These reviews are the most popular with readers.
All Media Types
For the last:
Encode when necessary: correlated network coding under unreliable wireless links
Wang S., Kim S., Yin Z., He T. ACM Transactions on Sensor Networks 13(1): 1-22, 2017. Type: Article
The broadcast nature of wireless communication is the reason for interference. Interference is one of the factors in the attenuation of effective power and the decrease in data rate in the receivers. Network coding is a technology that has changed...
Computer vision: models, learning, and inference
Prince S., Cambridge University Press, New York, NY, 2012. 600 pp. Type: Book (978-1-107011-79-3)
Computer vision has become increasingly important and effective in the last few years, with applications in areas as diverse as film and other media, mapping, surveillance, and even self-driving vehicles. In part, the rise in effectiveness comes f...
Metadata: shaping knowledge from antiquity to the semantic web
Gartner R., Springer International Publishing, New York, NY, 2016. 114 pp. Type: Book (978-3-319408-91-0)
This highly readable, clear, and accessible book by Richard Gartner demonstrates that the term “metadata” is neither--on the one hand--an exotic buzzword, nor--on the other hand--a reference to a resource descriptio...
The AXIOM software layers
Álvarez C., Ayguadé E., Bosch J., Bueno J., Cherkashin A., Filgueras A., Jiménez-González D., Martorell X., Navarro N., Vidal M., Theodoropoulos D., Pnevmatikatos D., Catani D., Oro D., Fernández C., Segura C., Rodríguez J., Hernando J., Scordino C., Gai P., Passera P., Pomella A., Bettin N., Rizzo A., Giorgi R. Microprocessors & Microsystems 47, Part B, 262-277, 2016. Type: Article
AXIOM is a project aimed at building a hardware substrate and software layers to target cyber-physical systems (CPS) that interact with users in real-time running applications such as face recognition. The paper should be of interest to any practi...
Efficient memory-mapped I/O on fast storage device
Song N., Son Y., Han H., Yeom H. ACM Transactions on Storage 12(4): Article No. 19, 2016. Type: Article
Data-intensive applications tend to use a large quantity of dynamic random-access memory (DRAM) using DRAM caching. This is relatively expensive, but using insufficient DRAM can lead to paging some data to secondary storage. That may result in una...
Modeling and simulating software architectures: the Palladio approach
Reussner R., Becker S., Happe J., Heinrich R., Koziolek A., Koziolek H., Kramer M., Krogmann K., The MIT Press, Cambridge, MA, 2016. 400 pp. Type: Book (978-0-262034-76-0)
As a computer science (CS) academic responsible for supervising and marking large student projects, I am used to being presented with pages and pages of unified modeling language (UML) diagrams; this usually drives me to despair as it is not clear...
Software-defined mobile networks security
Chen M., Qian Y., Mao S., Tang W., Yang X. Mobile Networks and Applications 21(5): 729-743, 2016. Type: Article
The tremendous success of mobile devices and their applications raises a lot of questions regarding security, quality of service (QoS), and user satisfaction. It is therefore very important to address these challenges and provide cost-effective ar...
SQL on big data: technology, architecture, and innovation
Pal S., Apress, New York, NY, 2016. 157 pp. Type: Book (978-1-484222-46-1)
After a few years and many discussions about big data and its most well-known attributes (“volume, variety, velocity, veracity”), it is now recognized that big data is not so easy to master. To obtain value from it, the user pool has t...
Software architecture in action: designing and executing architectural models with SysADL grounded on the OMG SysML standard
Oquendo F., Leite J., Batista T., Springer International Publishing, New York, NY, 2016. 236 pp. Type: Book (978-3-319443-37-9)
This 234-page book is broken into 17 chapters and organized into four parts, each focused on a different aspect of software architecture. Each part is organized in a similar manner, with a clear focus on one topic related to software architecture....
Mobile demand profiling for cellular cognitive networking
Furno A., Naboulsi D., Stanica R., Fiore M. IEEE Transactions on Mobile Computing 16(3): 772-786, 2017. Type: Article
Furno et al. describe a framework for automated demand profiling in mobile networks. Since participants in mobile communications can move around, both spatial as well as temporal characteristics of network traffic must be considered. In addition, ...
Reproduction in whole or in part without permission is prohibited. Copyright © 2000-2017 ThinkLoud, Inc.