Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
View:  Show:    
 
 

Computer Systems Organization (C)
Coordinated CTA combination and bandwidth partitioning for GPU concurrent kernel execution : ACM Trans. on Architecture and Code Optimization

The high throughput of processors (or, more broadly, computers) has always been a key issue in computer systems architecture. For...
General (C.0) | Oct 25 19

CGraph: a distributed storage and processing system for concurrent iterative graph analysis jobs : ACM Trans. on Storage

There are many distributed (and commercial) graph processing platforms (for example, services related to social networks) that “need...
General (C.0) | Oct 4 19

On the profitability of bundling sale strategy for online service markets with network effects : ACM Trans. on Internet Technology

Online services are usually provided over the Internet and telecommunications infrastructure. The online services focused on in this paper include...
Network Architecture & Design (C.2.1) | Nov 4 19

Dual-page checkpointing : ACM Trans. on Architecture and Code Optimization

In-memory computing is one of the most important paradigm shifts in today’s processing models. This interesting and innovative approach is possible because not only do we have new ideas on how to...
Network Architecture & Design (C.2.1) | Nov 1 19

Software defined wireless networks: a survey of issues and solutions : Wireless Personal Communications

The communication network paradigm has undergone tremendous transformation, leading to changes in traffic patterns over the network. Traditional network architecture and protocols...
Wireless Communication (C.2.1...) | Oct 14 19

Tensorizing restricted Boltzmann machine : ACM Trans. on Knowledge Discovery from Data

The paper proposes a tensorized variation on restricted Boltzmann machines (RBMs) to reduce the number of model parameters and significantly decrease training time, while still obtaining comparable...
Network Architecture & Design (C.2.1) | Sep 16 19

Information diffusion prediction with network regularized role-based user representation learning : ACM Trans. on Knowledge Discovery from Data

Wang et al. propose and evaluate the network regularized diffusion representation (NRDR) learning model to tackle the issue of information...
Network Architecture & Design (C.2.1) | Sep 12 19

Large-scale and extreme-scale computing with stranded green power : IEEE Trans. on Parallel and Distributed Systems

Yang and Chien look at the opportunities and costs of using stranded power (SP) at green generating centers for supercomputing and allied computer resources. They “define [SP] as offered power generation with no...
Distributed Systems (C.2.4) | Sep 13 19


Software (D)
And then, there were three : Communications of the ACM

This article is a state-of-the-industry survey on the dwindling silicon foundries that manufacture integrated circuits. The authors rightly question the trifecta of factors that currently constrict and afflict...
General (D.0) | Sep 17 19

Software verification and validation technologies and tools : IEEE Software

Rodriguez et al. attempt to explore the existing methods and tools that can be employed to check if (1) software is being built in a way that meets quality standards, and (2) the software product satisfies the intended...
General (D.0) | Sep 17 19


Hardware (B)

In-memory computing: synthesis and optimization

For many years, von Neumann’s computer architecture model was one of the most important paradigms in computer engineering. The central processing unit (CPU) with its main memory (primary storage) is connected to external storage (random access memory (RAM)...
Integrated Circuits (B.7) | Oct 28 19


Computer Systems Organization (C)

The changing face of problematic Internet use: an interpersonal approach

In this age of explosion with regards to Internet use and the derived social networks, as well as online media access, voices start to identify drawbacks and risks, as with any groundbreaking technology. These risks...
Internet (C.2.1...) | Oct 8 19

Nonlocal modeling, analysis, and computation

Nonlocal models are models that generalize partial differential equations (PDEs). In PDE-based modeling, for a point, the values can be verified without using any values of other points. In nonlocal modeling, local values and nonlocal values become part of the...
Modeling Techniques (C.4...) | Nov 8 19


Software (D)

Testing and tuning market trading systems: algorithms in C++

Financial markets have become increasingly dominated by automated systems. A computer program can be used to decide when to buy and sell things such as shares or currencies, with the aim of making a profit. The automated use of this means no human...
Object-Oriented Programming (D.1.5) | Sep 5 19

The essentials of modern software engineering

This introductory software engineering textbook differs from others in that it does not focus on one particular methodology. Instead, the book focuses on identifying the essence of software engineering, a meta-model...
Software Engineering (D.2) | Oct 14 19

Managing technical debt

Although technical debt has existed in software systems ever since there was software, the term “technical debt” and the metaphor comparing it to financial debt are more recent. This book is intended for practitioners. Its purpose is to provide them with practical advice...
General (D.2.0) | Nov 13 19

Analytic methods in systems and software testing

I admit that this book perhaps gives me an inordinate amount of pleasure. I have a completely ridiculous number of books on software and systems testing on my shelves, beginning with Glenford Myers’ brilliant classic...
Testing & Debugging (D.2.5) | Oct 31 19

Core Java, volume I—fundamentals (11th ed.)

Core Java is a longstanding series by computer science professor Cay Horstmann, who has written several books on programming languages. This edition is a classic textbook for high school seniors and college freshman. In 2020, Java will be 25 years old. Its...
Java (D.3.2...) | Nov 12 19

Practical Java machine learning

Over the past few years, machine learning techniques have gained popularity among researchers and practitioners. Much of this popularity can be explained by three factors: (i) the growing amount of available data created every day, (ii) the increase in...
Java (D.3.2...) | Oct 11 19

Personal finance with Python

I could start this review by trying to define as accurately as possible the book’s audience. Is it for Python programmers eager to apply their knowledge to personal finance applications? Or is it for people involved, one way or another, in the realm of...
Python (D.3.2...) | Sep 27 19

   
Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy