Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
View:  Show:    
 
 

General Literature (A)
Multimedia big data analytics: a survey : ACM Computing Surveys

Big data continues to grow exponentially. One source of that growth--multimedia data--has not received comprehensive study. The authors correct this deficit by presenting the results of a broad...
Introductory & Survey (A.1) | Jan 16 19


Hardware (B)
Modeling memristor radiation interaction events and the effect on neuromorphic learning circuits : ICONS 18

This paper presents several event models for memristor radiation interaction with Verilog-A. Radiation events can “affect all synapses or affect each synapse with different flux or...
Verilog (B.6.3...) | Jan 28 19


Computer Systems Organization (C)
An automatic proving approach to parameterized verification : ACM Transactions on Computational Logic

Network and security protocols occasionally require important but difficult to authenticate parameters such as the number in a communication party. The existing formal proofs of algorithms for verifying the...
Security & Protection (C.2.0...) | Feb 20 19

A long way to the top : IMC 18

Research communities that analyze parameters like Internet measurement, privacy, and network security typically use Internet top lists. As the selected Internet top list affects the research, it is very important...
Security and Protection (C.2.0...) | Feb 5 19

Coming of age: a longitudinal study of TLS deployment : IMC 18

The paper presents a longitudinal study of secure sockets layer/transport layer security (SSL/TLS) deployment. The datasets span periods from early 2012 and mid-2015 until now, and contain the TLS...
Security & Protection (C.2.0...) | Jan 28 19

Where did I leave my keys?: Lessons from the Juniper dual EC incident : Communications of the ACM

Safe networks require reliable operating systems free from security vulnerabilities. Trustworthy routers ought to use dependable cryptographic algorithms to protect data transmitted over insecure networks. But...
Security and Protection (C.2.0...) | Dec 27 18

A scalable and manageable IoT architecture based on transparent computing : Journal of Parallel and Distributed Computing

The Internet of things (IoT) has been emerging with a gradual tangible impact on everyday life. With such growth, its use cases are becoming more...
Distributed Systems (C.2.4) | Feb 6 19

PERSIST : Journal of Grid Computing

NoSQL application data stores often combine on-premise and public cloud resources. As a consequence, they may deal with heterogeneous technologies, flexible but less structured storage architectures, and dynamic changes. In this paper, the authors propose PERSIST...
Cloud Computing (C.2.4...) | Jan 9 19

Dataset popularity prediction for caching of CMS big data : Journal of Grid Computing

The Compact Muon Solenoid (CMS) experiment at the European Organization for Nuclear Research (CERN) is a collaboration between thousands of physicists using a distributed computing and storage infrastructure...
Grid Computing (C.2.4...) | Dec 24 18


Software (D)
Improving integrated development environment commands knowledge with recommender systems : ICSE-SEET 18

Integrated development environments (IDEs) are an essential part of software developers’ toolkits, enabling them to efficiently author, manage, and test...
General (D.2.0) | Feb 11 19


General Literature (A)

Advances in computers: volume 108

The Advances in Computers series started in 1960 [1]. Each year, several volumes are printed; each volume contains four to seven chapters, with each chapter written by leading researchers who summarize the state of the art in their specific field. Four volumes were...
General (A.0) | Dec 18 18


Computer Systems Organization (C)

Analytical performance modeling for computer systems (3rd ed.)

Performance measurement and modeling is essential for both real systems and systems being modeled in a research environment. Without good models and tests to verify that the systems match those models...
Modeling of Computer Architecture (C.0...) | Dec 17 18

Communication networks (2nd ed.)

The book is based on the authors’ lecture notes from an upper-division communication networks course taught at the University of California, Berkeley. They have used many textbooks over the years. This book was developed as a material for the course and as...
General (C.2.0) | Feb 4 19

Internet infrastructure

Textbooks on computer networking theory abound, as do practitioner guides to the setup and administration of web servers and other Internet services. However, books that combine the two are less common. This text is an attempt to fill that niche. The authors seek to...
Internet (C.2.1...) | Feb 8 19

Hypergraph theory in wireless communication networks

This short publication really fits in the “SpringerBriefs” series. Despite the fact that the book could be considered a long paper, it may interest researchers in the applications of mathematics field. The book starts with an overview of hypergraph theory [1,2]...
Wireless Communication (C.2.1...) | Jan 4 19

Distributed computing pearls

In computer science, the term “synchronization” can relate to coordination between processors or to contention. So I was expecting to find some program examples using the open message passing interface (OpenMPI) or a discussion of distributed...
Distributed Systems (C.2.4) | Feb 13 19


Software (D)

Practical C++ design

Not long before reviewing this book, I taught a class in C++ using Bjarne Stroustrup’s book Programming: principles and practices using C++ [1]. In four chapters (out of 26), Stroustrup has the reader build a small calculator, including several advanced features. I thought Practical C++ design would be a...
Object-Oriented Programming (D.1.5) | Feb 1 19

Predictive statistics

As stated in the preface, Predictive statistics “is an attempt to focus more heavily on the data than the formalism and to focus more heavily on the performance of predictors rather than the fit or physical interpretation of a model or other construct.” This clear and...
Statistical Methods (D.2.4...) | Dec 24 18

Practical Webix

Addressed to web developers who can use this toolkit for better web development, this book describes Webix: a user interface (UI) toolkit for building web applications. Webix is available in two versions: a standard (free) UI library under GNU license and...
JavaScript (D.3.2...) | Feb 1 19

Personal finance with Python

I have probably said this way too many times in reviews, but it remains true and to the point: one of the great things about learning Python programming is that it allows you to move more easily into other areas that you might want to learn about. In this case, you can go from...
Python (D.3.2...) | Jan 31 19

   
Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy