Catálogo de publicaciones - revistas

Compartir en
redes sociales


ACM Computing Surveys (CSUR)

Resumen/Descripción – provisto por la editorial en inglés
A journal of the Association for Computing Machinery (ACM), which publishes surveys, tutorials, and special reports on all areas of computing research. Volumes are published yearly in four issues appearing in March, June, September, and December.
Palabras clave – provistas por la editorial

No disponibles.

Disponibilidad
Institución detectada Período Navegá Descargá Solicitá
No detectada desde mar. 1969 / hasta dic. 2023 ACM Digital Library

Información

Tipo de recurso:

revistas

ISSN impreso

0360-0300

ISSN electrónico

1557-7341

Editor responsable

Association for Computing Machinery (ACM)

País de edición

Estados Unidos

Fecha de publicación

Tabla de contenidos

Augmentation Techniques for Mobile Cloud Computing

Bowen Zhou; Rajkumar Buyya

<jats:p>Despite the rapid growth of hardware capacity and popularity in mobile devices, limited resources in battery and processing capacity still lack the ability to meet increasing mobile users’ demands. Both conventional techniques and emerging approaches are brought together to fill this gap between user demand and mobile devices’ limited capabilities. Recent research has focused on enhancing the performance of mobile devices via augmentation techniques. Augmentation techniques for mobile cloud computing refer to the computing paradigms and solutions to outsource mobile device computation and storage to more powerful computing resources in order to enhance a mobile device’s computing capability and energy efficiency (e.g., code offloading). Adopting augmentation techniques in the heterogeneous and intermittent mobile cloud computing environment creates new challenges for computation management, energy efficiency, and system reliability. In this article, we aim to provide a comprehensive taxonomy and survey of the existing techniques and frameworks for mobile cloud augmentation regarding both computation and storage. Different from the existing taxonomies in this field, we focus on the techniques aspect, following the idea of realizing a complete mobile cloud computing system. The objective of this survey is to provide a guide on what available augmentation techniques can be adopted in mobile cloud computing systems as well as supporting mechanisms such as decision-making and fault tolerance policies for realizing reliable mobile cloud services. We also present a discussion on the open challenges and future research directions in this field.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-38

Quality Control in Crowdsourcing

Florian Daniel; Pavel Kucherbaev; Cinzia Cappiello; Boualem Benatallah; Mohammad Allahbakhsh

<jats:p>Crowdsourcing enables one to leverage on the intelligence and wisdom of potentially large groups of individuals toward solving problems. Common problems approached with crowdsourcing are labeling images, translating or transcribing text, providing opinions or ideas, and similar—all tasks that computers are not good at or where they may even fail altogether. The introduction of humans into computations and/or everyday work, however, also poses critical, novel challenges in terms of quality control, as the crowd is typically composed of people with unknown and very diverse abilities, skills, interests, personal objectives, and technological resources. This survey studies quality in the context of crowdsourcing along several dimensions, so as to define and characterize it and to understand the current state of the art. Specifically, this survey derives a quality model for crowdsourcing tasks, identifies the methods and techniques that can be used to assess the attributes of the model, and the actions and strategies that help prevent and mitigate quality problems. An analysis of how these features are supported by the state of the art further identifies open issues and informs an outlook on hot future research directions.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-40

A New Classification Framework to Evaluate the Entity Profiling on the Web

Ahmad Barforoush; Hossein Shirazi; Hojjat EmamiORCID

<jats:p>Recently, we have witnessed entity profiling (EP) becoming increasingly one of the most important topics in information extraction, personalized applications, and web data analysis. EP aims to identify, extract, and represent a compact summary of valuable information about an entity based on the data related to it. To determine how EP systems have developed, during the last few years, this article reviews EP systems through a survey of the literature, from 2000 to 2015. To fulfill this aim, we introduce a comparison framework to compare and classify EP systems. Our comparison framework is composed of thirteen criteria that include: profiling source, the entity being modeled, the information that constitutes the profile, representation schema, profile construction technique, scale, scope/target domain, language, updating mechanism, enrichment technique, dynamicity, evaluation method, and application among others. Then, using the comparison framework, we discuss the recent development of the field and list some of the open problems and main trends that have emerged in EP to provide a proper guideline for researchers to develop or use robust profiling systems with suitable features according to their needs.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-39

Optimization of Complex Dataflows with User-Defined Functions

Astrid RheinländerORCID; Ulf Leser; Goetz Graefe

<jats:p>In many fields, recent years have brought a sharp rise in the size of the data to be analyzed and the complexity of the analysis to be performed. Such analyses are often described as dataflows specified in declarative dataflow languages. A key technique to achieve scalability for such analyses is the optimization of the declarative programs; however, many real-life dataflows are dominated by user-defined functions (UDFs) to perform, for instance, text analysis, graph traversal, classification, or clustering. This calls for specific optimization techniques as the semantics of such UDFs are unknown to the optimizer.</jats:p> <jats:p>In this article, we survey techniques for optimizing dataflows with UDFs. We consider methods developed over decades of research in relational database systems as well as more recent approaches spurred by the popularity of Map/Reduce-style data processing frameworks. We present techniques for syntactical dataflow modification, approaches for inferring semantics and rewrite options for UDFs, and methods for dataflow transformations both on the logical and the physical levels. Furthermore, we give a comprehensive overview on declarative dataflow languages for Big Data processing systems from the perspective of their build-in optimization techniques. Finally, we highlight open research challenges with the intention to foster more research into optimizing dataflows that contain UDFs.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-39

A Survey on Malware Detection Using Data Mining Techniques

Yanfang Ye; Tao LiORCID; Donald Adjeroh; S. Sitharama Iyengar

<jats:p> In the Internet age, malware (such as viruses, trojans, ransomware, and bots) has posed serious and evolving security threats to Internet users. To protect legitimate users from these threats, anti-malware software products from different companies, including Comodo, Kaspersky, Kingsoft, and Symantec, provide the major defense against malware. Unfortunately, driven by the economic benefits, the number of new malware samples has explosively increased: anti-malware vendors are now confronted with millions of potential malware samples per year. In order to keep on combating the increase in malware samples, there is an urgent need to develop intelligent methods for effective and efficient malware detection from the real and large daily sample collection. In this article, we first provide a brief overview on malware as well as the anti-malware industry, and present the industrial needs on malware detection. We then survey intelligent malware detection methods. In these methods, the process of detection is usually divided into two stages: <jats:italic>feature extraction</jats:italic> and <jats:italic>classification/clustering</jats:italic> . The performance of such intelligent malware detection approaches critically depend on the extracted features and the methods for classification/clustering. We provide a comprehensive investigation on both the feature extraction and the classification/clustering techniques. We also discuss the additional issues and the challenges of malware detection using data mining techniques and finally forecast the trends of malware development. </jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-40

Nudges for Privacy and Security

Alessandro AcquistiORCID; Idris Adjerid; Rebecca Balebako; Laura Brandimarte; Lorrie Faith Cranor; Saranga Komanduri; Pedro Giovanni Leon; Norman Sadeh; Florian Schaub; Manya Sleeper; Yang Wang; Shomir Wilson

<jats:p>Advancements in information technology often task users with complex and consequential privacy and security decisions. A growing body of research has investigated individuals’ choices in the presence of privacy and information security tradeoffs, the decision-making hurdles affecting those choices, and ways to mitigate such hurdles. This article provides a multi-disciplinary assessment of the literature pertaining to privacy and security decision making. It focuses on research on assisting individuals’ privacy and security choices with soft paternalistic interventions that nudge users toward more beneficial choices. The article discusses potential benefits of those interventions, highlights their shortcomings, and identifies key ethical, design, and research challenges.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-41

Data Science

Longbing CaoORCID

<jats:p> The 21st century has ushered in the age of big data and data economy, in which <jats:italic>data DNA</jats:italic> , which carries important knowledge, insights, and potential, has become an intrinsic constituent of all data-based organisms. An appropriate understanding of data DNA and its organisms relies on the new field of <jats:italic>data science</jats:italic> and its keystone, <jats:italic>analytics</jats:italic> . Although it is widely debated whether big data is only hype and buzz, and data science is still in a very early phase, significant challenges and opportunities are emerging or have been inspired by the research, innovation, business, profession, and education of data science. This article provides a comprehensive survey and tutorial of the fundamental aspects of data science: the evolution from data analysis to data science, the data science concepts, a big picture of the era of data science, the major challenges and directions in data innovation, the nature of data analytics, new industrialization and service opportunities in the data economy, the profession and competency of data education, and the future of data science. This article is the first in the field to draw a comprehensive big picture, in addition to offering rich observations, lessons, and thinking about data science and analytics. </jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-42

Fog Computing for Sustainable Smart Cities

Charith PereraORCID; Yongrui Qin; Julio C. Estrella; Stephan Reiff-Marganiec; Athanasios V. Vasilakos

<jats:p>The Internet of Things (IoT) aims to connect billions of smart objects to the Internet, which can bring a promising future to smart cities. These objects are expected to generate large amounts of data and send the data to the cloud for further processing, especially for knowledge discovery, in order that appropriate actions can be taken. However, in reality sensing all possible data items captured by a smart object and then sending the complete captured data to the cloud is less useful. Further, such an approach would also lead to resource wastage (e.g., network, storage, etc.). The Fog (Edge) computing paradigm has been proposed to counterpart the weakness by pushing processes of knowledge discovery using data analytics to the edges. However, edge devices have limited computational capabilities. Due to inherited strengths and weaknesses, neither Cloud computing nor Fog computing paradigm addresses these challenges alone. Therefore, both paradigms need to work together in order to build a sustainable IoT infrastructure for smart cities. In this article, we review existing approaches that have been proposed to tackle the challenges in the Fog computing domain. Specifically, we describe several inspiring use case scenarios of Fog computing, identify ten key characteristics and common features of Fog computing, and compare more than 30 existing research efforts in this domain. Based on our review, we further identify several major functionalities that ideal Fog computing platforms should support and a number of open challenges toward implementing them, to shed light on future research directions on realizing Fog computing for building sustainable smart cities.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-43

Data-Driven Techniques in Computing System Management

Tao LiORCID; Chunqiu Zeng; Yexi Jiang; Wubai Zhou; Liang Tang; Zheng Liu; Yue Huang

<jats:p>Modern forms of computing systems are becoming progressively more complex, with an increasing number of heterogeneous hardware and software components. As a result, it is quite challenging to manage these complex systems and meet the requirements in manageability, dependability, and performance that are demanded by enterprise customers. This survey presents a variety of data-driven techniques and applications with a focus on computing system management. In particular, the survey introduces intelligent methods for event generation that can transform diverse log data sources into structured events, reviews different types of event patterns and the corresponding event-mining techniques, and summarizes various event summarization methods and data-driven approaches for problem diagnosis in system management. We hope this survey will provide a good overview for data-driven techniques in computing system management.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-43

Cross Domain Recommender Systems

Muhammad Murad KhanORCID; Roliana Ibrahim; Imran Ghani

<jats:p>Cross domain recommender systems (CDRS) can assist recommendations in a target domain based on knowledge learned from a source domain. CDRS consists of three building blocks: domain, user-item overlap scenarios, and recommendation tasks. The objective of this research is to identify the most widely used CDRS building-block definitions, identify common features between them, classify current research in the frame of identified definitions, group together research with respect to algorithm types, present existing problems, and recommend future directions for CDRS research. To achieve this objective, we have conducted a systematic literature review of 94 shortlisted studies. We classified the selected studies using the tag-based approach and designed classification grids. Using classification grids, it was found that the category-domain contributed a maximum of 62%, whereas the time domain contributed at least 3%. User-item overlaps were found to have equal contribution. Single target domain recommendation task was found at a maximum of 78%, whereas cross-domain recommendation task had a minor influence at only 10%. MovieLens contributed the most at 22%, whereas Yahoo-music provided 1% between 29 datasets. Factorization-based algorithms contributed a total of 37%, whereas semantics-based algorithms contributed 6% among seven types of identified algorithm groups. Finally, future directions were grouped into five categories.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-34