Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
View:  Show:    

Hardware (B)
Execution trace-driven energy-reliability optimization for multimedia MPSoCs : ACM Transactions on Reconfigurable Technology and Systems

Dynamic task scheduling and fault tolerance in multiprocessor systems-on-chip (MPSoCs) are explored in this paper. The paper describes a...
Reliability, Test. & Fault-Tolerance (B.8.1) | Aug 19 15

Computer Systems Organization (C)
A matrix multiplier case study for an evaluation of a configurable dataflow-machine : CF 15

Research in computing frontiers is fascinating for the preview it gives us of some potential futures of computing. Rethinking some of our fundamental assumptions, like the shift from complex...
Data-Flow Architectures (C.1.3...) | Aug 18 15

Impact of GC design on power and performance for Android : SYSTOR 15

Android’s garbage collection (GC) strategy is investigated in this paper in impressive detail. The authors do a good job of explaining how GC works in Dalvik, have ported a significant number...
Mobile Processors (C.1.4...) | Aug 18 15

Efficient spectrum sensing with minimum transmission delay in cognitive radio networks : Mobile Networks and Applications

Cooperation in cognitive radio networks is a powerful tool for dealing with hidden terminals and shortening spectrum sensing...
Wireless Communication (C.2.1...) | Aug 18 15

Videocent: a quality-oriented incentive mechanism for video delivery in opportunistic networks : Wireless Networks

Videocent, a novel incentive mechanism that could not only provide incentives for selfish nodes but also maximize the delivery quality of video, is proposed in this paper. Its effectiveness is also...
Wireless Communication (C.2.1...) | Aug 18 15

Gatling: automatic performance attack discovery in large-scale distributed systems : ACM Transactions on Information and System Security

A distributed system consists of many individual and independent nodes interacting with one another using a standardized set of protocols. Since the scale of nodes is often thousands or even millions...
Distributed Systems (C.2.4) | Aug 18 15

Software (D)
JThread, a deadlock-free mutex library : PPDP 15

Toilers in the orchards of multi-threaded programming can only reap the fruits of concurrent execution through the hard work of access synchronization. This paper describes the jThread library, designed...
Concurrent Programming (D.1.3) | Aug 12 15

DaSH : Parallel Computing

DaSH is the first benchmark suite for the runtime evaluation of (low-level) parallel programming models, which combine the dataflow and shared memory paradigms. Currently, OmpSs, atomic dataflow...
Parallel Programming (D.1.3...) | Jul 29 15

Abstract state machine nets: closing the gap between business process models and their implementation : S-BPM ONE 15

Process automation has seen many unsuccessful attempts to bridge the gap between requirements specification by domain experts and...
Evolutionary Prototyping (D.2.2...) | Aug 6 15

A methodology to evaluate important dimensions of information quality in systems : Journal of Data and Information Quality

As the world begins to surf down the “trough of disillusionment” with big data [1], on the journey to sorting out what can be real and what has value, we rediscover the discipline that data and...
Process Metrics (D.2.8...) | Aug 5 15

Hardware (B)

Counterfeit integrated circuits: detection and avoidance

Counterfeit integrated circuits (ICs) are an emerging problem in the semiconductor industry due to their worldwide production and distribution. How to prevent the increasing threat of counterfeiting is...
General (B.7.0) | Aug 13 15

Low-power VLSI circuits and systems

Designing low-power integrated circuits has become very important, especially for chips that are to be used in handheld or battery-powered electronic systems. This book provides readers not only with succinct information for designing low-power very...
VLSI (B.7.1...) | Sep 1 15

Computer Systems Organization (C)

Understanding network hacks: attack and defense with Python

Cybersecurity and penetration testing have been growing in importance for the past couple of decades. And due to some well-publicized hacking cases, such as Sony and Target, the public has become increasingly more aware of these issues...
Security & Protection (C.2.0...) | Aug 20 15

Guide to computer network security (3rd ed.)

Computer network security is a hot topic these days due to the proliferation of computer networks and their vulnerability to attacks. This book is a part of Springer’s “Computer Communications and...
Security & Protection (C.2.0...) | Aug 19 15

Cloud computing: a hands-on approach

This book surprised me in many ways. Let’s start with the negative surprise: it is not as carefully written as I would have liked it to be. Typographical errors, grammatically incorrect sentences, and redundancies and inconsistencies in coverage and depth...
Cloud Computing (C.2.4...) | Aug 21 15

Resilient computer system design

Resilience is understood as returning to an operational state, in response to failures, breaches, attacks, and other similar disturbances. This book addresses an emerging issue of resilience, that is, keeping computer systems and software resilient in case of external or internal disruptions to their operation. Even...
Reliability, Avail. & Serviceability (C.4...) | Aug 26 15

The green computing book

Traditionally, computer science (CS) curricula have done little to teach practical aspects of the discipline of computing. More specifically, CS education does precious little to make students aware of the resource costs of their work, and there is ample indication that...
Performance of Systems (C.4) | Aug 24 15

Reliability engineering

This is a perfect book supporting a course on reliability modeling. It presents a broad range of material, starting from the fundamentals and going into moderately advanced problems. Because resilience to failures is one of the most important...
Reliability, Avail. & Serviceability (C.4...) | Aug 24 15

High performance parallel I/O

Engineers and scientists in the supercomputing field will immensely benefit from this book. For software engineers or any computing practitioner, the book presents up-to-date projects, formats, and libraries for all levels of the input/output (I/O) stack. The...
Performance of Systems (C.4) | Aug 20 15

Software (D)

Adaptive code via C#

This book encourages readers to rethink the ways in which they design and develop C# applications. The best part of the book: it clearly explains how to develop C# applications with an agile/Scrum methodology through real-life examples. I really like how the...
Object-Oriented Programming (D.1.5) | Sep 4 15

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2015 ThinkLoud, Inc.
Terms of Use
| Privacy Policy