Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
View:  Show:    
 
 

Hardware (B)
RT level timing modeling for aging prediction : DATE 16

Transistor aging has grown as a critical reliability issue that shortens the lifetime of electronic devices and slows down the circuits inside these devices. During the past decade, researchers have proposed various...
Reliability, Testing & Fault-Tolerance (B.2.3) | Sep 9 16

Parallel programming model for the Epiphany many-core coprocessor using threaded MPI : Microprocessors & Microsystems

This particular parallel programming model using threaded message passing interface (MPI) was implemented on a special architecture...
Interconnections (Subsystems) (B.4.3) | Aug 29 16


Computer Systems Organization (C)
Out-of-band covert channels—a survey : ACM Computing Surveys

In recent years, covert channels were shifted back into the focus of research. These channels can be used to communicate in a stealthy way not recognizable by third parties. Typical application scenarios...
General (C.2.0) | Sep 30 16

Taking back control of privacy : International Journal of Information Security

Would you intentionally make your firewall leak packets that are supposed to be blocked? This paper presents an interesting argument for when this might be desired. When your firewall is hosted, the cloud service...
Security & Protection (C.2.0...) | Sep 12 16

Practical approximate k-nearest neighbor queries with location and query privacy : IEEE Transactions on Knowledge and Data Engineering

Location-based services (LBS) have been used as a Trojan horse to reveal users’ private data. Since they run on mobile applications, individuals can...
Wireless Communication (C.2.1...) | Sep 20 16

Declarative framework for specification, simulation and analysis of distributed applications : IEEE Transactions on Knowledge and Data Engineering

Distributed applications are normally overlaid on a network of computing elements (nodes). Their specification requires the declaration...
Distributed Applications (C.2.4...) | Sep 23 16

Topology-aware virtual machine placement in data centers : Journal of Grid Computing

Cloud computing infrastructures, consisting of myriad central processing units (CPUs), storage devices, and network connections, depend heavily on virtualized components. Virtualized...
Cloud Computing (C.2.4...) | Sep 20 16

Workload characterization: a survey revisited : ACM Computing Surveys

This paper considers the process of characterizing workloads in different kinds of computing services. It starts with a brief discussion of what a workload is and how characterizing workloads leads to better...
Performance of Systems (C.4) | Sep 20 16


Software (D)
Why designers might want to redesign company processes to get to better UX design: a case study : CHI EA 16

In this paper, the authors summarize the various problems faced by software/user experience (UX) designers in implementing change that on the surface seems like an easy job that has widespread...
Requirements/Specifications (D.2.1) | Sep 21 16

Exploiting hierarchical locality in deep parallel architectures : ACM Transactions on Architecture and Code Optimization

Locality awareness in programs can be used to improve their execution performance on parallel computers. Modern parallel computers have many levels of parallelism; many cores on a chip and many...
Processors (D.3.4) | Aug 26 16


General Literature (A)

Quality in the 21st century: perspectives from ASQ Feigenbaum Medal winners

As computing professionals, we are all professionally concerned with the issue of quality in our software products, embedded systems, user interfaces, and maintainability. We use products produced...
Miscellaneous (A.m) | Aug 18 16


Hardware (B)

Principles and methods of quantum information technologies

Quantum information technologies is the name given to theories and applications of the principles of quantum mechanics as applied to computation and information processing. The former uses the properties of quantum mechanical objects to implement algorithms...
Advanced Technologies (B.7.1...) | Sep 16 16


Computer Systems Organization (C)

Trust and communication in a digitized world: models and concepts of trust research

Trust is foundational for all interactions. While one might suppose that digital interactions are inherently disadvantaged in creating trust, the authors demonstrate that this stereotype may not...
Data Communications (C.2.0...) | Sep 20 16

Computer networks and Internets (6th ed.)

For many years, Comer’s book has been an excellent source for those who want to learn about or teach the fundamentals of networking. Obviously, this has not changed with the new updated edition. Being an overview of all the related techniques, from the...
Internet (C.2.1...) | Sep 29 16

Enterprise IoT: a definitive handbook

The Internet of Things (IoT), the idea of connecting everything using Internet protocols, is one of the most innovative visions across industries as well as daily life. A wide range of subjects, from tiny sensors to big data analysis, are related to IoT; it is not easy for...
Internet (C.2.1...) | Sep 20 16

Engineering safe and secure cyber-physical systems: the specification PEARL approach

Self-driving cars, process control systems, automatic pilot avionics, medical monitoring systems, smart cities, and the Internet of Things: welcome to the wonderful world of cyber-physical systems...
Real-Time & Embedded Systems (C.3...) | Aug 23 16


Software (D)

High performance parallelism pearls

High performance parallelism pearls is a collection of loosely connected chapters, each one containing a discussion about parallelization or optimization of code in a particular scientific field. The book, written by experts in data centers, academia, and high-performance...
Parallel Programming (D.1.3...) | Sep 16 16

Reactive Internet programming

In choosing this book to, in Nobel laureate J.D. Watson’s words, “read around [my] subject” [1], laureate Richard Feynman’s expressed truism, namely that “the same equations have the same solutions,” came to mind [2]. My adaptation here would be that, in software...
Design (D.2.10) | Sep 26 16

Practical software architecture: moving from system context to deployment

Oh! Another book on software architecture! Perhaps the mysteries behind building software will definitely be solved one day! Often it is argued that good software architecture without implementation...
Software Architectures (D.2.11) | Sep 28 16

Learn Git in a month of lunches

This book, the latest in Manning’s “In a Month of Lunches” series, offers software professionals an introduction to source control and Git. It is a welcome addition to the list of books dedicated to what might well be the most widely used source control system...
Version Control (D.2.7...) | Aug 31 16

   
Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2016 ThinkLoud, Inc.
Terms of Use
| Privacy Policy