Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
View:  Show:    
 
 

Computer Systems Organization (C)
A static/opportunistic hybrid-scheduling scheme for MIMO wireless networks : Wireless Networks

The multi-input multi-output (MIMO) antenna arrangement technique has been used in different domains of wireless communication for its proven advantages. It has been a source of spatial...
General (C.2.0) | Jun 25 18

Lightweight, obfuscation-resilient detection and family identification of Android malware : ACM Transactions on Software Engineering and Methodology

Malware is undoubtedly one of the most real and potent threats in the smartphone industry. Android’s open ecosystem in terms of code as well as...
Security and Protection (C.2.0...) | Jun 22 18

Seamless virtual network for international business continuity in presence of intentional blocks : ACM Transactions on Internet Technology

It is an accepted fact that international borders are vulnerable and permeable when it comes to information technology. This is why international businesses...
Network Management (C.2.3...) | Jul 10 18

Comparative analysis of ellipsoidal methods for distributed data fusion : IMCOM 18

In multisensor systems, the fusion of information from multiple sensors can be done globally or locally in distributed “fusion centers.” The distributed approach has advantages in reliability, fault tolerance...
Distributed Systems (C.2.4) | Jul 11 18

CoCloud: enabling efficient cross-cloud file collaboration based on inefficient web APIs : IEEE Transactions on Parallel and Distributed Systems

Cloud storage services, because of their simplicity, have become more popular than other services for personal cloud usage. Consequently, there have been...
Cloud Computing (C.2.4...) | Jun 27 18

Architectural principles for cloud software : ACM Transactions on Internet Technology

What comes to mind first with cloud system architectures is the ubiquitous use of microservices, supported by total virtualization from hardware to middleware to applications: virtual machines...
Cloud Computing (C.2.4...) | Jun 14 18

Rivulet: a fault-tolerant platform for smart-home applications : Middleware 17

The paper presents Rivulet, a distributed middleware for smart home applications. The main idea of Rivulet is to move from a state-of-the-art cloud-centric architectural solution, where the whole application logic is...
Fault Tolerance (C.4...) | Jun 20 18


Software (D)
Serverless computing: economic and architectural impact : ESEC/FSE 17

The concept of virtual machines has liberated--elegantly and very successfully-- information technology (IT) from hardware constraints. The next step in virtualization now concerns the very programs themselves: in...
Distributed Programming (D.1.3...) | Jun 22 18

Tableau reasoning for description logics and its extension to probabilities : Annals of Mathematics and Artificial Intelligence

Zese et al. present Prolog implementations of some reasoning algorithms for description logics (DL). They describe two principal algorithms, TRILL and...
Nondeterministic Languages (D.3.2...) | Jun 28 18

Computing semantic similarity of concepts in knowledge graphs : IEEE Transactions on Knowledge and Data Engineering

Semantic similarity expresses the commonality among concepts; therefore, it may play a critical role in a wide range of computational applications. The...
Measurements (D.4.8...) | Jul 9 18


Computer Systems Organization (C)

Computer networking problems and solutions

Many computer networking books have been adopted in universities and are very popular [1,2,3], so it is hard for a new book to make an impact unless it differentiates in a significant way. This book tries to achieve this...
General (C.2.0) | Jun 28 18

Embedded computing for high performance

The book provides theoretical and hands-on knowledge for embedded high-performance computing. Advancements in the hardware and architecture technology have necessitated the need to study embedded parallel systems. Systems...
Real-Time & Embedded Systems (C.3...) | Jun 26 18


Software (D)

Nim in action

Among the newer programming languages, Nim has managed to distinguish itself on its own merits without any corporate support. Andreas Rumpf released the first Nim compiler written in Nim (then known as Nimrod) in 2008. Nim is open source; both development...
General (D.1.0) | Jul 16 18

Coding literacy: how computer programming is changing writing

Like reading and writing, programming has become an essential fundamental tool to organize information. A few centuries ago, being able to write and read, whether in Spanish, English, or French, was a way to be...
General (D.1.0) | Jul 9 18

Reactive with ClojureScript recipes: functional programming for the web

This book offers a cookbook of recipes using ClojureScript and its libraries for reactive web programming. According to the back cover, the intended readership level is beginning to intermediate. I had high hopes for this book...
Applicative (Functional) Programming (D.1.1) | Jul 6 18

Parallel programming

Parallel programming is not optional. In the past, algorithm designers focused on the design of sequential algorithms, because of Moore’s law, and hardware speed improvements did the rest. Today, computer scientists and software engineers must write highly...
Parallel Programming (D.1.3...) | Jun 29 18

Introduction to software testing (2nd ed.)

Software testing is essential. It doesn’t much matter if you can do something quickly or in minimal memory or with a spiffy web interface if the results are incorrect, though incorrect might include “more or less correct” in many circumstances (this is often explicit in...
Testing & Debugging (D.2.5) | Jun 15 18

Endless loop

Ada Lovelace is widely regarded as the world’s first computer programmer. Did you know that her father was the poet Lord Byron, or that he separated from her mother shortly after Ada was born? Her mother then promoted Ada’s interest in mathematics and...
BASIC (D.3.2...) | Jul 18 18

The Python 3 standard library by example (2nd ed.)

The power and capabilities of a modern computer programming language are often found in the libraries associated with the language. Python is no exception. Python’s standard library is a large body of modules and...
Python (D.3.2...) | Jul 12 18

Attribute-based access control

Due to the increasing distribution and complexity of current applications, attribute-based access control (ABAC) is slowly becoming the only way to control access. This monograph summarizes the accumulated knowledge on this important subject and has a...
Access Controls (D.4.6...) | Jul 20 18

   
Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy