Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
View:  Show:    

Computer Systems Organization (C)
The rise of serverless computing : Communications of the ACM

In spite of a somewhat confusing introduction--“the server is dead, long live the server”--this informative article gives an overview of the relatively new phenomenon of serverless computing. It...
General (C.0) | Aug 3 20

AndroZoo: collecting millions of Android apps for the research community : MSR 16

This is basically a data collection paper. How did the authors collect more than three million free Android apps (more than 20 terabytes)? The answer: it’s somewhat more delicate than one might...
Mobile Processors (C.1.4...) | Aug 5 20

Performance analysis of linear receivers for uplink massive MIMO FBMC-OQAM systems : IEEE Transactions on Signal Processing

Progressive improvements have been made to the FBMC-OQAM signaling, for example, many theoretical discussions and achievements...
Signal Processing Systems (C.3...) | Aug 4 20

Software (D)
Engineering resilient collective adaptive systems by self-stabilisation : ACM Transactions on Modeling and Computer Simulation

Smart cities, together with the Internet of Things (IoT), are becoming reality at an accelerated speed, supported by the fifth generation of...
Software Engineering (D.2) | Jul 8 20

Hospitality of chatbot building platforms : SQUADE 19

Chatbots provide for natural language computer conversations, popularized with personal voice assistants like Siri and Alexa. Suitable architecture frameworks for building chatbots are reframed...
General (D.2.0) | Jul 9 20

A systematic literature review on intelligent user interfaces : IHM 19

Designers of user interfaces often face a fundamental dilemma: how much of the underlying functionality of the system should they expose to the user? An experienced user may want direct access to...
User Interfaces (D.2.2...) | May 14 20

Metamorphic testing: a review of challenges and opportunities : ACM Computing Surveys

Testing software remains a complex business, so finding different means for doing so is important. Metamorphic testing belongs in one’s toolkit, along with unit tests and property-based testing. Thus, overviews are...
Validation (D.2.4...) | Jun 2 20

Keeping master green at scale : EuroSys 19

Huge monolithic repositories, also known as monorepos, are popular in leading technology companies such as Microsoft, Google, and Facebook. They support continuous integration, merging all the...
Testing And Debugging (D.2.5) | Jun 15 20

DeFlaker: automatically detecting flaky tests : ICSE 18

One of the final steps in producing a new version of a software tool is to make sure the old functionality was not lost when the new functionality was added. A common approach to this problem is regression testing, that is, running the test cases used for...
Testing And Debugging (D.2.5) | May 20 20

Automated classification of software bug reports : ICICM 19

Software developers use the information from software bug reports to correct software defects and enhance software. However, it is difficult for software developers to manually inspect and analyze a “large number...
Software Quality Assurance (SQA) (D.2.9...) | Jun 9 20

General Literature (A)

F. A. Hayek: economics, political economy and social philosophy

Understanding and modeling complex phenomena, including businesses, requires abstraction: “the process of suppressing irrelevant detail to establish a simplified model, or the result of that of that process" [1]...
Biographies/Autobiographies (A.0...) | Jul 13 20

Hardware (B)

Design of low power integrated radios for emerging standards

Low power radios are in high demand for use in Internet of Things (IoT) devices, where there is a need for small, efficient, and low powered radios for wireless data communications. This book is part of Springer’s...
General (B.0) | Jul 10 20

Computer Systems Organization (C)

Computer and communication networks (2nd ed.)

In every technological field characterized by very fast changes, it is necessary to update the related textbooks with the progress of research and practice. Obviously, this statement refers also to networking, where rapid reactions to book contents are also necessary...
Data Communications (C.2.0...) | Jul 7 20

Pro Azure governance and security

The pervasiveness of cloud technologies and the increasing popularity of Microsoft Azure make this book quite interesting for practicing software enthusiasts. Chapter 1 lays out the necessary governance needed in organizations to migrate to a cloud-based...
Security & Protection (C.2.0...) | May 26 20

The art of high performance computing for computational science, vol. 1

This is the book I wish I had owned when I started supporting computational scientists a few years ago. It is revised and updated from a Japanese volume based on computational science lectures broadcast to a number of...
Performance of Systems (C.4) | May 12 20

Software (D)

Practical Flutter

One of the reasons a business may develop an application for mobile devices is for its branding and digital presence. In today’s market, that requires making the application available for both Android and iOS. The traditional way to accomplish this is to develop two separate...
Object-Oriented Design Methods (D.2.2...) | Jul 27 20

Formal methods: an appetizer

I’ve occasionally been intimidated into ordering an appetizer as the main course, but have rarely regretted it thanks to the presence of “gourmet” friends. This is an excellent, ultra-elegant, and rigorous book. Its 160 printed pages are to be used together with its...
Formal Methods (D.2.4...) | Apr 23 20

Formal languages and compilation (3rd ed.)

Compiler construction literature has always been an interesting mixture of clever tricks and deep theory. Most textbooks try to deal with both aspects, usually emphasizing theory at the beginning and then moving on to the tricks necessary to support specific...
Compilers (D.3.4...) | Jun 19 20

Beginning security with Microsoft technologies

This book is written for a very specific audience. If you are a junior technical person (say a programmer, systems administrator, or even an entry-level security specialist) in an organization running Office 365, Windows 10, and Azure web services, and you...
Security & Protection (D.4.6) | Apr 24 20

Trustworthy cyber-physical systems

Users expect a trustworthy system to behave according to its requirements. Trustworthiness is a fundamental design objective for any system that provides critical functions, for example, transportation systems, medical systems, and water purification. Typically, these...
Real-Time & Embedded Systems (D.4.7...) | Jul 1 20

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2020 ThinkLoud, Inc.
Terms of Use
| Privacy Policy