: ACM Transactions on Reconfigurable Technology and Systems
For some time, application-specific integrated circuits (ASICs) have been used to efficiently accelerate computational performance in many areas of technology, including Internet of Things (IoT)...
General (B.0) | Jul 30 19
Long short-term memory fuzzy finite state machine for human activity modelling
: PETRA 19
As sensors become more ubiquitous in smart homes and work environments, the data they provide can offer information about the locations and actions of any occupants. The authors propose using a...
Memory Design (B.5.1...) | Aug 14 19
NV-clustering: normally-off computing using non-volatile datapaths
: IEEE Transactions on Computers
The much-needed downscaling of different core system architectures is significantly challenged by static power dissipation. The authors present a solution via middleware-transparent...
Logic Design (B.6) | Jun 19 19
Computer Systems Organization (C)
Orchestrating complex application architectures in heterogeneous clouds
: Journal of Grid Computing
The authors present INDIGO-DataCloud for deploying cloud applications across multiple cloud management platforms (CMPs) that require complex topologies and operational...
General (C.2.0) | Aug 19 19
Reliable industrial IoT-based distributed automation
: IoTDI 19
This paper shows improved reliability in Industrial Internet of Things (IIoT) distributed automation systems by following along at runtime against expected real-world fault models. This novel idea represents models using...
General (C.2.0) | Aug 16 19
Smart city system design
: ACM Computing Surveys
As the authors state, “smart city applications in healthcare, transportation, utility, safety, and environmental health” are likely to benefit from machine intelligence and Internet of Things (IoT) technology. In this survey article on smart city system design...
Security & Protection (C.2.0...) | Aug 16 19
Adaptive network tools and services network topology mapper
: ICIT 18
Modern educational institutions provide Internet access in order to empower students with web-based resources. These institutions typically use network tools for terminal monitoring, power management...
General (C.2.0) | Jul 30 19
EmerGence: a delay tolerant web application for disaster relief
: HotMobile 19
Providing communication services in disaster-affected areas is important. The authors introduce an app for such situations that runs on the back of networks powered by unmanned aircraft systems (drones)...
Network Architecture & Design (C.2.1) | Jun 19 19
Three bits suffice: explicit support for passive measurement of Internet latency in QUIC and TCP
: IMC 18
The Internet measurement of round-trip time (RTT) is important as an indication of performance and latency. While the Ping utility can and does measure RTT, widespread use increases overhead. This...
Network Protocols (C.2.2) | Jun 17 19
Back to the future
: Communications of the ACM
The name of this short article comes from the fact that the dawn of the Internet with the Advanced Research Projects Agency Network (ARPANET) reintroduced the store-and-forward method used for telegraphs, but instead of human nodes that made information...
Public Networks (C.2.3...) | Aug 15 19
General Literature (A)
The philosophy of any discipline must account for the goals, methodology, and subject matter of the discipline . There is a well-developed body of scholarship on the philosophy of mathematics and of science, especially physics and biology, and more recently...
General (A.0) | Jul 15 19
New light through old windows
Science fiction has often been prophetic--sometimes wrongly so, sometimes very much on point.
New light through old windows is a collection of science fiction stories--the earliest is from the early 19th century and the most recent is from the mid-1930s. Each...
General (A.0) | Jun 28 19
Hardware accelerators in data centers
Over the years, the exchange of data over networks has been on the rise. With advancements in mobile technologies and applications, this is only going to increase. Modern data centers store, process, and distribute huge amounts of data, 24 hours a day...
General (B.0) | Jul 25 19
Computer Systems Organization (C)
Handbook of mobile data privacy
Location, location, location! If you are at risk of being targeted by an intelligent guided missile and you want to survive, I can only suggest you turn off your cellphone. But OK, let’s be realistic: if you’re worrying about this, you’ve got bigger problems than...
Security & Protection (C.2.0...) | Jul 22 19
Research advances in cloud computing
This book includes recent research trends in cloud computing. It covers a wide range of research topics, some of which will be of interest to cloud users and others to cloud vendors. This review organizes 18 chapters into topics for cloud users, cloud platform providers, cloud...
Cloud Computing (C.2.4...) | Aug 8 19
Migrating to Azure
Migrating to Azure covers the fundamentals of migrating, securing, and deploying legacy applications on the Microsoft Azure cloud. Due to their high availability and cost effectiveness, cloud computing technologies have been increasingly used for...
Cloud Computing (C.2.4...) | Jun 18 19
Orthogonal waveforms and filter banks for future communication systems
Filter bank multicarrier (FBMC) signaling policy is the subject of this book. To explain its different features and functionalities in different communication interaction scenarios, the authors present a comprehensive...
Signal Processing Systems (C.3...) | Aug 12 19
A philosophy of software design
I distinctly recall the first class I taught in software design, in 1980. One student from that course is now a computer science (CS) professor and department head at a major college in Tel Aviv. This anecdote, with its dating, is relevant to this book. It is well known that a...
General (D.0) | Jun 3 19
Declarative logic programming
What is declarative logic programming and why is it relevant? These are just two of the many questions answered in Declarative logic programming, edited by Michael Kifer and Yanhong Annie Liu. The compiled chapters aim to fill in any gaps in the current literature related to...
Logic Programming (D.1.6) | Jun 26 19
Handbook of model checking
Due to the proliferation and pervasiveness of hardware and software entities in everyday life, ascertaining their trustworthiness is of paramount importance. Model checking is a logic-based approach that determines whether the abstract model of an entity conforms to a...
Model Checking (D.2.4...) | May 20 19