Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
View:  Show:    
 
 

General Literature (A)
Data science: a comprehensive overview : ACM Computing Surveys

This paper brings together a cohesive picture of data science, a new interdisciplinary academic field, from many different perspectives. In this 42-page...
Introductory & Survey (A.1) | Jan 11 18


Hardware (B)
Optimization and quality estimation of circuit design via random region covering method : ACM Transactions on Design Automation of Electronic Systems

Bi et al. propose a random region covering theory to optimize designs on systems and circuits. The proposed work has been verified on a class-E power...
Design Styles (B.6.1) | Jan 26 18


Computer Systems Organization (C)
A survey on software defined networking: architecture for next generation network : Journal of Network and Systems Management

Over the years, data communication networks have seen a constant rise in network traffic, and this trend is expected to continue eternally. This constant...
Data Communications (C.2.0...) | Jan 16 18

Recovery from simultaneous failures in a large scale wireless sensor network : Ad Hoc Networks

Wireless sensor networks (WSNs) are an appealing choice for applications such as environmental monitoring due to the capability to deploy massive amounts of cheaper sensor nodes and...
Sensor Networks (C.2.1...) | Feb 14 18

A survey of attacks and detection mechanisms on intelligent transportation systems : Ad Hoc Networks

A vehicle ad hoc network (VANET) is a mobile ad-hoc network (MANET) consisting of vehicles and roadside units (RSUs). VANETs are a key technology for future smart car services such as accident alerting...
Wireless Communication (C.2.1...) | Feb 14 18

Data-driven synchronization for Internet-of-Things systems : ACM Transactions on Embedded Computing Systems

Time synchronization has been an active issue for decades. Stricter timing, energy considerations, external influences, and so on have spurred new studies. Two variants can be found: synchronize the clocks...
Real-Time & Embedded Systems (C.3...) | Feb 13 18

Efficient attack graph analysis through approximate inference : ACM Transactions on Privacy and Security

In the course of this very well-written and interesting research paper, the authors attempt to show how an existing technique can be employed to analyze attack graphs. In computer security, the analysis...
Real-Time & Embedded Systems (C.3...) | Jan 24 18


Software (D)
A technique to automatically determine ad-hoc communication patterns at runtime : Parallel Computing

Moreton-Fernandez et al. present an approach to automatically determine communication patterns at runtime for programs that run on distributed...
Parallel Programming (D.1.3...) | Feb 14 18

Agile requirements handling in a service-oriented taxonomy of capabilities : Requirements Engineering

Enterprises often grow through mergers and acquisitions in response to the needs created by prevalent market conditions. While mergers may strategically position an...
Requirements/Specifications (D.2.1) | Jan 29 18

X3ML mapping framework for information integration in cultural heritage and beyond : International Journal on Digital Libraries

A fascinating aspect of computer science is its variety of application domains. Sometimes the solution to a problem involving one application domain can be...
Data Mapping (D.2.12...) | Jan 10 18


Computer Systems Organization (C)

Scientific programming and computer architecture

You can find books that teach you how to write efficient code in a specific language. The efficiency here comes from using good algorithms and making the best use of the language capability. You can also find books that...
General (C.1.0) | Feb 14 18

Fundamentals of computer architecture and design

Computer architecture is a vast subject that encompasses a variety of topics such as logic design, digital circuits, arithmetic, data path, memory, and input/output (I/O). While logic design is fundamental to computer architecture, memory and I/O are up...
General (C.1.0) | Jan 25 18

Advances in computers: creativity in computing and dataflow supercomputing

Computers and software applications are rapidly overwhelming our day-to-day lives. Computing has seen a rapid rise in the past four decades due to Moore’s law and the doubling of computing...
Parallel Architectures (C.1.4) | Jan 25 18

Network analysis literacy: a practical approach to network analysis project design

Networks are not just an important part of computer science--they are an important part of our daily lives. Many structures in nature and in our daily lives exhibit network behavior. For instance, our friendships...
General (C.2.0) | Feb 1 18

Wireless networking and mobile data management

This book, which is divided into two parts, presents a solid foundation to wireless technologies and their management. In the beginning, there are eight pages of acronym definitions. That goes to show the...
Wireless Communication (C.2.1...) | Feb 5 18

Cloud computing for science and engineering

Clouds have been around for some time and are often touted as expensive and complex systems meant to solve problems specific to Web companies with global reach. Foster and Gannon dispel this myth through an elegantly...
Distributed Systems (C.2.4) | Feb 1 18

Smart sensors networks: communication technologies and intelligent applications

There is a lot that can be said about smart sensor networks. In fact, many volumes of books would be needed to cover the topic material of such a booming domain. Composed of four sections and 15...
Signal Processing Systems (C.3...) | Feb 1 18


Software (D)

macOS programming for absolute beginners: developing apps using Swift and Xcode

Every year, thousands of developer positions are not filled because of a lack of skilled tech talent. In this context, a Swift (a programming language presented in 2014 by Apple) developer has become one of...
General (D.1.0) | Feb 1 18

Software engineering: specification, implementation, verification

Many introductions to software engineering focus on the high-level aspects of large-scale software development, for example, requirements analysis, architecture design, configuration management, quality control...
Software/Program Verification (D.2.4) | Feb 1 18

Software failure investigation: a near-miss analysis approach

This book bothered me. There were profound positives and profound negatives that I discovered as I proceeded through the (very short, barely 100-meaty-page) book. First, the positives. There is a great need for this...
Testing & Debugging (D.2.5) | Feb 15 18

   
Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy