Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
View:  Show:    
 
 

Hardware (B)
DeepBurning: automatic generation of FPGA-based learning accelerators for the neural network family : DAC 16

Technically complex, this paper has numerous acronyms that are commonly used in specialist areas like electronics and engineering. However, the topic...
Integrated Circuits (B.7) | Feb 28 20


Computer Systems Organization (C)
Quantifying the utility-privacy tradeoff in the Internet of Things : ACM Transactions on Cyber-Physical Systems

The Internet of Things (IoT), much more than other fields in computer science (CS), introduces new issues related to inferential and differential privacy. The...
Security & Protection (C.2.0...) | Mar 10 20


Software (D)
Engineering resilient collective adaptive systems by self-stabilisation : ACM Transactions on Modeling and Computer Simulation

Smart cities, together with the Internet of Things (IoT), are becoming reality at an accelerated speed, supported by the fifth generation of...
Software Engineering (D.2) | Jul 8 20

Hospitality of chatbot building platforms : SQUADE 19

Chatbots provide for natural language computer conversations, popularized with personal voice assistants like Siri and Alexa. Suitable architecture frameworks for building chatbots are reframed...
General (D.2.0) | Jul 9 20

A systematic literature review on intelligent user interfaces : IHM 19

Designers of user interfaces often face a fundamental dilemma: how much of the underlying functionality of the system should they expose to the user? An experienced user may want direct access to...
User Interfaces (D.2.2...) | May 14 20

Metamorphic testing: a review of challenges and opportunities : ACM Computing Surveys

Testing software remains a complex business, so finding different means for doing so is important. Metamorphic testing belongs in one’s toolkit, along with unit tests and property-based testing. Thus, overviews are...
Validation (D.2.4...) | Jun 2 20

Keeping master green at scale : EuroSys 19

Huge monolithic repositories, also known as monorepos, are popular in leading technology companies such as Microsoft, Google, and Facebook. They support continuous integration, merging all the...
Testing And Debugging (D.2.5) | Jun 15 20

DeFlaker: automatically detecting flaky tests : ICSE 18

One of the final steps in producing a new version of a software tool is to make sure the old functionality was not lost when the new functionality was added. A common approach to this problem is regression testing, that is, running the test cases used for...
Testing And Debugging (D.2.5) | May 20 20

Automated classification of software bug reports : ICICM 19

Software developers use the information from software bug reports to correct software defects and enhance software. However, it is difficult for software developers to manually inspect and analyze a “large number...
Software Quality Assurance (SQA) (D.2.9...) | Jun 9 20

Surviving software dependencies : Communications of the ACM

Software has been reused since the days of exchanging decks of punched cards wrapped in listings printed on green bar paper. Packages (that is, libraries) of code are everywhere and are used in an overwhelming number of...
Reusable Software (D.2.m...) | May 13 20


Hardware (B)

Design of low power integrated radios for emerging standards

Low power radios are in high demand for use in Internet of Things (IoT) devices, where there is a need for small, efficient, and low powered radios for wireless data communications. This book is part...
General (B.0) | Jul 10 20


Computer Systems Organization (C)

Introduction to deep learning

Deep learning has taken many application domains by storm, specifically those where artificial intelligence (AI) techniques have been struggling without too much success for decades. One of those domains is natural language processing (NLP), which includes key...
Neural Nets (C.1.3...) | Mar 5 20

Computer and communication networks (2nd ed.)

In every technological field characterized by very fast changes, it is necessary to update the related textbooks with the progress of research and practice. Obviously, this statement refers also to networking, where...
Data Communications (C.2.0...) | Jul 7 20

Pro Azure governance and security

The pervasiveness of cloud technologies and the increasing popularity of Microsoft Azure make this book quite interesting for practicing software enthusiasts. Chapter 1 lays out the necessary governance needed in organizations to migrate to a cloud-based...
Security & Protection (C.2.0...) | May 26 20

The art of high performance computing for computational science, vol. 1

This is the book I wish I had owned when I started supporting computational scientists a few years ago. It is revised and updated from a Japanese volume based on computational science lectures broadcast to a number of...
Performance of Systems (C.4) | May 12 20


Software (D)

Formal methods: an appetizer

I’ve occasionally been intimidated into ordering an appetizer as the main course, but have rarely regretted it thanks to the presence of “gourmet” friends. This is an excellent, ultra-elegant, and rigorous book. Its 160 printed pages are to be used together with its...
Formal Methods (D.2.4...) | Apr 23 20

Formal languages and compilation (3rd ed.)

Compiler construction literature has always been an interesting mixture of clever tricks and deep theory. Most textbooks try to deal with both aspects, usually emphasizing theory at the beginning and then moving on to the tricks necessary to support specific...
Compilers (D.3.4...) | Jun 19 20

Beginning security with Microsoft technologies

This book is written for a very specific audience. If you are a junior technical person (say a programmer, systems administrator, or even an entry-level security specialist) in an organization running Office 365, Windows 10, and Azure web services, and you...
Security & Protection (D.4.6) | Apr 24 20

Trustworthy cyber-physical systems

Users expect a trustworthy system to behave according to its requirements. Trustworthiness is a fundamental design objective for any system that provides critical functions, for example, transportation systems...
Real-Time & Embedded Systems (D.4.7...) | Jul 1 20


Data (E)

Learn RStudio IDE: quick, effective, and productive data science

R is one of most popular programming languages used in statistical computing. RStudio is an easy-to-use, free, and open-source integrated development environment (IDE) to learn, apply, and develop an R program...
General (E.0) | May 21 20

   
Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2020 ThinkLoud, Inc.
Terms of Use
| Privacy Policy