Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Shamsi, Jawwad
FAST National University of Computer and Emerging Sciences
Karachi, Pakistan
 
   Reader Recommended
   Reviewer Selected
Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 9 of 9 reviews

   
  Data science solutions with Python: fast and scalable models using Keras, PySpark MLlib, H2O, XGBoost, and Scikit-Learn
Nokeri T., Apress, New York, NY, 2021. 136 pp.  Type: Book (978-1-484277-61-4)

This book elaborates on different models of data science. It includes a brief description of theory, which is supported by program/code listings....

Jun 29 2022  
   Intelligent systems and methods to combat Covid-19
Joshi A., Dey N., Santosh K., Springer International Publishing, New York, NY, 2020. 239 pp.  Type: Book (978-9-811565-71-7)

The book describes intelligent systems and methods to combat Covid-19. It is composed of ten chapters....

Sep 6 2021  
   Deep learning illustrated
Krohn J., Beyleveld G., Bassens A., Addison-Wesley, Boston, MA, 2020. 416 pp.  Type: Book (978-1-351166-94-2)

Deep learning is an emerging topic. This book aims to cover deep learning and its applications through programming examples and illustrations. The book is divided into 14 chapters and four parts....

Mar 10 2021  
  Embedded software for the IoT (3rd ed.)
Elk K., DE GRUYTER, Boston, MA, 2019. 294 pp.  Type: Book (978-1-547417-15-5)

An in-depth study of embedded software for the Internet of Things (IoT), this book explains various topics, from selecting an operating system (OS) to code maintenance. Due to the resource-constrained nature of IoT, it is always a chal...

Nov 30 2020  
  Security, privacy and trust in the IoT environment
Mahmood Z., Springer International Publishing, New York, NY, 2019. 293 pp.  Type: Book (978-3-030180-74-4)

I was pleased to review this book, edited by Zaigham Mahmood. The book is divided into two parts. The first part elaborates on different technologies and frameworks for security and privacy in the Internet of Things (IoT), whereas the ...

Aug 19 2020  
  Overcoming security vulnerabilities in deep learning-based indoor localization frameworks on mobile devices
Tiku S., Pasricha S. ACM Transactions on Embedded Computing Systems 18(6): 1-24, 2019.  Type: Article

This paper analyzes “the vulnerability of a convolutional neural network (CNN)–based indoor localization solution.” The authors “propose a novel methodology to maintain indoor localization accuracy ... in ...

Apr 22 2020  
  Migrating to Azure: transforming legacy applications into scalable cloud-first solutions
Garverick J., Apress, New York, NY, 2018. 324 pp.  Type: Book (978-1-484235-84-3)

Migrating to Azure covers the fundamentals of migrating, securing, and deploying legacy applications on the Microsoft Azure cloud. Due to their high availability and cost effectiveness, cloud computing technologies have been inc...

Jun 18 2019  
  Embedded computing for high performance: efficient mapping of computations using customization, code transformations and compilation
Cardoso J., Coutinho J., Diniz P., Morgan Kaufmann Publishers Inc., San Francisco, CA, 2017. 320 pp.  Type: Book (978-0-128041-89-5), Reviews: (2 of 2)

The book provides theoretical and hands-on knowledge for embedded high-performance computing. Advancements in the hardware and architecture technology have necessitated the need to study embedded parallel systems. Systems such as field...

Jun 26 2018  
   Privacy in a digital, networked world: technologies, implications and solutions
Zeadally S., Badra M., Springer Publishing Company, Incorporated, New York, NY, 2015. 418 pp.  Type: Book (978-3-319084-69-5), Reviews: (2 of 2)

The book provides in-depth details of privacy issues and solutions in the digital domain. In the context of emerging smart applications, there are genuine concerns related to attacks and violations of user privacy. The book not only hi...

Mar 30 2016  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy