Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
May 18, 2022

Core data analysis: summarization, correlation, and visualization (2nd ed.)
This interesting textbook on data analysis considers summarization as a means for developing and augmenting analytical concepts; correlation for enhancing and establishing relations; and visualization as a means to “presenting results in a cognitively comfortable... more
Nanoseconds, megabytes, and sophisticated submarket control…Here is the... more
- J. A. Sherman Christensen (1973)
Question answering in knowledge bases: a verification assisted model with iterative training: ACM Transactions on Information Systems

Zhang et. al., in their paper, present a novel approach to increase the accuracy and efficiency in question-answering systems over a knowledge base. As they explain, “[mapping] a question in a natural... more

General (H.0) | May 10 22

Securing communication data in pervasive social networking based on trust with KP-ABE: ACM Transactions on Cyber-Physical Systems

This paper looks at the crucial issues of security, user privacy, and communication integrity, inherent to the pervasive social networking (PSN) (a cyber... more

General (C.2.0) | Apr 28 22

SARDE: a framework for continuous and self-adaptive resource demand estimation: ACM Transactions on Autonomous and Adaptive Systems

Reliable performance estimation of complex software systems requires models that are adaptable to the system’s environment and workload. Grohmann et al. present SARDE for active and... more

General (D.0) | Apr 6 22

BlockQuicksort: avoiding branch mispredictions in Quicksort: Journal of Experimental Algorithmics

Quite often algorithms with bad worst-case complexity perform better on the average. Quicksort falls into this class. However, one of the drawbacks of Quicksort is that it is vulnerable to branch mispredictions... more

Sorting/Searching (E.5...) | Apr 1 22

Detection and resolution of rumours in social media: a survey: ACM Computing Surveys

Unverified information can spread on the web and influence public opinion before it is eventually verified as true or false. Such rumors eventually evolve during reiterated transmission, and often accompany... more

Social Networking (H.3.4...) | Mar 30 22

An empirical study of students’ perceptions on the setup and grading of group programming assignments: ACM Transactions on Computing Education

The ever-changing business world requires teams of agile developers, testers, technical leaders, product owners, and scrum masters to cooperatively... more

Computer & Info. Science Edu. (K.3.2) | Mar 15 22

TSLAM: A trust-enabled self-learning agent model for service matching in the cloud market: ACM Transactions on Autonomous and Adaptive Systems

Cloud services and cloud computing in general have experienced explosive growth. Undoubtedly it is easier for users, even sophisticated ones, to leave the... more

Cloud Computing (C.2.4...) | Feb 15 22

Data storage auditing service in cloud computing: World Wide Web

Cloud computing provides a convenient, scalable, and cost-effective data storage solution that is particularly attractive to small organizations who lack internal information technology (IT) resources. However, this new solution also... more

Cloud Computing (C.2.4...) | Feb 7 22

Next and next new POI recommendation via latent behavior pattern inference: ACM Transactions on Information Systems

The objective of a recommender system is to suggest relevant items or preferences to users. Similar to other recommendations, for example, for products... more

General (H.0) | Jan 25 22

Incorporating system-level objectives into recommender systems: WWW 19

This paper proposes and evaluates two algorithms for recommendation systems. Most recommendation systems concentrate on optimizing one primary metric, for example, the advantage of a consumer purchasing an item or... more

General (H.0) | Jan 20 22

Cause effect pairs in machine learning

From the earliest courses in statistics we are taught that correlation does not imply causation. However, apart from some special cases, it is also generally true that causation implies correlation (or dependency). While the first sentence is a severe warning against erroneous... more
Learning (I.2.6) | May 17 22

Social engineering

The book’s subtitle is a fitting 13-word summary of what it is about. The book taught me that social engineering is a polite, obfuscating, nonthreatening label for the pernicious, amoral manipulation of people to accomplish someone else’s hidden goals of power and... more
Social Issues (K.4.2) | May 13 22

Database design for mere mortals (4th ed.)

This is the fourth edition of a text that was published 25 years ago. The main purpose of the book is to explain the logical design phase of the database development process, independently on a particular database software. Note that a situation is considered... more
Database Management (H.2) | May 10 22

Core data analysis (2nd ed.)

This interesting textbook on data analysis considers summarization as a means for developing and augmenting analytical concepts; correlation for enhancing and establishing relations; and visualization as a means to “presenting results in a... more
General (E.0) | May 5 22

Dive into algorithms: a Python adventure for the intrepid beginner

Algorithms--their concepts, theory, and methods--are not limited to computer science. My recipe for making chili for dinner is an algorithm, as are my lesson plans for my courses, and the Internal Revenue Service (IRS) tax return forms I file every April. Even my... more
Python (D.3.2...) | May 2 22

Security of ubiquitous computing systems

Frankly, my first reaction to this book was a silent groan. Why do some people seem to think that a technical book must be obscure, unbelievably boring, and written by people with poor-to-mediocre language skills? Come on! Read Knuth’s The art of... more
Security & Protection (D.4.6) | Apr 25 22

Computer networks: a systems approach (6th ed.)

The field of computer science and engineering is advancing rapidly, especially in the area of computer networking. As the speed of networks increases, large amounts of data can be transferred at the speed of light. This makes more advanced applications possible... more
General (C.2.0) | Apr 20 22

Practical doomsday: a user’s guide to the end of the world

Why is this book relevant to computing professionals? When this book was made available for review, I was curious about why it was listed, and I selected it. We all have digital assets that we protect. In day-to-day behavior, we back up our data and our work... more
Social Issues (K.4.2) | Apr 18 22

Big data mining for climate change

The book looks more like an encyclopedia than a handbook or textbook. The chapter titles mention climate issues that are typically discussed in the last subsections of the given chapter. Each chapter... more
Earth & Atmospheric Sciences (J.2...) | Apr 14 22

Cause-effect structures

Most systems in the real world--for example, computational, physical, or biological ones--consist of multiple components that on the one hand operate concurrently, but on the other hand may also interact with each other. Since at any time many... more
Organization & Design (D.4.7) | Apr 12 22

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2022 ThinkLoud, Inc.
Terms of Use
| Privacy Policy