Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Myerson, Judy

Philadelphia, Pennsylvania
 
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 8 of 8 reviews

   
   How might we increase system trustworthiness?
Neumann P. Communications of the ACM 62(10): 23-25, 2019.  Type: Article

With the ever-increasing number of vulnerabilities and threats against systems and networks, one would wonder the best way to make systems more trusted. In reality, there is no best way because the causes of the problems have been over...

Jan 8 2020  
   Contextual visualization
Borland D., Wang W., Gotz D. IEEE Computer Graphics and Applications 38(6): 17-23, 2018.  Type: Article

If users cannot see the breakdown of data hidden behind summaries visualized as charts or pies, they will go to another website to find the information. Unseen information can lead to biased findings presented by summaries. The complex...

Nov 22 2019  
   Human-centered VR design: five essentials every engineer needs to know
Jerald J. IEEE Computer Graphics and Applications 38(2): 15-21, 2018.  Type: Article

When virtual reality (VR) is not pleasing to see and/or hear, users will remove their headsets or glasses. One main reason is that engineers don’t consider all human aspects of the VR experience when developing VR systems and...

May 29 2019  
   Lightweight cybersecurity schemes using elliptic curve cryptography in publish-subscribe fog computing
Diro A., Chilamkurti N., Kumar N. Mobile Networks and Applications 22(5): 848-858, 2017.  Type: Article

Diro et al. “propose novel lightweight security solutions for publish-subscribe protocol-based Internet of Things [IoT] in fog networks using [elliptic curve cryptography, ECC].” This proposal would be of interest t...

Nov 29 2017  
   Cyber security. Simply. Make it happen.: leveraging digitization through IT security
Abolhassan F., Springer International Publishing, New York, NY, 2017. 127 pp.  Type: Book (978-3-319465-28-9)

The book is edited by Ferri Abolhassan, from Telekom Deutschland, who collected 11 chapters, each one from a different author. All chapters serve as the basis for a discussion on digitization and its impact on the future development of...

Nov 28 2017  
   A survey on resource scheduling in cloud computing: issues and challenges
Singh S., Chana I. Journal of Grid Computing 14(2): 217-264, 2016.  Type: Article, Reviews: (1 of 2)

When a cloud provider doesn’t properly schedule workloads, performance usually degrades. If the degradation is not caught in time, a cloud outage can occur. A couple of minutes of downtime is too long for many enterprise user...

May 9 2017  
   Machine learning models and algorithms for big data classification: thinking with examples for effective learning
Suthaharan S., Springer Publishing Company, Incorporated, New York, NY, 2015. 359 pp.  Type: Book (978-1-489976-40-6)

Machine learning models have been around for a while. It is not surprising that machine learning has come to play an important role in data science....

Feb 9 2016  
   Three-dimensional object recognition using invariant Euclidean signature curves
Ames A., Jalkio J., Shakiban C. In Analysis, combinatorics and computing. Commack, NY: Nova Science Publishers, Inc., 2002.  Type: Book Chapter

An interesting argument is presented in this paper, namely that the amount of data needed to describe a 3D object can be reduced with2D planes derived from the object with a computer. The paper does not, however, consider the latest te...

Nov 19 2003  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy