Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
View:  Show:    

Hardware (B)
Fine-grain power breakdown of modern out-of-order cores and its implications on Skylake-based systems : ACM Transactions on Architecture and Code Optimization

Extreme-scale data centers and supercomputers draw many megawatts of power to function. By today’s standards, drawing one megawatt of power...
Microprocessors & computers (B.7.1...) | Aug 28 17

Computer Systems Organization (C)
Understanding co-running behaviors on integrated CPU/GPU architectures : IEEE Transactions on Parallel and Distributed Systems

Graphics processing units (GPUs) are used in many applications that are not necessarily related to graphics. With the rise of big data and machine...
Processor Architectures (C.1) | Aug 8 17

The communication-hiding pipelined BiCGstab method for the parallel solution of large unsymmetric linear systems : Parallel Computing

In the huge matrices used in high-performance computing (HPC), there exist patterns and relations among the members of the matrix that can be...
Parallel Architectures (C.1.4) | Aug 10 17

Fog computing for the Internet of Things: security and privacy issues : IEEE Internet Computing

Connecting everything to the Internet is attractive because it can bring efficiency and convenience in many areas. However, security and privacy issues can also occur. The problem is that it is difficult...
Security & Protection (C.2.0...) | Sep 7 17

The g-good-neighbor conditional diagnosability of star graphs under the PMC and MM* model : Theoretical Computer Science

A network of processors is said to be diagnosable if its faulty nodes can be reliably identified. Identification of a faulty node depends on it having nonfaulty neighbors. The requirement that each fault-free node in a...
Network Architecture & Design (C.2.1) | Aug 7 17

Hybrid method for minimizing service delay in edge cloud computing through VM migration and transmission power control : IEEE Transactions on Computers

One of the most important requirements for an edge/cloud computing system is task latency, especially for some specific applications such as security...
Cloud Computing (C.2.4...) | Sep 19 17

Improving resource efficiency at scale with Heracles : ACM Transactions on Computer Systems

Most of the paper’s authors are connected to Google, and their work centers on Google workload performance improvement. They’ve developed runtime controller software, Heracles, that uses...
Cloud Computing (C.2.4...) | Sep 6 17

Cloudy, foggy and misty Internet of Things : ICPE 16

Overcoming the often-oversold Internet of Things (IoT) reliance on cloud infrastructure is at the heart of a new revamping of edge computing called “fog computing” (see Basically, today’s...
Cloud Computing (C.2.4...) | Aug 25 17

A scalable data chunk similarity based compression approach for efficient big sensing data processing on cloud : IEEE Transactions on Knowledge and Data Engineering

Marrying sensors and innovative industries (for example, think aircraft engines instrumented for real-time preventive maintenance) leads to the creation...
Cloud Computing (C.2.4...) | Jul 25 17

Building the Internet of Things with Bluetooth Smart : Ad Hoc Networks

The paper looks at the current state of Bluetooth Low Energy (BLE) as a communication platform to connect resource-constrained devices to the Internet, and presents a purportedly first-of-its-kind open...
Internet (C.2.5...) | Aug 23 17

Computer Systems Organization (C)

Computer organization and design

The book Computer organization and design has helped multiple generations of computer scientists, and is an awesome text for students and professionals alike. This book on the ARM architecture is very relevant as billions of devices with the architecture are...
General (C.0) | Aug 22 17

The power of networks

I was thrilled to review this book. I teach computer network classes and my research area is computer networks. The bright yellow cover definitely grabs your attention. The preface mentions popular software companies such as Google, Amazon, Netflix, and YouTube, and...
Computer-Communication Networks (C.2) | Aug 23 17

Software defined networks (2nd ed.)

In the networking model of old, many users (clients) talk to a central server; this client-server model dominates network traffic. Nowadays, everyone has networked devices (smartphones, tablets, and so on) communicating with each other. A peer-to-peer...
Network Architecture & Design (C.2.1) | Sep 19 17

Algorithms and models for network data and link analysis

A recent article in The Economist noted that data is to the twenty-first century what oil was to the twentieth century. Data is almost ubiquitously generated by humans as part of their everyday interactions on...
Network Management (C.2.3...) | Sep 8 17

Cognitive (Internet of) Things

Cognitive (Internet of) Things brings us a comprehensive view of the field, despite its small size (less than 180 pages). The book is well organized, with topics ranging from the basics of the subject to cognitive devices that function as human assistants. Finally, the book discusses...
Real-Time & Embedded Systems (C.3...) | Sep 13 17

Introduction to embedded systems: a cyber-physical systems approach (2nd ed.)

This book begins with the statement (from page 1), “[A] CPS [cyber-physical system] is about the intersection, not the union, of the physical and the cyber. It is not sufficient to separately understand the physical...
Real-Time & Embedded Systems (C.3...) | Aug 22 17

Software (D)

Programming in Haskell

Graham Hutton’s Programming in Haskell is a leading textbook on the functional programming language Haskell, which first appeared in 2007; it is instructive to see how its second edition reflects what has changed over the last decade. A particular strength of...
Functional Programming (D.1.1) | Aug 17 17

Speed, data, and ecosystems

This book is a masterful exposition of how to develop large software programs, aimed at business leaders but useful to others. “Speed” refers to shortening the time required to get new software to the customer. “Data” refers to maximizing the usefulness of data...
General (D.2.0) | Sep 14 17

Self-aware computing systems

Self-aware computing systems are covered in this book, which is an expanded collection of papers (each chapter by a group of authors). Organized under five parts, the book is an attempt to bring together researchers...
General (D.2.0) | Sep 14 17

Software reading techniques: twenty techniques for more effective software review and inspection

Software professionals are trained to create software artifacts of all kinds. Surprisingly, they are not taught how to read and analyze the resulting requirements, designs, test cases, and code. Yang-Ming...
Code Inspections (D.2.5...) | Sep 14 17

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy