Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Kayhani Pirdehi, Mohammad Sadegh
University of Oulu
Oulu, Finland
   Reader Recommended
   Reviewer Selected
Follow this Reviewer
Date Reviewed  
- 10 of 55 reviews

   Dynamic spectrum allocation with maximum efficiency and fairness in interactive cognitive radio networks
Ma Z., Wang H.  Wireless Personal Communications: An International Journal 64(2): 439-455, 2020. Type: Article

Cognitive radio is a promising technology to leverage the radio spectrum in a more effective way. The nature of the interactivities in cognitive radio network entities is of a manner that can be modeled by game theory ideas. In this regard, the au...

Aug 27 2021  
   Gradient algorithms for complex non-Gaussian independent component/vector extraction, question of convergence
Koldovský Z., Tichavský P.  IEEE Transactions on Signal Processing 67(4): 1050-1064, 2019. Type: Article

Blind source separation/extraction (BSS/BSE) methods are widely applicable, from wireless communication to cosmic explorations. They are subsets of blind signal processing, used in original source waveform estimation, without relying on transmissi...

May 13 2021  
  Smart dispatching in heterogeneous systems
Gardner K., Stephens C.  ACM SIGMETRICS Performance Evaluation Review 47(2): 12-14, 2019. Type: Article

For modern computing platforms, heterogeneous processing nodes are the reality. Moreover, most traditional job assignment algorithms, which are designed for homogeneous systems, are not efficient for heterogeneous platforms. For the sake of gainin...

Mar 31 2021  
   Scalable distributed semantic network for knowledge management in cyber physical system
Song S., Lin Y., Guo B., Di Q., Lv R.  Journal of Parallel and Distributed Computing 118(P1): 22-33, 2018. Type: Article

Knowledge extraction in cyber-physical systems (CPS) is a challenging task. Traditional methods are not efficient for this complicated task; an approach that exploits parallel and distributed computing methods while considering scalability is esse...

Dec 3 2020  
  Blockchain technology: What is it good for?
Ruoti S., Kaiser B., Yerukhimovich A., Clark J., Cunningham R.  Communications of the ACM 63(1): 46-53, 2019. Type: Article

Cryptocurrency has been the origin of an evolution in financial and monetary relations the world over, and its domain of influence continues to spread. Bitcoin is its well-known symbol. In addition to security, trust is a key criterion in these tr...

Sep 28 2020  
  Performance analysis of linear receivers for uplink massive MIMO FBMC-OQAM systems
Rottenberg F., Mestre X., Horlin F., Louveaux J.  IEEE Transactions on Signal Processing 66(3): 830-842, 2018. Type: Article

Progressive improvements have been made to the offset-quadratic-amplitude-modulation-based filter-bank multicarrier (FBMC-OQAM) signaling scheme, for example, many theoretical discussions and achievements surrounding its waveform structure, signal...

Aug 4 2020  
  Alias-free products of signals near Nyquist rate
Davis C., Lorenz K., Goodman J., Stantchev G., Boglione L., Nousain B.  IEEE Transactions on Signal Processing 66(16): 4151-4159, 2018. Type: Article

When the nonlinear, complicated behavior of natural phenomena and man-made artifacts cannot be modeled perfectly by one-dimensional modeling, multidimensional modeling can be an effective alternative. It is an emerging technique in digital signal ...

May 19 2020  
  Known and unknown facts of LoRa: experiences from a large-scale measurement study
Liando J., Gamage A., Tengourtius A., Li M.  ACM Transactions on Sensor Networks 15(2): 1-35, 2019. Type: Article

Proposal and critique are two steps in the evolution of scientific theories and ideas: an idea is founded in a proposal and advanced via critiques. In the Internet of Things (IOT), equilibrium among power consumption, coverage, and coexistence is ...

Feb 18 2020  
  Static identification of injection attacks in Java
Spoto F., Burato E., Ernst M., Ferrara P., Lovato A., Macedonio D., Spiridon C.  ACM Transactions on Programming Languages and Systems 41(3): 1-58, 2019. Type: Article

A programming language’s security principles guarantee robustness and sustainability by detecting and neutralizing any tainted object in the programming code, which can potentially be the source of any vulnerability during the operation and ...

Feb 6 2020  
   AODV routing protocol for cognitive radio access based Internet of Things (IoT)
Anamalamudi S., Sangi A., Alkatheiri M., Ahmed A.  Future Generation Computer Systems 83(C): 228-238, 2018. Type: Article

There has been tangible growth in the investigation of cognitive radio (CR) communication and networking over the past few years. Sharing and digital switchover (DSO) TV band technology and issuing regularities concerned with its utilization as th...

Feb 4 2020  
Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2021 ThinkLoud, Inc.
Terms of Use
| Privacy Policy