Reviewers have found these items notable and have self-selected them for review.
All Media Types
Software architecture for big data and the cloud
Mistrik I., Bahsoon R., Ali N., Heisel M., Maxim B., Morgan Kaufmann Publishers Inc., Cambridge, MA, 2017. 470 pp. Type: Book (978-0-128054-67-3)
Systems and software architecture has been a significant engineering endeavor for many years, requiring formal languages and models to document and analyze the structure and functionality of systems. This mature domain of interest has been applied...
Sep 24 2018
VIRTIO-USER: a new versatile channel for kernel-bypass networks
Tan J., Liang C., Xie H., Xu Q., Hu J., Zhu H., Liu Y. KBNets 2017 (Proceedings of the Workshop on Kernel-Bypass Networks, Los Angeles, CA, Aug 21, 2017) 13-18, 2017. Type: Proceedings
VIRTIO-USER is a userspace-based channel to facilitate container applications to benefit from kernel-bypass technologies. The authors explain that container networking or operating system (OS) virtualization technologies have historically not been...
Sep 19 2018
Using Bayesian network to estimate the value of decisions within the context of value-based software engineering
Mendes E., Perkusich M., Freitas V., Nunes J. EASE 2018 (Proceedings of the 22nd International Conference on Evaluation and Assessment in Software Engineering, Christchurch, New Zealand, Jun 28-29, 2018) 90-100, 2018. Type: Proceedings
For longevity, a software company should adopt value-based decision making, in which the focus is on overall value creation rather than the required efforts and costs alone. The paper introduces concepts behind value-based decision making, and ill...
Sep 14 2018
Deception in the digital age: exploiting and defending human targets through computer-mediated communications
Malin C., Gudaitis T., Holt T., Kilger M., ACADEMIC PRESS, Cambridge, MA, 2017. 284 pp. Type: Book (978-0-124116-30-6), Reviews: (4 of 4)
The basis of deception is misdirection: it amounts to making something insignificant seem important, while really relevant things go unnoticed. This strategy is used not only by spammers, crackers, cyber criminals, and cyber terrorists, but also b...
Sep 14 2018
Codes, cryptology and curves with computer algebra
Pellikaan R., Wu X., Bulygin S., Jurrius R., Cambridge University Press, New York, NY, 2018. 606 pp. Type: Book (978-0-521520-36-2)
This volume offers a terse, highly formal exposition of the relation between the four subjects named in the title: codes (transformations of a stream of information), cryptology (transformations that seek to hide the original content), curves (spe...
Sep 13 2018
Toward the robots of science fiction
Aaron D. Ames. YouTube, 00:49:33, published on Dec 7, 2017, Caltech,
. Type: Video
It was a pleasure to watch this presentation about the future of robotics, a hotly debated topic fueled by the controversy between robots defeating humans and robots augmenting and assisting humans, for example, prostheses and exoskeletons. This d...
Sep 12 2018
Introduction to inverse problems for differential equations
Hasanoǧlu A., Romanov V., Springer International Publishing, New York, NY, 2017. 261 pp. Type: Book (978-3-319627-96-0)
Several mathematical problems in science, engineering, and technology are inverse problems. For example, inverse problem theory is often used in heat and mass transfer, imaging, hydrology, oceanography, and so on. In general, inverse problems are ...
Sep 12 2018
A novel stock recommendation system using Guba sentiment analysis
Sun Y., Fang M., Wang X. Personal and Ubiquitous Computing 22(3): 575-587, 2018. Type: Article
It’s pretty obvious that if you know what investors are thinking, you can predict what stocks they’ll buy and sell. Stock scams have operated for years on the complement of this thought, that is, attempt to change investors’ opin...
Sep 5 2018
Attribute-based access control
Hu V., Ferraiolo D., Chandramouli R., Kuhn D., Artech House, Inc., Norwood, MA, 2017. 280 pp. Type: Book (978-1-630811-34-1), Reviews: (2 of 2)
In many applications, it becomes a necessity to define who (which user) is allowed to access what (which resource). This is achieved via access control. Several models for access control exist. Attribute-based access control (ABAC) is one of them,...
Sep 5 2018
An in-vehicle software defined network architecture for connected and automated vehicles
Fussey P., Parisis G. CarSys 2017 (Proceedings of the 2nd ACM International Workshop on Smart, Autonomous, and Connected Vehicular Systems and Services, Snowbird, UT, Oct 16, 2017) 73-74, 2017. Type: Proceedings
The expansion of communication networks has made the efficient configuration and management of these networks challenging. Software-defined networking (SDN) facilitates the rapid provisioning of network services, improved network visibility and pr...
Sep 4 2018
Reproduction in whole or in part without permission is prohibited. Copyright © 2000-2018 ThinkLoud, Inc.