Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Best of 2016 Recommended by Editor Recommended by Reviewer Recommended by Reader
Search
Reviewers have found these items notable and have self-selected them for review.
 
Options:
 
  1-10 of 7193 results Date Reviewed  
  A survey of communication performance models for high-performance computing
Rico-Gallego J., Díaz-Martín J., Manumachu R., Lastovetsky A.  ACM Computing Surveys 51(6): 1-36, 2019. Type: Article

Cluster computing is a major trend in scientific high-performance computing (HPC), and the recent evolution of cluster computing requires a revision to the models and methods for evaluating operational performance. The paper’s main achieveme...

Apr 16 2019  
  Statistical and machine-learning data mining: techniques for better predictive modeling and analysis of big data (3rd ed.)
Ratner B.,  CRC Press, Inc., Boca Raton, FL, 2017. 696 pp. Type: Book (978-1-498797-60-3)

There are numerous books about statistics, from short recipe collections to larger theoretical works. There are texts devoted to data science and data mining, the newest expressions of data analysis, which focus on computational techniques. Ratner...

Apr 12 2019  
  Next-generation big data: a practical guide to Apache Kudu, Impala, and Spark
Quinto B.,  Apress, New York, NY, 2018. 557 pp. Type: Book (978-1-484231-46-3)

Since the introduction of Apache Hadoop nearly a decade ago, new tools and methods for analyzing large datasets have evolved rapidly, dramatically improving performance and providing easier and more powerful query languages....

Apr 10 2019  
  An investigation of factors affecting the visits of online crowdsourcing and labor platforms
Mourelatos E., Tzagarakis M.  Netnomics 19(3): 95-130, 2018. Type: Article

This paper reports on the authors’ survey of popular websites that use crowdsourcing to conduct one or more steps in their business processes, for a period between 2012 and 2016. The survey’s objectives were to identify factors affecti...

Apr 9 2019  
  Foundations of programming languages (2nd ed.)
Lee K.,  Springer International Publishing, New York, NY, 2017. 370 pp. Type: Book (978-3-319707-89-1)

Programming is a science-based craft. For a programmer, the better the science, the better the craft. Foundations of programming languages provides a computer science (CS)-based treatment of the foundations of three programming paradigms: i...

Apr 8 2019  
  Impact of virtualization on cloud computing energy consumption: empirical study
Atiewi S., Abuhussein A., Saleh M.  ISCSIC 2018 (Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control, Stockholm, Sweden,  Sep 21-23, 2018) 1-7, 2018. Type: Proceedings

Intensive computation in tasks such as weather forecasting and scientific solar system exploration requires high-speed processors and huge data storage. Very large data centers are likely to consume more energy as the number of servers substantial...

Apr 5 2019  
  Beyond worst-case analysis
Roughgarden T.  Communications of the ACM 62(3): 88-96, 2019. Type: Article

It was the title that caught my attention. To note, I am not an algorithmic complexity theorist, but I am interested in the application of such techniques to complexity problems arising within formal logic, especially in the presence of an inducti...

Apr 4 2019  
   Survey on fog computing
Hu P., Dhelim S., Ning H., Qiu T.  Journal of Network and Computer Applications 98(C): 27-42, 2017. Type: Article

In the Internet of things (IoT), is there a difference between edge and fog computing?...

Apr 3 2019  
  Imperfect forward secrecy: how Diffie-Hellman fails in practice
Adrian D., Bhargavan K., Durumeric Z., Gaudry P., Green M., Halderman J., Heninger N., Springall D., Thomé E., Valenta L., VanderSloot B., Wustrow E., Zanella-Béguelin S., Zimmermann P.  Communications of the ACM 62(1): 106-114, 2019. Type: Article

Prevalent Internet protocols require reliable cryptographic algorithms for approving mutual keys to use for bargaining safe connections. Internet protocols such as secure shell (SSH) and hypertext transfer protocol secure (HTTPS) frequently use th...

Mar 27 2019  
  Arabic authorship attribution: an extensive study on Twitter posts
Altakrori M., Iqbal F., Fung B., Ding S., Tubaishat A.  ACM Transactions on Asian and Low-Resource Language Information Processing 18(1): 1-51, 2019. Type: Article

Altakrori et al. present an excellent study on Arabic authorship attributes from Twitter posts. The coverage of the subject is very extensive. The authors review a large body of related authorship attribution literature in short messages. Non-Arab...

Mar 25 2019  
 
 
 
Display per page
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy