Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
View:  Show:    

Hardware (B)
FeatherNet : ACM Transactions on Reconfigurable Technology and Systems

For some time, application-specific integrated circuits (ASICs) have been used to efficiently accelerate computational performance in many areas of technology, including Internet of Things (IoT)...
General (B.0) | Jul 30 19

Long short-term memory fuzzy finite state machine for human activity modelling : PETRA 19

As sensors become more ubiquitous in smart homes and work environments, the data they provide can offer information about the locations and actions of any occupants. The authors propose using a...
Memory Design (B.5.1...) | Aug 14 19

NV-clustering: normally-off computing using non-volatile datapaths : IEEE Transactions on Computers

The much-needed downscaling of different core system architectures is significantly challenged by static power dissipation. The authors present a solution via middleware-transparent...
Logic Design (B.6) | Jun 19 19

Computer Systems Organization (C)
Orchestrating complex application architectures in heterogeneous clouds : Journal of Grid Computing

The authors present INDIGO-DataCloud for deploying cloud applications across multiple cloud management platforms (CMPs) that require complex topologies and operational...
General (C.2.0) | Aug 19 19

Reliable industrial IoT-based distributed automation : IoTDI 19

This paper shows improved reliability in Industrial Internet of Things (IIoT) distributed automation systems by following along at runtime against expected real-world fault models. This novel idea represents models using...
General (C.2.0) | Aug 16 19

Smart city system design : ACM Computing Surveys

As the authors state, “smart city applications in healthcare, transportation, utility, safety, and environmental health” are likely to benefit from machine intelligence and Internet of Things (IoT) technology. In this survey article on smart city system design...
Security & Protection (C.2.0...) | Aug 16 19

Adaptive network tools and services network topology mapper : ICIT 18

Modern educational institutions provide Internet access in order to empower students with web-based resources. These institutions typically use network tools for terminal monitoring, power management...
General (C.2.0) | Jul 30 19

EmerGence: a delay tolerant web application for disaster relief : HotMobile 19

Providing communication services in disaster-affected areas is important. The authors introduce an app for such situations that runs on the back of networks powered by unmanned aircraft systems (drones)...
Network Architecture & Design (C.2.1) | Jun 19 19

Three bits suffice: explicit support for passive measurement of Internet latency in QUIC and TCP : IMC 18

The Internet measurement of round-trip time (RTT) is important as an indication of performance and latency. While the Ping utility can and does measure RTT, widespread use increases overhead. This...
Network Protocols (C.2.2) | Jun 17 19

Back to the future : Communications of the ACM

The name of this short article comes from the fact that the dawn of the Internet with the Advanced Research Projects Agency Network (ARPANET) reintroduced the store-and-forward method used for telegraphs, but instead of human nodes that made information...
Public Networks (C.2.3...) | Aug 15 19

General Literature (A)

Computational artifacts

The philosophy of any discipline must account for the goals, methodology, and subject matter of the discipline [1]. There is a well-developed body of scholarship on the philosophy of mathematics and of science, especially physics and biology, and more recently...
General (A.0) | Jul 15 19

New light through old windows

Science fiction has often been prophetic--sometimes wrongly so, sometimes very much on point. New light through old windows is a collection of science fiction stories--the earliest is from the early 19th century and the most recent is from the mid-1930s. Each...
General (A.0) | Jun 28 19

Hardware (B)

Hardware accelerators in data centers

Over the years, the exchange of data over networks has been on the rise. With advancements in mobile technologies and applications, this is only going to increase. Modern data centers store, process, and distribute huge amounts of data, 24 hours a day...
General (B.0) | Jul 25 19

Computer Systems Organization (C)

Handbook of mobile data privacy

Location, location, location! If you are at risk of being targeted by an intelligent guided missile and you want to survive, I can only suggest you turn off your cellphone. But OK, let’s be realistic: if you’re worrying about this, you’ve got bigger problems than...
Security & Protection (C.2.0...) | Jul 22 19

Research advances in cloud computing

This book includes recent research trends in cloud computing. It covers a wide range of research topics, some of which will be of interest to cloud users and others to cloud vendors. This review organizes 18 chapters into topics for cloud users, cloud platform providers, cloud...
Cloud Computing (C.2.4...) | Aug 8 19

Migrating to Azure

Migrating to Azure covers the fundamentals of migrating, securing, and deploying legacy applications on the Microsoft Azure cloud. Due to their high availability and cost effectiveness, cloud computing technologies have been increasingly used for...
Cloud Computing (C.2.4...) | Jun 18 19

Orthogonal waveforms and filter banks for future communication systems

Filter bank multicarrier (FBMC) signaling policy is the subject of this book. To explain its different features and functionalities in different communication interaction scenarios, the authors present a comprehensive...
Signal Processing Systems (C.3...) | Aug 12 19

Software (D)

A philosophy of software design

I distinctly recall the first class I taught in software design, in 1980. One student from that course is now a computer science (CS) professor and department head at a major college in Tel Aviv. This anecdote, with its dating, is relevant to this book. It is well known that a...
General (D.0) | Jun 3 19

Declarative logic programming

What is declarative logic programming and why is it relevant? These are just two of the many questions answered in Declarative logic programming, edited by Michael Kifer and Yanhong Annie Liu. The compiled chapters aim to fill in any gaps in the current literature related to...
Logic Programming (D.1.6) | Jun 26 19

Handbook of model checking

Due to the proliferation and pervasiveness of hardware and software entities in everyday life, ascertaining their trustworthiness is of paramount importance. Model checking is a logic-based approach that determines whether the abstract model of an entity conforms to a...
Model Checking (D.2.4...) | May 20 19

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy