Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
View:  Show:    

Hardware (B)
JACCIE: a Java-based compiler-compiler for generating, visualizing and debugging compiler components : Science of Computer Programming

The software described is a compiler generator integrated in a graphical user interface to support debugging. A compiler is...
Languages & Compilers (B.1.4...) | Aug 12 14

Cache vulnerability mitigation using an adaptive cache coherence protocol : The Journal of Supercomputing

Soft errors in on-chip cache hierarchies are studied in this paper, and solutions to the problem are proposed. Soft errors are the result of events such...
Cache Memories (B.3.2...) | Jul 28 14

Computer Systems Organization (C)
Visualization of wireless sensor network by a Java framework for security in defense surveillance : ICESC 14

Wireless sensor network (WSN) deployments often require a back-end network and a data visualizer. Motivated by this, the authors have designed...
Sensor networks (C.2.1...) | Jul 25 14

A configuration scheme for connectivity-aware mobile P2P networks for efficient mobile cloud-based video streaming services : Cluster Computing

The focus in research relating to peer-to-peer networks and possible configuration schemes for efficient cloud-based video...
P2P Computing (C.2.1...) | Jul 24 14

Mobile data offloading: a host-based distributed mobility management approach : IEEE Internet Computing

The advancement of smartphones and tablets, combined with recent upgrades to the cellular infrastructure, has paved the way for an explosion of mobile Internet traffic. Video traffic in...
Wireless Communication (C.2.1...) | Jul 23 14

Designing green network architectures using the ten commandments for a mature ecosystem : Computer Communications

Drouant et al. clarify from the beginning of the paper that their goal is to check if philosophical concepts from ecology make sense when considering a...
Network Architecture & Design (C.2.1) | Jul 22 14

Improving discovery phase of reactive ad hoc routing protocols using Jaccard distance : The Journal of Supercomputing

Reina et al. propose a novel algorithm, Jaccard distance, to improve redundancy issues during the mobile ad-hoc network discovery phase. The Jaccard distance...
Routing Protocols (C.2.2...) | Jul 25 14

Improving Colorwave with the probabilistic approach for reader-to-reader anti-collision TDMA protocols : Wireless Networks

Colorwave is a time division multiple access (TDMA) approach for collision resolution among radio frequency identification (RFID)...
Network Protocols (C.2.2) | Jul 22 14

A robust active queue management scheme for network congestion control : Computers and Electrical Engineering

Transmission control protocols (TCP) at the senders and queue management schemes at the intermediate routers have been made to cooperate in order...
Network Management (C.2.3...) | Jul 31 14

XML privacy protection model based on cloud storage : Computer Standards & Interfaces

Data security in the cloud remains an active area of research. This paper provides a novel approach to protecting data privacy by leveraging the...
Cloud Computing (C.2.4...) | Aug 5 14

Computer Systems Organization (C)

Wireless communication electronics by example

Wireless communication has become an essential part of our daily lives. An increase in the popularity of wireless and mobile communication technologies has drawn the attention of academicians and...
Wireless Communication (C.2.1...) | Aug 4 14

OpenStack cloud computing cookbook (2nd ed.)

OpenStack, the topic of this book, is an extremely relevant and important technology for cloud computing. With huge support from the community and industry, this open-source solution is becoming more commonly used in cloud...
Cloud Computing (C.2.4...) | Jul 31 14

Data intensive distributed computing: challenges and solutions for large-scale information management

With many books on the market already addressing the large spectrum of big data-related topics, Data intensive distributed computing manages to address the underlying research and technology...
Distributed Systems (C.2.4) | Jul 29 14

Software (D)

Agile software architecture: aligning agile processes and software architectures

Some agile evangelists assert that software architecture requires big design up front (BDUF), and that the artifacts produced by the software architects (that is, the architectural documentation) will...
Software Architectures (D.2.11) | Aug 6 14

Quality code

Software development has undergone deep changes in the past few years. Whereas once it was an essentially linear process similar to many other engineering disciplines, the frantic pace of present-day...
Testing & Debugging (D.2.5) | Aug 21 14

Model-driven software migration: a methodology reengineering, recovery and modernization of legacy systems

Change is inevitable in life, and software, like anything else, may need to undergo change for many reasons. The cost of software maintenance is high; it...
Dstr., Maint., & Enhancement (D.2.7) | Aug 14 14

Introduction to computer science using Python: a computational problem-solving focus

This book is intended as a textbook for an introductory course in programming with Python. Chapter 1, “Introduction,” presents a broad, multi-faceted overview of computer science, problem...
Python (D.3.2...) | Aug 21 14

Beginning C (5th ed.)

This book is intended for readers with little or no programming experience. It introduces C as defined by the C11 standard (ISO/IEC 9899:2011, Information technology, Programming Languages, C)...
C (D.3.2...) | Jul 28 14

Android programming: the Big Nerd Ranch guide

Computer programming has undergone transformations since its inception. At the very beginning, programming was limited to the underlying machine code, followed by macro languages as assemblers. In the late...
Language Constructs & Features (D.3.3) | Aug 4 14

Theory Of Computation (F)

Computational models of complex systems

An ancient Chinese saying states: “Since you are inside the mountain, that is exactly the reason why you cannot see the mountain clearly.” This very environment that we live in is comprised of...
Models of Computation (F.1.1) | Aug 5 14

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2014 ThinkLoud, Inc.
Terms of Use
| Privacy Policy