Catálogo de publicaciones - revistas
ACM Computing Surveys (CSUR)
Resumen/Descripción – provisto por la editorial en inglés
A journal of the Association for Computing Machinery (ACM), which publishes surveys, tutorials, and special reports on all areas of computing research. Volumes are published yearly in four issues appearing in March, June, September, and December.Palabras clave – provistas por la editorial
No disponibles.
Disponibilidad
Institución detectada | Período | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | desde mar. 1969 / hasta dic. 2023 | ACM Digital Library |
Información
Tipo de recurso:
revistas
ISSN impreso
0360-0300
ISSN electrónico
1557-7341
Editor responsable
Association for Computing Machinery (ACM)
País de edición
Estados Unidos
Fecha de publicación
1969-
Cobertura temática
Tabla de contenidos
doi: 10.1145/3042064
Deep Learning Advances in Computer Vision with 3D Data
Anastasia Ioannidou; Elisavet Chatzilari; Spiros Nikolopoulos; Ioannis Kompatsiaris
<jats:p>Deep learning has recently gained popularity achieving state-of-the-art performance in tasks involving text, sound, or image processing. Due to its outstanding performance, there have been efforts to apply it in more challenging scenarios, for example, 3D data processing. This article surveys methods applying deep learning on 3D data and provides a classification based on how they exploit them. From the results of the examined works, we conclude that systems employing 2D views of 3D data typically surpass voxel-based (3D) deep models, which however, can perform better with more layers and severe data augmentation. Therefore, larger-scale datasets and increased resolutions are required.</jats:p>
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. 1-38
doi: 10.1145/3062394
A Survey of Techniques for Cache Partitioning in Multicore Processors
Sparsh Mittal
<jats:p>As the number of on-chip cores and memory demands of applications increase, judicious management of cache resources has become not merely attractive but imperative. Cache partitioning, that is, dividing cache space between applications based on their memory demands, is a promising approach to provide capacity benefits of shared cache with performance isolation of private caches. However, naively partitioning the cache may lead to performance loss, unfairness, and lack of quality-of-service guarantees. It is clear that intelligent techniques are required for realizing the full potential of cache partitioning. In this article, we present a survey of techniques for partitioning shared caches in multicore processors. We categorize the techniques based on important characteristics and provide a bird’s eye view of the field of cache partitioning.</jats:p>
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. 1-39
doi: 10.1145/3037755
Systematic Review of Software Behavioral Model Consistency Checking
Faiz ul Muram; Huy Tran; Uwe Zdun
<jats:p>In software development, models are often used to represent multiple views of the same system. Such models need to be properly related to each other in order to provide a consistent description of the developed system. Models may contain contradictory system specifications, for instance, when they evolve independently. Therefore, it is very crucial to ensure that models conform to each other. In this context, we focus on consistency checking of behavior models. Several techniques and approaches have been proposed in the existing literature to support behavioral model consistency checking. This article presents a Systematic Literature Review (SLR) that was carried out to obtain an overview of the various consistency concepts, problems, and solutions proposed regarding behavior models. In our study, the identification and selection of the primary studies was based on a well-planned search strategy. The search process identified a total of 1770 studies, out of which 96 have been thoroughly analyzed according to our predefined SLR protocol. The SLR aims to highlight the state-of-the-art of software behavior model consistency checking and identify potential gaps for future research. Based on research topics in selected studies, we have identified seven main categories: targeted software models, types of consistency checking, consistency checking techniques, inconsistency handling, type of study and evaluation, automation support, and practical impact. The findings of the systematic review also reveal suggestions for future research, such as improving the quality of study design and conducting evaluations, and application of research outcomes in industrial settings. For this purpose, appropriate strategy for inconsistency handling, better tool support for consistency checking and/or development tool integration should be considered in future studies.</jats:p>
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. 1-39
doi: 10.1145/3057267
A Survey and Comparative Study of Hard and Soft Real-Time Dynamic Resource Allocation Strategies for Multi-/Many-Core Systems
Amit Kumar Singh; Piotr Dziurzanski; Hashan Roshantha Mendis; Leandro Soares Indrusiak
<jats:p>Multi-/many-core systems are envisioned to satisfy the ever-increasing performance requirements of complex applications in various domains such as embedded and high-performance computing. Such systems need to cater to increasingly dynamic workloads, requiring efficient dynamic resource allocation strategies to satisfy hard or soft real-time constraints. This article provides an extensive survey of hard and soft real-time dynamic resource allocation strategies proposed since the mid-1990s and highlights the emerging trends for multi-/many-core systems. The survey covers a taxonomy of the resource allocation strategies and considers their various optimization objectives, which have been used to provide comprehensive comparison. The strategies employ various principles, such as market and biological concepts, to perform the optimizations. The trend followed by the resource allocation strategies, open research challenges, and likely emerging research directions have also been provided.</jats:p>
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. 1-40
doi: 10.1145/3054177
A Taxonomy and Survey of Cloud Resource Orchestration Techniques
Denis Weerasiri; Moshe Chai Barukh; Boualem Benatallah; Quan Z. Sheng; Rajiv Ranjan
<jats:p>Cloud services and applications prove indispensable amid today’s modern utility-based computing. The cloud has displayed a disruptive and growing impact on everyday computing tasks. However, facilitating the orchestration of cloud resources to build such cloud services and applications is yet to unleash its entire magnitude of power. Accordingly, it is paramount to devise a unified and comprehensive analysis framework to accelerate fundamental understanding of cloud resource orchestration in terms of concepts, paradigms, languages, models, and tools. This framework is essential to empower effective research, comprehension, comparison, and selection of cloud resource orchestration models, languages, platforms, and tools. This article provides such a comprehensive framework while analyzing the relevant state of the art in cloud resource orchestration from a novel and holistic viewpoint.</jats:p>
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. 1-41
doi: 10.1145/3040990
Simulation and Experimentation Platforms for Underwater Acoustic Sensor Networks
Hanjiang Luo; Kaishun Wu; Rukhsana Ruby; Feng Hong; Zhongwen Guo; Lionel M. Ni
<jats:p>Ocean and water basically cover the major parts of our planet. To obtain the best utilization of the underlying resources on these parts of the Earth, people have made some research advancements. Specifically, the research on underwater wireless acoustic sensor networks (UWA-SNs) has made great progress. However, wide deployment of UWA-SNs is far from a reality due to several reasons. One important reason is that offshore deployment and field-level experiments of ocean-centric applications are both expensive and labor intensive. Other alternatives to attain this objective are to conduct simulation or experimentation that can reduce cost and accelerate the research activities and their outcomes. However, designing efficient and reliable simulation and experimentation platforms have proven to be more challenging beyond the expectation. In this article, we explore the main techniques (including their pros and cons) and components to develop simulation and experimentation platforms and provide a comprehensive survey report in this area. We classify simulation and experimentation platforms based on some typical criteria and then provide useful guidelines for researchers on choosing suitable platforms in accordance with their requirements. Finally, we address some open and un-resolved issues in this context and provide some suggestions on future research.</jats:p>
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. 1-44
doi: 10.1145/3064004
A Survey on Reliability Protocols in Wireless Sensor Networks
Mohamed Amine Kafi; Jalel Ben Othman; Nadjib Badache
<jats:p>Wireless Sensor Network (WSN) applications have become more and more attractive with the miniaturization of circuits and the large variety of sensors. The different application domains, especially critical fields of WSN use, make the reliability of data acquisition and communication a hot research field that must be tackled efficiently. Indeed, the quality of largely used, cheap-cost wireless sensors and their scarce energy supply support these reliability challenges that lead to data loss or corruption. For solving this problem, the conception of a reliability mechanism that detects these shortcomings and recovers to them becomes necessary. In this article, we present a survey on existing reliability protocols conceived especially for WSNs due to their special features. The deep classification and discussion in this study allow for understanding the pros and cons of state-of-the-art works in order to enhance the existing schemes and fill the gaps. We have classified the works according to the required level of reliability, the manner to identify the origins of the lack of reliability, and the control to recover this lack of reliability. Across the discussion along this study, we deduce that the cross-layer design between MAC, routing, and transport layers presents a good concept to efficiently overcome the different reliability holes.</jats:p>
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. 1-47
doi: 10.1145/3150223
A Comprehensive Taxonomy of Fragmentation and Allocation Techniques in Distributed Database Design
Dalia Nashat; Ali A. Amer
<jats:p>The need to design an optimally distributed database is increasingly important with the growth of information technology and computer networks. However, designing a distributed database is an extremely complex process due to a large number of geographically distributed sites and database relations. Moreover, decreasing communication costs and query response time should be taken into consideration. There are three main techniques applied to design a distributed database, namely Fragmentation, Data allocation, and Replication. It is notable that these techniques are often treated separately and rarely processed together. Some available allocation methods are applied regardless of how the fragmentation technique is performed or replication process is adopted. In contrast, other fragmentation techniques do not consider the allocation or the replication techniques. Therefore, the first and foremost step for designing an optimal database is to develop a comprehensive understanding of the current fragmentation, replication, and allocation techniques and their disadvantages. This article presents an attempt to fulfill this step by proposing a comprehensive taxonomy of the available fragmentation and allocation techniques in distributed database design. The article also discusses some case studies of these techniques for a deeper understanding of its achievements and limitations.</jats:p>
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. 1-25
doi: 10.1145/3143559
Analysis and Classification of Shape-Changing Interfaces for Design and Application-based Research
Miriam Sturdee; Jason Alexander
<jats:p>Shape-changing interfaces are physically tangible, interactive devices, surfaces, or spaces that allow for rich, organic, and novel experiences with computational devices. Over the last 15 years, research has produced functional prototypes over many use applications; reviews have identified themes and possible future directions but have not yet looked at possible design or application-based research. Here, we gather this information together to provide a reference for designers and researchers wishing to build upon existing prototyping work, using synthesis and discussion of existing shape-changing interface reviews and comprehensive analysis and classification of 84 shape-changing interfaces. Eight categories of prototype are identified alongside recommendations for the field.</jats:p>
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. 1-32
doi: 10.1145/3154834
Underwater Wireless Sensor Networks
Rodolfo W. L. Coutinho; Azzedine Boukerche; Luiz F. M. Vieira; Antonio A. F. Loureiro
<jats:p>Underwater wireless sensor networks (UWSNs) will pave the way for a new era of underwater monitoring and actuation applications. The envisioned landscape of UWSN applications will help us learn more about our oceans, as well as about what lies beneath them. They are expected to change the current reality where no more than 5% of the volume of the oceans has been observed by humans. However, to enable large deployments of UWSNs, networking solutions toward efficient and reliable underwater data collection need to be investigated and proposed. In this context, the use of topology control algorithms for a suitable, autonomous, and on-the-fly organization of the UWSN topology might mitigate the undesired effects of underwater wireless communications and consequently improve the performance of networking services and protocols designed for UWSNs. This article presents and discusses the intrinsic properties, potentials, and current research challenges of topology control in underwater sensor networks. We propose to classify topology control algorithms based on the principal methodology used to change the network topology. They can be categorized in three major groups: power control, wireless interface mode management, and mobility assisted–based techniques. Using the proposed classification, we survey the current state of the art and present an in-depth discussion of topology control solutions designed for UWSNs.</jats:p>
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. 1-36