Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
View:  Show:    

Hardware (B)
Optimizing data placement on GPU memory: a portable approach : IEEE Transactions on Computers

We say that a computational artifact is “portable” if it can be implemented on a variety of targets. In this paper, the portable artifact is a strategy for the...
Performance Analysis & Design Aids (B.3.3) | Apr 17 17

Dynamic core allocation and packet scheduling in multicore network processors : IEEE Transactions on Computers

The invention of the multicore processor was a great achievement with significant influences on the throughput, performance, and speed of...
Performance Analysis & Design Aids (B.3.3) | Mar 31 17

Generating cyclic-random sequences in a constrained space for in-system validation : IEEE Transactions on Computers

Verification is one of the most important parts of the whole chip design flow. Typically, verification claims more than 60 percent of the chip design...
Performance Analysis & Design Aids (B.4.4) | Mar 31 17

Computer Systems Organization (C)
Cellular machine-type communications: physical challenges and solutions : IEEE Wireless Communications

Machine type communication (MTC) is an emerging technology with unbelievable penetration in different aspects of human life; wireless communication...
General (C.2.0) | Apr 7 17

Joint pre-processing co-channel interference cancellation for single user MIMO : Wireless Networks

In fourth-generation (4G) wireless communication and its famous long-term evolution (LTE) technology, multiple input, multiple output (MIMO) plays a...
Wireless Communication (C.2.1...) | Apr 4 17

Passive Wi-Fi: bringing low power to Wi-Fi transmissions : NSDI 16

Low-power Wi-Fi fills a definite need in the Internet of Things (IoT) infrastructure, and this paper’s ideas advance its evolution. While consumer IoT is built atop “large”...
Sensor Networks (C.2.1...) | Mar 31 17

A new asset tracking architecture integrating RFID, Bluetooth low energy tags and ad hoc smartphone applications : Pervasive & Mobile Computing

Tracking systems are intended to determine the exact position of an object and are, nowadays, widespread. Objects intended to be tracked are actually...
Wireless Communication (C.2.1...) | Mar 31 17

A taxonomy of job scheduling on distributed computing systems : IEEE Transactions on Parallel and Distributed Systems

In the field of computing theory or computer science in general, there are many problems that are computationally hard. These problems attract many researchers who try to solve them. But one...
Distributed Networks (C.2.1...) | Mar 30 17

Internet of Things (IoT): smart and secure service delivery : ACM Transactions on Internet Technology

The coverage of the Internet of Things (IoT), especially on security, is critical. As the paper and other sources on the Internet say, there are...
Network Protocols (C.2.2) | Mar 31 17

Light at the middle of the tunnel: middleboxes for selective disclosure of network monitoring to distrusted parties : HotMiddleboxes 16

Sultana et al. tackle the problem of remotely making measurements on a network over which the party conducting the reconnaissance has no control...
Network Monitoring (C.2.3...) | Mar 30 17

Hardware (B)

Fundamentals of fibre optics in telecommunication and sensor systems (2nd ed.)

This collective 620-page volume brings together many of the fundamental constituents of fiber optical communications and sensing, together with specifics in a range of applications. It turns out that...
Fiber Optics (B.4.3...) | Mar 31 17

Designing with Xilinx FPGAs: using Vivado

This highly practical compendium of articles from different authors covers topics about, as the title of the book says, design methods using field-programmable gate array (FPGA) devices from the vendor Xilinx. FPGA devices are among the most...
Gate Arrays (B.7.1...) | Apr 20 17

Computer Systems Organization (C)

Description and selection of communication services for service oriented network architectures

Computer networks and communication technologies have evolved drastically since the inception of computer networks. Present-day computer networks need to deal with the constantly changing demands of...
Data Communications (C.2.0...) | Apr 5 17

SDN and NFV simplified

Software-defined networking (SDN) and network function virtualization (NFV) are now popular buzzwords. On one hand, this fact is related to the prevailing usage of these two groups of concepts in practical applications...
Network Architecture & Design (C.2.1) | Mar 30 17

Content distribution for mobile Internet: a cloud-based approach

The distribution of content in a mobile Internet, with emphasis on the emergence of cloud-based technology, is the basis of a collection of articles by the main author, Zhenhua Li, written during his PhD and post-doctoral work. (The other authors were his...
Distributed Systems (C.2.4) | Mar 30 17

Guide to computing fundamentals in cyber-physical systems: concepts, design methods, and applications

We are living through the fourth Industrial Revolution, which is causing steep change in our professions and lives. If you are wondering where to start comprehending its technical aspects, start...
Real-Time & Embedded Systems (C.3...) | Apr 6 17

Vehicular cyber physical systems: adaptive connectivity and security

The title of this slim book indicates that it is about the connectivity and security of vehicular cyber-physical systems. However, it only covers a very restricted range of these topics. Its five chapters are based...
Real-Time & Embedded Systems (C.3...) | Mar 31 17

Reliable software for unreliable hardware: a cross layer perspective

Today we are living through a boom in the software and hardware fields, mainly motivated by what is called the Internet of Things (IoT). It is obvious that hardware improvements can no longer be accomplished...
Reliability, Avail. & Serviceability (C.4...) | Apr 6 17

Anti-fragile ICT systems

Large, complex information and communications technology (ICT) systems need to have been designed so that unexpected stressors and events do not cause the systems to fail. This is particularly...
Reliability, Availability & Serv. (C.4...) | Mar 31 17

Pervasive social computing: socially-aware pervasive systems and mobile applications

Social awareness applications or services are intended to handle remote communication by providing, automatically or in a supervised manner, hints about people’s current state or situation, or...
Portable Devices (C.5.3...) | Apr 7 17

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy