Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
View:  Show:    
 
 

General Literature (A)
Data science: a comprehensive overview : ACM Computing Surveys

This paper brings together a cohesive picture of data science, a new interdisciplinary academic field, from many different perspectives. In this 42-page...
Introductory & Survey (A.1) | Jan 11 18


Computer Systems Organization (C)
A survey on software defined networking: architecture for next generation network : Journal of Network and Systems Management

Over the years, data communication networks have seen a constant rise in network traffic, and this trend is expected to continue eternally. This constant...
Data Communications (C.2.0...) | Jan 16 18

Energy-efficient context aware power management with asynchronous protocol for body sensor network : Mobile Networks and Applications

Magno et al. address a challenging issue of wearable devices for fitness and health tracking: low-power resources and wireless communication. The lifetime of these devices is limited by the small energy...
Sensor Networks (C.2.1...) | Dec 21 17

A generalized design of distributed rateless codes with decreasing ripple size for multiple-access relay networks : Wireless Networks

Channel coding is a fundamental technology in wireless communication, which has attracted the efforts of many researchers around...
Frame Relay Networks (C.2.1...) | Dec 21 17

An indoor test methodology for solar-powered wireless sensor networks : ACM Transactions on Embedded Computing Systems

Reliable hardware and algorithms for solar-powered wireless sensor networks (WSNs) require precise and reproducible indoor tests. But how should...
Performance of Systems (C.4) | Dec 21 17


Software (D)
X3ML mapping framework for information integration in cultural heritage and beyond : International Journal on Digital Libraries

A fascinating aspect of computer science is its variety of application domains. Sometimes the solution to a problem involving one application domain can be...
Data Mapping (D.2.12...) | Jan 10 18

Validation of formal specifications through transformation and animation : Requirements Engineering

A validation check between a design and its implementation is usually done in order to validate the correctness of the requirements for any system. It is crucial to check that the requirements are...
Formal Methods (D.2.4...) | Jan 18 18

On the correlation between size and metric validity : Empirical Software Engineering

“If you can’t measure it, you can’t manage it.” Not so fast! Internal software metrics, or code metrics, have their history in software engineering. We love to measure software development...
Metrics (D.2.8) | Dec 14 17

Designing a semantic model for a wide-spectrum language with concurrency : Formal Aspects of Computing

A concurrent wide-spectrum language combines a concurrent programming language with specification constructs. Colvin et al. provide a unified framework for defining the...
Concurrency (D.4.1...) | Jan 10 18

Reducing write amplification of flash storage through cooperative data management with NVM : ACM Transactions on Storage

Flash memory continues to increase in popularity as the storage media of choice for business storage systems. Now “flash memory is an erase-before-write...
Storage Management (D.4.2) | Jan 17 18


General Literature (A)

Harmonies of disorder: Norbert Wiener

Norbert Wiener was one of the great geniuses of the 20th century. Harmonies of disorder is a brilliant biography that carefully details every aspect of Wiener’s background and contributions without using any equations, making it accessible to general...
Biographies/Autobiographies (A.0...) | Jan 3 18


Computer Systems Organization (C)

Guide to computer network security (4th ed.)

The fourth edition of this outstanding guide is fully revised, keeping in line with the latest technological developments of the computing ecosystem, which resulted from the removal of the logical boundaries between enterprise, mobile, wireless, and home...
Security & Protection (C.2.0...) | Dec 14 17

Practical packet analysis (3rd ed.)

The study of the operation of network protocols, as well as the improvement of a network’s functionality and security, are the main aspects that network packet analysis considers. Known as both a software protocol...
Network Monitoring (C.2.3...) | Dec 5 17

Internet of Things: novel advances and envisioned applications

This volume is a collection of 15 standalone papers, assembled into four sections covering selected aspects of an emerging and fast-moving field generically described as the Internet of Things (IoT)...
Real-Time & Embedded Systems (C.3...) | Jan 17 18

Cloud service benchmarking

Cloud computing is now quite well known. As in the case of some other technologies and product innovations related to computing (for example, blockchain or the World Wide Web), it has been driven largely by industry, with very limited contributions from academics...
Performance of Systems (C.4) | Dec 22 17

Non-volatile in-memory computing by spintronics

With quintillions of calculations per second, exascale computing is a challenge for the world of scientific discovery and for advancing economic competitiveness. In certain applications such as climate change and climate modeling, precision medicine, energy...
Performance of Systems (C.4) | Dec 11 17


Software (D)

Perl 6 fundamentals

We have been hearing about Perl 6 for some 15 years, but I have yet to meet anyone who actually uses it. The author observes that Perl 6 differs significantly from Perl 5, but he believes that it offers advantages in regular expression operations and Unicode support that more than...
General (D.1.0) | Jan 5 18

Working with coders: a guide to software development for the perplexed non-techie

On the very first page of chapter 1, Gleeson provides a callout with the simple but profound observation: “Building software is nothing like building a house.” Software development is a tricky process...
General (D.1.0) | Jan 3 18

Murach’s JavaScript and jQuery (3rd ed.)

Murach’s JavaScript and jQuery is about giving essential knowledge and tools to a programmer to build web clients using JavaScript and jQuery. The book covers and details the most basic usages of JavaScript and...
Object-Oriented Programming (D.1.5) | Dec 28 17

Introduction to game design, prototyping, and development

Bond has made an excellent attempt to introduce game design to programmers and programming to game designers. Often times, these two areas are so disconnected that the fundamentals of both these areas are...
Object-Oriented Programming (D.1.5) | Dec 14 17

   
Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy