Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
View:  Show:    

Hardware (B)
DeepBurning: automatic generation of FPGA-based learning accelerators for the neural network family : DAC 16

Technically complex, this paper has numerous acronyms that are commonly used in specialist areas like electronics and engineering. However, the topic...
Integrated Circuits (B.7) | Feb 28 20

Computer Systems Organization (C)
Deep neural networks classification over encrypted data : CODASPY 19

When we speak about a convolutional neural network (CNN) as a more complex deep learning algorithm, there are privacy-preserving issues that could be addressed in any study on the topic. In deep...
Neural Nets (C.1.3...) | Feb 13 20

Quantifying the utility-privacy tradeoff in the Internet of Things : ACM Transactions on Cyber-Physical Systems

The Internet of Things (IoT), much more than other fields in computer science (CS), introduces new issues related to inferential and differential privacy. The...
Security & Protection (C.2.0...) | Mar 10 20

Known and unknown facts of LoRa : ACM Transactions on Sensor Networks

Proposal and critique are two steps in the evolution of scientific theories and ideas: an idea is founded in a proposal and advanced via critiques. In the Internet of Things (IOT), equilibrium among power...
General (C.2.0) | Feb 18 20

Static identification of injection attacks in Java : ACM Transactions on Programming Languages and Systems

A programming language’s security principles guarantee robustness and sustainability by detecting and neutralizing any tainted object in the programming code, which can potentially be the source...
Security & Protection (C.2.0...) | Feb 6 20

Challenges of privacy-preserving machine learning in IoT : AIChallengeIoT 19

The widespread adoption of Internet of Things (IoT) devices has made available a huge amount of data, thus enabling the development of applications that use machine learning (ML) to gather and dig up...
Sensor Networks (C.2.1...) | Feb 3 20

AODV routing protocol for cognitive radio access based Internet of Things (IoT) : Future Generation Computer Systems

There has been tangible growth in the investigation of cognitive radio (CR) communication and networking over the past few years. Sharing and digital switchover (DSO)...
Network Protocols (C.2.2) | Feb 4 20

Zooming in on wide-area latencies to a global cloud provider : SIGCOMM 19

The authors measure wide area network (WAN) latency from the viewpoint of a large cloud provider, Azure, by tracking the round-trip time (RTT) of transmission control protocol (TCP) connections. Presenting...
Cloud Computing (C.2.4...) | Feb 27 20

Software (D)
A systematic literature review on intelligent user interfaces : IHM 19

Designers of user interfaces often face a fundamental dilemma: how much of the underlying functionality of the system should they expose to the user? An experienced user may want direct access to...
User Interfaces (D.2.2...) | May 14 20

DeFlaker: automatically detecting flaky tests : ICSE 18

One of the final steps in producing a new version of a software tool is to make sure the old functionality was not lost when the new functionality was added. A common approach to this problem is regression testing, that is, running...
Testing And Debugging (D.2.5) | May 20 20

Computer Systems Organization (C)

Introduction to deep learning

Deep learning has taken many application domains by storm, specifically those where artificial intelligence (AI) techniques have been struggling without too much success for decades. One of those domains is natural language processing (NLP), which includes key...
Neural Nets (C.1.3...) | Mar 5 20

Grokking deep learning

Deep learning is a hot topic in artificial intelligence (AI). It is exciting to see a book that can help readers understand the ideas of deep learning without advanced knowledge of mathematics. The book is divided into 16 chapters. Chapter 1 presents the basic ideas of getting...
Neural Nets (C.1.3...) | Feb 14 20

Pro Azure governance and security

The pervasiveness of cloud technologies and the increasing popularity of Microsoft Azure make this book quite interesting for practicing software enthusiasts. Chapter 1 lays out the necessary governance needed in organizations to migrate to a cloud-based...
Security & Protection (C.2.0...) | May 26 20

VoIP technology: applications and challenges

Many of us are familiar with voice over Internet protocol (VoIP) technology, having replaced our traditional landline telephones with VoIP phones connected through a data network. Modern routers are often equipped with analog sockets so users can plug their existing...
Network Protocols (C.2.2) | Feb 18 20

The art of high performance computing for computational science, vol. 1

This is the book I wish I had owned when I started supporting computational scientists a few years ago. It is revised and updated from a Japanese volume based on computational science lectures broadcast...
Performance of Systems (C.4) | May 12 20

Software (D)

Formal methods: an appetizer

I’ve occasionally been intimidated into ordering an appetizer as the main course, but have rarely regretted it thanks to the presence of “gourmet” friends. This is an excellent, ultra-elegant, and rigorous book. Its 160 printed pages are to be used together with its...
Formal Methods (D.2.4...) | Apr 23 20

Pro Python 3: features and tools for professional development (3rd ed.)

This is an excellent book aimed at intermediate-level programmers already familiar with basic Python. The book aims to take these programmers to the next level by encouraging good habits and by examining...
Python (D.3.2...) | Feb 26 20

Beginning security with Microsoft technologies

This book is written for a very specific audience. If you are a junior technical person (say a programmer, systems administrator, or even an entry-level security specialist) in an organization running Office 365, Windows 10, and Azure web services, and you...
Security & Protection (D.4.6) | Apr 24 20

Data (E)

Learn RStudio IDE: quick, effective, and productive data science

R is one of most popular programming languages used in statistical computing. RStudio is an easy-to-use, free, and open-source integrated development environment (IDE) to learn, apply, and develop an R program...
General (E.0) | May 21 20

Core data analysis (2nd ed.)

Data science recently emerged as a hot topic. Mirkin’s book explores the strength of data analysis from both data summarization and knowledge discovery points of view. In addition to quantified summarization, correlation and visualization (graphical summary...
General (E.0) | Mar 12 20

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2020 ThinkLoud, Inc.
Terms of Use
| Privacy Policy