Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
View:  Show:    

Hardware (B)
A multi-level-optimization framework for FPGA-based cellular neural network implementation : ACM Journal on Emerging Technologies in Computing Systems

Multi-level optimizations for cellular neural network design with Zybo and ZedBoard field-programmable gate arrays (FPGAs),...
General (B.0) | Dec 3 19

Computer Systems Organization (C)
Coordinated CTA combination and bandwidth partitioning for GPU concurrent kernel execution : ACM Trans. on Architecture and Code Optimization

The high throughput of processors (or, more broadly, computers) has always been a key issue in computer systems architecture. For...
General (C.0) | Oct 25 19

A first look at Certification Authority Authorization (CAA) : ACM SIGCOMM Computer Communication Review

The cornerstone of information and communications technology (ICT), security provides and maintains robustness, sustainability, and reliability. Using web services by referring to different web pages...
Security & Protection (C.2.0...) | Nov 21 19

A survey on artifacts from CoNEXT, ICN, IMC, and SIGCOMM conferences in 2017 : ACM SIGCOMM Computer Communication Review

This paper does precisely what the title says. It is an attempt to survey the current state of reproducibility in computer networking research. This is one of...
Data Communications (C.2.0...) | Nov 18 19

On the profitability of bundling sale strategy for online service markets with network effects : ACM Trans. on Internet Technology

Online services are usually provided over the Internet and telecommunications infrastructure. The online services focused on in this paper include...
Network Architecture & Design (C.2.1) | Nov 4 19

Dual-page checkpointing : ACM Trans. on Architecture and Code Optimization

In-memory computing is one of the most important paradigm shifts in today’s processing models. This interesting and innovative approach is possible because not only do we have new ideas on how to perform data...
Network Architecture & Design (C.2.1) | Nov 1 19

Software defined wireless networks: a survey of issues and solutions : Wireless Personal Communications

The communication network paradigm has undergone tremendous transformation, leading to changes in traffic patterns over the network. Traditional network architecture and protocols...
Wireless Communication (C.2.1...) | Oct 14 19

Software (D)
Convolutional neural networks in APL : ARRAY 19

After a short introduction, the authors show how to implement a convolutional neural network (CNN) in APL, a programming language based on a multidimensional array, illustrated by an example CNN for handwriting recognition on the Modified National Institute of...
Concurrent Programming (D.1.3) | Oct 31 19

Self-healing UI : UIST 19

Compared to living things like animals or plants, today’s electronic devices are quite fragile. Even minor “injuries” render them incapacitated, or limit their functionality. Sometimes they can be repaired, although this requires intervention by skilled and motivated humans...
User Interfaces (D.2.2...) | Jan 23 20

Modular product programs : ACM Transactions on Programming Languages and Systems

Some properties of programs are not about a single run of the program; instead, they relate multiple runs. For example, a program is deterministic if, given the same input, two runs will always produce the same...
Formal Methods (D.2.4...) | Jan 14 20

Hardware (B)

Passive network synthesis: an approach to classification

This interesting and technically oriented book was written for an audience with some advanced knowledge and understanding of passive networks and network synthesis. The authors have tried to convey the...
Logic Design (B.6) | Jan 24 20

Computer Systems Organization (C)

Demystifying Internet of Things security

When a paper on Internet of Things (IoT) security is too brief, experienced users will look for other papers. This book covers many aspects of IoT security, from hardware to applications and systems. The first chapter covers why Stuxnet happened and what could...
Security & Protection (C.2.0...) | Dec 12 19

Designing an Internet

This comprehensive view of the development and growth of the Internet includes the author’s review and critique of the proposed changes and improvements since its inception. It has 15 chapters, an appendix, a list of acknowledgements, a glossary, a list of...
Internet (C.2.1...) | Jan 28 20

Software (D)

Simplicity is complex: foundations of cyber-physical system design

First of all, I must say that this is a very good book. However, it did not captivate me, as I expected something different based on the subtitle. The book exposes exactly what the subtitle indicates...
General (D.2.0) | Jan 23 20

The impact of service oriented architecture adoption on organizations

Before the emergence of service-oriented architecture (SOA) in the early 2000s, enterprise businesses developed numerous in-house applications for related business processes. These business applications...
Service-oriented architecture (D.2.11...) | Dec 18 19

Bits and bugs

Niels Bohr, in confronting the subtleties and paradoxes of quantum theory, said to one of his many famous students and acolytes, “These issues are so serious that one can only joke about them” [1]. The vernacular main title of this excellent and very important book...
Testing & Debugging (D.2.5) | Nov 20 19

Clean Python: elegant coding in Python

Every beginning programmer needs a friend to look over their shoulder at their screen and give advice on how to code better. This book attempts to be such a friend. The book is full of advice of the kind, “do this, don’t do that.” This could be infuriating when a smart-...
Multiparadigm Languages (D.3.2...) | Jan 2 20

Learning Java with games

True to its title, this book will guide readers through Java with an appealing, well-structured sequence of increasingly complex coding tasks, leading eventually to journeyman fluency in writing a graphical user interface (GUI) application--that is, if one is...
Java (D.3.2...) | Dec 6 19

Essential TypeScript

JavaScript (ECMAScript) is kind of a mess of a language. It has grown and changed over time, but most of the original language misfeatures remain, including the almost complete way it ignores types and coerces values into other types in weird and wonderful ways...
Multiparadigm Languages (D.3.2...) | Nov 20 19

Cloud security auditing

Information technology (IT) systems auditing is important for good corporate governance, and essential where there is a need to formally demonstrate compliance with legislation and regulatory requirements. Information security management standards such as ISO...
Security & Protection (D.4.6) | Jan 28 20

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2020 ThinkLoud, Inc.
Terms of Use
| Privacy Policy