agreed-upon definition of analytic philosophy, philosophers and historians suggest viewing it as a parascience. Due to the accumulation and growth of knowledge in analytic philosophy, the author considers it an intellectual feature of t...

Aug 30 2019  
  Fundamentals of numerical computation
Driscoll T., Braun R.,  SIAM-Society for Industrial and Applied Mathematics, Philadelphia, PA, 2017. 559 pp. Type: Book (978-1-611975-07-9)

An interesting read, this book is composed of 13 chapters spread over two parts....

Jan 15 2019  
   Computational phylogenetics: an introduction to designing methods for phylogeny estimation
Warnow T.,  Cambridge University Press, New York, NY, 2018. 394 pp. Type: Book (978-1-107184-71-8)

Evolutionary biology broadly covers phylogeny or the phylogenetic tree, representing the relationships among individuals or groups of organisms. Specifically, computational phylogenetics deals with the implementation of computational methods and a...

Nov 14 2018  
  “Revenge porn”: an analysis of legislative and policy responses
Goldsworthy T., Raj M., Crowley J.  International Journal of Technoethics 8(2): 26-41, 2017. Type: Article

In recent years, uploading or sharing images or videos online has become a social norm around the globe. However, when it involves intimate, disturbing, or nude images or video, circulation may take the form of a criminal activity known as “...

Jun 18 2018  
Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2021 ThinkLoud, Inc.
Terms of Use
| Privacy Policy