Computer Systems Organization (C)
The rise of serverless computing
: Communications of the ACM
In spite of a somewhat confusing introduction--“the server is dead, long live the server”--this informative article gives an overview of the relatively new phenomenon of serverless computing. It...
General (C.0) | Aug 3 20
AndroZoo: collecting millions of Android apps for the research community
: MSR 16
This is basically a data collection paper. How did the authors collect more than three million free Android apps (more than 20 terabytes)? The answer: it’s somewhat more delicate than one might...
Mobile Processors (C.1.4...) | Aug 5 20
Performance analysis of linear receivers for uplink massive MIMO FBMC-OQAM systems
: IEEE Transactions on Signal Processing
Progressive improvements have been made to the FBMC-OQAM signaling, for example, many theoretical discussions and achievements...
Signal Processing Systems (C.3...) | Aug 4 20
Engineering resilient collective adaptive systems by self-stabilisation
: ACM Transactions on Modeling and Computer Simulation
Smart cities, together with the Internet of Things (IoT), are becoming reality at an accelerated speed, supported by the fifth generation of...
Software Engineering (D.2) | Jul 8 20
Hospitality of chatbot building platforms
: SQUADE 19
Chatbots provide for natural language computer conversations, popularized with personal voice assistants like Siri and Alexa. Suitable architecture frameworks for building chatbots are reframed...
General (D.2.0) | Jul 9 20
A systematic literature review on intelligent user interfaces
: IHM 19
Designers of user interfaces often face a fundamental dilemma: how much of the underlying functionality of the system should they expose to the user? An experienced user may want direct access to...
User Interfaces (D.2.2...) | May 14 20
Metamorphic testing: a review of challenges and opportunities
: ACM Computing Surveys
Testing software remains a complex business, so finding different means for doing so is important. Metamorphic testing belongs in one’s toolkit, along with unit tests and property-based testing. Thus, overviews are...
Validation (D.2.4...) | Jun 2 20
Keeping master green at scale
: EuroSys 19
Huge monolithic repositories, also known as monorepos, are popular in leading technology companies such as Microsoft, Google, and Facebook. They support continuous integration, merging all the...
Testing And Debugging (D.2.5) | Jun 15 20
DeFlaker: automatically detecting flaky tests
: ICSE 18
One of the final steps in producing a new version of a software tool is to make sure the old functionality was not lost when the new functionality was added. A common approach to this problem is regression testing, that is, running the test cases used for...
Testing And Debugging (D.2.5) | May 20 20
Automated classification of software bug reports
: ICICM 19
Software developers use the information from software bug reports to correct software defects and enhance software. However, it is difficult for software developers to manually inspect and analyze a “large number...
Software Quality Assurance (SQA) (D.2.9...) | Jun 9 20
General Literature (A)
F. A. Hayek: economics, political economy and social philosophy
Understanding and modeling complex phenomena, including businesses, requires abstraction: “the process of suppressing irrelevant detail to establish a simplified model, or the result of that of that process" ...
Biographies/Autobiographies (A.0...) | Jul 13 20
Design of low power integrated radios for emerging standards
Low power radios are in high demand for use in Internet of Things (IoT) devices, where there is a need for small, efficient, and low powered radios for wireless data communications. This book is part of Springer’s...
General (B.0) | Jul 10 20
Computer Systems Organization (C)
Computer and communication networks (2nd ed.)
In every technological field characterized by very fast changes, it is necessary to update the related textbooks with the progress of research and practice. Obviously, this statement refers also to networking, where rapid reactions to book contents are also necessary...
Data Communications (C.2.0...) | Jul 7 20
Pro Azure governance and security
The pervasiveness of cloud technologies and the increasing popularity of Microsoft Azure make this book quite interesting for practicing software enthusiasts.
Chapter 1 lays out the necessary governance needed in organizations to migrate to a cloud-based...
Security & Protection (C.2.0...) | May 26 20
The art of high performance computing for computational science, vol. 1
This is the book I wish I had owned when I started supporting computational scientists a few years ago. It is revised and updated from a Japanese volume based on computational science lectures broadcast to a number of...
Performance of Systems (C.4) | May 12 20
One of the reasons a business may develop an application for mobile devices is for its branding and digital presence. In today’s market, that requires making the application available for both Android and iOS. The traditional way to accomplish this is to develop two separate...
Object-Oriented Design Methods (D.2.2...) | Jul 27 20
Formal methods: an appetizer
I’ve occasionally been intimidated into ordering an appetizer as the main course, but have rarely regretted it thanks to the presence of “gourmet” friends. This is an excellent, ultra-elegant, and rigorous book. Its 160 printed pages are to be used together with its...
Formal Methods (D.2.4...) | Apr 23 20
Formal languages and compilation (3rd ed.)
Compiler construction literature has always been an interesting mixture of clever tricks and deep theory. Most textbooks try to deal with both aspects, usually emphasizing theory at the beginning and then moving on to the tricks necessary to support specific...
Compilers (D.3.4...) | Jun 19 20
Beginning security with Microsoft technologies
This book is written for a very specific audience. If you are a junior technical person (say a programmer, systems administrator, or even an entry-level security specialist) in an organization running Office 365, Windows 10, and Azure web services, and you...
Security & Protection (D.4.6) | Apr 24 20
Trustworthy cyber-physical systems
Users expect a trustworthy system to behave according to its requirements. Trustworthiness is a fundamental design objective for any system that provides critical functions, for example, transportation systems, medical systems, and water purification. Typically, these...
Real-Time & Embedded Systems (D.4.7...) | Jul 1 20