Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Iyer, Shyamkumar
Round Rock, Texas
   Reviewer Selected
Follow this Reviewer
Date Reviewed  
- 8 of 8 reviews

  Resource characterisation of personal-scale sensing models on edge accelerators
Antonini M., Vu T., Min C., Montanari A., Mathur A., Kawsar F.  AIChallengeIoT 2019 (Proceedings of the First International Workshop onChallenges in Artificial Intelligence and Machine Learning for Internet of Things, New York, NY,  Nov 10-13, 2019) 49-55, 2019. Type: Proceedings

Edge computing is going through an exciting phase where several chip vendors are looking to infiltrate the ecosystem with accelerators. As compute requirements at the edge increase, choosing the right compute architecture coupled with a suitable a...

Aug 18 2021  
  Walling up backdoors in intrusion detection systems
Bachl M., Hartl A., Fabini J., Zseby T.  Big-DAMA 2019 (Proceedings of the 3rd ACM CoNEXT Workshop on Big DAta, Machine Learning and Artificial Intelligence for Data Communication Networks, Orlando, FL,  Dec 9, 2019) 8-13, 2019. Type: Proceedings

Intrusion detection systems (IDSs) detect anomalies in a network. However, backdoors instated for profit, political gain, and/or other reasons can be hard to detect and may introduce security vulnerabilities....

Feb 4 2021  
  Automata processing in reconfigurable architectures: in-the-cloud deployment, cross-platform evaluation, and fast symbol-only reconfiguration
Bo C., Dang V., Xie T., Wadden J., Stan M., Skadron K.  ACM Transactions on Reconfigurable Technology and Systems 12(2): 1-25, 2019. Type: Article

In this new world of heterogeneous computing, automata processing has seen renewed interest with the advent of new workloads like machine learning, gene sequence matching, and other established disciplines like compiler design. This paper makes a ...

Oct 18 2019  
  EmerGence: a delay tolerant web application for disaster relief
Paul U., Nekrasov M., Belding E.  HotMobile 2019 (Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications, Santa Cruz, CA,  Feb 27-28, 2019) 167-167, 2019. Type: Proceedings

Providing communication services in disaster-affected areas is important. The authors introduce an app for such situations that runs on the back of networks powered by unmanned aircraft systems (drones). Such a system is designed to tolerate long ...

Jun 19 2019  
   Fast miss ratio curve modeling for storage cache
Hu X., Wang X., Zhou L., Luo Y., Wang Z., Ding C., Ye C.  ACM Transactions on Storage 14(2): 1-34, 2018. Type: Article

Miss ratio curve (MRC) profiling techniques are widely used for memory, cache analysis, and design. As noted by the authors, uses include cache partitioning, page size selection, memory management, memory cache prediction, and so on. Thus, MRC pro...

Dec 24 2018  
   VIRTIO-USER: a new versatile channel for kernel-bypass networks
Tan J., Liang C., Xie H., Xu Q., Hu J., Zhu H., Liu Y.  KBNets 2017 (Proceedings of the Workshop on Kernel-Bypass Networks, Los Angeles, CA,  Aug 21, 2017) 13-18, 2017. Type: Proceedings

VIRTIO-USER is a userspace-based channel to facilitate container applications to benefit from kernel-bypass technologies. The authors explain that container networking or operating system (OS) virtualization technologies have historically not been...

Sep 19 2018  
  6LB: scalable and application-aware load balancing with segment routing
Townsley M., Clausen T., Tollet J., Pfister P., Desmouceaux Y.  IEEE/ACM Transactions on Networking 26(2): 819-834, 2018. Type: Article

Most network load balancers do not take the application state into account when making a load balancing decision. They often need a centralized orchestrator to help monitor the overall system. In other environments, load balancer functions are int...

Aug 21 2018  
  Analytical methods for network congestion control
Low S.,  Morgan & Claypool Publishers, San Rafael, CA, 2017. 214 pp. Type: Book (978-1-627057-33-2)

This is one of the most comprehensive books I have read recently, and it is a must-read for a serious network designer. This book uses a step-by-step approach to build a mathematical model to understand, design, and fix network congestion. This bo...

May 3 2018  
Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2021 ThinkLoud, Inc.
Terms of Use
| Privacy Policy