Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
View:  Show:    
 
 

Hardware (B)
Compiling with continuations, or without? Whatever. : Proceedings of the ACM on Programming Languages

The front end of a compiler analyzes a computer program’s source code and parses it into an intermediate representation (IR). The back end then takes this IR and translates it into machine code...
General (B.0) | Dec 16 20


Computer Systems Organization (C)
Detection of crop pests and diseases based on deep convolutional neural network and improved algorithm : ICMLT 19

Especially in large monoculture-based agricultural settings, an outbreak of pests or diseases can have a major impact on yield or quality of a crop. Advances in image processing based on convolutional...
Neural Nets (C.1.3...) | Sep 29 20

Joint online coflow routing and scheduling in data center networks : IEEE/ACM Transactions on Networking

With the proliferation of big data initiatives across corporations and academia, the importance of distributed computing frameworks has created many research opportunities related to routing and...
Network Architecture & Design (C.2.1) | Sep 3 20

Scratchpad-memory management for multi-threaded applications on many-core architectures : ACM Transactions on Embedded Computing Systems

This paper focuses on improving many-core architectures via software programmable or scratchpad memory (SPM): An SPM contains an array of...
Real-Time And Embedded Systems (C.3...) | Oct 7 20


Software (D)
A predicate transformer semantics for effects (functional pearl) : Proceedings of the ACM on Programming Languages

Proving properties of imperative programs with side effects is quite arduous. Purely functional code, on the other hand, has a relatively pleasant equational theory that enables reasonable proofs. Is it possible...
General (D.2.0) | Jan 20 21

Testing extended finite state machines using NSGA-III : A-TEST 19

The goal of the paper is to describe how the non-dominated sorting genetic algorithm III (NSGA-III) algorithm generates test suites from extended finite-state machines (EFSMs). Each generated test...
General (D.2.0) | Nov 19 20

RML: runtime monitoring language: a system-agnostic DSL for runtime verification : Programming 19

This paper on the runtime monitoring language (RML) is a very brief look at a system-agnostic domain-specific language (DSL) for runtime verification. This language is system agnostic due to its use of JavaScript...
General (D.2.0) | Nov 18 20

A study examining relationships between micro patterns and security vulnerabilities : Software Quality Journal

Do you have an unlimited budget for code review and testing? Or can you ignore security vulnerabilities in the code? If not, you might be interested in this novel way of allocating code...
General (D.2.0) | Nov 5 20

Blockchain technology: What is it good for? : Communications of the ACM

Cryptocurrency has been the origin of an evolution in financial and monetary relations the world over, and its domain of influence continues to spread. Bitcoin is its well-known symbol. In addition to security, trust...
General (D.2.0) | Sep 28 20

SparseX: a library for high-performance sparse matrix-vector multiplication on multicore platforms : ACM Transactions on Mathematical Software

The treatment of many scientific and engineering problems leads nearly always to huge computational tasks, which can cause...
Software Libraries (D.2.2...) | Sep 14 20


Hardware (B)

Mastering frequency domain techniques for the stability analysis of LTI time delay systems

Time delay systems are ubiquitous. They are found in controllers of all sorts, where information from sensors may undergo a delay (perhaps computational) before being...
General (B.0) | Jan 8 21

The hardware hacker

Andrew “bunnie” Huang was Chumby’s lead hardware engineer for its WiFi-equipped embedded computer device, chumby, which premiered in 2006. He was charged with the task of traveling from the US to Shenzhen, and figuring how to build a supply chain for the device. This...
General (B.0) | Nov 17 20


Computer Systems Organization (C)

Guide to automotive connectivity and cybersecurity

Information technology (IT) specialists are very involved in vehicle design and maintenance. The technologies that support modern engine monitoring, navigation, driver information, and safety systems would be...
General (C.0) | Oct 9 20

Essentials of cloud computing

Why do we need cloud computing? What are the core components of cloud computing architecture and its technological foundations? What is the impact of virtualization and multitenancy on cloud security? What is the best way to migrate to cloud computing?...
Distributed Architectures (C.1.4...) | Oct 6 20

5G enabled secure wireless networks

Wireless 5G networks are widely deployed and, compared to previous generations, carry vastly augmented data flows with low latency. Thus, their security and privacy aspects warrant special attention [1], even if a vast number of standards have...
Security and Protection (C.2.0...) | Jan 15 21

Big data privacy preservation for cyber-physical systems

This monograph gives an introduction to cyber-physical systems (CPS). These are systems that are controlled by computers and influence objects in the physical world. Areas discussed include spectrum trading (where...
Security & Protection (C.2.0...) | Nov 11 20

Secure sensor cloud

This interesting book provides an introduction to, and overview of, some of the basic principles and security threats within the domain of secure cloud architecture. The utilization and discussion of wireless sensor network (WSN) attacks provide and an inside look for...
Cloud Computing (C.2.4...) | Dec 21 20

Embedded software for the IoT (3rd ed.)

An in-depth study of embedded software for the Internet of Things (IoT), this book explains various topics, from selecting an operating system (OS) to code maintenance. Due to the resource-constrained nature of IoT, it is always a challenge to utilize central...
Real-Time & Embedded Systems (C.3...) | Nov 30 20


Software (D)

Introduction to logic programming

Some time ago, our (then) teenage daughter used to exclaim, “Get with the ’80s!” whenever my wife and I imposed an eminently reasonable restriction. The very loose, perhaps reverse analogy here is that a computing professional has not yet “gotten with the...
Logic Programming (D.1.6) | Dec 15 20

Automotive systems and software engineering

From their web profiles: “Yanja Dajsuren is a program director of the PDEng Software Technology program and assistant professor at the Software Engineering and Technology (SET) group, Eindhoven University of Technology...
Software Engineering (D.2) | Nov 4 20

   
Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2021 ThinkLoud, Inc.
Terms of Use
| Privacy Policy