DeepBurning: automatic generation of FPGA-based learning accelerators for the neural network family
: DAC 16
Technically complex, this paper has numerous acronyms that are commonly used in specialist areas like electronics and engineering. However, the topic...
Integrated Circuits (B.7) | Feb 28 20
Computer Systems Organization (C)
Deep neural networks classification over encrypted data
: CODASPY 19
When we speak about a convolutional neural network (CNN) as a more complex deep learning algorithm, there are privacy-preserving issues that could be addressed in any study on the topic. In deep...
Neural Nets (C.1.3...) | Feb 13 20
Quantifying the utility-privacy tradeoff in the Internet of Things
: ACM Transactions on Cyber-Physical Systems
The Internet of Things (IoT), much more than other fields in computer science (CS), introduces new issues related to inferential and differential privacy. The...
Security & Protection (C.2.0...) | Mar 10 20
Known and unknown facts of LoRa
: ACM Transactions on Sensor Networks
Proposal and critique are two steps in the evolution of scientific theories and ideas: an idea is founded in a proposal and advanced via critiques. In the Internet of Things (IOT), equilibrium among power...
General (C.2.0) | Feb 18 20
Static identification of injection attacks in Java
: ACM Transactions on Programming Languages and Systems
A programming language’s security principles guarantee robustness and sustainability by detecting and neutralizing any tainted object in the programming code, which can potentially be the source...
Security & Protection (C.2.0...) | Feb 6 20
Challenges of privacy-preserving machine learning in IoT
: AIChallengeIoT 19
The widespread adoption of Internet of Things (IoT) devices has made available a huge amount of data, thus enabling the development of applications that use machine learning (ML) to gather and dig up...
Sensor Networks (C.2.1...) | Feb 3 20
AODV routing protocol for cognitive radio access based Internet of Things (IoT)
: Future Generation Computer Systems
There has been tangible growth in the investigation of cognitive radio (CR) communication and networking over the past few years. Sharing and digital switchover (DSO)...
Network Protocols (C.2.2) | Feb 4 20
Zooming in on wide-area latencies to a global cloud provider
: SIGCOMM 19
The authors measure wide area network (WAN) latency from the viewpoint of a large cloud provider, Azure, by tracking the round-trip time (RTT) of transmission control protocol (TCP) connections. Presenting...
Cloud Computing (C.2.4...) | Feb 27 20
A systematic literature review on intelligent user interfaces
: IHM 19
Designers of user interfaces often face a fundamental dilemma: how much of the underlying functionality of the system should they expose to the user? An experienced user may want direct access to...
User Interfaces (D.2.2...) | May 14 20
DeFlaker: automatically detecting flaky tests
: ICSE 18
One of the final steps in producing a new version of a software tool is to make sure the old functionality was not lost when the new functionality was added. A common approach to this problem is regression testing, that is, running...
Testing And Debugging (D.2.5) | May 20 20
Computer Systems Organization (C)
Introduction to deep learning
Deep learning has taken many application domains by storm, specifically those where artificial intelligence (AI) techniques have been struggling without too much success for decades. One of those domains is natural language processing (NLP), which includes key...
Neural Nets (C.1.3...) | Mar 5 20
Grokking deep learning
Deep learning is a hot topic in artificial intelligence (AI). It is exciting to see a book that can help readers understand the ideas of deep learning without advanced knowledge of mathematics.
The book is divided into 16 chapters. Chapter 1 presents the basic ideas of getting...
Neural Nets (C.1.3...) | Feb 14 20
Pro Azure governance and security
The pervasiveness of cloud technologies and the increasing popularity of Microsoft Azure make this book quite interesting for practicing software enthusiasts.
Chapter 1 lays out the necessary governance needed in organizations to migrate to a cloud-based...
Security & Protection (C.2.0...) | May 26 20
VoIP technology: applications and challenges
Many of us are familiar with voice over Internet protocol (VoIP) technology, having replaced our traditional landline telephones with VoIP phones connected through a data network. Modern routers are often equipped with analog sockets so users can plug their existing...
Network Protocols (C.2.2) | Feb 18 20
The art of high performance computing for computational science, vol. 1
This is the book I wish I had owned when I started supporting computational scientists a few years ago. It is revised and updated from a Japanese volume based on computational science lectures broadcast...
Performance of Systems (C.4) | May 12 20
Formal methods: an appetizer
I’ve occasionally been intimidated into ordering an appetizer as the main course, but have rarely regretted it thanks to the presence of “gourmet” friends. This is an excellent, ultra-elegant, and rigorous book. Its 160 printed pages are to be used together with its...
Formal Methods (D.2.4...) | Apr 23 20
Pro Python 3: features and tools for professional development (3rd ed.)
This is an excellent book aimed at intermediate-level programmers already familiar with basic Python. The book aims to take these programmers to the next level by encouraging good habits and by examining...
Python (D.3.2...) | Feb 26 20
Beginning security with Microsoft technologies
This book is written for a very specific audience. If you are a junior technical person (say a programmer, systems administrator, or even an entry-level security specialist) in an organization running Office 365, Windows 10, and Azure web services, and you...
Security & Protection (D.4.6) | Apr 24 20
Learn RStudio IDE: quick, effective, and productive data science
R is one of most popular programming languages used in statistical computing. RStudio is an easy-to-use, free, and open-source integrated development environment (IDE) to learn, apply, and develop an R program...
General (E.0) | May 21 20
Core data analysis (2nd ed.)
Data science recently emerged as a hot topic. Mirkin’s book explores the strength of data analysis from both data summarization and knowledge discovery points of view. In addition to quantified summarization, correlation and visualization (graphical summary...
General (E.0) | Mar 12 20