Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
View:  Show:    
 
 

Hardware (B)
Modeling memristor radiation interaction events and the effect on neuromorphic learning circuits : ICONS 18

This paper presents several event models for memristor radiation interaction with Verilog-A. Radiation events can “affect all synapses or affect each synapse with different flux or...
Verilog (B.6.3...) | Jan 28 19


Computer Systems Organization (C)
A novel multilayer AAA model for integrated applications : Neural Computing and Applications

Unidimensional static security policies cannot cater to the needs of a growing enterprise anymore. Local regulations, business processes, operational levels, and threat modeling are the...
Neural Nets (C.1.3...) | Mar 22 19

An efficient and secure directed diffusion in industrial wireless sensor networks : FICN 18

Directed diffusion is a form of message routing that is application aware, allowing improved energy efficiency through path selection that is empirically efficient, combined with caching and summarization of...
Security & Protection (C.2.0...) | Mar 11 19

An automatic proving approach to parameterized verification : ACM Transactions on Computational Logic

Network and security protocols occasionally require important but difficult to authenticate parameters such as the number in a communication party. The existing formal proofs of algorithms for verifying the...
Security & Protection (C.2.0...) | Feb 20 19

A long way to the top : IMC 18

Research communities that analyze parameters like Internet measurement, privacy, and network security typically use Internet top lists. As the selected Internet top list affects the research, it is very important...
Security and Protection (C.2.0...) | Feb 5 19

Coming of age: a longitudinal study of TLS deployment : IMC 18

The paper presents a longitudinal study of secure sockets layer/transport layer security (SSL/TLS) deployment. The datasets span periods from early 2012 and mid-2015 until now, and contain the TLS...
Security & Protection (C.2.0...) | Jan 28 19

Context-driven and real-time provisioning of data-centric IoT services in the cloud : ACM Transactions on Internet Technology

The Internet of Things (IoT) and cloud computing infrastructure are synonymous in contemporary computing, insomuch as the phenomena relate...
Cloud Computing (C.2.4...) | Mar 21 19

Password-based protection of clustered segments in distributed memory systems : Journal of Parallel and Distributed Computing

This interesting paper starts by summarizing the logic of shared memories across local area network (LAN) nodes. Shared memory...
Distributed Systems (C.2.4) | Feb 27 19

A scalable and manageable IoT architecture based on transparent computing : Journal of Parallel and Distributed Computing

The Internet of things (IoT) has been emerging with a gradual tangible impact on everyday life. With such growth, its use cases are becoming more...
Distributed Systems (C.2.4) | Feb 6 19

Instantaneous frequency estimation based on synchrosqueezing wavelet transform : Signal Processing

Whereas natural signals are nonlinear and nonstationary, their modeling and analysis have always been complicated tasks. The wavelet signal...
Signal Processing Systems (C.3...) | Mar 8 19


Hardware (B)

Beginning robotics with Raspberry Pi and Arduino

The language used in this book is very close to beginner level. It includes many examples, with code, images, and details of the materials needed to assemble the presented robot. The book’s ten chapters cover five key aspects related to low-cost robots: the robot...
Microprocessors & computers (B.7.1...) | Mar 14 19


Computer Systems Organization (C)

Network function virtualization

The exponential growth of cellular network data, which grows at a pace of 60 percent per year and is expected to increase even more due to the growth of Internet of Things (IoT) networks, poses some unprecedented challenges to the design of data networks. To...
General (C.2.0) | Mar 21 19

Communication networks (2nd ed.)

The book is based on the authors’ lecture notes from an upper-division communication networks course taught at the University of California, Berkeley. They have used many textbooks over the years. This book was developed as a material for the course and as...
General (C.2.0) | Feb 4 19

Fog computing

In a nutshell, fog computing tries to transfer familiar concepts from cloud computing, like virtualization, elastic scalability, and everything-as-a-service (XaaS), closer to the sensors and devices of the Internet of Things (IoT) or to end users, to the so-called “edge,” to reduce...
Distributed Networks (C.2.1...) | Mar 6 19

Internet infrastructure

Textbooks on computer networking theory abound, as do practitioner guides to the setup and administration of web servers and other Internet services. However, books that combine the two are less common. This text is an attempt to fill that niche. The authors seek to...
Internet (C.2.1...) | Feb 8 19

Crowdsourcing of sensor cloud services

With the ubiquitous distribution of mobile devices (smartphones, tablets, and so on equipped with a variety of sensory and wearable devices), users are able to generate different types of real-time information related to ambient air measurements, fire...
Cloud Computing (C.2.4...) | Feb 28 19

Distributed computing pearls

In computer science, the term “synchronization” can relate to coordination between processors or to contention. So I was expecting to find some program examples using the open message passing interface (OpenMPI) or a discussion of distributed...
Distributed Systems (C.2.4) | Feb 13 19

The Internet of Things

The number of connected devices will soon be much bigger than the world population. The Internet of Things (IoT) is changing the Internet at a much faster pace than ever expected, and we are experiencing only the beginning of a new trend leading up to an IoT paradigm...
Special-Purpose Systems (C.3) | Feb 26 19


Software (D)

Practical C++ design

Not long before reviewing this book, I taught a class in C++ using Bjarne Stroustrup’s book Programming: principles and practices using C++ [1]. In four chapters (out of 26), Stroustrup has the reader build a small calculator, including several advanced features. I thought Practical C++ design would be a...
Object-Oriented Programming (D.1.5) | Feb 1 19

Practical Webix

Addressed to web developers who can use this toolkit for better web development, this book describes Webix: a user interface (UI) toolkit for building web applications. Webix is available in two versions: a standard (free) UI library under GNU license and...
JavaScript (D.3.2...) | Feb 1 19

   
Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy