: ACM Transactions on Reconfigurable Technology and Systems
Transforming gate-level Boolean logic into functionally equivalent lookup tables (LUTs) is a key step in the compilation of a design into field-programmable gate arrays (FPGAs). Tools typically deploy a...
General (B.5.0) | Apr 3 19
Computer Systems Organization (C)
A novel multilayer AAA model for integrated applications
: Neural Computing and Applications
Unidimensional static security policies cannot cater to the needs of a growing enterprise anymore. Local regulations, business processes, operational levels, and threat modeling are the...
Neural Nets (C.1.3...) | Mar 22 19
An efficient and secure directed diffusion in industrial wireless sensor networks
: FICN 18
Directed diffusion is a form of message routing that is application aware, allowing improved energy efficiency through path selection that is empirically efficient, combined with caching and summarization of...
Security & Protection (C.2.0...) | Mar 11 19
Survey on fog computing
: Journal of Network and Computer Applications
In the Internet of things (IoT), is there a difference between edge and fog computing?
By now we all understand the cloud computing paradigm in which end devices (anything from sensors and smartphones to industrial...
Distributed Networks (C.2.1...) | Apr 3 19
Context-driven and real-time provisioning of data-centric IoT services in the cloud
: ACM Transactions on Internet Technology
The Internet of Things (IoT) and cloud computing infrastructure are synonymous in contemporary computing, insomuch as the phenomena relate...
Cloud Computing (C.2.4...) | Mar 21 19
Instantaneous frequency estimation based on synchrosqueezing wavelet transform
: Signal Processing
Whereas natural signals are nonlinear and nonstationary, their modeling and analysis have always been complicated tasks. The wavelet signal...
Signal Processing Systems (C.3...) | Mar 8 19
SDN flow entry management using reinforcement learning
: ACM Transactions on Autonomous and Adaptive Systems
Software-defined networking (SDN) technology makes for smoother network management and configuration. It allows network resources to be efficiently assigned to both prolonged and short-term traffic...
Performance of Systems (C.4) | Apr 24 19
Impact of virtualization on cloud computing energy consumption: empirical study
: ISCSIC 18
Intensive computation in tasks such as weather forecasting and scientific solar system exploration requires high-speed processors and huge data...
Performance of Systems (C.4) | Apr 5 19
Search-based program synthesis
: Communications of the ACM
Program synthesis aims at the automatic generation of “an executable implementation ... from a high-level logical specification of the desired input-to-output behavior.” The review article concentrates on...
General (D.1.0) | Mar 19 19
The PCL theorem
: Journal of the ACM
Transactional memory is one approach to making highly parallel programming manageable. In such approaches, parallel memory accesses are treated somewhat similarly to transactions in a database system, ideally guaranteeing properties similar to the ACID...
Concurrent Programming (D.1.3) | Apr 15 19
Design automation techniques for approximation circuits: verification, synthesis and test
Finding the optimal energy savings corresponding to different quality constraints is one of the most important driving forces in approximate design, particularly for complex system on chips (SoCs) with multiple Internet protocols (IPs) integrated on edge devices...
Types & Design Styles (B.7.1) | Apr 12 19
Beginning robotics with Raspberry Pi and Arduino
The language used in this book is very close to beginner level. It includes many examples, with code, images, and details of the materials needed to assemble the presented robot. The book’s ten chapters cover five key aspects related to low-cost robots: the robot...
Microprocessors & computers (B.7.1...) | Mar 14 19
Computer Systems Organization (C)
In this revised and expanded edition of his 2010 seminal work [1,2], Newman updates the content to reflect developments in the field. The book is very comprehensive and consists of 18 chapters. It is divided into four distinct parts: “The Empirical Study of...
General (C.0) | Apr 22 19
Advanced Raspberry Pi (2nd ed.)
The history of broadly understood electronics development includes the creation of new paradigms that became milestones: the discovery of transistors, the release of the 8051 microprocessor, the discovery of light-emitting diode (LED) indicators, the...
General (C.0) | Apr 11 19
Handbook of e-business security
This 15-chapter handbook opens up with an introductory chapter on security threats in e-commerce. Overall, the chapters cover traditional issues common to e-business security. For example, chapter 2 discusses the practical aspects of cryptography as it relates to...
Security & Protection (C.2.0...) | Apr 3 19
The datacenter as a computer (3rd ed.)
As machine learning becomes more popular and more responsible for managing our everyday lives, using it to manage data centers, to control the mammoth tasks engineers have to deal with, is only a natural evolution.
This book is a series of lectures in computer...
General (C.2.0) | Mar 29 19
Network function virtualization
The exponential growth of cellular network data, which grows at a pace of 60 percent per year and is expected to increase even more due to the growth of Internet of Things (IoT) networks, poses some unprecedented challenges to the design of data networks. To...
General (C.2.0) | Mar 21 19
In a nutshell, fog computing tries to transfer familiar concepts from cloud computing, like virtualization, elastic scalability, and everything-as-a-service (XaaS), closer to the sensors and devices of the Internet of Things (IoT) or to end users, to the so-called “edge,” to reduce...
Distributed Networks (C.2.1...) | Mar 6 19
Crowdsourcing of sensor cloud services
With the ubiquitous distribution of mobile devices (smartphones, tablets, and so on equipped with a variety of sensory and wearable devices), users are able to generate different types of real-time information related to ambient air measurements, fire...
Cloud Computing (C.2.4...) | Feb 28 19
Distributed computing pearls
In computer science, the term “synchronization” can relate to coordination between processors or to contention. So I was expecting to find some program examples using the open message passing interface (OpenMPI) or a discussion of distributed...
Distributed Systems (C.2.4) | Feb 13 19