Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
View:  Show:    

Hardware (B)
A low-cost and high-performance architecture for robust human detection using histogram of edge oriented gradients : Microprocessors & Microsystems

Due to their programmability and hardware parallelism, field-programmable gate arrays (FPGAs) will be widely used to speed up edge/cloud computation on...
Microprocessors & computers (B.7.1...) | Nov 13 17

Computer Systems Organization (C)
Traleika Glacier : Parallel Computing

Exascale computers require new technologies in both hardware and software because of the increased gap between various memory structures and computational units and the decreased reliability of components due the sheer size of the machine and small scale of the individual...
Processor Architectures (C.1) | Dec 4 17

Coarray-based load balancing on heterogeneous and many-core architectures : Parallel Computing

Load balancing to gain performance and energy efficiency within a heterogeneous processing environment, which contains processing units with different specialized cores and memory...
Parallel Processors (C.1.2...) | Dec 12 17

Improving loop dependence analysis : ACM Transactions on Architecture and Code Optimization

Research on multicore utilization embraces three major categories of topics: investigations regarding the issues of multicore interaction functionality, operating system affairs and compilers, and programming...
SIMD Processors (C.1.2...) | Dec 7 17

Lightweight cybersecurity schemes using elliptic curve cryptography in publish-subscribe fog computing : Mobile Networks and Applications

Diro et al. “propose novel lightweight security solutions for publish-subscribe protocol-based Internet of Things [IoT] in fog networks...
Security & Protection (C.2.0...) | Nov 29 17

Security in high-performance computing environments : Communications of the ACM

Peisert starts with the question of whether there is any difference between high-performance computing and the traditional computational environment in terms of security. Apparently, there are no profound...
Security & Protection (C.2.0...) | Nov 28 17

Decentralised peer-to-peer data dissemination in wireless sensor networks : Pervasive and Mobile Computing

Can edge sensor data reliably route through unreliable networks using a unique decentralized routing framework? New research describes how using a framework of...
Peer-to-Peer Computing (C.2.1...) | Dec 8 17

Software (D)
Decoding the representation of code in the brain: an fMRI study of code review and expertise : ICSE 17

This paper presents an excellent example of an inter-disciplinary study to understand how the human brain processes common software engineering tasks by using medical imaging. Subjectivity is an inherent...
Coding Tools & Techniques (D.2.3) | Oct 20 17

The science of brute force : Communications of the ACM

This paper’s main contribution is a nice introduction of the Boolean satisfiability (SAT) problem to the general public. The basic idea is that the brute force approach of SAT to problem solving, called brute reasoning, is relevant. Despite the untamed aspect of brute...
Software/Program Verification (D.2.4) | Dec 6 17

Incremental bounded model checking for embedded software : Formal Aspects of Computing

Bounded model checking is employed in tools for the formal verification of C programs such as the C bounded model checker (CBMC). The key idea of this technique is to unwind unbounded program loops to a...
Model Checking (D.2.4...) | Dec 4 17

Hardware (B)

Fundamentals of IP and SoC security: design, verification, and debug

The ubiquity of connected devices (smartphones, home assistants, health trackers, and emerging autonomous cars) can be attributed to the advancement of shrinking semiconductor technology. Apart from the...
General (B.7.0) | Nov 14 17

Computer Systems Organization (C)

Rolling out 5G: use cases, applications, and technology solutions

5G telephones! How long ago was 4G? 4G long-term evolution (LTE)? It was introduced about eight years ago--eons in technology years--and is still being deployed in many areas. It also continues...
Wireless Communication (C.2.1...) | Nov 7 17

Practical packet analysis (3rd ed.)

The study of the operation of network protocols, as well as the improvement of a network’s functionality and security, are the main aspects that network packet analysis considers. Known as both a software protocol analysis and a packet sniffer application...
Network Monitoring (C.2.3...) | Dec 5 17

Mobile sensors and context-aware computing

I am disappointed in this book. I’m an engineer designing distributed Internet of Things (IoT) systems as well as a part-time college instructor, and I was hoping for a future-oriented discussion of the evolution of...
Real-Time & Embedded Systems (C.3...) | Nov 16 17

Non-volatile in-memory computing by spintronics

With quintillions of calculations per second, exascale computing is a challenge for the world of scientific discovery and for advancing economic competitiveness. In certain applications such as climate change and...
Performance of Systems (C.4) | Dec 11 17

Software (D)

The habit-forming guide to becoming a systems thinker

This is a new and fresh publication from the Waters Foundation that pulls back the curtain on the wizards of systems thinking, so to speak, to eliminate the mystery of this important, but often obtuse, body of...
General (D.0) | Nov 20 17

Elements of parallel computing

Elements of parallel computing is a short introductory text aimed at undergraduate computer science (CS) students or students and researchers in disciplines other than CS who want to gain skills in parallel programming. The book presents basic concepts of parallel...
Parallel Programming (D.1.3...) | Nov 27 17

Classical Fortran: programming for engineering and scientific applications (2nd ed.)

Should scientists and engineers learn Fortran? The answer is, “Yes, of course.” Fortran is still the dominant programming language in scientific computing [1,2]. That answer probably means modern Fortran...
Sequential Programming (D.1.4) | Nov 27 17

Object-orientation, abstraction, and data structures using Scala (2nd ed.)

The topic of language choice for teaching programming often results in enthusiastic (sometimes irate) discussion. While Java, Python, and JavaScript are the most often championed choices, others such...
Object-Oriented Programming (D.1.5) | Nov 27 17

Reactive programming with Angular and ngrx

Many programmers may not be aware of the fact that JavaScript has a powerful functional programming subset. The use of callbacks is very common, but is only a small part of how functional techniques can improve the conciseness, readability, and maintainability...
Object-Oriented Programming (D.1.5) | Nov 9 17

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy