: ACM Transactions on Reconfigurable Technology and Systems
Transforming gate-level Boolean logic into functionally equivalent lookup tables (LUTs) is a key step in the compilation of a design into field-programmable gate arrays (FPGAs). Tools typically deploy a...
General (B.5.0) | Apr 3 19
Computer Systems Organization (C)
Neural network classifiers using a hardware-based approximate activation function with a hybrid stochastic multiplier
: ACM Journal on Emerging Technologies in Computing Systems
Li et al. present a novel approach for optimizing neural network implementations, that is, “a new architecture of stochastic neural networks” with a hidden...
Neural Nets (C.1.3...) | May 1 19
A novel multilayer AAA model for integrated applications
: Neural Computing and Applications
Unidimensional static security policies cannot cater to the needs of a growing enterprise anymore. Local regulations, business processes, operational levels, and threat modeling are the...
Neural Nets (C.1.3...) | Mar 22 19
Survey on fog computing
: Journal of Network and Computer Applications
In the Internet of things (IoT), is there a difference between edge and fog computing?
By now we all understand the cloud computing paradigm in which end devices (anything from sensors and smartphones to industrial...
Distributed Networks (C.2.1...) | Apr 3 19
Context-driven and real-time provisioning of data-centric IoT services in the cloud
: ACM Transactions on Internet Technology
The Internet of Things (IoT) and cloud computing infrastructure are synonymous in contemporary computing, insomuch as the phenomena relate...
Cloud Computing (C.2.4...) | Mar 21 19
The human infrastructure of El Paquete, Cuba’s offline Internet
Cubans do not have online access to the Internet, nor instantaneous communication with people outside of Cuba. Even cellphone technology inside Cuba is limited. Responding to that void, an informal network...
Local & Wide-Area Networks (C.2.5) | Apr 29 19
SDN flow entry management using reinforcement learning
: ACM Transactions on Autonomous and Adaptive Systems
Software-defined networking (SDN) technology makes for smoother network management and configuration. It allows network resources to be efficiently assigned to both prolonged and short-term traffic...
Performance of Systems (C.4) | Apr 24 19
Impact of virtualization on cloud computing energy consumption: empirical study
: ISCSIC 18
Intensive computation in tasks such as weather forecasting and scientific solar system exploration requires high-speed processors and huge data...
Performance of Systems (C.4) | Apr 5 19
The PCL theorem
: Journal of the ACM
Transactional memory is one approach to making highly parallel programming manageable. In such approaches, parallel memory accesses are treated somewhat similarly to transactions in a database system, ideally guaranteeing properties similar to the ACID...
Concurrent Programming (D.1.3) | Apr 15 19
: Communications of the ACM
Stephen Hawking once said,
“If aliens visit us, the outcome would be much as when Columbus landed in America, which didn’t turn out well for the Native Americans. We only have to look at ourselves to see how intelligent life might develop into something...
General (D.2.0) | Apr 26 19
Design automation techniques for approximation circuits: verification, synthesis and test
Finding the optimal energy savings corresponding to different quality constraints is one of the most important driving forces in approximate design, particularly for complex system on chips (SoCs) with multiple Internet protocols (IPs) integrated on edge devices...
Types & Design Styles (B.7.1) | Apr 12 19
Computer Systems Organization (C)
Networks (2nd ed.)
In this revised and expanded edition of his 2010 seminal work [1,2], Newman updates the content to reflect developments in the field. The book is very comprehensive and consists of 18 chapters. It is divided into four distinct parts: “The Empirical Study of Networks,” “Fundamentals of Network Theory...
General (C.0) | Apr 22 19
Advanced Raspberry Pi (2nd ed.)
The history of broadly understood electronics development includes the creation of new paradigms that became milestones: the discovery of transistors, the release of the 8051 microprocessor, the discovery of light-emitting diode (LED) indicators, the...
General (C.0) | Apr 11 19
Handbook of e-business security
This 15-chapter handbook opens up with an introductory chapter on security threats in e-commerce. Overall, the chapters cover traditional issues common to e-business security. For example, chapter 2 discusses the practical aspects of cryptography as it relates to...
Security & Protection (C.2.0...) | Apr 3 19
The datacenter as a computer (3rd ed.)
As machine learning becomes more popular and more responsible for managing our everyday lives, using it to manage data centers, to control the mammoth tasks engineers have to deal with, is only a natural evolution.
This book is a series of lectures in computer...
General (C.2.0) | Mar 29 19
Network function virtualization
The exponential growth of cellular network data, which grows at a pace of 60 percent per year and is expected to increase even more due to the growth of Internet of Things (IoT) networks, poses some unprecedented challenges to the design of data networks. To...
General (C.2.0) | Mar 21 19
Bitwise: a life in code
This is perhaps the most peculiar book I have ever reviewed. It is essentially a collection of philosophical and autobiographical essays on the subject of computing, specifically on topics the author finds interesting. Whether you, the reader, will find the book interesting or not is a...
General (D.2.0) | May 2 19
Software development from A to Z
Initially I didn’t much like this book. Here’s why. It’s mostly about software as a product. My experience is with software as an in-house problem solution. It spends most of its time talking about the various roles involved in building software, and what tools are...
General (D.2.0) | Apr 2 19
Handbook of model checking
Due to the proliferation and pervasiveness of hardware and software entities in everyday life, ascertaining their trustworthiness is of paramount importance. Model checking is a logic-based approach that determines whether the abstract model of an entity conforms to a...
Model Checking (D.2.4...) | May 20 19
Foundations of programming languages
Programming is a science-based craft. For a programmer, the better the science, the better the craft. Foundations of programming languages provides a computer science (CS)-based treatment of the foundations of three programming paradigms...
Formal Definitions & Theory (D.3.1) | Apr 8 19