Catálogo de publicaciones - revistas

Compartir en
redes sociales


ACM Computing Surveys (CSUR)

Resumen/Descripción – provisto por la editorial en inglés
A journal of the Association for Computing Machinery (ACM), which publishes surveys, tutorials, and special reports on all areas of computing research. Volumes are published yearly in four issues appearing in March, June, September, and December.
Palabras clave – provistas por la editorial

No disponibles.

Disponibilidad
Institución detectada Período Navegá Descargá Solicitá
No detectada desde mar. 1969 / hasta dic. 2023 ACM Digital Library

Información

Tipo de recurso:

revistas

ISSN impreso

0360-0300

ISSN electrónico

1557-7341

Editor responsable

Association for Computing Machinery (ACM)

País de edición

Estados Unidos

Fecha de publicación

Tabla de contenidos

Thinking Like a Vertex

Robert Ryan McCune; Tim Weninger; Greg Madey

<jats:p>The vertex-centric programming model is an established computational paradigm recently incorporated into distributed processing frameworks to address challenges in large-scale graph processing. Billion-node graphs that exceed the memory capacity of commodity machines are not well supported by popular Big Data tools like MapReduce, which are notoriously poor performing for iterative graph algorithms such as PageRank. In response, a new type of framework challenges one to “think like a vertex” (TLAV) and implements user-defined programs from the perspective of a vertex rather than a graph. Such an approach improves locality, demonstrates linear scalability, and provides a natural way to express and compute many iterative graph algorithms. These frameworks are simple to program and widely applicable but, like an operating system, are composed of several intricate, interdependent components, of which a thorough understanding is necessary in order to elicit top performance at scale. To this end, the first comprehensive survey of TLAV frameworks is presented. In this survey, the vertex-centric approach to graph processing is overviewed, TLAV frameworks are deconstructed into four main components and respectively analyzed, and TLAV implementations are reviewed and categorized.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-39

A Survey on Trust Modeling

Jin-Hee Cho; Kevin Chan; Sibel Adali

<jats:p>The concept of trust and/or trust management has received considerable attention in engineering research communities as trust is perceived as the basis for decision making in many contexts and the motivation for maintaining long-term relationships based on cooperation and collaboration. Even if substantial research effort has been dedicated to addressing trust-based mechanisms or trust metrics (or computation) in diverse contexts, prior work has not clearly solved the issue of how to model and quantify trust with sufficient detail and context-based adequateness. The issue of trust quantification has become more complicated as we have the need to derive trust from complex, composite networks that may involve four distinct layers of communication protocols, information exchange, social interactions, and cognitive motivations. In addition, the diverse application domains require different aspects of trust for decision making such as emotional, logical, and relational trust. This survey aims to outline the foundations of trust models for applications in these contexts in terms of the concept of trust, trust assessment, trust constructs, trust scales, trust properties, trust formulation, and applications of trust. We discuss how different components of trust can be mapped to different layers of a complex, composite network; applicability of trust metrics and models; research challenges; and future work directions.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-40

How Close are We to Realizing a Pragmatic VANET Solution? A Meta-Survey

Mukesh Saini; Abdulhameed Alelaiwi; Abdulmotaleb El Saddik

<jats:p>Vehicular Ad-hoc Networks (VANETs) are seen as the key enabling technology of Intelligent Transportation Systems (ITS). In addition to safety, VANETs also provide a cost-effective platform for numerous comfort and entertainment applications. A pragmatic solution of VANETs requires synergistic efforts in multidisciplinary areas of communication standards, routings, security and trust. Furthermore, a realistic VANET simulator is required for performance evaluation. There have been many research efforts in these areas, and consequently, a number of surveys have been published on various aspects. In this article, we first explain the key characteristics of VANETs, then provide a meta-survey of research works. We take a tutorial approach to introducing VANETs and gradually discuss intricate details. Extensive listings of existing surveys and research projects have been provided to assess development efforts. The article is useful for researchers to look at the big picture and channel their efforts in an effective way.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-40

Systems of Systems Engineering

Claus Ballegaard Nielsen; Peter Gorm Larsen; John Fitzgerald; Jim Woodcock; Jan Peleska

<jats:p>The term “System of Systems” (SoS) has been used since the 1950s to describe systems that are composed of independent constituent systems, which act jointly towards a common goal through the synergism between them. Examples of SoS arise in areas such as power grid technology, transport, production, and military enterprises. SoS engineering is challenged by the independence, heterogeneity, evolution, and emergence properties found in SoS. This article focuses on the role of model-based techniques within the SoS engineering field. A review of existing attempts to define and classify SoS is used to identify several dimensions that characterise SoS applications. The SoS field is exemplified by a series of representative systems selected from the literature on SoS applications. Within the area of model-based techniques the survey specifically reviews the state of the art for SoS modelling, architectural description, simulation, verification, and testing. Finally, the identified dimensions of SoS characteristics are used to identify research challenges and future research areas of model-based SoS engineering.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-41

Mapping QoE through QoS in an Approach to DDB Architectures

Ramon Hugo De Souza; Mário Antônio Ribeiro Dantas

<jats:p>In the context of distributed databases (DDBs), the absence of mathematically well defined equations to evaluate quality of service (QoS), especially with statistical models, seems to have taken database community attention from the possible performance guarantees that could be handled by concepts related to quality of experience (QoE). In this article, we targeted the definition of QoE based on completeness of QoS to deal with decisions concerning with performance correction in a system level. This study also presents a statistical bibliometric analysis before the proposed model. The idea was to show the origin of first studies with correlated focus, which also have initial conceptualizations, and then propose a new model. This model concerns concise QoS definitions, grouped to provide a basis for QoE analysis. Afterward, it is foreseen that a DDB system will be able to autoevaluate and be aware of recovering situations before they happen.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-41

A Survey on Lightweight Entity Authentication with Strong PUFs

Jeroen Delvaux; Roel Peeters; Dawu Gu; Ingrid Verbauwhede

<jats:p> <jats:italic>Physically unclonable functions</jats:italic> (PUFs) exploit the unavoidable manufacturing variations of an Integrated Circuit (IC). Their input-output behavior serves as a unique IC “fingerprint.” Therefore, they have been envisioned as an IC authentication mechanism, in particular the subclass of so-called strong PUFs. The protocol proposals are typically accompanied with two PUF promises: lightweight and an increased resistance against physical attacks. In this work, we review 19 proposals in chronological order: from the original strong PUF proposal (2001) to the more complicated noise bifurcation and system of PUF proposals (2014). The assessment is aided by a unified notation and a transparent framework of PUF protocol requirements. </jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-42

Trust and Reputation Models for Multiagent Systems

Jones Granatyr; Vanderson Botelho; Otto Robert Lessing; Edson Emílio Scalabrin; Jean-Paul Barthès; Fabrício Enembreck

<jats:p>Finding reliable partners to interact with in open environments is a challenging task for software agents, and trust and reputation mechanisms are used to handle this issue. From this viewpoint, we can observe the growing body of research on this subject, which indicates that these mechanisms can be considered key elements to design multiagent systems (MASs). Based on that, this article presents an extensive but not exhaustive review about the most significant trust and reputation models published over the past two decades, and hundreds of models were analyzed using two perspectives. The first one is a combination of trust dimensions and principles proposed by some relevant authors in the field, and the models are discussed using an MAS perspective. The second one is the discussion of these dimensions taking into account some types of interaction found in MASs, such as coalition, argumentation, negotiation, and recommendation. By these analyses, we aim to find significant relations between trust dimensions and types of interaction so it would be possible to construct MASs using the most relevant dimensions according to the types of interaction, which may help developers in the design of MASs.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-42

Verifying Linearisability

Brijesh Dongol; John Derrick

<jats:p>Linearisability is a key correctness criterion for concurrent data structures, ensuring that each history of the concurrent object under consideration is consistent with respect to a history of the corresponding abstract data structure. Linearisability allows concurrent (i.e., overlapping) operation calls to take effect in any order, but requires the real-time order of nonoverlapping to be preserved. The sophisticated nature of concurrent objects means that linearisability is difficult to judge, and hence, over the years, numerous techniques for verifying lineasizability have been developed using a variety of formal foundations such as data refinement, shape analysis, reduction, etc. However, because the underlying framework, nomenclature, and terminology for each method is different, it has become difficult for practitioners to evaluate the differences between each approach, and hence, evaluate the methodology most appropriate for verifying the data structure at hand. In this article, we compare the major of methods for verifying linearisability, describe the main contribution of each method, and compare their advantages and limitations.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-43

Energy Efficiency Techniques in Cloud Computing

Tarandeep Kaur; Inderveer Chana

<jats:p>The increase in energy consumption is the most critical problem worldwide. The growth and development of complex data-intensive applications have promulgated the creation of huge data centers that have heightened the energy demand. In this article, the need for energy efficiency is emphasized by discussing the dual role of cloud computing as a major contributor to increasing energy consumption and as a method to reduce energy wastage. This article comprehensively and comparatively studies existing energy efficiency techniques in cloud computing and provides the taxonomies for the classification and evaluation of the existing studies. The article concludes with a summary providing valuable suggestions for future enhancements.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-46

Deterministic Replay

Yunji Chen; Shijin Zhang; Qi Guo; Ling Li; Ruiyang Wu; Tianshi Chen

<jats:p>Deterministic replay is a type of emerging technique dedicated to providing deterministic executions of computer programs in the presence of nondeterministic factors. The application scopes of deterministic replay are very broad, making it an important research topic in domains such as computer architecture, operating systems, parallel computing, distributed computing, programming languages, verification, and hardware testing.</jats:p> <jats:p> In this survey, we comprehensively review existing studies on deterministic replay by introducing a taxonomy. Basically, existing deterministic replay schemes can be classified into two categories, <jats:italic>single-processor</jats:italic> (SP) schemes and <jats:italic>multiprocessor</jats:italic> (MP) schemes. By reviewing the details of these two categories of schemes respectively, we summarize and compare how existing schemes address technical issues such as log size, record slowdown, replay slowdown, implementation cost, and probe effect, which may shed some light on future studies on deterministic replay. </jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-47