Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
View:  Show:    

General Literature (A)
The six pillars for building big data analytics ecosystems : ACM Computing Surveys

Big data analytics (BDA) encompasses a set of activities oriented toward the transformation of enormous amounts of raw data into meaningful insights, the discovery of hidden patterns, and the prediction...
Introductory & Survey (A.1) | Oct 5 16

Computational thinking : YouTube

This one-hour lecture by Grady Booch is a walk through history seen as an evolution toward computational thinking, which will culminate in a symbiotic relationship between people and computers/machines....
Introductory & Survey (A.1) | Oct 3 16

Hardware (B)
Area-energy tradeoffs of logic wear-leveling for BTI-induced aging : CF 16

As technology nodes are scaled down into the nanometer level, the reliability of the devices for an electronic chip becomes critical. Among various reliability threats, aging is one of the most...
Control Struct. Rel., Test. & Fault-Tol. (B.1.3) | Oct 4 16

Accelerating irregular computation in massive short reads mapping on FPGA co-processor : IEEE Transactions on Parallel and Distributed Systems

Next-generation sequencing (NGS) is a big data problem. On the one hand, it is embarrassingly parallel; on the other hand, the...
Design Styles (B.6.1) | Oct 4 16

Computer Systems Organization (C)
Out-of-band covert channels—a survey : ACM Computing Surveys

In recent years, covert channels were shifted back into the focus of research. These channels can be used to communicate in a stealthy way not recognizable by third parties. Typical application scenarios...
General (C.2.0) | Sep 30 16

Taking back control of privacy : International Journal of Information Security

Would you intentionally make your firewall leak packets that are supposed to be blocked? This paper presents an interesting argument for when this might be desired. When your firewall is hosted, the cloud service...
Security & Protection (C.2.0...) | Sep 12 16

Application of hierarchical and distributed cognitive architecture management for the smart grid : Ad Hoc Networks

Traditional cognitive radio architecture management aims at the reconfiguration of radio access based on the current radio channel...
Network Architecture & Design (C.2.1) | Oct 11 16

Self-healing wireless sensor networks : Concurrency & Computation: Practice & Experience

Miyaji and Omote, in this paper, explore the security of encrypted self-healing features for three different wireless sensor network (WSN) schemes designed to be deployed in hostile environments. In...
Sensor Networks (C.2.1...) | Oct 4 16

Soft computing-based localizations in wireless sensor networks : Pervasive and Mobile Computing

The world is transitioning to the 5G era. 5G involves more than simply upgrading to “better” radios in the network. The Internet of Things (IoT) is part of the biggest plans 5G has for...
Sensor Networks (C.2.1...) | Oct 3 16

Practical approximate k-nearest neighbor queries with location and query privacy : IEEE Transactions on Knowledge and Data Engineering

Location-based services (LBS) have been used as a Trojan horse to reveal users’ private data. Since they run on mobile applications, individuals can...
Wireless Communication (C.2.1...) | Sep 20 16

General Literature (A)

Scientific peer reviewing: practical hints and best practices

Peer reviewing is something we often learn by experience, though recently there has been an effort by many doctoral programs to provide guidance. This slim and straightforward volume may well help...
Miscellaneous (A.m) | Oct 5 16

Hardware (B)

Principles and methods of quantum information technologies

Quantum information technologies is the name given to theories and applications of the principles of quantum mechanics as applied to computation and information processing. The former uses the properties of quantum mechanical objects to implement algorithms...
Advanced Technologies (B.7.1...) | Sep 16 16

Computer Systems Organization (C)

Trust and communication in a digitized world: models and concepts of trust research

Trust is foundational for all interactions. While one might suppose that digital interactions are inherently disadvantaged in creating trust, the authors demonstrate that this stereotype may not...
Data Communications (C.2.0...) | Sep 20 16

Wireless sensor networks: concepts, applications, experimentation and analysis

A wireless sensor network (WSN) is a collection of self-organized sensor nodes. WSNs have been a popular research topic for a long time. With the advances in the Internet of Things, this research area...
Wireless Communication (C.2.1...) | Oct 4 16

Computer networks and Internets (6th ed.)

For many years, Comer’s book has been an excellent source for those who want to learn about or teach the fundamentals of networking. Obviously, this has not changed with the new updated edition. Being an overview of all the related techniques, from the...
Internet (C.2.1...) | Sep 29 16

Enterprise IoT: a definitive handbook

The Internet of Things (IoT), the idea of connecting everything using Internet protocols, is one of the most innovative visions across industries as well as daily life. A wide range of subjects, from tiny sensors to big data analysis, are related to IoT; it is not easy for...
Internet (C.2.1...) | Sep 20 16

Virtualized cloud data center networks: issues in resource management

The replacement of “real” information and communications technology infrastructure with cloud-based services perhaps reaches its pinnacle in the multitenant cloud data center. The value...
Distributed Systems (C.2.4) | Oct 20 16

Mobile cloud computing: architectures, algorithms and applications

Mobile cloud computing (MCC) is the combination of mobile computing and cloud computing. Mobile devices have low battery life and limited resources. MCC introduces offloading, where data storage and...
Distributed Systems (C.2.4) | Oct 18 16

Guide to security assurance for cloud computing

The title of this book is misleading; it is not a guide, but rather a collection of loosely related papers about cloud computing security. Some of the chapters have redundancies, each author has a...
Cloud Computing (C.2.4...) | Oct 11 16

Building Arduino projects for the Internet of Things: experiments with real-world applications

Arduino Uno or Yun platforms are fun, inexpensive, and great projects for the newbie maker. The question is often how to get started on something relatively simple, but that is also interesting and...
Real-Time & Embedded Systems (C.3...) | Oct 4 16

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2016 ThinkLoud, Inc.
Terms of Use
| Privacy Policy