Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
  Li, Tao Add to Alert Profile  
Date Reviewed  
  1 - 5 of 14 reviews    
   A survey on end-edge-cloud orchestrated network computing paradigms: transparent computing, mobile edge computing, fog computing, and cloudlet
Ren J., Zhang D., He S., Zhang Y., Li T. ACM Computing Surveys 52(6): 1-36, 2019.  Type: Article

Recognizing the limits of (distant) cloud computing, modern Internet of things (IoT) architectures recognize the so-called edge continuum between cloud applications and IoT devices and machines. “Continuum” implies ...
Jun 17 2022  
  Event summarization for sports games using Twitter streams
Huang Y., Shen C., Li T. World Wide Web 21(3): 609-627, 2018.  Type: Article

The Wall Street Journal recently published an article by Jason Gay titled “How Twitter Rules the NBA” [1]. It contends that the National Basketball Association (NBA) is heavily linked to social media, especia...
Jul 9 2018  
  A survey on malware detection using data mining techniques
Ye Y., Li T., Adjeroh D., Iyengar S. ACM Computing Surveys 50(3): 1-40, 2017.  Type: Article

It is not new that software is eating the world [1]. Industries and businesses everywhere are being “softwareized.” Meanwhile, we cannot deny that malware (malicious software) is also having a feast. This paper prov...
Sep 22 2017  
  Event mining: algorithms and applications
Li T., Chapman & Hall/CRC, Boca Raton, FL, 2016. 332 pp.  Type: Book (978-1-466568-57-0)

A very interesting and well-structured survey work, Event mining: algorithms and applications succeeds in presenting a thorough overview of the most important characteristics of the field of event processing. It is a unique and ...
May 11 2017  
  Per-flow traffic measurement through randomized counter sharing
Li T., Chen S., Ling Y. IEEE/ACM Transactions on Networking 20(5): 1622-1634, 2012.  Type: Article

Network traffic measurement is quite an important requirement for network administration for a variety of reasons, including traffic and capacity planning, accounting, billing, network forensics, and anomaly detection. Measurements nee...
Mar 22 2013  

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 2004™
Terms of Use
| Privacy Policy