 |
Hardware (B)
Fifty years of P vs. NP and the possibility of the impossible
: Communications of the ACM

The P versus NP problem is one of the most fundamental and well-known unresolved questions in computer science. In comparison with the 2009 Communications article by the same...
Algorithms (B.2.4...) | Jun 27 22

A review on virtual reality and augmented reality use-cases of brain computer interface based applications for smart cities
: Microprocessors & Microsystems

Current computing and user interface technologies permit increasingly direct connections between the human brain and computers. The technologies include various types of displays, such as traditional...
Input/Output Devices (B.4.2) | Feb 2 23

Computer Systems Organization (C)
One-hop out-of-band control planes for multi-hop wireless sensor networks
: ACM Transactions on Sensor Networks

Wireless sensor networks (WSNs) have expanded in the last decade. Sensors are deployed in an environment to control the data generated within that area, without any wiring. Data is sensed by the deployed devices...
General (C.0) | Jan 26 23

Securing communication data in pervasive social networking based on trust with KP-ABE
: ACM Transactions on Cyber-Physical Systems

This paper looks at the crucial issues of security, user privacy, and communication integrity, inherent to the pervasive social networking (PSN) (a cyber-physical social system for nearby...
General (C.2.0) | Apr 28 22

AI-based computer vision using deep learning in 6G wireless networks
: Computers and Electrical Engineering

The development of sixth-generation (6G) wireless networks is expected to revolutionize the way we use the Internet and handle data. This new network will offer faster speeds, better security, and...
Wireless Communication (C.2.1...) | Mar 22 23

TSLAM: A trust-enabled self-learning agent model for service matching in the cloud market
: ACM Transactions on Autonomous and Adaptive Systems

Cloud services and cloud computing in general have experienced explosive growth. Undoubtedly it is easier for users, even sophisticated ones, to leave the...
Cloud Computing (C.2.4...) | Feb 15 22

Data storage auditing service in cloud computing
: World Wide Web

Cloud computing provides a convenient, scalable, and cost-effective data storage solution that is particularly attractive to small organizations who lack internal information technology (IT) resources. However, this new solution also...
Cloud Computing (C.2.4...) | Feb 7 22

Software (D)
SARDE: a framework for continuous and self-adaptive resource demand estimation
: ACM Transactions on Autonomous and Adaptive Systems

Reliable performance estimation of complex software systems requires models that are adaptable to the system’s environment and workload. Grohmann...
General (D.0) | Apr 6 22

On the model of computation: counterpoint: parallel programming wall and multicore software spiral: denial hence crisis
: Communications of the ACM

Vishkin’s counterpoint to Dally [1] talks about what the model of computation should now be in light of multicore processors (and their programming difficulties) and parallel processing...
General (D.1.0) | Jan 24 23

On the model of computation: point: we must extend our model of computation to account for cost and location
: Communications of the ACM

The model of any process demonstrates its functionality and is useful for its study and analysis. For example, the Turing machine is a model for computation. However, the random-access machine (RAM) model is...
General (D.1.0) | Jan 23 23

|
|
Computer Systems Organization (C)
5G wireless: a comprehensive introduction

The tremendous growth of mobile technology from first generation (1G) to fifth generation (5G) includes the development of mobile networks, user interfaces, and real-time implementation. The COVID-19 pandemic of the last couple years highlighted an immediate...
Security & Protection (C.2.0...) | Sep 20 22

Software (D)
Clean craftsmanship: disciplines, standards, and ethics

At first, computer programming was reserved for highly skilled people. Over the decades, programming languages have become more and more user friendly, making them accessible to more people. Nowadays, several countries around the world are...
General (D.0) | Sep 21 22

Sustainable design: HCI, usability and environmental concerns (2nd ed.)

In the context of this book, sustainability refers to software that supports the creation of a healthy environment and energy efficiency. Very early on in the book, the authors make the point that...
General (D.0) | Sep 14 22

The language of SQL

Structured query language (SQL) allows programmers to interact with a data repository through a relational database management system (RDBMS). The language of SQL is divided into 20 easy chapters. It also includes three appendices about installing and running...
General (D.3.0) | Dec 23 22

Numerical methods using Java: for data science, analysis, and engineering

It is fairly safe to say that most scientific, mathematical, and engineering software has been written in Fortran or C/C++. Libraries of software implementing algorithms have been written and distributed in these languages. The “Numerical Recipes” series by Press et al...
Java (D.3.2...) | Dec 6 22

Embracing modern C++ safely

Embracing modern C++ safely is for professionals involved in large-scale projects using the C++ programming language. It describes various safe, conditionally safe, and unsafe features in C++11 and C++14. Each feature covered includes...
C++ (D.3.2...) | Oct 3 22

Functional interfaces in Java: fundamentals and examples

Functional programming is a programming paradigm that emphasizes the use of functions to break down a problem into subtasks. Everything is done with functions, and the building blocks are just functions. This is in contrast to other paradigms, such as...
Java (D.3.2...) | Sep 27 22

Data (E)
On the epistemology of data science: conceptual tools for a new inductivism

This book discusses the fundamental theory of data science, including its methods, validity, and scope. The author introduces and addresses key concepts of data science as an inductive methodology, in an appropriate order, in order to guide scientists and...
General (E.0) | Feb 7 23

Social big data analytics: practices, techniques, and applications

Thanks to the advances in wireless sensor communication, large-scale storage, and computing technologies, those who can afford to be in one or more of the available platforms--the Internet, WhatsApp, or Twitter, to name a few--are connected directly (or at most...
General (E.0) | Nov 8 22

Discovery of ill-known motifs in time series data

Today, as we are drowning in data, we desperately need bits of dry land where we can climb out of the information ocean and gain useful perspectives. The book under review provides one such vantage point, and anyone whose work involves finding patterns in...
Coding & Information Theory (E.4) | Oct 11 22

|

|