Computer Systems Organization (C)
Computational memory: a stepping stone to non-von Neumann computing?
The topic of this video presentation is computational memory (CM), a seemingly fascinating new paradigm in computing. The presenter’s approach to the topic is captivating; when you start the video, you just...
Von Neumann Architectures (C.1.1...) | Sep 27 18
Data-driven concurrency for high performance computing
: ACM Transactions on Architecture and Code Optimization
While in procedural parallel programming with multithreading lemmas, the synchronization of the sequences of parallel execution of tasks is...
Distributed Architectures (C.1.4...) | Oct 8 18
MirageOS Unikernel with network acceleration for IoT cloud environments
: ICCBDC 18
Companies started conducting large-scale analysis with Internet of Things (IoT) data on cloud computing platforms to increase operating efficiency and revenue. IoT platforms based on fog computing and edge...
Security & Protection (C.2.0...) | Nov 6 18
Challenges and preparedness of SDN-based firewalls
: SDN-NFV Security 2018
The constant increase in data traffic over carrier networks has led to the design of more complex networks. This has generated a need for efficient technologies to handle traffic in large-scale...
Security and Protection (C.2.0...) | Nov 2 18
VIRTIO-USER: a new versatile channel for kernel-bypass networks
: KBNets 17
VIRTIO-USER is a userspace-based channel to facilitate container applications to benefit from kernel-bypass technologies. The authors explain that container networking or operating system (OS) virtualization technologies have...
General (C.2.0) | Sep 19 18
A ternary unification framework for optimizing TCAM-based packet classification systems
: IEEE/ACM Transactions on Networking
Today, many network devices include a packet classification function to provide various services based on packet headers such as packet filtering, load...
Network Architecture & Design (C.2.1) | Nov 14 18
Sleep behavior assessment via smartwatch and stigmergic receptive fields
: Personal and Ubiquitous Computing
A stigmergic receptive field (SRF) is suggested as an improved variant of machine learning (ML). The authors successfully prove their proposed variant. They...
Sensor Networks (C.2.1...) | Oct 18 18
IoT smart homes based on RFID technology: localization systems review
: ICEMIS 18
Indoor localization techniques and applications are getting attention in the area of smart homes. This paper focuses on radio frequency identification (RFID)-based localization, because RFID technology has been...
Network Architecture & Design (C.2.1) | Oct 10 18
Low PAPR FBMC
: IEEE Transactions on Wireless Communications
Peak to average power ratio (PAPR) is an issue in signaling schemes that has gotten more complicated in multicarrier systems. High PAPR not only increases the out-of-band (OOB) radiation, but also requires a...
Wireless Communication (C.2.1...) | Sep 25 18
PerfBound: conserving energy with bounded overheads in on/off-based HPC interconnects
: IEEE Transactions on Computers
Network performance is crucial in high-performance computing (HPC), where individual nodes can work together to solve a large problem. Traditionally...
Local & Wide-Area Networks (C.2.5) | Sep 26 18
Computer Systems Organization (C)
Computer architecture: a quantitative approach (6th ed.)
Computer architecture has evolved over time. Today’s cheap yet powerful computer systems are a result of hardware miniaturization and optimization techniques, among many other factors. Progress will continue as user needs change over time. In order to...
General (C.0) | Aug 13 18
Microservices with Azure
This introductory book on microservices and Microsoft Azure Service Fabric will help readers understand good development practices, that is, using proven architectural patterns to address common architectural challenges associated with the microservices...
Cloud Computing (C.2.4...) | Aug 17 18
Flash memory integration: performance and energy issues
With the explosion of data in recent years, storage technologies continue to be a critical infrastructure in the world. It is predicted that 44 zettabytes (44 billion terabytes) will be generated in 2020. While most...
Performance of Systems (C.4) | Nov 13 18
Guide to competitive programming
Competitive programming is not new, but is now widely available through different online competitions. As Laaksonen notes, competitive programming provides opportunities for practice and helps to bridge the gap between theory and practice by forcing...
General (D.1.0) | Oct 30 18
Data science fundamentals for Python and MongoDB
Data science is an important and growing field in computing.
This book purports to provide an introduction to data science with Python and MongoDB. It fails on pretty much every level.
Object-Oriented Programming (D.1.5) | Oct 17 18
Advanced object-oriented programming in R
Computer science (CS) research has changed dramatically in recent years. It now often involves analyzing large datasets and testing hypotheses through a set of statistical tests. Along this line, R is one of the most widely used...
Object-Oriented Programming (D.1.5) | Aug 9 18
Software engineering (10th ed.)
This book has been around for about three decades. This newest version is the tenth edition. Software engineering is--has become--an enormous subject. The book is very long--over 800 pages--and yet it does not actually cover all aspects of software engineering...
General (D.2.0) | Oct 17 18
Microservices and containers
Microservices and containers is an interesting book, albeit a flawed one. It addresses two important topics, but only loosely justifies putting the two topics in the same work. It is divided into three sections: the first addresses microservices, the second containers, and the...
General (D.2.0) | Oct 12 18
Software architecture for big data and the cloud
Systems and software architecture has been a significant engineering endeavor for many years, requiring formal languages and models to document and analyze the structure and functionality of...
Software Architectures (D.2.11) | Sep 24 18
Computer arithmetic and formal proofs
The audience for this superlatively researched and crafted book includes postgraduate students and practitioners of floating-point (FP) computation or formal verification. The authors “sincerely hope that, after reading this book, you will feel like formally...
Formal Methods (D.2.4...) | Aug 8 18