Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
View:  Show:    

Hardware (B)
PIMap : ACM Transactions on Reconfigurable Technology and Systems

Transforming gate-level Boolean logic into functionally equivalent lookup tables (LUTs) is a key step in the compilation of a design into field-programmable gate arrays (FPGAs). Tools typically deploy a...
General (B.5.0) | Apr 3 19

Computer Systems Organization (C)
A novel multilayer AAA model for integrated applications : Neural Computing and Applications

Unidimensional static security policies cannot cater to the needs of a growing enterprise anymore. Local regulations, business processes, operational levels, and threat modeling are the...
Neural Nets (C.1.3...) | Mar 22 19

An efficient and secure directed diffusion in industrial wireless sensor networks : FICN 18

Directed diffusion is a form of message routing that is application aware, allowing improved energy efficiency through path selection that is empirically efficient, combined with caching and summarization of...
Security & Protection (C.2.0...) | Mar 11 19

Survey on fog computing : Journal of Network and Computer Applications

In the Internet of things (IoT), is there a difference between edge and fog computing? By now we all understand the cloud computing paradigm in which end devices (anything from sensors and smartphones to industrial...
Distributed Networks (C.2.1...) | Apr 3 19

Context-driven and real-time provisioning of data-centric IoT services in the cloud : ACM Transactions on Internet Technology

The Internet of Things (IoT) and cloud computing infrastructure are synonymous in contemporary computing, insomuch as the phenomena relate...
Cloud Computing (C.2.4...) | Mar 21 19

Instantaneous frequency estimation based on synchrosqueezing wavelet transform : Signal Processing

Whereas natural signals are nonlinear and nonstationary, their modeling and analysis have always been complicated tasks. The wavelet signal...
Signal Processing Systems (C.3...) | Mar 8 19

SDN flow entry management using reinforcement learning : ACM Transactions on Autonomous and Adaptive Systems

Software-defined networking (SDN) technology makes for smoother network management and configuration. It allows network resources to be efficiently assigned to both prolonged and short-term traffic...
Performance of Systems (C.4) | Apr 24 19

Impact of virtualization on cloud computing energy consumption: empirical study : ISCSIC 18

Intensive computation in tasks such as weather forecasting and scientific solar system exploration requires high-speed processors and huge data...
Performance of Systems (C.4) | Apr 5 19

Software (D)
Search-based program synthesis : Communications of the ACM

Program synthesis aims at the automatic generation of “an executable implementation ... from a high-level logical specification of the desired input-to-output behavior.” The review article concentrates on...
General (D.1.0) | Mar 19 19

The PCL theorem : Journal of the ACM

Transactional memory is one approach to making highly parallel programming manageable. In such approaches, parallel memory accesses are treated somewhat similarly to transactions in a database system, ideally guaranteeing properties similar to the ACID...
Concurrent Programming (D.1.3) | Apr 15 19

Hardware (B)

Design automation techniques for approximation circuits: verification, synthesis and test

Finding the optimal energy savings corresponding to different quality constraints is one of the most important driving forces in approximate design, particularly for complex system on chips (SoCs) with multiple Internet protocols (IPs) integrated on edge devices...
Types & Design Styles (B.7.1) | Apr 12 19

Beginning robotics with Raspberry Pi and Arduino

The language used in this book is very close to beginner level. It includes many examples, with code, images, and details of the materials needed to assemble the presented robot. The book’s ten chapters cover five key aspects related to low-cost robots: the robot...
Microprocessors & computers (B.7.1...) | Mar 14 19

Computer Systems Organization (C)


In this revised and expanded edition of his 2010 seminal work [1,2], Newman updates the content to reflect developments in the field. The book is very comprehensive and consists of 18 chapters. It is divided into four distinct parts: “The Empirical Study of...
General (C.0) | Apr 22 19

Advanced Raspberry Pi (2nd ed.)

The history of broadly understood electronics development includes the creation of new paradigms that became milestones: the discovery of transistors, the release of the 8051 microprocessor, the discovery of light-emitting diode (LED) indicators, the...
General (C.0) | Apr 11 19

Handbook of e-business security

This 15-chapter handbook opens up with an introductory chapter on security threats in e-commerce. Overall, the chapters cover traditional issues common to e-business security. For example, chapter 2 discusses the practical aspects of cryptography as it relates to...
Security & Protection (C.2.0...) | Apr 3 19

The datacenter as a computer (3rd ed.)

As machine learning becomes more popular and more responsible for managing our everyday lives, using it to manage data centers, to control the mammoth tasks engineers have to deal with, is only a natural evolution. This book is a series of lectures in computer...
General (C.2.0) | Mar 29 19

Network function virtualization

The exponential growth of cellular network data, which grows at a pace of 60 percent per year and is expected to increase even more due to the growth of Internet of Things (IoT) networks, poses some unprecedented challenges to the design of data networks. To...
General (C.2.0) | Mar 21 19

Fog computing

In a nutshell, fog computing tries to transfer familiar concepts from cloud computing, like virtualization, elastic scalability, and everything-as-a-service (XaaS), closer to the sensors and devices of the Internet of Things (IoT) or to end users, to the so-called “edge,” to reduce...
Distributed Networks (C.2.1...) | Mar 6 19

Crowdsourcing of sensor cloud services

With the ubiquitous distribution of mobile devices (smartphones, tablets, and so on equipped with a variety of sensory and wearable devices), users are able to generate different types of real-time information related to ambient air measurements, fire...
Cloud Computing (C.2.4...) | Feb 28 19

Distributed computing pearls

In computer science, the term “synchronization” can relate to coordination between processors or to contention. So I was expecting to find some program examples using the open message passing interface (OpenMPI) or a discussion of distributed...
Distributed Systems (C.2.4) | Feb 13 19

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy