Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
View:  Show:    
 
 

Hardware (B)
PIMap : ACM Transactions on Reconfigurable Technology and Systems

Transforming gate-level Boolean logic into functionally equivalent lookup tables (LUTs) is a key step in the compilation of a design into field-programmable gate arrays (FPGAs). Tools typically deploy a...
General (B.5.0) | Apr 3 19


Computer Systems Organization (C)
Neural network classifiers using a hardware-based approximate activation function with a hybrid stochastic multiplier : ACM Journal on Emerging Technologies in Computing Systems

Li et al. present a novel approach for optimizing neural network implementations, that is, “a new architecture of stochastic neural networks” with a hidden...
Neural Nets (C.1.3...) | May 1 19

A novel multilayer AAA model for integrated applications : Neural Computing and Applications

Unidimensional static security policies cannot cater to the needs of a growing enterprise anymore. Local regulations, business processes, operational levels, and threat modeling are the...
Neural Nets (C.1.3...) | Mar 22 19

Survey on fog computing : Journal of Network and Computer Applications

In the Internet of things (IoT), is there a difference between edge and fog computing? By now we all understand the cloud computing paradigm in which end devices (anything from sensors and smartphones to industrial...
Distributed Networks (C.2.1...) | Apr 3 19

Context-driven and real-time provisioning of data-centric IoT services in the cloud : ACM Transactions on Internet Technology

The Internet of Things (IoT) and cloud computing infrastructure are synonymous in contemporary computing, insomuch as the phenomena relate...
Cloud Computing (C.2.4...) | Mar 21 19

The human infrastructure of El Paquete, Cuba’s offline Internet : interactions

Cubans do not have online access to the Internet, nor instantaneous communication with people outside of Cuba. Even cellphone technology inside Cuba is limited. Responding to that void, an informal network...
Local & Wide-Area Networks (C.2.5) | Apr 29 19

SDN flow entry management using reinforcement learning : ACM Transactions on Autonomous and Adaptive Systems

Software-defined networking (SDN) technology makes for smoother network management and configuration. It allows network resources to be efficiently assigned to both prolonged and short-term traffic...
Performance of Systems (C.4) | Apr 24 19

Impact of virtualization on cloud computing energy consumption: empirical study : ISCSIC 18

Intensive computation in tasks such as weather forecasting and scientific solar system exploration requires high-speed processors and huge data...
Performance of Systems (C.4) | Apr 5 19


Software (D)
The PCL theorem : Journal of the ACM

Transactional memory is one approach to making highly parallel programming manageable. In such approaches, parallel memory accesses are treated somewhat similarly to transactions in a database system, ideally guaranteeing properties similar to the ACID...
Concurrent Programming (D.1.3) | Apr 15 19

Hawking’s nightmare : Communications of the ACM

Stephen Hawking once said, “If aliens visit us, the outcome would be much as when Columbus landed in America, which didn’t turn out well for the Native Americans. We only have to look at ourselves to see how intelligent life might develop into something...
General (D.2.0) | Apr 26 19


Hardware (B)

Design automation techniques for approximation circuits: verification, synthesis and test

Finding the optimal energy savings corresponding to different quality constraints is one of the most important driving forces in approximate design, particularly for complex system on chips (SoCs) with multiple Internet protocols (IPs) integrated on edge devices...
Types & Design Styles (B.7.1) | Apr 12 19


Computer Systems Organization (C)

Networks (2nd ed.)

In this revised and expanded edition of his 2010 seminal work [1,2], Newman updates the content to reflect developments in the field. The book is very comprehensive and consists of 18 chapters. It is divided into four distinct parts: “The Empirical Study of Networks,” “Fundamentals of Network Theory...
General (C.0) | Apr 22 19

Advanced Raspberry Pi (2nd ed.)

The history of broadly understood electronics development includes the creation of new paradigms that became milestones: the discovery of transistors, the release of the 8051 microprocessor, the discovery of light-emitting diode (LED) indicators, the...
General (C.0) | Apr 11 19

Handbook of e-business security

This 15-chapter handbook opens up with an introductory chapter on security threats in e-commerce. Overall, the chapters cover traditional issues common to e-business security. For example, chapter 2 discusses the practical aspects of cryptography as it relates to...
Security & Protection (C.2.0...) | Apr 3 19

The datacenter as a computer (3rd ed.)

As machine learning becomes more popular and more responsible for managing our everyday lives, using it to manage data centers, to control the mammoth tasks engineers have to deal with, is only a natural evolution. This book is a series of lectures in computer...
General (C.2.0) | Mar 29 19

Network function virtualization

The exponential growth of cellular network data, which grows at a pace of 60 percent per year and is expected to increase even more due to the growth of Internet of Things (IoT) networks, poses some unprecedented challenges to the design of data networks. To...
General (C.2.0) | Mar 21 19


Software (D)

Bitwise: a life in code

This is perhaps the most peculiar book I have ever reviewed. It is essentially a collection of philosophical and autobiographical essays on the subject of computing, specifically on topics the author finds interesting. Whether you, the reader, will find the book interesting or not is a...
General (D.2.0) | May 2 19

Software development from A to Z

Initially I didn’t much like this book. Here’s why. It’s mostly about software as a product. My experience is with software as an in-house problem solution. It spends most of its time talking about the various roles involved in building software, and what tools are...
General (D.2.0) | Apr 2 19

Handbook of model checking

Due to the proliferation and pervasiveness of hardware and software entities in everyday life, ascertaining their trustworthiness is of paramount importance. Model checking is a logic-based approach that determines whether the abstract model of an entity...
Model Checking (D.2.4...) | May 20 19

Foundations of programming languages

Programming is a science-based craft. For a programmer, the better the science, the better the craft. Foundations of programming languages provides a computer science (CS)-based treatment of the foundations of three programming paradigms...
Formal Definitions & Theory (D.3.1) | Apr 8 19

   
Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy