Computer Systems Organization (C)
The rise of serverless computing
: Communications of the ACM
In spite of a somewhat confusing introduction--“the server is dead, long live the server”--this informative article gives an overview of the relatively new phenomenon of serverless computing. It includes definitions...
General (C.0) | Aug 3 20
Building consistent transactions with inconsistent replication
: ACM Transactions on Computer Systems
Large-scale transaction processing systems must balance the need for minimal response times with maintaining the integrity of the data being processed. In theory, transactions are processed sequentially...
Distributed Architectures (C.1.4...) | Aug 18 20
AndroZoo: collecting millions of Android apps for the research community
: MSR 16
This is basically a data collection paper. How did the authors collect more than three million free Android apps (more than 20 terabytes)? The answer: it’s somewhat more delicate than one might...
Mobile Processors (C.1.4...) | Aug 5 20
Joint online coflow routing and scheduling in data center networks
: IEEE/ACM Transactions on Networking
With the proliferation of big data initiatives across corporations and academia, the importance of distributed computing frameworks has created many research opportunities related to routing and...
Network Architecture & Design (C.2.1) | Sep 3 20
Performance analysis of linear receivers for uplink massive MIMO FBMC-OQAM systems
: IEEE Transactions on Signal Processing
Progressive improvements have been made to the FBMC-OQAM signaling, for example, many theoretical discussions and achievements...
Signal Processing Systems (C.3...) | Aug 4 20
Engineering resilient collective adaptive systems by self-stabilisation
: ACM Transactions on Modeling and Computer Simulation
Smart cities, together with the Internet of Things (IoT), are becoming reality at an accelerated speed, supported by the fifth generation of...
Software Engineering (D.2) | Jul 8 20
Blockchain technology: What is it good for?
: Communications of the ACM
Cryptocurrency has been the origin of an evolution in financial and monetary relations the world over, and its domain of influence continues to spread. Bitcoin is its well-known symbol. In addition to security, trust...
General (D.2.0) | Sep 28 20
Hospitality of chatbot building platforms
: SQUADE 19
Chatbots provide for natural language computer conversations, popularized with personal voice assistants like Siri and Alexa. Suitable architecture frameworks for building chatbots are reframed into the "hospitality" of a...
General (D.2.0) | Jul 9 20
SparseX: a library for high-performance sparse matrix-vector multiplication on multicore platforms
: ACM Transactions on Mathematical Software
The treatment of many scientific and engineering problems leads nearly always to huge computational tasks, which can cause...
Software Libraries (D.2.2...) | Sep 14 20
A systematic literature review on intelligent user interfaces
: IHM 19
Designers of user interfaces often face a fundamental dilemma: how much of the underlying functionality of the system should they expose to the user? An experienced user may want direct access to...
User Interfaces (D.2.2...) | May 14 20
General Literature (A)
F. A. Hayek: economics, political economy and social philosophy
Understanding and modeling complex phenomena, including businesses, requires abstraction: “the process of suppressing irrelevant detail to establish a simplified model, or the result of that of that process" ...
Biographies/Autobiographies (A.0...) | Jul 13 20
Design of low power integrated radios for emerging standards
Low power radios are in high demand for use in Internet of Things (IoT) devices, where there is a need for small, efficient, and low powered radios for wireless data communications. This book is part of Springer’s...
General (B.0) | Jul 10 20
Computer Systems Organization (C)
The era of Internet of Things: towards a smart world
A very short text of just over 100 pages, this book has a catchy title and the author claims it contains everything needed to start working with the Internet of Things (IoT). Unfortunately, such a claim is an enormous exaggeration. The...
General (C.0) | Sep 25 20
Security, privacy and trust in the IoT environment
I was pleased to review this book, edited by Zaigham Mahmood. The book is divided into two parts. The first part elaborates on different technologies and frameworks for security and privacy in the Internet of Things...
Security & Protection (C.2.0...) | Aug 19 20
Computer and communication networks (2nd ed.)
In every technological field characterized by very fast changes, it is necessary to update the related textbooks with the progress of research and practice. Obviously, this statement refers also to networking, where rapid reactions to book contents are also necessary...
Data Communications (C.2.0...) | Jul 7 20
Pro Azure governance and security
The pervasiveness of cloud technologies and the increasing popularity of Microsoft Azure make this book quite interesting for practicing software enthusiasts.
Chapter 1 lays out the necessary governance needed in organizations to migrate to a cloud-based...
Security & Protection (C.2.0...) | May 26 20
One of the reasons a business may develop an application for mobile devices is for its branding and digital presence. In today’s market, that requires making the application available for both Android and iOS. The traditional way to accomplish this is to...
Object-Oriented Design Methods (D.2.2...) | Jul 27 20
Data-intensive workflow management: for clouds and data-intensive and scalable computing environments
Data-intensive workflows turn up in scientific domains where the most current information technologies find application areas. The “differentia specifica” between business and...
Frameworks (D.3.3...) | Sep 16 20
Formal languages and compilation (3rd ed.)
Compiler construction literature has always been an interesting mixture of clever tricks and deep theory. Most textbooks try to deal with both aspects, usually emphasizing theory at the beginning and then moving on to the tricks necessary to support specific...
Compilers (D.3.4...) | Jun 19 20
Cybercryptography: applicable cryptography for cyberspace security
Cybersecurity is a major challenge today, as computing systems and networks play an increasingly important role in modern society. Cryptography addresses this problem based on mathematical theory, trying...
Cryptographic Controls (D.4.6...) | Aug 24 20