Catálogo de publicaciones - revistas

Compartir en
redes sociales


ACM Computing Surveys (CSUR)

Resumen/Descripción – provisto por la editorial en inglés
A journal of the Association for Computing Machinery (ACM), which publishes surveys, tutorials, and special reports on all areas of computing research. Volumes are published yearly in four issues appearing in March, June, September, and December.
Palabras clave – provistas por la editorial

No disponibles.

Disponibilidad
Institución detectada Período Navegá Descargá Solicitá
No detectada desde mar. 1969 / hasta dic. 2023 ACM Digital Library

Información

Tipo de recurso:

revistas

ISSN impreso

0360-0300

ISSN electrónico

1557-7341

Editor responsable

Association for Computing Machinery (ACM)

País de edición

Estados Unidos

Fecha de publicación

Tabla de contenidos

Hypergraph Acyclicity Revisited

Johann Brault-Baron

<jats:p> The notion of graph acyclicity has been extended to several notions of hypergraph acyclicity. In increasing order of generality: <jats:italic>gamma</jats:italic> acyclicity, <jats:italic>beta</jats:italic> acyclicity, and <jats:italic>alpha</jats:italic> acyclicity have met a great interest in many fields. </jats:p> <jats:p>For each notion, we prove the equivalence between the numerous characterizations with a new, simpler proof, in a self-contained manner. For that purpose, we introduce new notions of alpha, beta, and gamma leaf that allow one to define new “rule-based” characterizations of each notion.</jats:p> <jats:p>The combined presentation of the notions is completed with a study of their respective closure properties. New closure results are established, and alpha, beta, and gamma acyclicity are proved optimal w.r.t. their closure properties.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-26

Understanding GPU Power

Robert A. Bridges; Neena Imam; Tiffany M. Mintz

<jats:p>Modern graphics processing units (GPUs) have complex architectures that admit exceptional performance and energy efficiency for high-throughput applications. Although GPUs consume large amounts of power, their use for high-throughput applications facilitate state-of-the-art energy efficiency and performance. Consequently, continued development relies on understanding their power consumption. This work is a survey of GPU power modeling and profiling methods with increased detail on noteworthy efforts. As direct measurement of GPU power is necessary for model evaluation and parameter initiation, internal and external power sensors are discussed. Hardware counters, which are low-level tallies of hardware events, share strong correlation to power use and performance. Statistical correlation between power and performance counters has yielded worthwhile GPU power models, yet the complexity inherent to GPU architectures presents new hurdles for power modeling. Developments and challenges of counter-based GPU power modeling are discussed. Often building on the counter-based models, research efforts for GPU power simulation, which make power predictions from input code and hardware knowledge, provide opportunities for optimization in programming or architectural design. Noteworthy strides in power simulations for GPUs are included along with their performance or functional simulator counterparts when appropriate. Last, possible directions for future research are discussed.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-27

Techniques and Devices Used in Palpation Simulation with Haptic Feedback

Mateus L. Ribeiro; Henrique Manoel Lederman; Simone Elias; FÁtima L. S. Nunes

<jats:p>Palpation exam is a procedure in which a healthcare professional presses a specific region of a patient’s body with the fingers in order to detect the presence of features and abnormalities under the skin. A simulator that aids the training of this procedure may contribute to the learning of the technique and the improvement of its implementation in real patients. This article presents a systematic review conducted in order to assess the state of the art of the simulation of the palpation procedure, providing a categorization of techniques and approaches used in systems with haptic feedback. The results indicate that there are existing gaps concerning the accessibility of the haptic devices, innovative methods to calculate force feedback and deformation caused by haptic devices, and user experience improvement, since most of the studies consider only one point of contact, which can limit the simulation realism.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-28

*droid

Bradley Reaves; Jasmine Bowers; Sigmund Albert Gorski III; Olabode Anise; Rahul Bobhate; Raymond Cho; Hiranava Das; Sharique Hussain; Hamza Karachiwala; Nolen Scaife; Byron Wright; Kevin Butler; William Enck; Patrick Traynor

<jats:p>The security research community has invested significant effort in improving the security of Android applications over the past half decade. This effort has addressed a wide range of problems and resulted in the creation of many tools for application analysis. In this article, we perform the first systematization of Android security research that analyzes applications, characterizing the work published in more than 17 top venues since 2010. We categorize each paper by the types of problems they solve, highlight areas that have received the most attention, and note whether tools were ever publicly released for each effort. Of the released tools, we then evaluate a representative sample to determine how well application developers can apply the results of our community’s efforts to improve their products. We find not only that significant work remains to be done in terms of research coverage but also that the tools suffer from significant issues ranging from lack of maintenance to the inability to produce functional output for applications with known vulnerabilities. We close by offering suggestions on how the community can more successfully move forward.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-30

Mapping Virtual Machines onto Physical Machines in Cloud Computing

Ilia Pietri; Rizos Sakellariou

<jats:p>Cloud computing enables users to provision resources on demand and execute applications in a way that meets their requirements by choosing virtual resources that fit their application resource needs. Then, it becomes the task of cloud resource providers to accommodate these virtual resources onto physical resources. This problem is a fundamental challenge in cloud computing as resource providers need to map virtual resources onto physical resources in a way that takes into account the providers’ optimization objectives. This article surveys the relevant body of literature that deals with this mapping problem and how it can be addressed in different scenarios and through different objectives and optimization techniques. The evaluation aspects of different solutions are also considered. The article aims at both identifying and classifying research done in the area adopting a categorization that can enhance understanding of the problem.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-30

Attestation in Wireless Sensor Networks

Rodrigo Vieira Steiner; Emil Lupu

<jats:p>Attestation is a mechanism used by a trusted entity to validate the software integrity of an untrusted platform. Over the past few years, several attestation techniques have been proposed. While they all use variants of a challenge-response protocol, they make different assumptions about what an attacker can and cannot do. Thus, they propose intrinsically divergent validation approaches. We survey in this article the different approaches to attestation, focusing in particular on those aimed at Wireless Sensor Networks. We discuss the motivations, challenges, assumptions, and attacks of each approach. We then organise them into a taxonomy and discuss the state of the art, carefully analysing the advantages and disadvantages of each proposal. We also point towards the open research problems and give directions on how to address them.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-31

A Survey of Wearable Biometric Recognition Systems

Jorge Blasco; Thomas M. Chen; Juan Tapiador; Pedro Peris-Lopez

<jats:p>The growing popularity of wearable devices is leading to new ways to interact with the environment, with other smart devices, and with other people. Wearables equipped with an array of sensors are able to capture the owner’s physiological and behavioural traits, thus are well suited for biometric authentication to control other devices or access digital services. However, wearable biometrics have substantial differences from traditional biometrics for computer systems, such as fingerprints, eye features, or voice. In this article, we discuss these differences and analyse how researchers are approaching the wearable biometrics field. We review and provide a categorization of wearable sensors useful for capturing biometric signals. We analyse the computational cost of the different signal processing techniques, an important practical factor in constrained devices such as wearables. Finally, we review and classify the most recent proposals in the field of wearable biometrics in terms of the structure of the biometric system proposed, their experimental setup, and their results. We also present a critique of experimental issues such as evaluation and feasibility aspects, and offer some final thoughts on research directions that need attention in future work.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-35

Connected Car

Riccardo Coppola; Maurizio Morisio

<jats:p>The connected car—a vehicle capable of accessing to the Internet, of communicating with smart devices as well as other cars and road infrastructures, and of collecting real-time data from multiple sources—is likely to play a fundamental role in the foreseeable Internet Of Things. In a context ruled by very strong competitive forces, a significant amount of car manufacturers and software and hardware developers have already embraced the challenge of providing innovative solutions for new-generation vehicles. Today’s cars are asked to relieve drivers from the most stressful operations needed for driving, providing them with interesting and updated entertainment functions. In the meantime, they have to comply with the increasingly stringent standards about safety and reliability. The aim of this article is to provide an overview of the possibilities offered by connected functionalities on cars and the associated technological issues and problems, as well as to enumerate the currently available hardware and software solutions and their main features.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-36

Gaussian Random Number Generation

Jamshaid Sarwar Malik; Ahmed Hemani

<jats:p> Some excellent surveys of the Gaussian random number generators (GRNGs) from the algorithmic perspective exist in the published literature to date (e.g., Thomas et al. [2007]). In the last decade, however, advancements in digital hardware have resulted in an ever-decreasing hardware cost and increased design flexibility. Additionally, recent advances in applications like gaming, weather forecasting, and simulations in physics and astronomy require faster, cheaper, and statistically accurate GRNGs. These two trends have contributed toward the development of a number of novel GRNG architectures optimized for hardware design. A detailed comparative study of these hardware architectures has been somewhat missing in the published literature. This work provides the potential user a capsulization of the published hardware GRNG architectures. We have provided the method and theory, pros and cons, and a comparative summary of the speed, statistical accuracy, and hardware resource utilization of these architectures. Finally, we have complemented this work by describing two novel hardware GRNG architectures, namely, the CLT-inversion and the multihat algorithm, respectively. These new architectures provide high tail accuracy ( <jats:italic>6σ</jats:italic> and <jats:italic>8σ</jats:italic> , respectively) at a low hardware cost. </jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-37

A Survey of Signed Network Mining in Social Media

Jiliang Tang; Yi Chang; Charu Aggarwal; Huan Liu

<jats:p>Many real-world relations can be represented by signed networks with positive and negative links, as a result of which signed network analysis has attracted increasing attention from multiple disciplines. With the increasing prevalence of social media networks, signed network analysis has evolved from developing and measuring theories to mining tasks. In this article, we present a review of mining signed networks in the context of social media and discuss some promising research directions and new frontiers. We begin by giving basic concepts and unique properties and principles of signed networks. Then we classify and review tasks of signed network mining with representative algorithms. We also delineate some tasks that have not been extensively studied with formal definitions and also propose research directions to expand the field of signed network mining.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-37