Catálogo de publicaciones - revistas

Compartir en
redes sociales


ACM Computing Surveys (CSUR)

Resumen/Descripción – provisto por la editorial en inglés
A journal of the Association for Computing Machinery (ACM), which publishes surveys, tutorials, and special reports on all areas of computing research. Volumes are published yearly in four issues appearing in March, June, September, and December.
Palabras clave – provistas por la editorial

No disponibles.

Disponibilidad
Institución detectada Período Navegá Descargá Solicitá
No detectada desde mar. 1969 / hasta dic. 2023 ACM Digital Library

Información

Tipo de recurso:

revistas

ISSN impreso

0360-0300

ISSN electrónico

1557-7341

Editor responsable

Association for Computing Machinery (ACM)

País de edición

Estados Unidos

Fecha de publicación

Tabla de contenidos

Software Platforms for Smart Cities

Eduardo Felipe Zambom SantanaORCID; Ana Paula Chaves; Marco Aurelio Gerosa; Fabio Kon; Dejan S. Milojicic

<jats:p>Information and communication technologies (ICT) can be instrumental in progressing towards smarter city environments, which improve city services, sustainability, and citizens’ quality of life. Smart City software platforms can support the development and integration of Smart City applications. However, the ICT community must overcome current technological and scientific challenges before these platforms can be widely adopted. This article surveys the state of the art in software platforms for Smart Cities. We analyzed 23 projects concerning the most used enabling technologies, as well as functional and non-functional requirements, classifying them into four categories: Cyber-Physical Systems, Internet of Things, Big Data, and Cloud Computing. Based on these results, we derived a reference architecture to guide the development of next-generation software platforms for Smart Cities. Finally, we enumerated the most frequently cited open research challenges and discussed future opportunities. This survey provides important references to help application developers, city managers, system operators, end-users, and Smart City researchers make project, investment, and research decisions.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-37

A Survey on Optical Network-on-Chip Architectures

Sebastian WernerORCID; Javier Navaridas; Mikel Luján

<jats:p>Optical on-chip data transmission enabled by silicon photonics (SiP) is widely considered a key technology to overcome the bandwidth and energy limitations of electrical interconnects. The possibility of integrating optical links into the on-chip communication fabric has opened up a fascinating new research field—Optical Networks-on-Chip (ONoCs)—which has been gaining large interest by the community. SiP devices and materials, however, are still evolving, and dealing with optical data transmission on chip makes designers and researchers face a whole new set of obstacles and challenges. Designing efficient ONoCs is a challenging task and requires a detailed knowledge from on-chip traffic demands and patterns down to the physical layout and implications of integrating both electronic and photonic devices. In this paper, we provide an exhaustive review of recently proposed ONoC architectures, discuss their strengths and weaknesses, and outline active research areas. Moreover, we discuss recent research efforts in key enabling technologies, such as on-chip and adaptive laser sources, automatic synthesis tools, and ring heating techniques, which are essential to enable a widespread commercial adoption of ONoCs in the future.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-37

Geomagnetism for Smartphone-Based Indoor Localization

Suining HeORCID; Kang G. Shin

<jats:p>Geomagnetism has recently attracted considerable attention for indoor localization due to its pervasiveness and independence from extra infrastructure. Its location signature has been observed to be temporally stable and spatially discernible for localization purposes. This survey examines and analyzes the recent challenges and advances in geomagnetism-based indoor localization using smartphones. We first study smartphone-based geomagnetism measurements. We then review recent efforts in database construction and computation reduction, followed by state-of-the-art schemes in localizing the target. For each category, we identify practical deployment challenges and compare related studies. Finally, we summarize future directions and provide a guideline for new researchers in this field.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-37

A Survey of Presence and Related Concepts

Richard Skarbez; Frederick P. Brooks, Jr.ORCID; Mary C. WhittonORCID

<jats:p>The presence construct, most commonly defined as the sense of “being there,” has driven research and development of virtual environments (VEs) for decades. Despite that, there is not widespread agreement on how to define or operationalize this construct. The literature contains many different definitions of presence and many proposed measures for it. This article reviews many of the definitions, measures, and models of presence from the literature. We also review several related constructs, including social presence, copresence, immersion, agency, transportation, reality judgment, and embodiment. In addition, we present a meta-analysis of existing presence models and propose a model of presence informed by Slater’s Place Illusion and Plausibility Illusion constructs.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-39

An Offensive and Defensive Exposition of Wearable Computing

Prakash ShresthaORCID; Nitesh Saxena

<jats:p>Wearable computing is rapidly getting deployed in many—commercial, medical, and personal—domains of day-to-day life. Wearable devices appear in various forms, shapes, and sizes and facilitate a wide variety of applications in many domains of life. However, wearables raise unique security and privacy concerns. Wearables also hold the promise to help enhance the existing security, privacy, and safety paradigms in unique ways while preserving the system’s usability.</jats:p> <jats:p>The contribution of this research literature survey is threefold. First, as a background, we identify a wide range of existing as well as upcoming wearable devices and investigate their broad applications. Second, we provide an exposition of the security and privacy of wearable computing, studying dual aspects, that is, both attacks and defenses. Third, we provide a comprehensive study of the potential security, privacy, and safety enhancements to existing systems based on the emergence of wearable technology. Although several research works have emerged exploring different offensive and defensive uses of wearables, there is a lack of a broad and precise literature review systematizing all those security and privacy aspects and the underlying threat models. This research survey also analyzes current and emerging research trends and provides directions for future research.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-39

Mining Electronic Health Records (EHRs)

Pranjul YadavORCID; Michael Steinbach; Vipin Kumar; Gyorgy Simon

<jats:p>The continuously increasing cost of the US healthcare system has received significant attention. Central to the ideas aimed at curbing this trend is the use of technology in the form of the mandate to implement electronic health records (EHRs). EHRs consist of patient information such as demographics, medications, laboratory test results, diagnosis codes, and procedures. Mining EHRs could lead to improvement in patient health management as EHRs contain detailed information related to disease prognosis for large patient populations. In this article, we provide a structured and comprehensive overview of data mining techniques for modeling EHRs. We first provide a detailed understanding of the major application areas to which EHR mining has been applied and then discuss the nature of EHR data and its accompanying challenges. Next, we describe major approaches used for EHR mining, the metrics associated with EHRs, and the various study designs. With this foundation, we then provide a systematic and methodological organization of existing data mining techniques used to model EHRs and discuss ideas for future research.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-40

The Experience Sampling Method on Mobile Devices

Niels van BerkelORCID; Denzil Ferreira; Vassilis Kostakos

<jats:p>The Experience Sampling Method (ESM) is used by scientists from various disciplines to gather insights into the intra-psychic elements of human life. Researchers have used the ESM in a wide variety of studies, with the method seeing increased popularity. Mobile technologies have enabled new possibilities for the use of the ESM, while simultaneously leading to new conceptual, methodological, and technological challenges. In this survey, we provide an overview of the history of the ESM, usage of this methodology in the computer science discipline, as well as its evolution over time. Next, we identify and discuss important considerations for ESM studies on mobile devices, and analyse the particular methodological parameters scientists should consider in their study design. We reflect on the existing tools that support the ESM methodology and discuss the future development of such tools. Finally, we discuss the effect of future technological developments on the use of the ESM and identify areas requiring further investigation.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-40

Feature Selection

Jundong LiORCID; Kewei Cheng; Suhang Wang; Fred Morstatter; Robert P. Trevino; Jiliang Tang; Huan Liu

<jats:p>Feature selection, as a data preprocessing strategy, has been proven to be effective and efficient in preparing data (especially high-dimensional data) for various data-mining and machine-learning problems. The objectives of feature selection include building simpler and more comprehensible models, improving data-mining performance, and preparing clean, understandable data. The recent proliferation of big data has presented some substantial challenges and opportunities to feature selection. In this survey, we provide a comprehensive and structured overview of recent advances in feature selection research. Motivated by current challenges and opportunities in the era of big data, we revisit feature selection research from a data perspective and review representative feature selection algorithms for conventional data, structured data, heterogeneous data and streaming data. Methodologically, to emphasize the differences and similarities of most existing feature selection algorithms for conventional data, we categorize them into four main groups: similarity-based, information-theoretical-based, sparse-learning-based, and statistical-based methods. To facilitate and promote the research in this community, we also present an open source feature selection repository that consists of most of the popular feature selection algorithms (http://featureselection.asu.edu/). Also, we use it as an example to show how to evaluate feature selection algorithms. At the end of the survey, we present a discussion about some open problems and challenges that require more attention in future research.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-45

Data Storage Management in Cloud Environments

Yaser MansouriORCID; Adel Nadjaran ToosiORCID; Rajkumar Buyya

<jats:p>Storage as a Service (StaaS) is a vital component of cloud computing by offering the vision of a virtually infinite pool of storage resources. It supports a variety of cloud-based data store classes in terms of availability, scalability, ACID (Atomicity, Consistency, Isolation, Durability) properties, data models, and price options. Application providers deploy these storage classes across different cloud-based data stores not only to tackle the challenges arising from reliance on a single cloud-based data store but also to obtain higher availability, lower response time, and more cost efficiency. Hence, in this article, we first discuss the key advantages and challenges of data-intensive applications deployed within and across cloud-based data stores. Then, we provide a comprehensive taxonomy that covers key aspects of cloud-based data store: data model, data dispersion, data consistency, data transaction service, and data management cost. Finally, we map various cloud-based data stores projects to our proposed taxonomy to validate the taxonomy and identify areas for future research.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-51

A Survey of Cloudlet-Based Mobile Augmentation Approaches for Resource Optimization

M. Ziad Nayyer; Imran Raza; Syed Asad Hussain

<jats:p>Mobile devices (MDs) face resource scarcity challenges owing to limited energy and computational resources. Mobile cloud computing (MCC) offers a resource-rich environment to MDs for offloading compute-intensive tasks encountering resource scarcity challenges. However, users are unable to exploit its full potential owing to challenges of distance, limited bandwidth, and seamless connectivity between the remote cloud (RC) and MDs in the conventional MCC model. The cloudlet-based solution is widely used to address these challenges. The response of the cloudlet-based solution is faster than the conventional mobile cloud-computing model, rendering it suitable for the Internet of Things (IoT) and Smart Cities (SC). However, with the increase in devices and workloads, the cloudlet-based solution has to deal with resource-scarcity challenges, thus, forwarding the requests to remote clouds. This study has been carried out to provide an insight into existing cloudlet-based mobile augmentation (CtMA) approaches and highlights the underlying limitations for resource optimization. Furthermore, numerous performance parameters have been identified and their detailed comparative analysis has been used to quantify the efficiency of CtMA approaches.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-28