Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
May 29, 2017
Search
Highlight

GPU-accelerated Hungarian algorithms for the linear assignment problem
The paper is devoted to a fundamental problem in the area of combinatorial optimization--the assignment problem. The goal is to find a maximum (or minimum) weight matching in a weighted bipartite graph. The authors focus on the Hungarian algorithm, which solves the linear... more
Quote
We insist here on a distinction between nominal definitions, which contain only characters by which we can distinguish one thing... more
- Gottfried Wilhelm von Leibniz (1680)
Articles
A maximum flow algorithm based on storage time aggregated graph for delay-tolerant networks: Ad Hoc Networks

Searching for maximum flow in a network based on graph theory is essential in planning the route and scheduling transmission. Therefore, it is natural... more

Sensor Networks (C.2.1...) | May 26 17

Test case prioritization using lexicographical ordering: IEEE Transactions on Software Engineering

Eghbali and Tahvildari examine a previously uncovered technique that orders test cases based on their coverage of code components, the additional technique (AT). They determine that ties can occur... more

Testing & Debugging (D.2.5) | May 26 17

Melia: a MapReduce framework on OpenCL-based FPGAs: IEEE Trans. on Parallel and Distributed Systems

Many web applications such as search engines and recommendation systems require operations on large datasets. The nature of computation in such applications is complex, which necessitates distributed... more

Gate Arrays (B.7.1...) | May 24 17

Counting and generating permutations in regular classes: Algorithmica

The signature of a permutation can be described in terms of two symbols that represent ascent and descent in the ordering of the elements. For each regular language (that... more

Permutations & Combinations (G.2.1...) | May 19 17

A GPU-based branch-and-bound algorithm using IntegerVectorMatrix data structure: Parallel Computing

Gmys et al. address the parallelization of the popular branch-and-bound (B&B) algorithm for solving combinatorial optimization problems using graphics processing units (GPUs)... more

Combinatorial Algorithms (G.2.1...) | May 17 17

Mobile demand profiling for cellular cognitive networking: IEEE Transactions on Mobile Computing

Furno et al. describe a framework for automated demand profiling in mobile networks. Since participants in mobile communications can move around, both spatial as well as temporal characteristics of... more

Cellular Architecture (C.1.3...) | May 16 17

The AXIOM software layers: Microprocessors & Microsystems

AXIOM is a project aimed at building a hardware substrate and software layers to target cyber-physical systems (CPS) that interact with users in real-time running... more

Heterogeneous (Hybrid) Systems (C.1.3...) | May 15 17

Encode when necessary: correlated network coding under unreliable wireless links: ACM Transactions on Sensor Networks

The broadcast nature of wireless communication is the reason for interference. Interference is one of the factors in the attenuation of effective power... more

Network Protocols (C.2.2) | May 12 17

Efficient memory-mapped I/O on fast storage device: ACM Transactions on Storage

Data-intensive applications tend to use a large quantity of dynamic random-access memory (DRAM) using DRAM caching. This is relatively expensive, but using insufficient DRAM can lead to paging some... more

Storage Management (D.4.2) | May 12 17

Ring-shaped hotspot detection: IEEE Transactions on Knowledge and Data Engineering

What is the best way to search for an annular object? Such problems arise in situations as diverse as meteorite craters and the spread of infections... more

Algorithm Design & Analysis (G.4...) | May 12 17

Books
Wonderful solutions and habitual domains for challenging problems in changeable spaces

The lengthy, lilting title forecasts the creativity and unconventionality of a book that seeks to revolutionize decision making by expanding the solution space to take into account that some quantitative... more
Optimization (G.1.6) | May 26 17

The science of managing our digital stuff

Written by two leading experts in the field, The science of managing our digital stuff is a very well-crafted book covering a wide range of work on how people store, organize, and use personal information in digital form. The... more
Multimedia Information Systems (H.5.1) | May 25 17

Evolution of broadcast content distribution

In approximately 125 pages, the author discusses the unfolding broadcast distribution ecosystem. Anyone concerned with how to distribute content with new networks, regulations, consumer expectations, and technologies will want this information. The... more
Distributed Systems (C.2.4) | May 25 17

Music through Fourier space: discrete Fourier transform in music theory

Discrete Fourier transform (DFT) has emerged as a powerful and popular tool in mathematical music theory. Amiot’s nice book gives the state of the art in the usage of DFT of abstract musical... more
Sound & Music Computing (H.5.5) | May 25 17

Ada’s legacy: cultures of computing from the Victorian to the digital age

A record and celebration of a 2013 conference exploring the legacy of Augusta Ada Lovelace, this collection of 12 chapters includes Lovelace’s published writing on Charles Babbage’s analytical engine (AE), called... more
Ada Lovelace (K.2...) | May 25 17

Sams teach yourself R in 24 hours

Sams teach yourself R in 24 hours is an operating system (OS)-agnostic book. R and the recommended graphical user interface, RStudio, can be run on Windows, Macintosh, and Linux computers. R is a statistical programming language that... more
Mathematical Software (G.4) | May 25 17

Recent contributions in intelligent systems

This is a collection of the best papers from the 2012 IEEE Intelligent Systems Conference, which was held in Sofia, Bulgaria in September 2012. The average length of the papers in this volume is 20... more
Applications & Expert Systems (I.2.1) | May 25 17

Signals and systems: a primer with MATLAB

Signals are physical manifestations of underlying processes or phenomena. The evolution of a physical process is captured in the form of a signal, which is mathematically represented as a function... more
MATLAB (G.4...) | May 25 17

The art of scrum: how scrum masters bind dev teams and unleash agility

Scrum is a widely used approach for the agile development of software systems. A scrum master plays a key role by coaching, facilitating, and orchestrating the ceremonies and artifacts of the scrum... more
Management (D.2.9) | May 24 17

Secure data deletion

Securely deleting data is a problem in more than just the digital sphere--for example, we are encouraged to shred paper documents with sensitive information. But how secure is shredding? The Defense Advanced Research... more
Security & Protection (K.6.5) | May 24 17


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy