Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
View:  Show:    
 
 

Hardware (B)
Efficient resource sharing algorithm for physical register file in simultaneous multi-threading processors : Microprocessors & Microsystems

This paper reminds me a lot of previous years of using assembly language and learning to write code with only four registers to hold data. Being trained...
Algorithms (B.2.4...) | Nov 9 16

Genetic-algorithm-based FPGA architectural exploration using analytical models : ACM Trans. on Design Automation of Electronic Systems

Mehri and Alizadeh use the genetic algorithm (GA) to optimize field-programmable gate array (FPGA) architectural performance involving area...
Integrated Circuits (B.7) | Nov 9 16

Frame buffer-less stream processor for accurate real-time interest point detection : Integration, the VLSI Journal

In the big data era, pictures are used as key information points in various applications such as ecommerce, entertainment, social networking, and...
VLSI (B.7.1...) | Nov 16 16


Computer Systems Organization (C)
Quantitative analysis of the mission impact for host-level cyber defensive mitigations : ANSS 16

Discussion and qualitative analysis on mitigation issues of cyber security from the host’s perspective are provided in this paper. The contribution...
Security & Protection (C.2.0...) | Oct 26 16

Location-based address configuration for 6LoWPAN wireless sensor networks : Wireless Networks

Connecting wireless sensor networks (WSNs) to the Internet is a very interesting topic. As useful as WSNs are, they used to be constrained in a separate compartment of the network. The...
Sensor Networks (C.2.1...) | Nov 22 16

Modeling and performance evaluation of security attacks on opportunistic routing protocols for multihop wireless networks : Ad Hoc Networks

The primary aim of opportunistic routing for wireless networks is to improve resilience and increase the probability that data will be...
Wireless Communication (C.2.1...) | Nov 16 16

Survey: Live migration and disaster recovery over long-distance networks : ACM Computing Surveys

Live migration (LM) is dealt with in this paper as a one-time task or function, performed by moving a virtual machine from one physical machine to another, located in the same or a different...
Distributed Systems (C.2.4) | Oct 12 16

An architecture to implement the Internet-of-Things using the Prometheus methodology : Int. Journal of Distributed Systems & Technologies

The Prometheus methodology is a set of detailed processes of specifying, designing, implementing, and testing agent-oriented software systems. An...
Distributed Applications (C.2.4...) | Oct 11 16

The Internet of Things: a survey : Information Systems Frontiers

Undisputedly, the Internet of Things (IoT), extending the classic computer-bound Internet to the physical world and all the “things” contained therein...
Distributed Applications (C.2.4...) | Oct 11 16

A survey on wireless indoor localization from the device perspective : ACM Computing Surveys

This long survey considers the problems related to wirelessly localizing objects in an indoor setting. For the purpose of dividing the problem, the authors consider two categories: device based and...
Miscellaneous (C.2.m) | Oct 28 16


Computer Systems Organization (C)

Fundamentals of parallel multicore architecture

Multicore is the default configuration in computing systems today, from smartphones to desktops and servers. Usually independent jobs are done in parallel on these cores, simplifying parallel programming...
Parallel Architectures (C.1.4) | Nov 18 16


Software (D)

Common Lisp recipes: a problem-solution approach

Lisp, the second high-level programming language invented at the dawn of the computer age, has never been out of fashion, especially for artificial intelligence and other specialized areas. When the Lisp community...
Applicative (Functional) Prog. (D.1.1) | Oct 27 16

Computer science: an interdisciplinary approach

I’ve decided to say here at the beginning that this book is outstanding and that it has my highest recommendation, both for self-study and as a text for undergraduate students who...
Object-Oriented Programming (D.1.5) | Dec 2 16

Pragmatic evaluation of software architectures

For software development, making the transition from “what” to “how” in an effective and efficient way depends on the right decisions made at the right time. Many decisions over the life...
Software Architectures (D.2.11) | Nov 17 16

C++ standard library quick reference

This small book (200 pages) represents an annotated guide to the modern (say, after 2011) C++ library. It claims to offer a “condensed, well-structured summary” of library features providing...
Software Libraries (D.2.2...) | Nov 4 16

Python parallel programming cookbook

Devoted to parallel programming in Python, this book is aimed at Python programmers who wish to become more proficient at writing efficient parallel code to realize performance gains. All of the example code in the book is available and allows...
Python (D.3.2...) | Nov 21 16

Reactive messaging patterns with the actor model: applications and integration in Scala and Akka

In the 1980s, when my academic career started as a researcher into functional and actor programming languages, we were confident that by the turn of the millennium these would...
Concurrent Prog. Structures (D.3.3...) | Nov 21 16

The official Ubuntu book (9th ed.)

This book has been revised and updated to cover Ubuntu 16.04, and comes with an installation DVD for the 64-bit (AMD64) desktop version thereof. The back cover promises that readers will “learn...
Systems Programs & Utilities (D.4.9) | Nov 16 16


Data (E)

Cryptology transmitted message protection: from deterministic chaos up to optical vortices

"In the book now presented, the authors describe their experience of the theoretical investigation of the properties of the deterministic chaos generators in radio and optical range for the protected...
Data Encryption (E.3) | Nov 23 16

Codes, ciphers and spies: tales of military intelligence in World War I

The invention of asymmetric key cryptography by Diffie and Hellman in 1976 [1] is generally accepted as the milestone that defines the boundary between classic and modern cryptography. Before 1976...
Data Encryption (E.3) | Oct 27 16

   
Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2016 ThinkLoud, Inc.
Terms of Use
| Privacy Policy