Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
View:  Show:    
 
 

General Literature (A)
A survey of tool-supported assurance case assessment techniques : ACM Computing Surveys

Assurance case assessment techniques find application in the study of complex system reliability and safety, for example, nuclear reactors, energy systems, aircraft, and so on. As the authors state, "significant research...
Introductory And Survey (A.1) | Mar 1 21


Hardware (B)
Compiling with continuations, or without? Whatever. : Proceedings of the ACM on Programming Languages

The front end of a compiler analyzes a computer program’s source code and parses it into an intermediate representation (IR). The back end then takes this IR and translates it into machine code...
General (B.0) | Dec 16 20


Computer Systems Organization (C)
Orchestrating big data analysis workflows in the cloud : ACM Computing Surveys

When processing different big data workflows, many new and (so far) unknown patterns and performance requirements are visible. We are forced to search new processing models and...
Cloud Computing (C.2.4...) | Mar 2 21


Software (D)
Tapir: embedding recursive fork-join parallelism into LLVM’s intermediate representation : ACM Transactions on Parallel Computing

A typical compiler has a front end that analyzes the source text and converts it to a language-independent IR whose structure and operations support...
Parallel Programming (D.1.3...) | Feb 22 21

Self-awareness in software engineering: a systematic literature review : ACM Transactions on Autonomous and Adaptive Systems

As researchers in the field of distributed software systems, the authors feel as though software self-awareness is becoming more and more...
General (D.2.0) | Jan 29 21

A systematic review on cloud testing : ACM Computing Surveys

In this survey paper, using over 150 selected articles between 2012 and 2017, the authors develop a framework to classify cloud testing research and to identify research trends and gaps in this area. The authors define six primary motivating...
General (D.2.0) | Jan 28 21

A predicate transformer semantics for effects (functional pearl) : Proceedings of the ACM on Programming Languages

Proving properties of imperative programs with side effects is quite arduous. Purely functional code, on the other hand, has a relatively pleasant equational...
General (D.2.0) | Jan 20 21

Testing extended finite state machines using NSGA-III : A-TEST 19

The goal of the paper is to describe how the non-dominated sorting genetic algorithm III (NSGA-III) algorithm generates test suites from extended finite-state machines (EFSMs). Each generated test...
General (D.2.0) | Nov 19 20

RML: runtime monitoring language: a system-agnostic DSL for runtime verification : Programming 19

This paper on the runtime monitoring language (RML) is a very brief look at a system-agnostic domain-specific language (DSL) for runtime verification. This language is system agnostic due to its use of JavaScript...
General (D.2.0) | Nov 18 20

A study examining relationships between micro patterns and security vulnerabilities : Software Quality Journal

Do you have an unlimited budget for code review and testing? Or can you ignore security vulnerabilities in the code? If not, you might be interested in this novel way of allocating code...
General (D.2.0) | Nov 5 20


General Literature (A)

Diversity in visualization

Diversity in visualization is a small book, spanning 88 pages (nine chapters plus references and editor/author bios). Yet it is very surprising, in a very good sense. The book is the result of "observations ... based on the analysis of data about the IEEE VIS family of...
General (A.0) | Feb 26 21


Hardware (B)

Mastering frequency domain techniques for the stability analysis of LTI time delay systems

Time delay systems are ubiquitous. They are found in controllers of all sorts, where information from sensors may undergo a delay (perhaps computational) before being used as control inputs. Some systems...
General (B.0) | Jan 8 21


Computer Systems Organization (C)

5G enabled secure wireless networks

Wireless 5G networks are widely deployed and, compared to previous generations, carry vastly augmented data flows with low latency. Thus, their security and privacy aspects warrant special attention [1], even if a vast number of standards have...
Security & Protection (C.2.0...) | Jan 15 21

Secure sensor cloud

This interesting book provides an introduction to, and overview of, some of the basic principles and security threats within the domain of secure cloud architecture. The utilization and discussion of wireless sensor network (WSN) attacks provide and an inside look for...
Cloud Computing (C.2.4...) | Dec 21 20

Embedded software for the IoT (3rd ed.)

An in-depth study of embedded software for the Internet of Things (IoT), this book explains various topics, from selecting an operating system (OS) to code maintenance. Due to the resource-constrained nature of IoT, it is always a challenge to utilize central...
Real-Time & Embedded Systems (C.3...) | Nov 30 20


Software (D)

Introduction to logic programming

Some time ago, our (then) teenage daughter used to exclaim, “Get with the ’80s!” whenever my wife and I imposed an eminently reasonable restriction. The very loose, perhaps reverse analogy here is that a computing professional has not yet “gotten with the...
Logic Programming (D.1.6) | Dec 15 20

iOS programming

iOS (iPhone OS) is Apple’s operating system for the iPhone and iPod Touch and, until 2019, the iPad. It is the second most used mobile operating system in the world after Android. On the other hand, Swift is a modern programming language that Apple introduced in...
General (D.2.0) | Dec 28 20

Software engineering in the era of cloud computing

This book attempts to present a state-of-the-art view of “software engineering in the era of cloud computing.” The claimed audience includes researchers, practitioners, and students. The title is ambiguous; it could mean how to use software engineering for...
General (D.2.0) | Dec 17 20

Reflections on programming systems

The book’s ten chapters may remind readers that the essential state of affairs in programming systems has not substantially changed since the early 1960s. Chapter 1--an overview of what follows--starts with a relatively familiar epigraph, published in 1968: “Today we...
Software Architectures (D.2.11) | Jan 21 21

Foundations of information security: a straightforward introduction

Like the subtitle suggests, this book is a gentle introduction to the subject of information security. It doesn’t assume any special background from the reader other than an understanding of the basic...
Cryptographic Controls (D.4.6...) | Feb 2 21

   
Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2021 ThinkLoud, Inc.
Terms of Use
| Privacy Policy