Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Myerson, Judy

Philadelphia, Pennsylvania
 
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 10 of 40 reviews

   
  EventAction: a visual analytics approach to explainable recommendation for event sequences
Du F., Plaisant C., Spring N., Crowley K., Shneiderman B.  ACM Transactions on Interactive Intelligent Systems 9(4): 1-31, 2019. Type: Article

If tables of complex data lack sufficient visual analytics illustrations on which recommender system to use, users will go to another website for better illustrations. The more complex the analysis of similar record attributes become, the more dif...

Sep 9 2021  
  Replicated computations results (RCR) report for “Statistical abstraction for multi-scale spatio-temporal systems”
Loreti M.  ACM Transactions on Modeling and Computer Simulation 29(4): 1-2, 2019. Type: Article

This brief paper takes an unusual approach to presenting the experimental results of simulating two case studies from [1]: a model of Escherichia coli chemotaxis and a model of Dictyostelium discoideum aggregation. It introduces read...

Feb 8 2021  
   How might we increase system trustworthiness?
Neumann P.  Communications of the ACM 62(10): 23-25, 2019. Type: Article

With the ever-increasing number of vulnerabilities and threats against systems and networks, one would wonder the best way to make systems more trusted. In reality, there is no best way because the causes of the problems have been overlooked. The ...

Jan 8 2020  
  Demystifying Internet of Things security: successful IoT device/edge and platform security deployment
Cheruvu S., Kumar A., Smith N., Wheeler D.,  Apress, New York, NY, 2020. 488 pp. Type: Book (978-1-484228-95-1)

When a paper on Internet of Things (IoT) security is too brief, experienced users will look for other papers. This book covers many aspects of IoT security, from hardware to applications and systems....

Dec 12 2019  
   Contextual visualization
Borland D., Wang W., Gotz D.  IEEE Computer Graphics and Applications 38(6): 17-23, 2018. Type: Article

If users cannot see the breakdown of data hidden behind summaries visualized as charts or pies, they will go to another website to find the information. Unseen information can lead to biased findings presented by summaries. The complexity of data ...

Nov 22 2019  
  Augmented reality gets real
Anthes G.  Communications of the ACM 62(9): 16-18, 2019. Type: Article

Forty years ago, Star Wars gave the public a futuristic preview of augmented reality (AR): in a 3D hologram, Princess Leia appeared standing on a physical table. The young audience of yesterday is wearing AR headsets today. However, images ...

Oct 3 2019  
   Human-centered VR design: five essentials every engineer needs to know
Jerald J.  IEEE Computer Graphics and Applications 38(2): 15-21, 2018. Type: Article

When virtual reality (VR) is not pleasing to see and/or hear, users will remove their headsets or glasses. One main reason is that engineers don’t consider all human aspects of the VR experience when developing VR systems and applications. T...

May 29 2019  
  Energy-efficient context aware power management with asynchronous protocol for body sensor network
Magno M., Polonelli T., Casamassima F., Gomez A., Farella E., Benini L.  Mobile Networks and Applications 22(5): 814-824, 2017. Type: Article

Magno et al. address a challenging issue of wearable devices for fitness and health tracking: low-power resources and wireless communication. The lifetime of these devices is limited by the small energy storage components that supply the wearable ...

Dec 21 2017  
   Lightweight cybersecurity schemes using elliptic curve cryptography in publish-subscribe fog computing
Diro A., Chilamkurti N., Kumar N.  Mobile Networks and Applications 22(5): 848-858, 2017. Type: Article

Diro et al. “propose novel lightweight security solutions for publish-subscribe protocol-based Internet of Things [IoT] in fog networks using [elliptic curve cryptography, ECC].” This proposal would be of interest to readers who are fa...

Nov 29 2017  
   Cyber security. Simply. Make it happen.: leveraging digitization through IT security
Abolhassan F.,  Springer International Publishing, New York, NY, 2017. 127 pp. Type: Book (978-3-319465-28-9)

The book is edited by Ferri Abolhassan, from Telekom Deutschland, who collected 11 chapters, each one from a different author. All chapters serve as the basis for a discussion on digitization and its impact on the future development of our society...

Nov 28 2017  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2021 ThinkLoud, Inc.
Terms of Use
| Privacy Policy