Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
View:  Show:    

General Literature (A)
A survey on gait recognition : ACM Computing Surveys

Gait recognition is a biometric method that uses sensor data to recognize people based on body shape and walking styles. Gait data is acquired from video images, inertial sensors, or sensors in the environment. The possible...
Introductory & Survey (A.1) | Jun 8 21

Hardware (B)
SOD: making smartphone smart on demand with radio interface management : ACM Transactions on Autonomous and Adaptive Systems

Smartphone batteries don’t last as long as they used to. Why? Applications consume a lot of energy. However, the authors show that, besides the display...
General (B.0) | Apr 20 21

iCanCloud : Journal of Grid Computing

Cloud computing is a flexible and scalable solution for delivering information technology (IT) services. However, as the processing power used must be paid for, accurately right-sizing the cloud resources for particular end user applications is important and can be expensive...
Simulation (B.1.2...) | Jul 26 21

Computer Systems Organization (C)
Dependable visual light-based indoor localization with automatic anomaly detection for location-based service of mobile cyber-physical systems : ACM Transactions on Cyber-Physical Systems

Indoor localization for mobile devices can employ beacons inserted in known positions...
General (C.0) | Jul 2 21

WoTbench: a benchmarking framework for the Web of Things : IoT 19

Since the beginning of the Internet of Things (IoT) concept, there has always been a deep belief that we are expecting a new paradigm in computer science and engineering. There are many new interesting...
General (C.0) | Jun 23 21

Lightweight and informative traffic metrics for data center monitoring : Journal of Network and Systems Management

Modern cloud computing data centers typically deliver virtualized services to tens of thousands of cloud users continuously, using hundreds...
General (C.2.0) | Aug 16 21

Securing and self recovery of virtual machines in cloud with an autonomic approach using snapshots : Mobile Networks and Applications

Virtual machines (VMs) in the form of cloud computing are now mainstream for the delivery of information technology (IT) services. However, the...
General (C.2.0) | Jun 17 21

Web portals for high-performance computing: a survey : ACM Transactions on the Web

High-performance computing (HPC) offers researchers the performance they need to solve complex problems. However, as these researchers are specialized in areas not related to HPC, web interfaces facilitate...
Cloud Computing (C.2.4...) | Sep 24 21

Resource characterisation of personal-scale sensing models on edge accelerators : AIChallengeIoT 19

Edge computing is going through an exciting phase where several chip vendors are looking to infiltrate the ecosystem with accelerators. As compute requirements at the edge increase, choosing the right compute architecture coupled with a...
Real-Time & Embedded Systems (C.3...) | Aug 18 21

Software (D)
Coding-data portability in systematic literature reviews: a W3C’s open annotation approach : EASE 19

Systematic literature reviews (SLRs) involve several steps: the planning step, which identifies the scope of literature according to the research goals, and develops a coding protocol; the analysis step, which...
Software Engineering (D.2) | Apr 9 21

General Literature (A)

Crypto dictionary

Why do we need a dictionary when we have the Internet? Dictionary: A worthless book now that the Internet exists. This Crypto dictionary entry might seem to indicate the author sees no need for his own work. But Crypto dictionary is not your run-of-the-mill...
Reference (A.2) | Aug 25 21

Hardware (B)

Design automation of cyber-physical systems

Cyber-physical systems (CPSs) combine the cyber principle of cognitive control systems with the physical elements of information perception and environmental impact, controlled or monitored with the help of computer-based algorithms. CPSs are used in an...
General (B.0) | Sep 17 21

Computer Systems Organization (C)

Computer networks and the Internet

Most people in the developed world routinely use the Internet, but only a small minority understands the technologies on which its services depend. Howser provides a detailed description of these technologies, supported by practical exercises using the...
General (C.2.0) | Aug 17 21

Software (D)


First, the good news: Pro TBB (threading building blocks, or TBB, now renamed oneTBB) is an invaluable book, written by three experts, on all facets of parallel programming that are available for free. Moreover, Intel’s oneAPI software tools, including oneTBB...
Parallel Programming (D.1.3...) | Jul 29 21

Software engineering for absolute beginners

This book’s audience is exactly as described in its title: “absolute beginners.” The content is appropriate for someone who has had some minimal programming experience, for example, classwork or playing around at home, and is ready for their first real project or...
General (D.2.0) | Jul 22 21

Designing with the mind in mind (3rd ed.)

This thoroughly engaging book offers explicit advice for the construction of user interfaces without involving one specification, development platform, or line of code. This is the third edition, but this review offers no...
User Interfaces (D.2.2...) | Sep 27 21

Funology 2 (2nd ed.)

This was an unusual book for me to review, far removed from my comfort zone of developer environments and programming languages. This book is purely about human-computer interaction (HCI). It consists of 35 distinct essays, averaging about 15 pages each...
User Interfaces (D.2.2...) | Aug 30 21

Data cleaning

Data cleaning provides an extensive literature review. It showcases the body of work that academia has produced over the last decades on the subject of data cleaning automation. Identifying and correcting dirty data by means of a computer is a task with...
Error Handling & Recovery (D.2.5...) | Aug 4 21

Understanding programming languages

This well-written textbook focuses on a precise description of programming language semantics in a relatively easily understood manner, utilizing a notation derived from a subset of the Vienna development method (VDM). The author motivates the...
General (D.3.0) | Jun 29 21

Exploring advanced features in C#: enhance your code and productivity

Words like “advanced” and “expert” are vague enough to be almost meaningless. It is not unreasonable to expect, however, that a book with the word “advanced” in the title will deliver more than a general...
C# (D.3.2...) | Sep 16 21

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2021 ThinkLoud, Inc.
Terms of Use
| Privacy Policy