Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
View:  Show:    

Hardware (B)
Analyzing worldwide research in hardware architecture, 1997-2011 : Communications of the ACM

This is a curious article. When asked to prepare a review, there was no abstract, so the assignment was a bit open ended. The article seemed to be of interest; any analysis of hardware architectures...
General (B.0) | Apr 1 15

A comparative investigation of device-specific mechanisms for exploiting HPC accelerators : GPGPU 15

The performance of different high-performance computing (HPC) accelerator/coprocessor devices is evaluated and compared in this well-written...
Perf. Analysis & Design Aids (B.2.2) | Apr 10 15

Customized pipeline and instruction set architecture for embedded processing engines : The Journal of Supercomputing

This research aims to improve performance in embedded application domains. The authors have not proposed an entirely new set of instructions...
Processors (B.4.1...) | Apr 9 15

Software (D)
Gestures that people can understand and use : Journal of Visual Languages and Computing

Computing devices often include sensors to track the body, limbs, hands, and fingers of a user. User interfaces rely on these capabilities to...
Visual Programming (D.1.7) | Mar 26 15

Surfing the Net for software engineering notes : ACM SIGSOFT Software Engineering Notes

With the development of artificial intelligence, embedded system software engineering, and computer science, autonomous systems and robotics...
Software Engineering (D.2) | Apr 8 15

Using a grounded theory approach for exploring software product management challenges : Journal of Systems & Software

Like most engineering research and practice, requirements engineering (RE) is typically approached according to the philosophical tradition of positivism. Indeed, theories...
Requirements/Specifications (D.2.1) | Apr 15 15

Software trustworthiness 2.0 : Journal of Systems and Software

The subject of the investigation in the paper is source code analysis. The paper commences with a literature review covering the rich history of this field. Then, the...
Coding Tools & Techniques (D.2.3) | Mar 25 15

Detecting memory leaks statically with full-sparse value-flow analysis : IEEE Trans. on Software Engineering

Every program analysis technique has to finely balance the issues of scalability and precision. These issues are at odds with each other, and it is...
Software/Program Verification (D.2.4) | Mar 26 15

ORBS: language-independent program slicing : FSE 14

Binkley et al. introduce a novel dynamic slicing technique called observation-based slicing (ORBS). This new technique has a very interesting property: it is language independent, and thus it is able...
Testing & Debugging (D.2.5) | Apr 15 15

Mutual authentication and trust bootstrapping towards secure disk encryption : ACM Transactions on Information and System Security

The data on storage devices for laptops and mobile devices need protection from theft and misplacement, and require reliable security schemes. How...
Security & Protection (D.4.6) | Mar 30 15

Computer Systems Organization (C)

Wireless communications networks for the smart grid

For most people, there is no connection between power networks and communications networks, except that the first are needed by the second to operate. With the advent of new two-way meters on the...
Wireless Communication (C.2.1...) | Mar 24 15

Software defined networks: a comprehensive approach

I have recently become interested in software-defined networks (SDNs), largely due to my research in cloud computing and visualization. Although I would not say it is a natural evolution of the research, it is one of those areas that is going to become big...
Network Architecture & Design (C.2.1) | Mar 23 15

Wireless next generation networks: a virtue-based trust model

This is an interesting book. The author, trained in physics and astronomy, has master’s degrees from three universities where he studied epistemology, theory of religion, cognitive psychology...
Wireless Communication (C.2.1...) | Mar 23 15

User-centric networking: future perspectives

This compiled book is from a European Union (EU)-funded project, User-Centric Wireless Local Loop (ULOOP), and is an excellent summary of user-centric networks (UCNs). Such networks have become pervasive across the modern world, whereby...
Network Management (C.2.3...) | Mar 23 15

Real-time UML workshop for embedded systems (2nd ed.)

The book presents a comprehensive overview of the unified modeling language (UML) and its use in the real world. Basically, two case studies demonstrate the use of modeling and design techniques based...
Real-Time & Embedded Sys. (C.3...) | Mar 24 15

Intelligence for embedded systems: a methodological approach

This book presents the underpinnings of state-of-the-art embedded systems. In doing so, it raises the bar for the next generation of ubiquitous computing. The target audience is “researchers, practitioners...
Real-Time & Embedded Sys. (C.3...) | Mar 24 15

Troubleshooting Oracle performance (2nd ed.)

This second-edition reference book is recommended to anyone who works with the Oracle Database. It is a very useful guide, not only for Oracle developers and Oracle professionals, but also for system...
Performance of Systems (C.4) | Apr 3 15

The green computing book

I was excited to get to review this book. After having read and reviewed Green mobile devices and networks [1], this book had me quite interested. I was not disappointed. This book is about managing the energy used for computing systems and installations...
Performance of Systems (C.4) | Mar 23 15

10 don’ts on your digital devices

This book is an introduction to cyber security and privacy for nontechnical readers. Increasingly, the media has shown us examples of highly connected individuals who have focused more on the features of the application than the possible risks of using...
Portable Devices (C.5.3...) | Mar 23 15

Software (D)

From mathematics to generic programming

In the 1960s, the need for mathematical engineers was already emphasized by E. W. Dijkstra [1]. Although this title, earned by graduates of some universities in Europe, may be somewhat unfamiliar, “the professional...
General (D.0) | Mar 26 15

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2015 ThinkLoud, Inc.
Terms of Use
| Privacy Policy