Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
View:  Show:    
 
 

Hardware (B)
Reliability-aware design to suppress aging : DAC 16

In the biological world, humans age over time. Similar to this, small components like transistors in an electronic chip also age as the system runs...
Design Styles (B.6.1) | Jun 28 16

Beat frequency detector-based high-speed true random number generators: statistical modeling and analysis : ACM Journal on Emerging Technologies in Computing Systems

With the increased number of personal electronic devices, the security of these devices and personal information has become a big concern. As...
General (B.7.0) | Jun 16 16


Computer Systems Organization (C)
Counting the security cost of cheap calls : Network Security

Session initiation protocol (SIP) trunking effectively allows enterprises and small businesses to continue leveraging their voice-over-IP (VoIP)...
Security & Protection (C.2.0...) | Jun 20 16

Toward cluster-based weighted compressive data aggregation in wireless sensor networks : Ad Hoc Networks

It seems surprising that so many users of remote sensing (including wireless networks) have yet to hear the 10-year-old...
Sensor Networks (C.2.1...) | Jun 27 16

Residual energy-based adaptive data collection approach for periodic sensor networks : Ad Hoc Networks

Wireless sensor networks (WSNs) are a key technology in the big data age. Deployed sensors, equipped with wireless communication...
Sensor Networks (C.2.1...) | Jun 23 16

Betweenness centrality in delay tolerant networks : Ad Hoc Networks

The need for larger, mobile, and dynamic networks--such as modern mobile ad hoc networks (MANETs)--is growing. Maintaining MANETs’ end-to-end routes at all times is not...
Centralized Networks (C.2.1...) | Jun 13 16

Cloud-assisted industrial cyber-physical systems : Microprocessors & Microsystems

Industry 4.0 is being dubbed the next generation in the manufacturing world. The cloud computing model has introduced so much potential to present...
Cloud computing (C.2.4...) | Jun 27 16

A new packet scheduling algorithm for access points in crowded WLANs : Ad Hoc Networks

Trying to use a wireless access point in a crowded venue can be very frustrating. The bandwidth is limited, at least in the short term; therefore...
Local & Wide-Area Networks (C.2.5) | Jun 20 16

Cache-aware compositional analysis of real-time multicore virtualization platforms : Real-Time Systems

Virtualized platforms on multicore systems are becoming increasingly common, especially since single-core performance is now increasing ever more slowly. Virtualized...
Real-Time & Embedded Systems (C.3...) | May 27 16


Software (D)
Protocol-based verification of message-passing parallel programs : OOPSLA 15

The message-passing interface (MPI) is a parallel computation standard that is widely used, especially in scientific computing. Parallel computation...
Concurrent Programming (D.1.3) | Jun 21 16


General Literature (A)

Lauren Ipsum

Those among us who have printed the jargon dictionary on greenbar fanfold will love this book. But what of the target audience, girls and young women who may be on the verge of attraction to computer science? Amazon rankings are solid, but are the...
General Literary Works (A.0...) | May 25 16

The pattern on the stone

This is an easy-to-read book that any computer science enthusiast would treasure. Daniel Hillis, the founder of Thinking Machines, brings out basic concepts beautifully. The book’s nine short chapters can be read in a couple of days. The author’s...
Introductory & Survey (A.1) | Jun 8 16


Computer Systems Organization (C)

Computer and communication networks

With this second edition, Nader Mir provides a comprehensive introduction to the most important topics in current networking. The almost 900-page book is composed of 22 chapters addressing packet-switching concepts, the well-known...
Data Communications (C.2.0...) | May 26 16

Automotive Ethernet

Increased use of electronics in vehicles and the need to enable communication between different electronic control units (ECUs) in the vehicle have given rise to in-vehicle networking. To handle varying requirements of automotive applications such as data rate...
Ethernet (C.2.1...) | Jun 1 16

CSA guide to cloud computing: implementing cloud privacy and security

The Cloud Security Alliance (CSA) is the leading not-for-profit organization in cloud security, which is evident in the body of research they have produced over the years. This book, written by three...
Cloud Computing (C.2.4...) | Jun 20 16

Foundations of software and system performance engineering

Andre B. Bondi, the author, has a background in mathematics and statistics, as well as many years of experience in network management. Thus, it is not surprising that his view on system...
Performance of Systems (C.4) | Jun 20 16


Software (D)

Web programming with PHP and MySQL

Web programming with PHP and MySQL fulfills the promise of its subtitle: a practical guide. The writing is friendly and clear, with the author indicating when every alternative to a command is not given and making suggestions on when it is necessary...
General (D.1.0) | Jun 21 16

Learn to program with C

Dennis Ritchie developed the C programming language at Bell Laboratories, in 1972, for implementing the UNIX operating system. Learn to program with C is a book whose stated goal is “to teach fundamental programming principles using C.” The author...
Sequential Programming (D.1.4) | May 27 16

Introduction to React

React is Facebook’s library for creating complex responsive user interfaces in JavaScript. I came to this book with some knowledge of what to expect. I have used the ClojureScript Reagent and...
Object-Oriented Programming (D.1.5) | Jun 20 16

Murach’s Android programming

Murach’s Android programming aims to give a structured learning path to the developer new to Android, guiding him from installing Android Studio to finishing his first app and uploading it to the Play Store. The book...
Object-Oriented Programming (D.1.5) | May 26 16

   
Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2016 ThinkLoud, Inc.
Terms of Use
| Privacy Policy