Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
May 23, 2017

GPU-accelerated Hungarian algorithms for the linear assignment problem
The paper is devoted to a fundamental problem in the area of combinatorial optimization--the assignment problem. The goal is to find a maximum (or minimum) weight matching in a weighted bipartite graph. The authors focus on the Hungarian algorithm, which solves the linear... more
With this issue, COMPUTING REVIEWS changes editorial management for the first time in its three-year history. The new editorial staff sincerely pays tribute to the splendid... more
- Computing Reviews (1963)
Counting and generating permutations in regular classes: Algorithmica

The signature of a permutation can be described in terms of two symbols that represent ascent and descent in the ordering of the elements. For each regular language (that can be recognized by a... more

Permutations & Combinations (G.2.1...) | May 19 17

A GPU-based branch-and-bound algorithm using IntegerVectorMatrix data structure: Parallel Computing

Gmys et al. address the parallelization of the popular branch-and-bound (B&B) algorithm for solving combinatorial optimization problems using graphics processing units (GPUs)... more

Combinatorial Algorithms (G.2.1...) | May 17 17

Mobile demand profiling for cellular cognitive networking: IEEE Transactions on Mobile Computing

Furno et al. describe a framework for automated demand profiling in mobile networks. Since participants in mobile communications can move around, both spatial as well as temporal characteristics of... more

Cellular Architecture (C.1.3...) | May 16 17

The AXIOM software layers: Microprocessors & Microsystems

AXIOM is a project aimed at building a hardware substrate and software layers to target cyber-physical systems (CPS) that interact with users in real-time running... more

Heterogeneous (Hybrid) Systems (C.1.3...) | May 15 17

Encode when necessary: correlated network coding under unreliable wireless links: ACM Transactions on Sensor Networks

The broadcast nature of wireless communication is the reason for interference. Interference is one of the factors in the attenuation of effective power and the decrease in data rate in the receivers... more

Network Protocols (C.2.2) | May 12 17

Efficient memory-mapped I/O on fast storage device: ACM Transactions on Storage

Data-intensive applications tend to use a large quantity of dynamic random-access memory (DRAM) using DRAM caching. This is relatively expensive, but using insufficient DRAM can lead to paging some... more

Storage Management (D.4.2) | May 12 17

Ring-shaped hotspot detection: IEEE Transactions on Knowledge and Data Engineering

What is the best way to search for an annular object? Such problems arise in situations as diverse as meteorite craters and the spread of infections. Previous methods of spatial searching have normally... more

Algorithm Design & Analysis (G.4...) | May 12 17

Software-defined mobile networks security: Mobile Networks and Applications

The tremendous success of mobile devices and their applications raises a lot of questions regarding security, quality of service, and user satisfaction. It is therefore... more

Mobile Processors (C.1.4...) | May 12 17

Scalability of broadcast performance in wireless network-on-chip: IEEE Transactions on Parallel and Distributed Systems

This paper analyzes the limitations of traditional network-on-a-chip (NoC or NOC) architectures and proposes a modified architectural paradigm called WNoC. NOC is a communication architecture... more

Wireless Communication (C.2.1...) | May 11 17

Assessing the epistemological relevance of Dung-style argumentation theories: Annals of Mathematics and Artificial Intelligence

Phan Minh Dung described a model for argumentation in Artificial Intelligence in 1995 [1]. The model presents an argument framework as a collection of... more

Rational Approximation (G.1.2...) | May 11 17

Building a comprehensive IT security program: practical guidelines and best practices

Security is similar to insurance. One buys insurance as a hedge against a severe, unexpected event. One buys a security system or implements a security program for... more
Security & Protection (K.6.5) | May 23 17

Multilayer control of networked cyber-physical systems: application to monitoring, autonomous and robot systems

A highly specialized overview of an area of industrial control, Multilayer control of networked cyber-physical systems (NCPSs) offers a detailed account of the concept, the theory, and some... more
Real-Time & Embedded Systems (C.3...) | May 22 17

Internet of Things from hype to reality

Written by two Cisco engineers (Ammar Rayes and Samer Salam), this book is a very interesting summary of all you need to know about the Internet of Things (IoT). The book is divided into 11 chapters, plus an appendix and a glossary. Although the... more
Real-Time & Embedded Systems (C.3...) | May 18 17

Metadata: shaping knowledge from antiquity to the semantic web

This highly readable, clear, and accessible book by Richard Gartner demonstrates that the term “metadata” is neither--on the one hand--an exotic buzzword, nor--on the other hand--a reference to a... more
Semantic Networks (I.2.4...) | May 12 17

Radio frequency modulation made easy

At the core of modern computer networking is wireless communication. The modulation of transmitted information is the noise-immune and powerful vehicle that safely carries the weak source analog... more
Signal Processing Systems (C.3...) | May 12 17

Modeling and simulating software architectures: the Palladio approach

As a computer science (CS) academic responsible for supervising and marking large student projects, I am used to being presented with pages and pages of unified modeling language (UML) diagrams; this... more
Software Architectures (D.2.11) | May 11 17

SQL on big data: technology, architecture, and innovation

After a few years and many discussions about big data and its most well-known attributes (“volume, variety, velocity, veracity”), it is now recognized that big data is not so easy to master. To obtain value from it... more
SQL (H.2.3...) | May 11 17

Software architecture in action: designing and executing architectural models with SysADL grounded on the OMG SysML standard

This 234-page book is broken into 17 chapters and organized into four parts, each focused on a different aspect of software architecture. Each part is organized in a similar manner, with a clear focus... more
Software Architectures (D.2.11) | May 11 17

Event mining: algorithms and applications

A very interesting and well-structured survey work, Event mining: algorithms and applications succeeds in presenting a thorough overview of the most important characteristics of the field of event processing... more
Data Mining (H.2.8...) | May 11 17

Bibliometrics and research evaluation: uses and abuses

The field of bibliometrics has undergone tremendous development; quantitative scientometrics indicators, the main outcome, are used to measure practically every aspect of scientific production. Even promotion and... more
General (A.0) | May 10 17

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy