Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
View:  Show:    

Hardware (B)
NV-clustering: normally-off computing using non-volatile datapaths : IEEE Transactions on Computers

The much-needed downscaling of different core system architectures is significantly challenged by static power dissipation. The authors present a solution via middleware-transparent...
Logic Design (B.6) | Jun 19 19

Computer Systems Organization (C)
Neural network classifiers using a hardware-based approximate activation function with a hybrid stochastic multiplier : ACM Journal on Emerging Technologies in Computing Systems

Li et al. present a novel approach for optimizing neural network implementations, that is, “a new architecture of stochastic neural networks” with a hidden...
Neural Nets (C.1.3...) | May 1 19

EmerGence: a delay tolerant web application for disaster relief : HotMobile 19

Providing communication services in disaster-affected areas is important. The authors introduce an app for such situations that runs on the back of networks powered by unmanned aircraft systems (drones)...
Network Architecture & Design (C.2.1) | Jun 19 19

Three bits suffice: explicit support for passive measurement of Internet latency in QUIC and TCP : IMC 18

The Internet measurement of round-trip time (RTT) is important as an indication of performance and latency. While the Ping utility can and does measure RTT, widespread use increases overhead. This...
Network Protocols (C.2.2) | Jun 17 19

The human infrastructure of El Paquete, Cuba’s offline Internet : interactions

Cubans do not have online access to the Internet, nor instantaneous communication with people outside of Cuba. Even cellphone technology inside Cuba is limited. Responding to that void, an informal network...
Local & Wide-Area Networks (C.2.5) | Apr 29 19

SDN flow entry management using reinforcement learning : ACM Transactions on Autonomous and Adaptive Systems

Software-defined networking (SDN) technology makes for smoother network management and configuration. It allows network resources to be efficiently assigned to both prolonged and short-term traffic...
Performance of Systems (C.4) | Apr 24 19

Impact of virtualization on cloud computing energy consumption: empirical study : ISCSIC 18

Intensive computation in tasks such as weather forecasting and scientific solar system exploration requires high-speed processors and huge data...
Performance of Systems (C.4) | Apr 5 19

Software (D)
The PCL theorem : Journal of the ACM

Transactional memory is one approach to making highly parallel programming manageable. In such approaches, parallel memory accesses are treated somewhat similarly to transactions in a database system, ideally guaranteeing properties similar to the ACID...
Concurrent Programming (D.1.3) | Apr 15 19

Hawking’s nightmare : Communications of the ACM

Stephen Hawking once said, “If aliens visit us, the outcome would be much as when Columbus landed in America, which didn’t turn out well for the Native Americans. We only have to look at ourselves to see how intelligent life might develop into something...
General (D.2.0) | Apr 26 19

Improving lazy decision tree for imbalanced classification by using skew-insensitive criteria : Applied Intelligence

Decision trees are powerful graphic tools representing decisions and their related outcomes as branches of a tree. They enable people to see both the overall picture and the...
Decision Tables (D.2.2...) | Jul 18 19

General Literature (A)

Computational artifacts

The philosophy of any discipline must account for the goals, methodology, and subject matter of the discipline [1]. There is a well-developed body of scholarship on the philosophy of mathematics and of science, especially physics and biology, and more recently...
General (A.0) | Jul 15 19

New light through old windows

Science fiction has often been prophetic--sometimes wrongly so, sometimes very much on point. New light through old windows is a collection of science fiction stories--the earliest is from the early 19th century and the most recent is from the mid-1930s. Each...
General (A.0) | Jun 28 19

Computer Systems Organization (C)

Networks (2nd ed.)

In this revised and expanded edition of his 2010 seminal work [1,2], Newman updates the content to reflect developments in the field. The book is very comprehensive and consists of 18 chapters. It is divided into four distinct parts: “The Empirical Study of Networks,” “Fundamentals of Network Theory...
General (C.0) | Apr 22 19

Migrating to Azure

Migrating to Azure covers the fundamentals of migrating, securing, and deploying legacy applications on the Microsoft Azure cloud. Due to their high availability and cost effectiveness, cloud computing technologies have been increasingly used for...
Cloud Computing (C.2.4...) | Jun 18 19

Software (D)

A philosophy of software design

I distinctly recall the first class I taught in software design, in 1980. One student from that course is now a computer science (CS) professor and department head at a major college in Tel Aviv. This anecdote, with its dating, is relevant to this book. It is well known that a...
General (D.0) | Jun 3 19

Declarative logic programming

What is declarative logic programming and why is it relevant? These are just two of the many questions answered in Declarative logic programming, edited by Michael Kifer and Yanhong Annie Liu. The compiled chapters aim to fill in any gaps in the current literature related to...
Logic Programming (D.1.6) | Jun 26 19

Bitwise: a life in code

This is perhaps the most peculiar book I have ever reviewed. It is essentially a collection of philosophical and autobiographical essays on the subject of computing, specifically on topics the author finds interesting. Whether you, the reader, will find the book interesting or not is a...
General (D.2.0) | May 2 19

Handbook of model checking

Due to the proliferation and pervasiveness of hardware and software entities in everyday life, ascertaining their trustworthiness is of paramount importance. Model checking is a logic-based approach that determines whether the abstract model of an entity conforms to a...
Model Checking (D.2.4...) | May 20 19

Software fault detection and correction

This book addresses the stages of fault detection and fault correction in software engineering from a dynamic perspective, that is, the life cycle of the software product, including maintenance phases or an agile methodology. Software reliability necessitates...
Testing & Debugging (D.2.5) | May 30 19

C++ templates (2nd ed.)

The evolution of the C++ language has created the need for revised material on C++ templates. It’s great to see this second edition of C++ templates out at this moment, as it provides a definitive guide to C++ templates with the latest C++ standards. The...
C++ (D.3.2...) | May 24 19

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy