








Consider a future device for individual use, which is a sort of mechanized private file and library, memex, in which an individual stores all his books, records, and communications, and which... more 

 Vannevar Bush (1945) 









Melia: a MapReduce framework on OpenCLbased FPGAs: IEEE Trans. on Parallel and Distributed Systems
Many web applications such as search engines and recommendation systems require operations on large datasets. The nature of computation in such applications is complex, which necessitates distributed... more
Gate Arrays (B.7.1...)  May 24 17
Counting and generating permutations in regular classes: Algorithmica
The signature of a permutation can be described in terms of two symbols that represent ascent and descent in the ordering of the elements. For each regular language (that... more
Permutations & Combinations (G.2.1...)  May 19 17
A GPUbased branchandbound algorithm using IntegerVectorMatrix data structure: Parallel Computing
Gmys et al. address the parallelization of the popular branchandbound (B&B) algorithm for solving combinatorial optimization problems using graphics processing units (GPUs)... more
Combinatorial Algorithms (G.2.1...)  May 17 17
Mobile demand profiling for cellular cognitive networking: IEEE Transactions on Mobile Computing
Furno et al. describe a framework for automated demand profiling in mobile networks. Since participants in mobile communications can move around, both spatial as well as temporal characteristics of... more
Cellular Architecture (C.1.3...)  May 16 17
The AXIOM software layers: Microprocessors & Microsystems
AXIOM is a project aimed at building a hardware substrate and software layers to target cyberphysical systems (CPS) that interact with users in realtime running... more
Heterogeneous (Hybrid) Systems (C.1.3...)  May 15 17
Encode when necessary: correlated network coding under unreliable wireless links: ACM Transactions on Sensor Networks
The broadcast nature of wireless communication is the reason for interference. Interference is one of the factors in the attenuation of effective power... more
Network Protocols (C.2.2)  May 12 17
Efficient memorymapped I/O on fast storage device: ACM Transactions on Storage
Dataintensive applications tend to use a large quantity of dynamic randomaccess memory (DRAM) using DRAM caching. This is relatively expensive, but using insufficient DRAM can lead to paging some... more
Storage Management (D.4.2)  May 12 17
Ringshaped hotspot detection: IEEE Transactions on Knowledge and Data Engineering
What is the best way to search for an annular object? Such problems arise in situations as diverse as meteorite craters and the spread of infections... more
Algorithm Design & Analysis (G.4...)  May 12 17
Softwaredefined mobile networks security: Mobile Networks and Applications
The tremendous success of mobile devices and their applications raises a lot of questions regarding security, quality of service, and user satisfaction. It is therefore... more
Mobile Processors (C.1.4...)  May 12 17
Scalability of broadcast performance in wireless networkonchip: IEEE Transactions on Parallel and Distributed Systems
This paper analyzes the limitations of traditional networkonachip (NoC or NOC) architectures and proposes a modified architectural paradigm... more
Wireless Communication (C.2.1...)  May 11 17









The science of managing our digital stuff
Written by two leading experts in the field, The science of managing our digital stuff is a very wellcrafted book covering a wide range of work on how people store, organize, and use personal information in digital form. The... more
Multimedia Information Systems (H.5.1)  May 25 17
Evolution of broadcast content distribution
In approximately 125 pages, the author discusses the unfolding broadcast distribution ecosystem. Anyone concerned with how to distribute content with new networks, regulations, consumer expectations, and technologies will want this information. The... more
Distributed Systems (C.2.4)  May 25 17
Music through Fourier space: discrete Fourier transform in music theory
Discrete Fourier transform (DFT) has emerged as a powerful and popular tool in mathematical music theory. Amiot’s nice book gives the state of the art in the usage of DFT of abstract musical... more
Sound & Music Computing (H.5.5)  May 25 17
Ada’s legacy: cultures of computing from the Victorian to the digital age
A record and celebration of a 2013 conference exploring the legacy of Augusta Ada Lovelace, this collection of 12 chapters includes Lovelace’s published writing on Charles Babbage’s analytical engine (AE), called... more
Ada Lovelace (K.2...)  May 25 17
Sams teach yourself R in 24 hours
Sams teach yourself R in 24 hours is an operating system (OS)agnostic book. R and the recommended graphical user interface, RStudio, can be run on Windows, Macintosh, and Linux computers. R is a statistical programming language that... more
Mathematical Software (G.4)  May 25 17
Recent contributions in intelligent systems
This is a collection of the best papers from the 2012 IEEE Intelligent Systems Conference, which was held in Sofia, Bulgaria in September 2012. The average length of the papers in this volume is 20... more
Applications & Expert Systems (I.2.1)  May 25 17
Signals and systems: a primer with MATLAB
Signals are physical manifestations of underlying processes or phenomena. The evolution of a physical process is captured in the form of a signal, which is mathematically represented as a function... more
MATLAB (G.4...)  May 25 17
Secure data deletion
Securely deleting data is a problem in more than just the digital spherefor example, we are encouraged to shred paper documents with sensitive information. But how secure is shredding? The Defense Advanced Research... more
Security & Protection (K.6.5)  May 24 17
The art of scrum: how scrum masters bind dev teams and unleash agility
Scrum is a widely used approach for the agile development of software systems. A scrum master plays a key role by coaching, facilitating, and orchestrating the ceremonies and artifacts of the scrum... more
Management (D.2.9)  May 24 17
Mathematical analysis and the mathematics of computation
Even though there are many deep connections between mathematical analysis and the mathematics of computation, these two fields are usually taught completely separately from each other. This traditional approach has the disadvantage that... more
General (G.0)  May 24 17





