Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
View:  Show:    
 
 

Hardware (B)
Modeling memristor radiation interaction events and the effect on neuromorphic learning circuits : ICONS 18

This paper presents several event models for memristor radiation interaction with Verilog-A. Radiation events can “affect all synapses or affect each synapse with different flux or...
Verilog (B.6.3...) | Jan 28 19


Computer Systems Organization (C)
An efficient and secure directed diffusion in industrial wireless sensor networks : FICN 18

Directed diffusion is a form of message routing that is application aware, allowing improved energy efficiency through path selection that is empirically efficient, combined with caching and summarization of...
Security & Protection (C.2.0...) | Mar 11 19

An automatic proving approach to parameterized verification : ACM Transactions on Computational Logic

Network and security protocols occasionally require important but difficult to authenticate parameters such as the number in a communication party. The existing formal proofs of algorithms for verifying the...
Security & Protection (C.2.0...) | Feb 20 19

A long way to the top : IMC 18

Research communities that analyze parameters like Internet measurement, privacy, and network security typically use Internet top lists. As the selected Internet top list affects the research, it is very important...
Security and Protection (C.2.0...) | Feb 5 19

Coming of age: a longitudinal study of TLS deployment : IMC 18

The paper presents a longitudinal study of secure sockets layer/transport layer security (SSL/TLS) deployment. The datasets span periods from early 2012 and mid-2015 until now, and contain the TLS...
Security & Protection (C.2.0...) | Jan 28 19

Password-based protection of clustered segments in distributed memory systems : Journal of Parallel and Distributed Computing

This interesting paper starts by summarizing the logic of shared memories across local area network (LAN) nodes. Shared memory...
Distributed Systems (C.2.4) | Feb 27 19

A scalable and manageable IoT architecture based on transparent computing : Journal of Parallel and Distributed Computing

The Internet of things (IoT) has been emerging with a gradual tangible impact on everyday life. With such growth, its use cases are becoming more...
Distributed Systems (C.2.4) | Feb 6 19

Instantaneous frequency estimation based on synchrosqueezing wavelet transform : Signal Processing

Whereas natural signals are nonlinear and nonstationary, their modeling and analysis have always been complicated tasks. The wavelet signal transform method features a...
Signal Processing Systems (C.3...) | Mar 8 19


Software (D)
An autotuning protocol to rapidly build autotuners : ACM Transactions on Parallel Computing

While autotuning has become a valuable tool for the high-performance computing (HPC) community to achieve “performance portability,” that is, the program runs on the new architecture correctly and...
Parallel Programming (D.1.3...) | Mar 7 19

Why SRE documents matter : Communications of the ACM

This article is about ensuring good documentation to help site reliability engineering (SRE) teams function effectively, scale seamlessly to accommodate new services, and ensure that web products and services run reliably. It focuses on moving from one-off team...
General (D.2.0) | Mar 4 19


Hardware (B)

Beginning robotics with Raspberry Pi and Arduino: using Python and OpenCV

The language used in this book is very close to beginner level. It includes many examples, with code, images, and details of the materials needed to assemble the presented robot. The book’s ten chapters cover five key...
Microprocessors & computers (B.7.1...) | Mar 14 19


Computer Systems Organization (C)

Communication networks (2nd ed.)

The book is based on the authors’ lecture notes from an upper-division communication networks course taught at the University of California, Berkeley. They have used many textbooks over the years. This book was developed as a material for the course and as...
General (C.2.0) | Feb 4 19

Fog computing

In a nutshell, fog computing tries to transfer familiar concepts from cloud computing, like virtualization, elastic scalability, and everything-as-a-service (XaaS), closer to the sensors and devices of the Internet of Things (IoT) or to end users, to the so-called...
Distributed Networks (C.2.1...) | Mar 6 19

Internet infrastructure

Textbooks on computer networking theory abound, as do practitioner guides to the setup and administration of web servers and other Internet services. However, books that combine the two are less common. This text is an attempt to fill that niche. The authors seek to...
Internet (C.2.1...) | Feb 8 19

Hypergraph theory in wireless communication networks

This short publication really fits in the “SpringerBriefs” series. Despite the fact that the book could be considered a long paper, it may interest researchers in the applications of mathematics field. The book starts with an overview of hypergraph theory [1,2]...
Wireless Communication (C.2.1...) | Jan 4 19

Crowdsourcing of sensor cloud services

With the ubiquitous distribution of mobile devices (smartphones, tablets, and so on equipped with a variety of sensory and wearable devices), users are able to generate different types of real-time information related to ambient air measurements, fire...
Cloud Computing (C.2.4...) | Feb 28 19

Distributed computing pearls

In computer science, the term “synchronization” can relate to coordination between processors or to contention. So I was expecting to find some program examples using the open message passing interface (OpenMPI) or a discussion of distributed...
Distributed Systems (C.2.4) | Feb 13 19

The Internet of Things

The number of connected devices will soon be much bigger than the world population. The Internet of Things (IoT) is changing the Internet at a much faster pace than ever expected, and we are experiencing only the beginning of a new trend leading up to an IoT...
Special-Purpose Systems (C.3) | Feb 26 19


Software (D)

Practical C++ design

Not long before reviewing this book, I taught a class in C++ using Bjarne Stroustrup’s book Programming: principles and practices using C++ [1]. In four chapters (out of 26), Stroustrup has the reader build a small calculator, including several advanced features. I thought Practical C++ design would be a...
Object-Oriented Programming (D.1.5) | Feb 1 19

Practical Webix

Addressed to web developers who can use this toolkit for better web development, this book describes Webix: a user interface (UI) toolkit for building web applications. Webix is available in two versions: a standard (free) UI library under GNU license and...
JavaScript (D.3.2...) | Feb 1 19

   
Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy