




A maximum flow algorithm based on storage time aggregated graph for delaytolerant networks: Ad Hoc Networks
Searching for maximum flow in a network based on graph theory is essential in planning the route and scheduling transmission. Therefore, it is natural... more
Sensor Networks (C.2.1...)  May 26 17
Test case prioritization using lexicographical ordering: IEEE Transactions on Software Engineering
Eghbali and Tahvildari examine a previously uncovered technique that orders test cases based on their coverage of code components, the additional technique (AT). They determine that ties can occur... more
Testing & Debugging (D.2.5)  May 26 17
Melia: a MapReduce framework on OpenCLbased FPGAs: IEEE Trans. on Parallel and Distributed Systems
Many web applications such as search engines and recommendation systems require operations on large datasets. The nature of computation in such applications is complex, which necessitates distributed... more
Gate Arrays (B.7.1...)  May 24 17
Counting and generating permutations in regular classes: Algorithmica
The signature of a permutation can be described in terms of two symbols that represent ascent and descent in the ordering of the elements. For each regular language (that... more
Permutations & Combinations (G.2.1...)  May 19 17
A GPUbased branchandbound algorithm using IntegerVectorMatrix data structure: Parallel Computing
Gmys et al. address the parallelization of the popular branchandbound (B&B) algorithm for solving combinatorial optimization problems using graphics processing units (GPUs)... more
Combinatorial Algorithms (G.2.1...)  May 17 17
Mobile demand profiling for cellular cognitive networking: IEEE Transactions on Mobile Computing
Furno et al. describe a framework for automated demand profiling in mobile networks. Since participants in mobile communications can move around, both spatial as well as temporal characteristics of... more
Cellular Architecture (C.1.3...)  May 16 17
The AXIOM software layers: Microprocessors & Microsystems
AXIOM is a project aimed at building a hardware substrate and software layers to target cyberphysical systems (CPS) that interact with users in realtime running... more
Heterogeneous (Hybrid) Systems (C.1.3...)  May 15 17
Encode when necessary: correlated network coding under unreliable wireless links: ACM Transactions on Sensor Networks
The broadcast nature of wireless communication is the reason for interference. Interference is one of the factors in the attenuation of effective power... more
Network Protocols (C.2.2)  May 12 17
Efficient memorymapped I/O on fast storage device: ACM Transactions on Storage
Dataintensive applications tend to use a large quantity of dynamic randomaccess memory (DRAM) using DRAM caching. This is relatively expensive, but using insufficient DRAM can lead to paging some... more
Storage Management (D.4.2)  May 12 17
Ringshaped hotspot detection: IEEE Transactions on Knowledge and Data Engineering
What is the best way to search for an annular object? Such problems arise in situations as diverse as meteorite craters and the spread of infections... more
Algorithm Design & Analysis (G.4...)  May 12 17









Wonderful solutions and habitual domains for challenging problems in changeable spaces
The lengthy, lilting title forecasts the creativity and unconventionality of a book that seeks to revolutionize decision making by expanding the solution space to take into account that some quantitative... more
Optimization (G.1.6)  May 26 17
The science of managing our digital stuff
Written by two leading experts in the field, The science of managing our digital stuff is a very wellcrafted book covering a wide range of work on how people store, organize, and use personal information in digital form. The... more
Multimedia Information Systems (H.5.1)  May 25 17
Evolution of broadcast content distribution
In approximately 125 pages, the author discusses the unfolding broadcast distribution ecosystem. Anyone concerned with how to distribute content with new networks, regulations, consumer expectations, and technologies will want this information. The... more
Distributed Systems (C.2.4)  May 25 17
Music through Fourier space: discrete Fourier transform in music theory
Discrete Fourier transform (DFT) has emerged as a powerful and popular tool in mathematical music theory. Amiot’s nice book gives the state of the art in the usage of DFT of abstract musical... more
Sound & Music Computing (H.5.5)  May 25 17
Ada’s legacy: cultures of computing from the Victorian to the digital age
A record and celebration of a 2013 conference exploring the legacy of Augusta Ada Lovelace, this collection of 12 chapters includes Lovelace’s published writing on Charles Babbage’s analytical engine (AE), called... more
Ada Lovelace (K.2...)  May 25 17
Sams teach yourself R in 24 hours
Sams teach yourself R in 24 hours is an operating system (OS)agnostic book. R and the recommended graphical user interface, RStudio, can be run on Windows, Macintosh, and Linux computers. R is a statistical programming language that... more
Mathematical Software (G.4)  May 25 17
Recent contributions in intelligent systems
This is a collection of the best papers from the 2012 IEEE Intelligent Systems Conference, which was held in Sofia, Bulgaria in September 2012. The average length of the papers in this volume is 20... more
Applications & Expert Systems (I.2.1)  May 25 17
Signals and systems: a primer with MATLAB
Signals are physical manifestations of underlying processes or phenomena. The evolution of a physical process is captured in the form of a signal, which is mathematically represented as a function... more
MATLAB (G.4...)  May 25 17
The art of scrum: how scrum masters bind dev teams and unleash agility
Scrum is a widely used approach for the agile development of software systems. A scrum master plays a key role by coaching, facilitating, and orchestrating the ceremonies and artifacts of the scrum... more
Management (D.2.9)  May 24 17
Secure data deletion
Securely deleting data is a problem in more than just the digital spherefor example, we are encouraged to shred paper documents with sensitive information. But how secure is shredding? The Defense Advanced Research... more
Security & Protection (K.6.5)  May 24 17


