Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
View:  Show:    
 
 

Hardware (B)
A multi-level-optimization framework for FPGA-based cellular neural network implementation : ACM Journal on Emerging Technologies in Computing Systems

Multi-level optimizations for cellular neural network design with Zybo and ZedBoard field-programmable gate arrays (FPGAs), including the system...
General (B.0) | Dec 3 19


Computer Systems Organization (C)
Coordinated CTA combination and bandwidth partitioning for GPU concurrent kernel execution : ACM Trans. on Architecture and Code Optimization

The high throughput of processors (or, more broadly, computers) has always been a key issue in computer systems architecture. For...
General (C.0) | Oct 25 19

CGraph: a distributed storage and processing system for concurrent iterative graph analysis jobs : ACM Trans. on Storage

There are many distributed (and commercial) graph processing platforms (for example, services related to social networks) that “need...
General (C.0) | Oct 4 19

A first look at Certification Authority Authorization (CAA) : ACM SIGCOMM Computer Communication Review

The cornerstone of information and communications technology (ICT), security provides and maintains robustness, sustainability, and reliability. Using web services by referring to different web pages...
Security & Protection (C.2.0...) | Nov 21 19

A survey on artifacts from CoNEXT, ICN, IMC, and SIGCOMM conferences in 2017 : ACM SIGCOMM Computer Communication Review

This paper does precisely what the title says. It is an attempt to survey the current state of reproducibility in computer networking research. This is one of...
Data Communications (C.2.0...) | Nov 18 19

On the profitability of bundling sale strategy for online service markets with network effects : ACM Trans. on Internet Technology

Online services are usually provided over the Internet and telecommunications infrastructure. The online services focused on in this paper include...
Network Architecture & Design (C.2.1) | Nov 4 19

Dual-page checkpointing : ACM Trans. on Architecture and Code Optimization

In-memory computing is one of the most important paradigm shifts in today’s processing models. This interesting and innovative approach is possible because not only do we have new ideas on how to perform data...
Network Architecture & Design (C.2.1) | Nov 1 19

Software defined wireless networks: a survey of issues and solutions : Wireless Personal Communications

The communication network paradigm has undergone tremendous transformation, leading to changes in traffic patterns over the network. Traditional network architecture and protocols...
Wireless Communication (C.2.1...) | Oct 14 19

Tensorizing restricted Boltzmann machine : ACM Trans. on Knowledge Discovery from Data

The paper proposes a tensorized variation on restricted Boltzmann machines (RBMs) to reduce the number of model parameters and significantly decrease training time, while still obtaining comparable...
Network Architecture & Design (C.2.1) | Sep 16 19


Software (D)
And then, there were three : Communications of the ACM

This article is a state-of-the-industry survey on the dwindling silicon foundries that manufacture integrated circuits. The authors rightly question the trifecta of factors that currently constrict and afflict...
General (D.0) | Sep 17 19


Hardware (B)

In-memory computing: synthesis and optimization

For many years, von Neumann’s computer architecture model was one of the most important paradigms in computer engineering. The central processing unit (CPU) with its main memory (primary storage) is connected to external storage (random access memory (RAM)...
Integrated Circuits (B.7) | Oct 28 19


Computer Systems Organization (C)

Proactive and dynamic network defense

The study of network security probably started together with the development of computer networks. Proactive and adaptive network defense techniques are newer approaches, based on an asymmetry between attackers and defenders. Typically, defenders maintain a...
Security & Protection (C.2.0...) | Nov 18 19

Nonlocal modeling, analysis, and computation

Nonlocal models are models that generalize partial differential equations (PDEs). In PDE-based modeling, for a point, the values can be verified without using any values of other points. In nonlocal modeling, local values and nonlocal values become part of the...
Modeling Techniques (C.4...) | Nov 8 19


Software (D)

The essentials of modern software engineering

This introductory software engineering textbook differs from others in that it does not focus on one particular methodology. Instead, the book focuses on identifying the essence of software engineering, a meta-model...
Software Engineering (D.2) | Oct 14 19

Managing technical debt

Although technical debt has existed in software systems ever since there was software, the term “technical debt” and the metaphor comparing it to financial debt are more recent. This book is intended for practitioners. Its purpose is to provide them with practical advice...
General (D.2.0) | Nov 13 19

Bits and bugs

Niels Bohr, in confronting the subtleties and paradoxes of quantum theory, said to one of his many famous students and acolytes, “These issues are so serious that one can only joke about them” [1]. The vernacular main title of this excellent and very important book brought...
Testing & Debugging (D.2.5) | Nov 20 19

Analytic methods in systems and software testing

I admit that this book perhaps gives me an inordinate amount of pleasure. I have a completely ridiculous number of books on software and systems testing on my shelves, beginning with Glenford Myers’ brilliant classic...
Testing & Debugging (D.2.5) | Oct 31 19

Essential TypeScript

JavaScript (ECMAScript) is kind of a mess of a language. It has grown and changed over time, but most of the original language misfeatures remain, including the almost complete way it ignores types and coerces values into other types in weird and wonderful ways...
Multiparadigm Languages (D.3.2...) | Nov 20 19

Core Java, volume I—fundamentals (11th ed.)

Core Java is a longstanding series by computer science professor Cay Horstmann, who has written several books on programming languages. This edition is a classic textbook for high school seniors and...
Java (D.3.2...) | Nov 12 19

Practical Java machine learning

Over the past few years, machine learning techniques have gained popularity among researchers and practitioners. Much of this popularity can be explained by three factors: (i) the growing amount of available data created every day, (ii) the increase in...
Java (D.3.2...) | Oct 11 19

   
Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy