Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Featured Help
November 22, 2005 | University of North Texas
Search
Highlight

Live and let die
The decades old problem of formally securing safety critical systems is addressed in this paper. These are concurrent systems that interact with critical physical environments. The authors describe verification processes that involve multiple steps. Starting with a source description of a safety critical... more
Quote
What makes a thing useful? In one tax office in Australia, a completely computerized system had been created merely to control the queuing of people making... more
- Larry L. Constantine and Lucy A. D. Lockwood (1999)
Articles
Robust moving least-squares fitting with sharp features: ACM Transactions on Graphics

A moving least-squares technique is described for reconstructing a piecewise smooth surface using noisy data from a digital scanner. The method is based on the forward-search algorithm used to detect...

Projections (I.4.7...) | Nov 22 05

Assessing metacognitive knowledge in Web-based CALL: a neural network approach: Computers & Education

Metacognition is the art of thinking about thinking. Flavel, as cited in this paper, distinguishes two forms of metacognition: that of metacognitive knowledge, and that of...

World Wide Web (WWW) (H.3.4...) | Nov 22 05

Web service composition using a deductive XML rule language: Distributed and Parallel Databases

A dedicated system for building Web service compositions, called SWIM, is presented in this paper. Web services compositions are capable of aggregating multiples results from multiple Web services...

Workflow Management (H.4.1...) | Nov 22 05

What does it take to learn ‘programming thinking’?: ICER ’05

One student said, “It is the understanding of how the programming language is built” (page 137). Another student said, “You have a problem that you solve in different ways, and then...

Computer Science Education (K.3.2...) | Nov 22 05

Why do current graphical user interfaces not work naturally & how they can be fixed?: Ubiquity

In this lighthearted, but thought-provoking article, Myers provides a walkthrough perspective of product development in graphical user interface design. He begins with a consideration of early tools...

Graphical User Interfaces (GUI) (H.5.2...) | Nov 22 05

A curriculum for embedded system engineering: ACM Transactions on Embedded Computing Systems

A curriculum for a four-year undergraduate program in embedded system engineering (ESE) is presented in this paper. Seviora takes a two-step approach, similar to that adopted by the...

Computer & Inf. Science Education (K.3.2) | Nov 21 05

Ten commandments revisited: a ten-year perspective on the industrial application of formal methods: FMICS ’05

Has correctness come into its own? Has, as Bertrand Meyer is quoted as saying, “a more mathematical approach” to software come to the fore? The media’s sound and fury are certainly...

Formal Methods (D.2.4...) | Nov 21 05

Nurturing software: Communications of the ACM

“Software does not grow on trees.” This interesting and intriguing opening statement, by the authors of this paper, forces the reader to continue reading the rest of the paper to see the...

General (D.2.0) | Nov 21 05

Disk scheduling in a multimedia I/O system: ACM Transactions on Multimedia Computing, Communications, and Applications

The progress made over a ten-year period on scheduling policies for multimedia systems is summarized in this paper, which also analyzes in detail a scheduling algorithm called SCAN-EDF, which the...

Secondary Storage (D.4.2...) | Nov 18 05

Biological sequence alignment on the computational grid using the GrADS framework: Future Generation Computer Systems

Grid Application Development Software (GrADS) is a multi-institutional research project created to assist with distributed computing. It provides tools for development and deployment of...

Distributed Systems (H.3.4...) | Nov 18 05

Books
Darknet: Hollywood’s war against the digital generation

Lasica has written an engaging book on the issue of digital rights in this age of participatory culture. The work is relevant to, and accessible by, general readers. Lasica informs readers of the ever-growing friction between entertainment companies and digital...
Video (H.5.1...) | Nov 22 05

JDF: process integration, technology, product description

This book is narrowly focused on the print media industry, which consists of printing services providers, their customers, and the companies that supply equipment and software to them. The products...
Workflow Management (H.4.1...) | Nov 22 05

Access by design: a guide to universal usability for Web designers

This treatise introduces the key concepts to be addressed when creating an accessible Web design. It is well organized and contains some good information, but it is shallow and repetitive. So, if you...
User-Centered Design (H.5.2...) | Nov 22 05

Cashing in with content: how innovative marketers use digital information to turn browsers into buyers

The message that David Scott emphasizes to both Web designers and marketers is “content drives action.” The maturing Web requires that useful sites have more than sizzle to attract and...
World Wide Web (WWW) (H.3.4...) | Nov 22 05

Hacker Web exploitation uncovered

The security of Web applications is of vital importance. In today’s enterprises, Web-originated intrusions outweigh traditional network-level intrusions. Interactive Web applications, where users interact with dynamically generated Web content, have the...
Introductory And Survey (A.1) | Nov 21 05

Managing agile projects

There exists an enormous variety of projects. Even if we limit the discussion to information technology (IT) projects (already a very grey term), the variety is overwhelming, and this does not even...
Software Process Models (D.2.9...) | Nov 21 05

Motion-free super-resolution

The demand for better resolution in imaging applications is still growing, despite recent enhancements in sensor technology that provide much higher resolution images. Super-resolution, which basically involves generating and estimating...
Transform Methods (I.4.5...) | Nov 18 05

Neuro-fuzzy applications in telecommunications

Computational intelligence (CI) is a branch of artificial intelligence, and as such tries to create computer programs that are, in some sense, intelligent. CI research either explicitly rejects or tacitly ignores statistical approaches to learning, adaptivity, and optimization...
Signal Processing (I.5.4...) | Nov 18 05

Data strategy

In the foreword of the book, David Marco writes, “Data strategy is one of the most ubiquitous and misunderstood topics in the information technology (IT) industry. Most corporations’ data strategy and IT infrastructure were not planned, but grew out of ‘stovepipe’ applications over time with little...
Strategic Inf. Syst. Planning (K.6.1...) | Nov 17 05

Prefiguring cyberculture: an intellectual history

The premise of this work is that we are who we are as humans because of the limitless social apparatus of technology, primarily the computer network. The interwoven nature of the human-computer interface has made it impossible to distinguish technology...
Systems (K.2...) | Nov 17 05


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 2005 Reviews.com™
Terms of Use
| Privacy Policy