Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
June 18, 2019

Millions, billions, zillions: defending yourself in a world of too many numbers
This book is simultaneously entertaining, instructive (one might say educational), and worrying. After an (important) opening chapter, the author analyzes a statement from Newsweek that the US should tap into the Strategic Petroleum Reserve (SPR), since it holds 660 billion... more
Shannon wants to feed not just data to a Brain, but cultural things! He wants to play music to it!... more
- Alan Turing (1983)
Three bits suffice: explicit support for passive measurement of Internet latency in QUIC and TCP: IMC 18

The Internet measurement of round-trip time (RTT) is important as an indication of performance and latency. While the Ping utility can and does measure RTT, widespread use increases overhead. This... more

Network Protocols (C.2.2) | Jun 17 19

Understanding image representations by measuring their equivariance and equivalence: International Journal of Computer Vision

As the number of artificial intelligence (AI)-based systems that support key aspects of our life, including health and security, increases... more

Image Representation (I.4.10) | Jun 17 19

Empirically-based secure OS design: NSPW 17

In this New Security Paradigms Workshop (NSPW) panel, four people discuss research methods and the actual meaning of a secure operating system (OS). The panelists do not tackle this aspect as a purely... more

Security & Protection (D.4.6) | Jun 13 19

A comparative study on two XML editors (Oxygen and UltraEdit): ICCSP 19

The authors compare two Extensible Markup Language (XML)-aware editors, Oxygen and UltraEdit. The comparison comprises three parts: an unstructured interview and observation, and two hands-on... more

XML (I.7.2...) | Jun 12 19

Did we just travel to the past? Building and evaluating with cultural presence different modes of VR-mediated experiences in virtual archaeology: Journal on Computing and Cultural Heritage

Virtual archaeology seeks to develop ways of using computer-based visualization for the comprehensive dissemination of the past. Compared to... more

Archaeology (J.2...) | Jun 10 19

Technologizing agriculture: Communications of the ACM

New technologies continue to revolutionize agricultural business processes. Today, farmers use technologies such as drones, robots, and sensors to cautiously and resourcefully track and manage agricultural assets and operative... more

Earth & Atmospheric Sciences (J.2...) | Jun 6 19

Can background music facilitate learning?: LAK 19

In my experience, humming a tune or listening to some soft music helps with learning. But does any background music help, or only some specific type? Hu et al. address this question here. The authors conducted an experiment with four different types of music... more

Music (J.5...) | Jun 5 19

Analytics for managerial work: Communications of the ACM

This article describes various surveys for determining the role of analytics in different types of managerial works. It specifically surveys managerial works in finance, human resources, marketing, and... more

General (J.0) | Jun 4 19

Human-centered VR design: IEEE Computer Graphics and Applications

When virtual reality (VR) is not pleasing to see and/or hear, users will remove their headsets or glasses. One main reason is that engineers don’t consider all human aspects of the VR experience when developing VR systems and... more

Virtual Reality (I.3.7...) | May 29 19

The evolution of an IT service desk: SIGUCCS 18

With the objective of “evolving” an information technology (IT) service desk after 35 years under the same management, Ryan Swan sets out to elaborate on the current status of the service desk and the deficiencies, in his view, that need to be... more

General (K.6.0) | May 23 19

Migrating to Azure

Migrating to Azure covers the fundamentals of migrating, securing, and deploying legacy applications on the Microsoft Azure cloud. Due to their high availability and cost effectiveness, cloud computing technologies have been increasingly used for application deployment... more
Cloud Computing (C.2.4...) | Jun 18 19

Cyber-physical security and privacy in the electric smart grid

The book presents an interesting selection of papers within the domain of cyber-physical security. It provides a starting point for researchers trying to navigate security and privacy issues within a smart grid... more
Security & Protection (K.6.5) | Jun 14 19

Managing cyber risk in the financial sector

I would classify this book as a buffet of articles, studies, research, and references spanning the spectrum of cyber risk domains across various economies around the world. Just like a buffet, there is a lot of very valuable information packed in here; however, just like... more
Security (K.4.4...) | Jun 12 19

Dynamics and control of DC-DC converters

This book is about designing controllers using simulation and mathematical software packages. It deals with direct current (DC)-to-DC controllers, and develops foundational circuit equations and ways to design such... more
Physical Sciences & Engineering (J.2) | Jun 11 19

Scalable big data analytics for protein bioinformatics

High-performance computing (HPC) refers to the use of large computational resources for solving computationally hard and data-intensive problems. Big data refers to “the exponential growth ... of data... more
Biology & Genetics (J.3...) | Jun 6 19

Technology for efficient learner support services in distance education

While open and distance learning generates huge revenues for educational institutions in more developed nations, it is quite interesting to know that this phenomenon is also catching on in developing countries like India. Distance learning can cut through... more
Distance Learning (K.3.1...) | Jun 5 19

Millions, billions, zillions

This book is simultaneously entertaining, instructive (one might say educational), and worrying. After an (important) opening chapter, the author analyzes a statement from Newsweek that the US should tap into the Strategic Petroleum Reserve (SPR), since... more
Mathematics & Statistics (J.2...) | Jun 4 19

Imaginary mathematics for computer science

This interesting book is very easy to read and understand. While the topics are not new, they are explained in lucid terms for anyone who is interested in sophisticated mathematics. My only quarrel concerns the title: the included mathematics is not... more
Mathematics & Statistics (J.2...) | Jun 4 19

A philosophy of software design

I distinctly recall the first class I taught in software design, in 1980. One student from that course is now a computer science (CS) professor and department head at a major college in Tel Aviv. This anecdote, with its dating, is relevant to this book. It is well known... more
General (D.0) | Jun 3 19

Mobile big data

Part of Springer’s “Lecture Notes on Data Engineering and Communications Technologies” series, this edited book is divided into four parts. The editors have chosen 13 different topics (chapters) related to big data. Note that there are only general references... more
General (H.2.0) | May 31 19

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy