Catálogo de publicaciones - revistas

Compartir en
redes sociales


ACM Computing Surveys (CSUR)

Resumen/Descripción – provisto por la editorial en inglés
A journal of the Association for Computing Machinery (ACM), which publishes surveys, tutorials, and special reports on all areas of computing research. Volumes are published yearly in four issues appearing in March, June, September, and December.
Palabras clave – provistas por la editorial

No disponibles.

Disponibilidad
Institución detectada Período Navegá Descargá Solicitá
No detectada desde mar. 1969 / hasta dic. 2023 ACM Digital Library

Información

Tipo de recurso:

revistas

ISSN impreso

0360-0300

ISSN electrónico

1557-7341

Editor responsable

Association for Computing Machinery (ACM)

País de edición

Estados Unidos

Fecha de publicación

Tabla de contenidos

Survey of scheduling techniques for addressing shared resources in multicore processors

Sergey Zhuravlev; Juan Carlos Saez; Sergey Blagodurov; Alexandra Fedorova; Manuel Prieto

<jats:p>Chip multicore processors (CMPs) have emerged as the dominant architecture choice for modern computing platforms and will most likely continue to be dominant well into the foreseeable future. As with any system, CMPs offer a unique set of challenges. Chief among them is the shared resource contention that results because CMP cores are not independent processors but rather share common resources among cores such as the last level cache (LLC). Shared resource contention can lead to severe and unpredictable performance impact on the threads running on the CMP. Conversely, CMPs offer tremendous opportunities for mulithreaded applications, which can take advantage of simultaneous thread execution as well as fast inter thread data sharing. Many solutions have been proposed to deal with the negative aspects of CMPs and take advantage of the positive. This survey focuses on the subset of these solutions that exclusively make use of OS thread-level scheduling to achieve their goals. These solutions are particularly attractive as they require no changes to hardware and minimal or no changes to the OS. The OS scheduler has expanded well beyond its original role of time-multiplexing threads on a single core into a complex and effective resource manager. This article surveys a multitude of new and exciting work that explores the diverse new roles the OS scheduler can successfully take on.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-28

On physical-layer identification of wireless devices

Boris Danev; Davide Zanetti; Srdjan Capkun

<jats:p>Physical-layer device identification aims at identifying wireless devices during radio communication by exploiting unique characteristics of their analog (radio) circuitry. This work systematizes the existing knowledge on this topic in order to enable a better understanding of device identification, its implications on the analysis and design of security solutions in wireless networks and possible applications. We therefore present a systematic review of physical-layer identification systems and provide a summary of current state-of-the-art techniques. We further present a classification of attacks and discuss the feasibility, limitations, and implications in selected applications. We also highlight issues that are still open and need to be addressed in future work.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-29

Time-series data mining

Philippe Esling; Carlos Agon

<jats:p>In almost every scientific field, measurements are performed over time. These observations lead to a collection of organized data called<jats:italic>time series</jats:italic>. The purpose of time-series data mining is to try to extract all meaningful knowledge from the<jats:italic>shape</jats:italic>of data. Even if humans have a natural capacity to perform these tasks, it remains a complex problem for computers. In this article we intend to provide a survey of the techniques applied for time-series data mining. The first part is devoted to an overview of the tasks that have captured most of the interest of researchers. Considering that in most cases, time-series task relies on the same components for implementation, we divide the literature depending on these common aspects, namely<jats:italic>representation</jats:italic>techniques,<jats:italic>distance</jats:italic>measures, and<jats:italic>indexing</jats:italic>methods. The study of the relevant literature has been categorized for each individual aspects. Four types of robustness could then be formalized and any kind of distance could then be classified. Finally, the study submits various research trends and avenues that can be explored in the near future. We hope that this article can provide a broad and deep understanding of the time-series data mining research field.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-34

A survey and projection on medium access control protocols for wireless sensor networks

Yi Zhi Zhao; Chunyan Miao; Maode Ma; Jing Bing Zhang; Cyril Leung

<jats:p> Recent advances in wireless communications and sensor technologies have enabled the development of low-cost wireless sensor networks (WSNs) for a wide range of applications. Medium access control (MAC) protocols play a crucial role in WSNs by enabling the sharing of scarce wireless bandwidth efficiently and fairly. This article provides a survey of the literature on MAC protocols for WSNs. We first briefly describe the unique features of WSNs. We then review representative MAC protocols from the following four categories: <jats:italic>contention-based protocols, contention-free (scheduled-based) protocols, hybrid protocols</jats:italic> , and <jats:italic>preamble sampling protocols.</jats:italic> Our discussions focus on the background, main features, operation procedures, major design issues, and the advantages and disadvantages of these protocols. We also present an analysis of the inherent and desirable features of the protocols, and the key challenges of MAC technology for WSNs. Finally, we present our view on future research directions for WSN MAC protocols in a reader-friendly way using illustrative diagrams. </jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-37

Ensemble approaches for regression

João Mendes-Moreira; Carlos Soares; Alípio Mário Jorge; Jorge Freire De Sousa

<jats:p>The goal of ensemble regression is to combine several models in order to improve the prediction accuracy in learning problems with a numerical target variable. The process of ensemble learning can be divided into three phases: the generation phase, the pruning phase, and the integration phase. We discuss different approaches to each of these phases that are able to deal with the regression problem, categorizing them in terms of their relevant characteristics and linking them to contributions from different fields. Furthermore, this work makes it possible to identify interesting areas for future research.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-40

Translation techniques in cross-language information retrieval

Dong Zhou; Mark Truran; Tim Brailsford; Vincent Wade; Helen Ashman

<jats:p>Cross-language information retrieval (CLIR) is an active sub-domain of information retrieval (IR). Like IR, CLIR is centered on the search for documents and for information contained within those documents. Unlike IR, CLIR must reconcile queries and documents that are written in different languages. The usual solution to this mismatch involves translating the query and/or the documents before performing the search. Translation is therefore a pivotal activity for CLIR engines. Over the last 15 years, the CLIR community has developed a wide range of techniques and models supporting free text translation. This article presents an overview of those techniques, with a special emphasis on recent developments.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-44

Dependability modeling and analysis of software systems specified with UML

Simona Bernardi; José Merseguer; Dorina C. Petriu

<jats:p>The goal is to survey dependability modeling and analysis of software and systems specified with UML, with focus on reliability, availability, maintainability, and safety (RAMS). From the literature published in the last decade, 33 approaches presented in 43 papers were identified. They are evaluated according to three sets of criteria regarding UML modeling issues, addressed dependability characteristics, and quality assessment of the surveyed approaches. The survey shows that more works are devoted to reliability and safety, fewer to availability and maintainability, and none to integrity. Many methods support early life-cycle phases (from requirements to design). More research is needed for tool development to automate the derivation of analysis models and to give feedback to designers.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-48

Agent-based simulation for large-scale emergency response

Glenn I. Hawe; Graham Coates; Duncan T. Wilson; Roger S. Crouch

<jats:p> When attempting to determine how to respond optimally to a large-scale emergency, the ability to predict the consequences of certain courses of action <jats:italic>in silico</jats:italic> is of great utility. Agent-based simulations (ABSs) have become the de facto tool for this purpose; however, they may be used and implemented in a variety of ways. This article reviews existing implementations of ABSs for large-scale emergency response, and presents a taxonomy classifying them by usage. Opportunities for improving ABS for large-scale emergency response are identified. </jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-51

Privacy in mobile technology for personal healthcare

Sasikanth Avancha; Amit Baxi; David Kotz

<jats:p>Information technology can improve the quality, efficiency, and cost of healthcare. In this survey, we examine the privacy requirements of mobile computing technologies that have the potential to transform healthcare. Such<jats:italic>mHealth</jats:italic>technology enables physicians to remotely monitor patients' health and enables individuals to manage their own health more easily. Despite these advantages, privacy is essential for any personal monitoring technology. Through an extensive survey of the literature, we develop a conceptual privacy framework for mHealth, itemize the privacy properties needed in mHealth systems, and discuss the technologies that could support privacy-sensitive mHealth systems. We end with a list of open research questions.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-54

Search-based software engineering

Mark Harman; S. Afshin Mansouri; Yuanyuan Zhang

<jats:p>In the past five years there has been a dramatic increase in work on Search-Based Software Engineering (SBSE), an approach to Software Engineering (SE) in which Search-Based Optimization (SBO) algorithms are used to address problems in SE. SBSE has been applied to problems throughout the SE lifecycle, from requirements and project planning to maintenance and reengineering. The approach is attractive because it offers a suite of adaptive automated and semiautomated solutions in situations typified by large complex problem spaces with multiple competing and conflicting objectives.</jats:p><jats:p>This article<jats:sup>1</jats:sup>provides a review and classification of literature on SBSE. The work identifies research trends and relationships between the techniques applied and the applications to which they have been applied and highlights gaps in the literature and avenues for further research.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-61