Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
May 25, 2022

Social engineering: how crowdmasters, phreaks, hackers, and trolls created a new form of manipulative communication
The book’s subtitle is a fitting 13-word summary of what it is about. The book taught me that social engineering is a polite, obfuscating, nonthreatening label for the pernicious, amoral manipulation of people to accomplish... more
In early 1984, my colleague Tim Lister and I visited what was then one of America’s premier computer makers. We lectured and consulted there for a week. One of the things we noticed immediately... more
- Tom DeMarco (1995)
Website visual design qualities: a threefold framework: ACM Transactions on Management Information Systems

This work contributes to the literature on information systems by studying a theoretical perspective “that integrates three [major] dimensions of artifact visual design quality”: the aesthetic, functional, and... more

Human Factors (H.1.2...) | May 19 22

Question answering in knowledge bases: a verification assisted model with iterative training: ACM Transactions on Information Systems

Zhang et. al., in their paper, present a novel approach to increase the accuracy and efficiency in question-answering systems over a knowledge base. As they explain, “[mapping] a... more

General (H.0) | May 10 22

Securing communication data in pervasive social networking based on trust with KP-ABE: ACM Transactions on Cyber-Physical Systems

This paper looks at the crucial issues of security, user privacy, and communication integrity, inherent to the pervasive social networking (PSN) (a cyber... more

General (C.2.0) | Apr 28 22

SARDE: a framework for continuous and self-adaptive resource demand estimation: ACM Transactions on Autonomous and Adaptive Systems

Reliable performance estimation of complex software systems requires models that are adaptable to the system’s environment and workload. Grohmann et al. present SARDE for active and... more

General (D.0) | Apr 6 22

BlockQuicksort: avoiding branch mispredictions in Quicksort: Journal of Experimental Algorithmics

Quite often algorithms with bad worst-case complexity perform better on the average. Quicksort falls into this class. However, one of the drawbacks of Quicksort is that it is vulnerable to branch mispredictions... more

Sorting/Searching (E.5...) | Apr 1 22

Detection and resolution of rumours in social media: a survey: ACM Computing Surveys

Unverified information can spread on the web and influence public opinion before it is eventually verified as true or false. Such rumors eventually evolve during reiterated transmission, and often accompany... more

Social Networking (H.3.4...) | Mar 30 22

An empirical study of students’ perceptions on the setup and grading of group programming assignments: ACM Transactions on Computing Education

The ever-changing business world requires teams of agile developers, testers, technical leaders, product owners, and scrum masters to cooperatively... more

Computer & Info. Science Edu. (K.3.2) | Mar 15 22

TSLAM: A trust-enabled self-learning agent model for service matching in the cloud market: ACM Transactions on Autonomous and Adaptive Systems

Cloud services and cloud computing in general have experienced explosive growth. Undoubtedly it is easier for users, even sophisticated ones, to leave the... more

Cloud Computing (C.2.4...) | Feb 15 22

Data storage auditing service in cloud computing: World Wide Web

Cloud computing provides a convenient, scalable, and cost-effective data storage solution that is particularly attractive to small organizations who lack internal information technology (IT) resources. However, this new solution also... more

Cloud Computing (C.2.4...) | Feb 7 22

Next and next new POI recommendation via latent behavior pattern inference: ACM Transactions on Information Systems

The objective of a recommender system is to suggest relevant items or preferences to users. Similar to other recommendations, for example, for products, movies, or books, point-of-interest (POI) recommendations... more

General (H.0) | Jan 25 22

Reverse clustering: formulation, interpretation and case studies

Classifying the items in a large collection is a fundamental data analytic technique, and has been approached in two very different ways. This brief volume is a concise introduction to a research program that the authors have been conducting into bridging these approaches. The... more
Data Mapping (D.2.12...) | May 25 22

Machines we trust: perspectives on dependable AI

Skynet is here. This was my mindset when I undertook to review Machines we trust. The book comprises an introduction plus eight chapters divided into three parts: “Setting the Stage” (chapters 2 and 3); “Issues” (chapters 4 through 7); and “Prospects”... more
Privacy (K.4.1...) | May 24 22

Code that fits in your head: heuristics for software engineering

Writing software is a creative activity encompassing art, science, engineering, and craftsmanship concurrently. The title of the book, Code that fits in your head, aptly summarizes the mastery that a developer must exercise. Comprehensibility is the goal. Code... more
General (D.2.0) | May 23 22

Cause effect pairs in machine learning

From the earliest courses in statistics we are taught that correlation does not imply causation. However, apart from some special cases, it is also generally true that causation implies correlation (or dependency). While the first sentence is a severe warning against... more
Learning (I.2.6) | May 17 22

Social engineering

The book’s subtitle is a fitting 13-word summary of what it is about. The book taught me that social engineering is a polite, obfuscating, nonthreatening label for the pernicious, amoral manipulation of people to accomplish someone else’s hidden goals of power and... more
Social Issues (K.4.2) | May 13 22

Database design for mere mortals (4th ed.)

This is the fourth edition of a text that was published 25 years ago. The main purpose of the book is to explain the logical design phase of the database development process, independently on a particular database software. Note that a situation is considered where an... more
Database Management (H.2) | May 10 22

Core data analysis (2nd ed.)

This interesting textbook on data analysis considers summarization as a means for developing and augmenting analytical concepts; correlation for enhancing and establishing relations; and visualization as a means to “presenting results in a... more
General (E.0) | May 5 22

Dive into algorithms: a Python adventure for the intrepid beginner

Algorithms--their concepts, theory, and methods--are not limited to computer science. My recipe for making chili for dinner is an algorithm, as are my lesson plans for my courses, and the Internal Revenue Service (IRS) tax return forms I file every April. Even my... more
Python (D.3.2...) | May 2 22

Security of ubiquitous computing systems

Frankly, my first reaction to this book was a silent groan. Why do some people seem to think that a technical book must be obscure, unbelievably boring, and written by people with poor-to-mediocre... more
Security & Protection (D.4.6) | Apr 25 22

Computer networks: a systems approach (6th ed.)

The field of computer science and engineering is advancing rapidly, especially in the area of computer networking. As the speed of networks increases, large amounts of data can be transferred at the speed of light. This makes more advanced applications possible... more
General (C.2.0) | Apr 20 22

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2022 ThinkLoud, Inc.
Terms of Use
| Privacy Policy