Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Best of 2016 Recommended by Editor Recommended by Reviewer Recommended by Reader
Search
  Best Reviews | Notable Books & Articles | "Best of" Archive  
     
     
 

Computing Reviews is happy to bring you the 19th annual list of notable items published in computing—this time for 2014. We reached out to many in the computing community for nominations: our reviewers, CR category editors, the editors in chief of journals we cover, and computer scientists in both industry and academia. In addition, we included proceedings papers that were recognized as "Best Papers" at their respective conferences, as well as the most downloaded journal papers from some of the top journals covered in CR.

Read more about our selection process.

All reviews with the symbol are freely available on the site. Download the full list as a PDF.
 
     
 
Notable Books and Articles in Computing of 2014
 
 

A. General Literature

Downey, R. (Ed.) Turing's legacy: developments from Turing's ideas in logic. Cambridge University Press.

Hodges A.Alan Turing:the enigma.Princeton University Press. Review

Isaacson W.The innovators:how a group of hackers, geniuses, and geeks created the digital revolution.Simon & Schuster.

Munroe, R. What if?: Serious scientific answers to absurd hypothetical questions. Houghton Mifflin Harcourt.

B. Hardware

Poza M.; Domínguez C.; Heras J.; Rubio J.A certified reduction strategy for homological image processing. ACM Transactions on Computational Logic15,3(July 2014),Article No. 23. Review

C. Computer Systems Organization

Andrews, J. G.; Buzzi, S.; Choi, W.; Hanly, S. V.; Lozano, A.; Soong, A. C. K.; Zhang, J. C. What will 5G be? IEEE Journal on Selected Areas in Communications 32, 6 (June 2014), 1065-1082.

Bahga A.; Madisetti V.Cloud computing:a hands-on approach.CreateSpace Independent Publishing Platform.

Farooqia, M. Z.; Tabassuma, S. M.; Rehmania, M. H.; Saleem, Y. A survey on network coding: from traditional wireless networks to emerging cognitive radio networks. Journal of Network and Computer Applications. 46 (Nov. 2014), 66-181.

Liu E.; Theodoropoulos G.Space-time matching algorithms for interest management in distributed virtual environments. ACM Transactions on Modeling and Computer Simulation24,3(May 2014),Article No. 15. Review

Walrand J.; Ying L.Communication networks:an optimization, control and stochastic networks perspective.Cambridge University Press.

Walton N.Concave switching in single and multihop networks. ACM SIGMETRICS Performance Evaluation Review42,1(June 2014),139-151.

Yang G.Body sensor networks (2nd ed.).Springer Publishing Company, Incorporated. Review

Zamir R.Lattice coding for signals and networks:a structured coding approach to quantization, modulation, and multiuser information theory.Cambridge University Press.

D. Software

Barnes J.Programming in Ada 2012.Cambridge University Press.

Baumann A.; Peinado M.; Hunt G.Shielding applications from an untrusted cloud with Haven. In Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation(OSDI 2014),USENIX Association,2014,267-283. Review

Cruz-Filipe L.; Lanese I.; Martins F.; Ravara A.; Thudichum Vasconcelos V.The stream-based service-centred calculus:a foundation for service-oriented programming. Formal Aspects of Computing26,5(September 2014),865-918. Review

de Lara J.; Guerra E.; Cuadrado J.When and how to use multilevel modelling. ACM Transactions on Software Engineering and Methodology24,2(December 2014),Article No. 12.

Dobrescu M.; Argyraki K.Software dataplane verification. In Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation(NSDI 2014),USENIX Association,2014,101-114.

Doncaster P.The UX five-second rules:guidelines for user experience design’s simplest testing technique.Morgan Kaufmann Publishers Inc. Review

Drebes A.; Heydemann K.; Drach N.; Pop A.; Cohen A.Topology-aware and dependence-aware scheduling and memory allocation for task-parallel languages. ACM Transactions on Architecture and Code Optimization11,3(July 2014),Article No. 30.

Gonzalez T.; Diaz-Herrera J.; Tucker A.Computing handbook:computer science and software engineering (3rd ed.).Chapman & Hall/CRC.

Hudson S.JavaScript creativity:exploring the modern capabilities of JavaScript and HTML5.Apress. Review

Lopes C.Exercises in programming style.Chapman & Hall/CRC. Review1 Review2 Review3

Meyer B.Agile!:The good, the hype and the ugly.Springer Publishing Company, Incorporated. Review

Zielińska E.; Mazurczyk W.; Szczypiorski K.Trends in steganography. Communications of the ACM57,3(March 2014),86-95.

E. Data

Brakerski Z.; Gentry C.; Vaikuntanathan V.(Leveled) fully homomorphic encryption without bootstrapping. ACM Transactions on Computation Theory6,3(July 2014),Article No. 13.

Kamp P.Please put OpenSSL out of its misery. Queue12,3(March 2014),20-23.

Lima, M. The book of trees: visualizing branches of knowledge. Princeton Architectural Press.

F. Theory of Computation

Cook J.; Etesami O.; Miller R.; Trevisan L.On the one-way function candidate proposed by Goldreich. ACM Transactions on Computation Theory6,3(July 2014),Article No. 14.

Emek Y.; Feldman M.; Gamzu I.; PaesLeme R.; Tennenholtz M.Signaling schemes for revenue maximization. ACM Transactions on Economics and Computation2,2(June 2014),Article No. 5.

Lee Y.; Sidford A.Path finding methods for linear programming:solving linear programs in Õ(√rank) iterations and faster algorithms for maximum flow. In Proceedings of the 2014 IEEE 55th Annual Symposium on Foundations of Computer Science(FOCS 2014),IEEE Computer Society,2014,424-433.

Rothvoss T.The matching polytope has exponential extension complexity. In Proceedings of the 46th Annual ACM Symposium on Theory of Computing(STOC 2014),ACM,2014,263-272.

Valiant G.; Valiant P.An automatic inequality prover and instance optimal identity testing. In Proceedings of the 2014 IEEE 55th Annual Symposium on Foundations of Computer Science(FOCS 2014),IEEE Computer Society,2014,51-60.

G. Mathematics of Computing

Figuera C.; Barquero-Pérez Ó.; Rojo-Álvarez J.; Martínez-Ramón M.; Guerrero-Curieses A.; Caamaño A.Spectrally adapted Mercer kernels for support vector nonuniform interpolation. Signal Processing94(January 2014),421-433. Review

Grigoryeva, L.; Henriques, J.; Larger, L.; Ortega, J.-P. Stochastic nonlinear time series forecasting using time-delay reservoir computers: performance and universality. Neural Networks 55 (July 2014), 59-71.

Guo R.; Xu Y.Efficient solvers of discontinuous Galerkin discretization for the Cahn-Hilliard equations. Journal of Scientific Computing58,2(February 2014),380-408.

Perotto S.; Veneziani A.Coupled model and grid adaptivity in hierarchical reduction of elliptic problems. Journal of Scientific Computing60,3(September 2014),505-536.

Ye, Y. Efficiency of the simplex and policy-iteration methods for Markov decision processes. In Proc. of the SIAM Conference on Optimization, SIAM, 2014.

Zhang, G.; Shen, Y. Exponential synchronization of delayed memristor-based chaotic neural networks via periodically intermittent control. Neural Networks 55 (July 2014), 1-10.

H. Information Systems

Ameloot T.; Ketsman B.; Neven F.; Zinn D.Weaker forms of monotonicity for declarative networking:a more fine-grained answer to the calm-conjecture. In Proceedings of the 33rd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems(PODS 2014),ACM,2014,64-75.

Chen, C. L. P.; Zhang, C.-Y. Data-intensive applications, challenges, techniques and technologies: a survey on big data. Information Sciences 275 (Aug. 2014), 314-347.

Ellis B.Real-time analytics:techniques to analyze and visualize streaming data.Wiley Publishing.
 

H. Information Systems (Cont'd.)

Ghinea G.; Timmerer C.; Lin W.; Gulliver S.Mulsemedia:state of the art, perspectives, and challenges. ACM Transactions on Multimedia Computing, Communications, and Applications11,1s(September 2014),Article No. 17.

Giannakopoulos T.; Pikrakis A.Introduction to audio analysis:a MATLAB approach.Academic Press, Inc. Review

Hara K.; Sun J.; Moore R.; Jacobs D.; Froehlich J.Tohme:detecting curb ramps in Google street view using crowdsourcing, computer vision, and machine learning. In Proceedings of the 27th Annual ACM Symposium on User Interface Software and Technology(UIST 2014),ACM,2014,189-204.

Hu, H.; Wen, Y.; Chua, T.-S.; Li, X. Toward scalable systems for big data analytics: a technology tutorial. IEEE Access 2 (June 2014), 652-687.

Kambatla, K.; Kollias, G.; Kumar, V.; Grama, A. Trends in big data analytics. Journal of Parallel and Distributed Computing 74, 7 (July 2014), 2561-3573.

Krempl G.; Žliobaite I.; Brzeziński D.; Hüllermeier E.; Last M.; Lemaire V.; Noack T.; Shaker A.; Sievi S.; Spiliopoulou M.; Stefanowski J.Open challenges for data stream mining research. ACM SIGKDD Explorations Newsletter16,1(June 2014),1-10.

Li A.; Ahmed A.; Ravi S.; Smola A.Reducing the sampling complexity of topic models. In Proceedings of the 20th ACM SIGKDD international conference(Knowledge discovery and data mining),ACM,2014,891-900.

Mitzenmacher M.; Pagh R.; Pham N.Efficient estimation for high similarities using odd sketches. In Proceedings of the 23rd International Conference on the World Wide Web(WWW 2014),ACM,2014,109-118.

Möller S.; Raake A.Quality of experience:advanced concepts, applications and methods.Springer Publishing Company, Incorporated. Review

Nahin A.; Alam J.; Mahmud H.; Hasan K.Identifying emotion by keystroke dynamics and text pattern analysis. Behaviour & Information Technology33,9(September 2014),987-996.

Olson J.; Kellogg W.Ways of knowing in HCI.Springer International Publishing.

Ottaviano G.; Venturini R.Partitioned Elias-Fano indexes. In Proceedings of the 37th International ACM SIGIR Conference on Research & Development in Information Retrieval(SIGIR 2014),ACM,2014,273-282.

Rudder C.Dataclysm:who we are (when we think no one’s looking).Crown Publishing Group. Review

Song W.; Liu Y.; Li J.Mining high utility itemsets by dynamically pruning the tree structure. Applied Intelligence40,1(January 2014),29-43.

Tew C.; Giraud-Carrier C.; Tanner K.; Burton S.Behavior-based clustering and analysis of interestingness measures for association rule mining. Data Mining and Knowledge Discovery28,4(July 2014),1004-1045. Review

Walmsley W.; Snelgrove W.; Truong K.Disambiguation of imprecise input with one-dimensional rotational text entry. ACM Transactions on Computer-Human Interaction21,1(February 2014),Article No. 4.

Wu X.; Zhu X.; Wu G.; Ding W.Data mining with big data. IEEE Transactions on Knowledge and Data Engineering26,1(January 2014),97-107.

Zhang C.; Kumar A.; Ré C.Materialization optimizations for feature selection workloads. In Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data(SIGMOD 2014),ACM,2014,265-276.

I. Computing Methodologies

Bareinboim, E.; Tian, J.; Pearl, J. Recovering from selection bias in causal and statistical inference. In Proc. of the 28th AAAI Conference on Artificial Intelligence, AAAI, 2014, 2410-2416.

Beer R.The cognitive domain of a glider in the game of life. Artificial Life20,2(May 2014),183-206.

Chandraker M.What camera motion reveals about shape with unknown BRDF. In Proceedings of the 2014 IEEE Conference on Computer Vision and Pattern Recognition(CVPR 2014),IEEE Computer Society,2014,2179-2186.

Charlesworth A.The comprehensibility theorem and the foundations of artificial intelligence. Minds and Machines24,4(November 2014),439-476.

Davis A.; Rubinstein M.; Wadhwa N.; Mysore G.; Durand F.; Freeman W.The visual microphone:passive recovery of sound from video. ACM Transactions on Graphics (TOG)33,4(July 2014),Article No. 79.

Howard G.; Bull L.; de Lacy Costello B.; Gale E.; Adamatzky A.Evolving spiking networks with variable resistive memories. Evolutionary Computation22,1(May 2014),79-103.

Ikeuchi, K. (Ed.) Computer vision: a reference guide. Springer.

Khushaba, R. N.; Takruri, M.; Miro, J. V.; Kodagoda, S. Towards limb position invariant myoelectric pattern recognition using time-dependent spectral features. Neural Networks 55 (July 2014), 42-58.

Liberti, L.; Lavor, C.; Maculan, N.; Mucherino, A. Euclidean distance geometry and applications. SIAM Review 56, 1 (Feb. 2014), 3-69.

Partridge D.What makes you clever:the puzzle of intelligence.World Scientific Publishing Co, Inc. Review

Ridel B.; Reuter P.; Laviole J.; Mellado N.; Couture N.; Granier X.The revealing flashlight:interactive spatial augmented reality for detail exploration of cultural heritage artifacts. Journal on Computing and Cultural Heritage7,2(June 2014),Article No. 6.

Riolo R.; Moore J.; Kotanchek M. (Eds.)Genetic programming theory and practice XI.Springer Publishing Company, Incorporated.

Tang, J.; Meng, Z.; Nguyen, X.; Mei, Q.; Zhang, M. Understanding the limiting factors of topic modeling via posterior contraction analysis. In Proc. of the 31st International Conference on Machine Learning, JMLR: Workshop and Conference Proceedings, 2014, 190-198.

Zhu, F.; Wang, Y.; Xiang, S.; Fan, B.; Pan, C. Structured sparse method for hyperspectral unmixing. ISPRS Journal of Photogrammetry and Remote Sensing 88 (Feb. 2014), 101-118.

J. Computer Applications

Carter, K. Actionable intelligence: a guide to delivering business results with big data fast!. Wiley.

Chierichetti F.; Kleinberg J.; Panconesi A. How to schedule a cascade in an arbitrary graph. SIAM Journal of Computing 43, 6 (2014), 1906-1920.

Kavelar A.; Zambanini S.; Kampel M.Reading the legends of Roman Republican coins. Journal on Computing and Cultural Heritage7,1(February 2014),1-20.

Lepp A.; Barkley J.; Karpinski A.The relationship between cell phone use, academic performance, anxiety, and satisfaction with life in college students. Computers in Human Behavior31(February 2014),343-350.

Lyon E.; Knapp R.; Ouzounian G.Compositional and performance mapping in computer chamber music:a case study. Computer Music Journal38,3(November 2014),64-75.

Maillé P.; Tuffin B.Telecommunication network economics:from theory to applications.Cambridge University Press.

Robichau B.Healthcare information privacy and security:regulatory compliance and data security in the age of electronic health records.Apress. Review

Stubbs, E. Big data, big innovation: enabling competitive differentiation through business analytics. Wiley.

von der Linden W.; Dose V.; von Toussaint U.Bayesian probability theory:applications in the physical sciences.Cambridge University Press. Review

K. Computing Milieux

Berghel, H. The future of digital money laundering. Computer 47, 8 (Aug. 2014), 70-75.

Embar M.; Louis F I.; Wesselman W.Printer watermark obfuscation. In Proceedings of the 3rd Annual Conference on Research in Information Technology(RIIT 2014),ACM,2014,15-20.

Greenwald G.No place to hide:Edward Snowden, the NSA, and the US surveillance state.Metropolitan Books.

Zetter K.Countdown to zero day:Stuxnet and the launch of the world’s first digital weapon.Crown Publishing Group. Review
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy