Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
View:  Show:    

Hardware (B)
A review on virtual reality and augmented reality use-cases of brain computer interface based applications for smart cities : Microprocessors & Microsystems

Current computing and user interface technologies permit increasingly direct connections between the human brain and computers. The...
Input/Output Devices (B.4.2) | Feb 2 23

Computer Systems Organization (C)
One-hop out-of-band control planes for multi-hop wireless sensor networks : ACM Transactions on Sensor Networks

Wireless sensor networks (WSNs) have expanded in the last decade. Sensors are deployed in an environment to control the data generated within that area, without any wiring...
General (C.0) | Jan 26 23

Potential technologies and applications based on deep learning in the 6G networks : Computers and Electrical Engineering

The sixth generation of cellular networks (6G) still hasn’t reached its peak in terms of hype, and in light of 4G and 5G coordinates and ruling experiences, concerned theorists are working to define 6G’s framework...
Security & Protection (C.2.0...) | Apr 4 23

Multiple LDPC-encoder layered space-time-frequency architectures for OFDM MIMO multiplexing : Wireless Personal Communications: An International Journal

For many, because of its influence in both everyday life and business, fourth-generation (4G) wireless communication has a distinguished place, where coupling OFDM and MIMO is one of its...
Wireless Communication (C.2.1...) | Apr 24 23

AI-based computer vision using deep learning in 6G wireless networks : Computers and Electrical Engineering

The development of sixth-generation (6G) wireless networks is expected to revolutionize the way we use the Internet and handle data. This new network will offer faster speeds, better security, and more...
Wireless Communication (C.2.1...) | Mar 22 23

ACE: toward application-centric, edge-cloud, collaborative intelligence : Communications of the ACM

Futuristic artificial intelligence (AI) applications in electronic business, urban surveillance, and medicine require more teamwork among researchers and practitioners. But with the rising number of autonomous AI applications in different domains, including...
Cloud Computing (C.2.4...) | Aug 4 23

H-Container: enabling heterogeneous-ISA container migration in edge computing : ACM Transactions on Computer Systems

Xing et al. describe a novel approach to dealing with the difficulties posed by container migration in edge computing settings with heterogeneous ISAs. By putting forth a mechanism that permits effective and...
Distributed Systems (C.2.4) | May 10 23

Software (D)
Democratizing domain-specific computing : Communications of the ACM

As computer professionals, we mostly envision computers as general-purpose tools by default. Over the past decades, Moore’s law and Dennard scaling have, year after year, given us consistently better “toys”: faster computers, larger storage spaces. With...
General (D.0) | Jun 22 23

On the model of computation: counterpoint: parallel programming wall and multicore software spiral: denial hence crisis : Communications of the ACM

Vishkin’s counterpoint to Dally [1] talks about what the model of computation should now be in light of multicore processors (and their programming difficulties) and parallel...
General (D.1.0) | Jan 24 23

On the model of computation: point: we must extend our model of computation to account for cost and location : Communications of the ACM

The model of any process demonstrates its functionality and is useful for its study and analysis. For example, the Turing machine is a model for computation. However, the random-access machine (RAM) model is...
General (D.1.0) | Jan 23 23

Hardware (B)

Algorithms for constructing computably enumerable sets

Computational complexity (historically called recursive functions in logic) is a very specific area of computational theory, and even within this domain the book discusses a very specific subfield: the theoretical construction of enumerable sets. The book is...
Algorithms (B.2.4...) | Nov 15 23

Software (D)

Parallel programming: for multicore and cluster systems (3rd ed.)

Parallel programming: for multicore and cluster systems is now in its third English edition (2023). The original German text had, in turn, its three editions in 2000, 2007, and 2012. The current third English edition includes selected (as opposed to pervasive)...
Parallel Programming (D.1.3...) | Sep 14 23

Predicting the unknown: the history and future of data science and artificial intelligence

Physicist Niels Bohr observed: “Prediction is very difficult, especially if it’s about the future!” Despite that warning, scientists, politicians, journalists, doctors, economists--professionals in nearly every knowledge domain--try to anticipate what’s in store for us...
Statistical Methods (D.2.4...) | Nov 29 23

Statistical methods for data analysis: with applications in particle physics (3rd ed.)

Statistical methods for data analysis explores possibilities for artificial intelligence (AI), statistics, and data science in particle physics. Although the title of the book does not mention AI, the content of the...
Statistical Methods (D.2.4...) | Aug 8 23

Murach''s R for data analysis

To paraphrase a popular political meme, “What should entry-level data analysts know and when should they know it?” And then, how should they learn it? Certain data exploration and analysis programming skills, for R, Python, and SQL, are obvious starting points...
General (D.3.0) | Jun 19 23

Practical explainable AI using Python: artificial intelligence model explanations using Python-based libraries, extensions, and frameworks

In this comprehensive guide, the author aims to provide practical insights into artificial intelligence (AI) model explainability and interpretability using Python frameworks. While Mishra doesn’t explicitly state...
Python (D.3.2...) | Aug 21 23

PyTorch recipes: a problem-solution approach to build, train and deploy neural network models (2nd ed.)

Full of lengthy code examples, PyTorch recipes is a very good textbook for beginner and intermediary neural network developers using PyTorch. The book chapters are structured identically: introduce a topic and...
Python (D.3.2...) | Jul 24 23

Mathematical logic through Python

I well remember, after many years, my surprise and awe at the beauty of the structure of my undergraduate course on logic and computability, which led students from the basics of propositional logic to Gödel’s incompleteness theorems. Unfortunately, I...
Python (D.3.2...) | Jun 27 23

On architecting fully homomorphic encryption-based computing systems

This book must be considered a game changer in the field of data security and privacy. It is a true testament to the boundless potential of technology when put in the hands of brilliant minds. The authors not only explore the intricacies of fully homomorphic encryption...
Cryptographic Controls (D.4.6...) | Oct 16 23

Viruses in all dimensions: how an information code controls viruses, software and microorganisms

It has been several decades since the emergence of the first recognized computer virus. The infectious behavior of computer viruses gave them their name--an analogy to the original biological biological variety. The...
Information Flow Controls (D.4.6...) | Jul 6 23

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2023 ThinkLoud®
Terms of Use
| Privacy Policy