|
|
|
|
|
|
Date Reviewed |
|
|
1 - 8 of 8
reviews
|
|
|
|
|
|
|
|
How might we increase system trustworthiness? Neumann P. Communications of the ACM 62(10): 23-25, 2019. Type: Article
With the ever-increasing number of vulnerabilities and threats against systems and networks, one would wonder the best way to make systems more trusted. In reality, there is no best way because the causes of the problems have been over...
|
Jan 8 2020 |
|
|
|
|
|
|
Contextual visualization Borland D., Wang W., Gotz D. IEEE Computer Graphics and Applications 38(6): 17-23, 2018. Type: Article
If users cannot see the breakdown of data hidden behind summaries visualized as charts or pies, they will go to another website to find the information. Unseen information can lead to biased findings presented by summaries. The complex...
|
Nov 22 2019 |
|
|
|
|
|
|
Human-centered VR design: five essentials every engineer needs to know Jerald J. IEEE Computer Graphics and Applications 38(2): 15-21, 2018. Type: Article
When virtual reality (VR) is not pleasing to see and/or hear, users will remove their headsets or glasses. One main reason is that engineers don’t consider all human aspects of the VR experience when developing VR systems and...
|
May 29 2019 |
|
|
|
|
|
|
Lightweight cybersecurity schemes using elliptic curve cryptography in publish-subscribe fog computing Diro A., Chilamkurti N., Kumar N. Mobile Networks and Applications 22(5): 848-858, 2017. Type: Article
Diro et al. “propose novel lightweight security solutions for publish-subscribe protocol-based Internet of Things [IoT] in fog networks using [elliptic curve cryptography, ECC].” This proposal would be of interest t...
|
Nov 29 2017 |
|
|
|
|
|
|
Cyber security. Simply. Make it happen.: leveraging digitization through IT security Abolhassan F., Springer International Publishing, New York, NY, 2017. 127 pp. Type: Book (978-3-319465-28-9)
The book is edited by Ferri Abolhassan, from Telekom Deutschland, who collected 11 chapters, each one from a different author. All chapters serve as the basis for a discussion on digitization and its impact on the future development of...
|
Nov 28 2017 |
|
|
|
|
|
|
A survey on resource scheduling in cloud computing: issues and challenges Singh S., Chana I. Journal of Grid Computing 14(2): 217-264, 2016. Type: Article, Reviews: (1 of 2)
When a cloud provider doesn’t properly schedule workloads, performance usually degrades. If the degradation is not caught in time, a cloud outage can occur. A couple of minutes of downtime is too long for many enterprise user...
|
May 9 2017 |
|
|
|
|
|
|
Machine learning models and algorithms for big data classification: thinking with examples for effective learning Suthaharan S., Springer Publishing Company, Incorporated, New York, NY, 2015. 359 pp. Type: Book (978-1-489976-40-6)
Machine learning models have been around for a while. It is not surprising that machine learning has come to play an important role in data science....
|
Feb 9 2016 |
|
|
|
|
|
|
Three-dimensional object recognition using invariant Euclidean signature curves Ames A., Jalkio J., Shakiban C. In Analysis, combinatorics and computing. Commack, NY: Nova Science Publishers, Inc., 2002. Type: Book Chapter
An interesting argument is presented in this paper, namely that the amount of data needed to describe a 3D object can be reduced with2D planes derived from the object with a computer. The paper does not, however, consider the latest te...
|
Nov 19 2003 |
|
|
|
|
|
|
|
|
|
|
|