Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
  Browse All Reviews > Hardware (B)  
  1-10 of 1707 Reviews about "Hardware (B)": Date Reviewed
  Optimum transistor sizing of CMOS logic circuits using logical effort theory and evolutionary algorithms
Singh K., Jain A., Mittal A., Yadav V., Singh A., Jain A., Gupta M.  Integration, the VLSI Journal 60 25-38, 2018. Type: Article

This paper proposes a methodology for optimizing and evaluating chip designs by coupling the well-known logical effort (LE) theory with heuristic algorithms. Complementary metal–oxide–semiconductor (CMOS)-level optimization can dramatically improv...

Mar 1 2018
  Emerging technology and architecture for big-data analytics
Chattopadhyay A., Chang C., Yu H.,  Springer International Publishing, New York, NY, 2017. 330 pp. Type: Book (978-3-319548-39-5)

Readers will always warmly welcome a book on a hot topic in contemporary computer science, and big data is such a topic. As can be seen by looking at the book, the topic is also an important issue for hardware designers and low-level software spec...

Feb 22 2018
   Architectural and operating system support for virtual memory
Bhattacharjee A., Lustig D.,  Morgan & Claypool Publishers, San Rafael, CA, 2017. 176 pp. Type: Book (978-1-627056-02-1)

Are you a memory management unit (MMU) hardware designer, an operating system kernel programmer, or a student/researcher of modern computer architectures or operating systems? Abhishek Bhattacharjee (Rutgers University) and Daniel Lustig (NVIDIA) ...

Feb 9 2018
  Optimization and quality estimation of circuit design via random region covering method
Bi Z., Zhou D., Wang S., Zeng X.  ACM Transactions on Design Automation of Electronic Systems 23(1): 1-25, 2017. Type: Article

Bi et al. propose a random region covering theory to optimize designs on systems and circuits. The proposed work has been verified on a class-E power amplifier and a cascade local impedance attenuation amplifier. Both are analog circuits with a si...

Jan 26 2018
  Advances in computers: creativity in computing and dataflow supercomputing (vol. 104)
Hurson A., Milutinovic V.,  Academic Press, Cambridge, MA, 2017. 238 pp. Type: Book (978-0-128119-55-6)

Computers and software applications are rapidly overwhelming our day-to-day lives. Computing has seen a rapid rise in the past four decades due to Moore’s law and the doubling of computing speeds in one-and-a-half to two years. However, Moor...

Jan 25 2018
  Space-efficient parallel construction of succinct representations of suffix tree topologies
Baier U., Beller T., Ohlebusch E.  Journal of Experimental Algorithmics 22(1): 1-26, 2017. Type: Article

A suffix tree is a compressed tree that represents all the suffixes of a given string. Such a data structure has wide applications in string processing, bioinformatics, and information retrieval and can be constructed with space/time complexity li...

Jan 24 2018
  Design optimization for security- and safety-critical distributed real-time applications
Jiang W., Pop P., Jiang K.  Microprocessors & Microsystems 52 401-415, 2017. Type: Article

Security and design for real-time systems is becoming more relevant today than ever before. This is mostly due to the technology revolution moving toward automation and optimization, fueled by computer algorithms and software....

Dec 13 2017
  Non-volatile in-memory computing by spintronics
Yu H., Ni L., Wang Y.,  Morgan & Claypool Publishers, San Rafael, CA, 2016. 186 pp. Type: Book (978-1-627052-94-8)

With quintillions of calculations per second, exascale computing is a challenge for the world of scientific discovery and for advancing economic competitiveness. In certain applications such as climate change and climate modeling, precision medici...

Dec 11 2017
  Effective usage of redundancy to aid neutralization of hardware Trojans in integrated circuits
Gunti N., Lingasubramanian K.  Integration, the VLSI Journal 59 233-242, 2017. Type: Article

Hardware Trojans (HTs) are a major concern in cyber-physical systems security. Outsourcing activities related to the design and implementation of digital systems expose them to malicious modification. Such modifications may long stay silent, not d...

Nov 22 2017
  Performance improvements for search systems using an integrated cache of lists + intersections
Tolosa G., Feuerstein E., Becchetti L., Marchetti-Spaccamela A.  Information Retrieval 20(3): 172-198, 2017. Type: Article

This work’s title should more aptly start with “Performance improvement for full-text search systems” because it focuses on that area of application. The lengthy paper (25 pages) revisits and expands on previous work aimed at inc...

Nov 21 2017
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy