Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
View:  Show:    
 
 

Hardware (B)
Modelling and verification of weighted spiking neural systems : Theoretical Computer Science

This paper considers the problem of formal verification of systems described using an abstract computing model called a spiking neural system, which is modeled after how brain cells...
Verification (B.1.4...) | Jul 13 16


Computer Systems Organization (C)
Intelligent brokers in an Internet of Things for logistics : ICC 16

This interesting paper addresses the nature of and the need for intelligent brokers to support logistics applications related to the Internet of Things (IoT). Brokers serve as a bridge among smart...
General (C.0) | Jul 13 16

Boosting the priority of garbage : ACM Trans. on Architecture and Code Optimization

This well-written paper presents a new algorithm for garbage collection of a Java program running across a heterogeneous set of cores (where some cores execute code significantly faster than others). While it...
Heterogeneous (Hybrid) Systems (C.1.3...) | Jul 12 16

Physical layer security in cognitive radio based self-organization network : Mobile Networks and Applications

This paper discusses finding an optimal solution, by using the Pareto boundary of the power gain region, to realize the secrecy rate performance in a cognitive radio (CR) environment with the existence...
Security & Protection (C.2.0...) | Jul 14 16

A survey on mobile social signal processing : ACM Computing Surveys

If you want to learn about mobile social signal processing (SSP), a field with the aim of detecting social behavior automatically and in a nonintrusive manner by exploiting the data provided by the...
Sensor Networks (C.2.1...) | Jul 20 16

Ear-phone: a context-aware noise mapping using smart phones : Pervasive and Mobile Computing

Crowdsourcing is a hot topic. Many individuals hold massive processing power in their hands. Ear-phone is an interesting proof-of-concept project. It shows how smartphones...
Wireless Communication (C.2.1...) | Jul 19 16

The Internet: Where, to what purpose, and why? : YouTube

Are you looking forward to learning about the nuances of the Internet transitioning from IPv4 to IPv6? Watch this video recording of the talk by Fred Baker, Cisco Fellow, IPv6 Committee Co-Chair, and...
Internet (C.2.1...) | Jul 13 16

CEDAR: a low-latency and distributed strategy for packet recovery in wireless networks : IEEE/ACM Transactions on Networking

Error detection and correction in wireless networks is a very popular topic of research. Many improvements and enhancements are continually being developed, implemented, tested, and theorized about...
Wireless Communication (C.2.1...) | Jul 11 16

Towards a novel trust-based opportunistic routing protocol for wireless networks : Wireless Networks

Routing in an ad hoc wireless network is a very important topic, especially considering the presence of malicious nodes. The authors propose a novel trust-based opportunistic...
Network Protocols (C.2.2) | Jul 12 16

Secure multi-server-aided data deduplication in cloud computing : Pervasive and Mobile Computing

This detailed paper on secure multiserver-aided data deduplication computing gives a quick overview of cloud computing and then delves into the main topic of secure...
Cloud Computing (C.2.4...) | Jul 28 16


Computer Systems Organization (C)

Fundamentals of parallel multicore architecture

Since the birth of microprocessors in the 1970s (the Intel 4004 was designed in 1971), virtual memory and pipelining were the main architectural novelties of the 1980s, on-chip caches and superscalar processors were introduced in the 1990s, and multicore chips...
Parallel Architectures (C.1.4) | Jul 12 16

Cyber operations: building, defending, and attacking modern computer networks

Among the wide range of literature available on the topic, this book distinguishes itself for its practical and didactical cut, which gives the reader an overarching introduction to cyber operations...
Security & Protection (C.2.0...) | Jul 27 16

Networking for big data

With the proliferation of social networks and cloud computing, increasing amounts of data are generated and stored in the cloud. The Internet of Things, online transactions, e-commerce, and so on also...
Data Communications (C.2.0...) | Jul 15 16

The future X network

In its long history, “Bell Labs research as an organization has never written a book.” Now, as its president Marcus K. Weldon states, the time seemed right to write this book: “We are at the nexus of a human technological revolution that will be different than any prior era...
Network Architecture & Design (C.2.1) | Jul 15 16

The future X network: a Bell Labs perspective

This is a very interesting book that has 14 chapters on the future of different types of networks, such as the Internet of Things, energy networks, and cloud networks. The chapter contributors are primarily Bell Labs employees or from Bell Labs...
Network Architecture & Design (C.2.1) | Jul 11 16

Management of cyber physical objects in the future Internet of Things: methods, architectures and applications

Today, and increasingly in the future, physical objects from the mundane to the esoteric will be tied to the Internet. From thermostats, fire alarms, and TVs to automobiles and mass transit, society...
Real-Time & Embedded Systems (C.3...) | Jul 13 16

Pro Android 5 (5th ed.)

According to Gartner [1], the world sales of smartphones to end users totaled 403 million units in the fourth quarter (Q4) of 2015. Of this number, 80.7 percent were smartphones with the Android operating system (OS). Considering that according to...
Portable Devices (C.5.3...) | Jul 13 16


Software (D)

Learn to program with Minecraft

Minecraft is a very popular virtual world video game with a user base that exceeds 100 million registered users. Python is an open-source, interpreted programming language growing in popularity because of the number and variety of open-source extensions...
General (D.1.0) | Jul 21 16

Metaprogramming Elixir: write less code, get more done (and have fun!)

Elixir is one of the programming languages built on top of BEAM, the Erlang virtual machine. That makes it inherently worthy of consideration since Erlang is well known as a platform for building highly reliable, massively parallel fault-tolerant systems. As a...
General (D.1.0) | Jul 21 16

Python for probability, statistics, and machine learning

Many recent books cover a combination of Python, data science, statistics, and machine learning. They vary widely in prerequisites and approach. This book does not include data science in its title...
Python (D.3.2...) | Jul 8 16

   
Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2016 ThinkLoud, Inc.
Terms of Use
| Privacy Policy