Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Best of 2016 Recommended by Editor Recommended by Reviewer Recommended by Reader
These reviews have been recommended by readers of Computing Reviews.
Options: For the last:
  1-10 of 82 results Ranking
  Covariance and contravariance
Castagna G.  ACM Transactions on Programming Languages and Systems 17(3): 431-447, 1995. Type: Article

Ever since the O2 data model [1] and later the Eiffel language [2] introduced the concept of covariant specialization of methods, type theorists have argued whether it is better to use covariant or contravariant specialization for the m...

  Death march
Yourdon E.,  Pearson Education, Upper Saddle River, NJ, 2003. 304 pp. Type: Book (9780131436350)

Ed Yourdon is nothing if not a catchy phraseologist. A “death march project” is one whose “schedules, estimations, budgets, and resources are so constrained or skewed that participants can hardly survive, much less succeed.”...

  Cyborg: digital destiny and human possibility in the age of the wearable computer
Mann S., Niedzviecki H.,  Doubleday Canada, Toronto, ON, 2001. 304 pp. Type: Book (9780385658256)

“We are all already cyborgs,” proclaims Mann. A pioneer in the field of wearable computers, he believes that it’s only a matter of time before society embraces such prosthetic devices, and becomes as dependent on them as we are n...

  AspectJ in action: practical aspect-oriented programming
Laddad R.,  Manning Publications Co., Greenwich, CT, 2003. 512 pp. Type: Book (9781930110939), Reviews: (1 of 2)

Aspect-oriented programming (AOP) is an emerging paradigm, gaining more and more importance due to the benefits it introduces to conventional programming methodologies. AOP deals with crosscutting concerns, and the concepts it relies on can be add...

  Software architecture design patterns in Java
Kuchana P.,  Auerbach Publications, Boston, MA, 2004.Type: Book (9780849321429)

Design patterns are intended to encode best computer system design practices. Based on the experience gained, via the analysis of the outcome of numerous actual enterprise software development projects, these general schemas can be readily applied...

   Secrets and lies: digital security in a networked world
Schneier B.,  John Wiley & Sons, 2004.Type: Book (9780471453802)

“Security is a process, not a product.” If one sentence could sum up the content of this book, this would be it. Bruce Schneier, the author of the popular book Applied cryptography [1], takes a U-turn in his thinking on computer...

  Cross-platform .NET development: using Mono, portable .NET, and Microsoft .NET
Easton M., King J.,  APress, LP, 2004.Type: Book (9781590593301)

This is a very timely book, which sheds new light on what many may see as a Microsoft-only direction in software development. The book shows that .NET has gained serious ground among the open source community of software developers. Today, this te...

  On computing the Hamming distance
Kéri G., Kisvölcsey Á.  Acta Cybernetica 16(3): 443-449, 2004. Type: Article

The Hamming distance between two n-tuples is the number of positions in which they differ. Computing the Hamming distance for a large number of pairs of words is a hard problem. It is important in coding theory since the minimum...

  Encyclopedia of multimedia
Furht B.,  Springer-Verlag New York, Inc., Secaucus, NJ, 2005. 989 pp. Type: Book (9780387243955)

Weighing in at over 14 pounds and priced at $448, this 989-page monster is the largest and most expensive book that I have ever encountered in 50 years of reviewing computing literature! It is aimed extremely broadly at “anyone concerned wit...

  The scientific works of Rainer Kemp (1949-2004)
Flajolet P., Nebel M., Prodinger H.  Theoretical Computer Science 355(3): 371-381, 2006. Type: Article

From the enumeration of leftist trees [1] to the basics of parsing context-free grammars, Rainer Kemp (1949--2004) had a major role in shaping the grounding of the analysis of algorithms. His research in the theory of formal languages, namely...

Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2022 ThinkLoud, Inc.
Terms of Use
| Privacy Policy