Catálogo de publicaciones - revistas

Compartir en
redes sociales


ACM Computing Surveys (CSUR)

Resumen/Descripción – provisto por la editorial en inglés
A journal of the Association for Computing Machinery (ACM), which publishes surveys, tutorials, and special reports on all areas of computing research. Volumes are published yearly in four issues appearing in March, June, September, and December.
Palabras clave – provistas por la editorial

No disponibles.

Disponibilidad
Institución detectada Período Navegá Descargá Solicitá
No detectada desde mar. 1969 / hasta dic. 2023 ACM Digital Library

Información

Tipo de recurso:

revistas

ISSN impreso

0360-0300

ISSN electrónico

1557-7341

Editor responsable

Association for Computing Machinery (ACM)

País de edición

Estados Unidos

Fecha de publicación

Tabla de contenidos

Scientific Workflows

Chee Sun LiewORCID; Malcolm P. Atkinson; Michelle Galea; Tan Fong Ang; Paul Martin; Jano I. Van Hemert

<jats:p>Modern scientific collaborations have opened up the opportunity to solve complex problems that require both multidisciplinary expertise and large-scale computational experiments. These experiments typically consist of a sequence of processing steps that need to be executed on selected computing platforms. Execution poses a challenge, however, due to (1) the<jats:italic>complexity and diversity of applications</jats:italic>, (2) the<jats:italic>diversity of analysis goals</jats:italic>, (3) the<jats:italic>heterogeneity of computing platforms</jats:italic>, and (4) the<jats:italic>volume and distribution of data</jats:italic>.</jats:p><jats:p>A common strategy to make these in silico experiments more manageable is to model them as<jats:italic>workflows</jats:italic>and to use a workflow management system to organize their execution. This article looks at the overall challenge posed by a new order of scientific experiments and the systems they need to be run on, and examines how this challenge can be addressed by workflows and workflow management systems. It proposes a taxonomy of workflow management system (WMS) characteristics, including aspects previously overlooked. This frames a review of prevalent WMSs used by the scientific community, elucidates their evolution to handle the challenges arising with the emergence of the “fourth paradigm,” and identifies research needed to maintain progress in this area.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-39

Visual Menu Techniques

Gilles BaillyORCID; Eric Lecolinet; Laurence Nigay

<jats:p>Menus are used for exploring and selecting commands in interactive applications. They are widespread in current systems and used by a large variety of users. As a consequence, they have motivated many studies in Human-Computer Interaction (HCI). Facing the large variety of menus, it is difficult to have a clear understanding of the design possibilities and to ascertain their similarities and differences. In this article, we address a main challenge of menu design: the need to characterize the design space of menus. To do this, we propose a taxonomy of menu properties that structures existing work on visual menus. As properties have an impact on the performance of the menu, we start by refining performance through a list of quality criteria and by reviewing existing analytical and empirical methods for quality evaluation. This taxonomy of menu properties is a step toward the elaboration of advanced predictive models of menu performance and the optimization of menus. A key point of this work is to focus both on menus and on the properties of menus, and then enable a fine-grained analysis in terms of performance.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-41

The Evolution of Android Malware and Android Analysis Techniques

Kimberly TamORCID; Ali Feizollah; Nor Badrul Anuar; Rosli Salleh; Lorenzo Cavallaro

<jats:p>With the integration of mobile devices into daily life, smartphones are privy to increasing amounts of sensitive information. Sophisticated mobile malware, particularly Android malware, acquire or utilize such data without user consent. It is therefore essential to devise effective techniques to analyze and detect these threats. This article presents a comprehensive survey on leading Android malware analysis and detection techniques, and their effectiveness against evolving malware. This article categorizes systems by methodology and date to evaluate progression and weaknesses. This article also discusses evaluations of industry solutions, malware statistics, and malware evasion techniques and concludes by supporting future research paths.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-41

Mobile Cloud Business Process Management System for the Internet of Things

Chii ChangORCID; Satish Narayana Srirama; Rajkumar Buyya

<jats:p>The Internet of Things (IoT) represents a comprehensive environment that consists of a large number of smart devices interconnecting heterogeneous physical objects to the Internet. Many domains such as logistics, manufacturing, agriculture, urban computing, home automation, ambient assisted living, and various ubiquitous computing applications have utilized IoT technologies. Meanwhile, Business Process Management Systems (BPMSs) have become a successful and efficient solution for coordinated management and optimized utilization of resources/entities. However, past BPMSs have not considered many issues they will face in managing large-scale connected heterogeneous IoT entities. Without fully understanding the behavior, capability, and state of the IoT entities, the BPMS can fail to manage the IoT integrated information systems. In this article, we analyze existing BPMSs for IoT and identify the limitations and their drawbacks based on a Mobile Cloud Computing perspective. Later, we discuss a number of open challenges in BPMS for IoT.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-42

Computer Vision and Natural Language Processing

Peratham WiriyathammabhumORCID; Douglas Summers-Stay; Cornelia Fermüller; Yiannis Aloimonos

<jats:p>Integrating computer vision and natural language processing is a novel interdisciplinary field that has received a lot of attention recently. In this survey, we provide a comprehensive introduction of the integration of computer vision and natural language processing in multimedia and robotics applications with more than 200 key references. The tasks that we survey include visual attributes, image captioning, video captioning, visual question answering, visual retrieval, human-robot interaction, robotic actions, and robot navigation. We also emphasize strategies to integrate computer vision and natural language processing models as a unified theme of distributional semantics. We make an analog of distributional semantics in computer vision and natural language processing as image embedding and word embedding, respectively. We also present a unified view for the field and propose possible future directions.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-44

Current Research and Open Problems in Attribute-Based Access Control

Daniel ServosORCID; Sylvia L. Osborn

<jats:p>Attribute-based access control (ABAC) is a promising alternative to traditional models of access control (i.e., discretionary access control (DAC), mandatory access control (MAC), and role-based access control (RBAC)) that is drawing attention in both recent academic literature and industry application. However, formalization of a foundational model of ABAC and large scale adoption is still in its infancy. The relatively recent emergence of ABAC still leaves a number of problems unexplored. Issues like delegation, administration, auditability, scalability, hierarchical representations, and the like, have been largely ignored or left to future work.</jats:p> <jats:p>This article provides a basic introduction to ABAC and a comprehensive review of recent research efforts toward developing formal models of ABAC. A taxonomy of ABAC research is presented and used to categorize and evaluate surveyed articles. Open problems are identified based on the shortcomings of the reviewed works and potential solutions discussed.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-45

Automated Planning for Ubiquitous Computing

Ilche GeorgievskiORCID; Marco Aiello

<jats:p>The goal of ubiquitous computing is to create ambience in which one’s experiences and quality of life are improved by monitoring and assisting people using ubiquitous technologies and computation in coherence. The continuous advancements of involved technologies, such as wireless communications, mobile devices, and sensors, imply fast evolution of ubiquitous computing environments too. The complexity of these environments is reaching a point where traditional solutions simply no longer work. The environments are in need of computational techniques that can deal with the evolution and uncertainty of ubiquitous computing environments dynamically and automatically. Artificial Intelligence (AI) can contribute towards satisfying this future scenario in many ways, while numerous approaches inspired by work in the AI planning community have already been designed for ubiquitous computing. We devote this study to investigate the current progress of AI planning for ubiquitous computing by analysing those approaches. We rigorously search for and select relevant literature out of which we extract qualitative information. Using the extracted qualities, we derive a generic framework that consists of aspects important to planning for ubiquitous computing. The framework’s main purpose is to facilitate the understanding of those aspects, and classify the literature according to them. We then analyse the literature in a consolidated way, and identify future challenges of planning for ubiquitous computing.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-46

Advances in the Quantum Theoretical Approach to Image Processing Applications

Nour Abura'ed; Faisal Shah Khan; Harish BhaskarORCID

<jats:p>In this article, a detailed survey of the quantum approach to image processing is presented. Recently, it has been established that existing quantum algorithms are applicable to image processing tasks allowing quantum informational models of classical image processing. However, efforts continue in identifying the diversity of its applicability in various image processing domains. Here, in addition to reviewing some of the critical image processing applications that quantum mechanics have targeted, such as denoising, edge detection, image storage, retrieval, and compression, this study will also highlight the complexities in transitioning from the classical to the quantum domain. This article shall establish theoretical fundamentals, analyze performance and evaluation, draw key statistical evidence to support claims, and provide recommendations based on published literature mostly during the period from 2010 to 2015.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-49

A Survey on Financial Applications of Metaheuristics

Amparo Soler-DominguezORCID; Angel A. Juan; Renatas Kizys

<jats:p>Modern heuristics or metaheuristics are optimization algorithms that have been increasingly used during the last decades to support complex decision-making in a number of fields, such as logistics and transportation, telecommunication networks, bioinformatics, finance, and the like. The continuous increase in computing power, together with advancements in metaheuristics frameworks and parallelization strategies, are empowering these types of algorithms as one of the best alternatives to solve rich and real-life combinatorial optimization problems that arise in a number of financial and banking activities. This article reviews some of the works related to the use of metaheuristics in solving both classical and emergent problems in the finance arena. A non-exhaustive list of examples includes rich portfolio optimization, index tracking, enhanced indexation, credit risk, stock investments, financial project scheduling, option pricing, feature selection, bankruptcy and financial distress prediction, and credit risk assessment. This article also discusses some open opportunities for researchers in the field, and forecast the evolution of metaheuristics to include real-life uncertainty conditions into the optimization problems being considered.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-23

Smart Computing and Sensing Technologies for Animal Welfare

Admela JukanORCID; Xavi Masip-Bruin; Nina Amla

<jats:p> Animals play a profoundly important and intricate role in our lives today. Dogs have been human companions for thousands of years, but now they work to assist the disabled, and in combat and search and rescue situations. Farm animals are a critical part of sustainable agriculture today, and there is increasing consumer interest in humanely raised livestock, and how it impacts our health and environmental footprint. Wild animals are threatened with extinction by human induced factors, and shrinking and compromised habitats. There are many reasons, including societal and economic ones, to explore how new computing technologies can be used to ensure the welfare of animals in these settings. The goal of this review is to systematically survey the existing literature in smart computing and sensing technologies for domestic, farm, and wild animal welfare. We use a broad notion of <jats:italic>animal welfare</jats:italic> to refer to an assessment of whether animals are healthy, free of pain and suffering, and positively stimulated in their environment. <jats:italic>Smart computing and sensing</jats:italic> is also used in broad terms, to refer to systems that are not isolated but interconnected with communication networks, and capable of remote data collection, processing, exchange, and analysis. The findings of this review are expected to motivate future research in computer science and engineering, as well as contribute to data, information, and communication management for animal welfare. </jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-27