Catálogo de publicaciones - revistas
ACM Computing Surveys (CSUR)
Resumen/Descripción – provisto por la editorial en inglés
A journal of the Association for Computing Machinery (ACM), which publishes surveys, tutorials, and special reports on all areas of computing research. Volumes are published yearly in four issues appearing in March, June, September, and December.Palabras clave – provistas por la editorial
No disponibles.
Disponibilidad
Institución detectada | Período | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | desde mar. 1969 / hasta dic. 2023 | ACM Digital Library |
Información
Tipo de recurso:
revistas
ISSN impreso
0360-0300
ISSN electrónico
1557-7341
Editor responsable
Association for Computing Machinery (ACM)
País de edición
Estados Unidos
Fecha de publicación
1969-
Cobertura temática
Tabla de contenidos
doi: 10.1145/3524500
Neural Architecture Search Survey: A Hardware Perspective
Krishna Teja Chitty-Venkata; Arun K. Somani
<jats:p> We review the problem of automating hardware-aware architectural design process of Deep Neural Networks (DNNs). The field of Convolutional Neural Network (CNN) algorithm design has led to advancements in many fields such as computer vision, virtual reality, and autonomous driving. The end-to-end design process of a CNN is a challenging and time-consuming task as it requires expertise in multiple areas such as signal and image processing, neural networks, and optimization. At the same time, several hardware platforms, general- and special-purpose, have equally contributed to the training and deployment of these complex networks in a different setting. <jats:bold>Hardware-Aware Neural Architecture Search</jats:bold> (HW-NAS) automates the architectural design process of DNNs to alleviate human effort, and generate efficient models accomplishing acceptable accuracy-performance tradeoffs. The goal of this paper is to provide insights and understanding of HW-NAS techniques for various hardware platforms (MCU, CPU, GPU, ASIC, FPGA, ReRAM, DSP, and VPU), followed by the co-search methodologies of neural algorithm and hardware accelerator specifications. </jats:p>
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. No disponible
doi: 10.1145/3527450
Software-Based Dialogue Systems: Survey, Taxonomy and Challenges
Quim Motger; Xavier Franch; Jordi Marco
<jats:p>The use of natural language interfaces in the field of human-computer interaction is undergoing intense study through dedicated scientific and industrial research. The latest contributions in the field, including deep learning approaches like recurrent neural networks, the potential of context-aware strategies and user-centred design approaches, have brought back the attention of the community to software-based dialogue systems, generally known as conversational agents or chatbots. Nonetheless, and given the novelty of the field, a generic, context-independent overview on the current state of research of conversational agents covering all research perspectives involved is missing. Motivated by this context, this paper reports a survey of the current state of research of conversational agents through a systematic literature review of secondary studies. The conducted research is designed to develop an exhaustive perspective through a clear presentation of the aggregated knowledge published by recent literature within a variety of domains, research focuses and contexts. As a result, this research proposes a holistic taxonomy of the different dimensions involved in the conversational agents’ field, which is expected to help researchers and to lay the groundwork for future research in the field of natural language interfaces.</jats:p>
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. No disponible
doi: 10.1145/3527157
Gamma Pseudo Random Number Generators
Elena Almaraz Luengo
<jats:p>The generation of random values corresponding to an underlying Gamma distribution is a key capability in many areas of knowledge such as Probability and Statistics, Signal Processing or Digital Communication, among others. Throughout history, different algorithms have been developed for the generation of such values and advances in computing have made them increasingly faster and more efficient from a computational point of view. These advances also allow the generation of higher quality inputs (from the point of view of randomness and uniformity) for these algorithms that are easily tested by different statistical batteries such as NIST, Dieharder or TestU01 among others. This article describes the existing algorithms for the generation of (independent and identically distributed-i.i.d.-) Gamma distribution values as well as the theoretical and mathematical foundations that support their validity.</jats:p>
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. No disponible
doi: 10.1145/3530814
A Systematic Survey on Android API Usage for Data-Driven Analytics with Smartphones
Hansoo Lee; Joonyoung Park; Uichin Lee
<jats:p>Recent industrial and academic research has focused on data-driven analytics with smartphones by collecting user interaction, context, and device systems data through Application Programming Interfaces (APIs) and sensors. The Android OS provides various APIs to collect such mobile usage and sensor data for third-party developers. Usage Statistics API (US API) and Accessibility Service API (AS API) are representative Android APIs for collecting app usage data and are used for various research purposes as they can collect fine-grained interaction data (e.g., app usage history, user interaction type). Furthermore, other sensor APIs help to collect a user’s context and device state data, along with AS/US APIs. This review investigates mobile usage and sensor data-driven research using AS/US APIs, by categorizing the research purposes and the data types. In this paper, the surveyed studies are classified as follows: five themes and 21 subthemes, and a four-layer hierarchical data classification structure. This allows us to identify a data usage trend and derive insight into data collection according to research purposes. Several limitations and future research directions of mobile usage and sensor data-driven analytics research are discussed, including the impact of changes in the Android API versions on research, the privacy and data quality issues, and the mitigation of reproducibility risks with standardized data typology.</jats:p>
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. No disponible
doi: 10.1145/3530049
Cross-Technology Communication for the Internet of Things: A Survey
Yuan He; Xiuzhen Guo; Xiaolong Zheng; Zihao Yu; Jia Zhang; Haotian Jiang; Xin Na; Jiacheng Zhang
<jats:p>The ever-developing Internet of Things (IoT) brings the prosperity of wireless sensing and control applications. In many scenarios, different wireless technologies coexist in the shared frequency medium as well as the physical space. Such wireless coexistence may lead to serious cross-technology interference (CTI) problems, e.g. channel competition, signal collision, throughput degradation. Compared with traditional methods like interference avoidance, tolerance, and concurrency mechanism, direct and timely information exchange among heterogeneous devices is therefore a fundamental requirement to ensure the usability, inter-operability, and reliability of the IoT. Under this circumstance, Cross-Technology Communication (CTC) technique thus becomes a hot topic in both academic and industrial fields, which aims at directly exchanging data among heterogeneous devices that follow different standards. This paper comprehensively summarizes the CTC techniques and reveals that the key challenge for CTC lies in the heterogeneity of IoT devices, including the incompatibility of technical standards and the asymmetry of connection capability. Based on the above finding, we present a taxonomy of the existing CTC works (packet-level CTCs and physical-level CTCs) and compare the existing CTC techniques in terms of throughput, reliability, hardware modification, and concurrency.</jats:p>
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. No disponible
doi: 10.1145/3529757
A Survey on Data-driven Software Vulnerability Assessment and Prioritization
Triet H. M. Le; Huaming Chen; M. Ali Babar
<jats:p>Software Vulnerabilities (SVs) are increasing in complexity and scale, posing great security risks to many software systems. Given the limited resources in practice, SV assessment and prioritization help practitioners devise optimal SV mitigation plans based on various SV characteristics. The surges in SV data sources and data-driven techniques such as Machine Learning and Deep Learning have taken SV assessment and prioritization to the next level. Our survey provides a taxonomy of the past research efforts and highlights the best practices for data-driven SV assessment and prioritization. We also discuss the current limitations and propose potential solutions to address such issues.</jats:p>
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. No disponible
doi: 10.1145/3530682
A Survey on Wireless Device-free Human Sensing: Application Scenarios, Current Solutions, and Open Issues
Jiang Xiao; Huichuwu Li; Minrui Wu; Hai Jin; M. Jamal Deen; Jiannong Cao
<jats:p> In the last decade, many studies have significantly pushed the limits of <jats:italic>wireless device-free human sensing</jats:italic> (WDHS) technology and facilitated various applications, ranging from activity identification to vital sign monitoring. This survey presents a novel taxonomy that classifies the state-of-the-art WDHS systems into eleven categories according to their <jats:italic>sensing task type</jats:italic> and motion <jats:italic>granularity</jats:italic> . In particular, existing WDHS systems involve three primary sensing task types. The first type, <jats:italic>behavior recognition</jats:italic> , is a classification problem of recognizing predefined meaningful behaviors. The second type is <jats:italic>movement tracking</jats:italic> , monitoring the quantitative values of behavior states integrating with spatiotemporal information. The third type, <jats:italic>user identification</jats:italic> , leverages the unique features in behaviors to identify who performs the movements. The selected papers in each sensing task type can be further divided into sub-categories according to their motion granularity. Recent advances reveal that WDHS systems within a particular granularity follow similar challenges and design principles. For example, fine-grained hand recognition systems target extracting subtle motion-induced signal changes from the noisy signal responses, and their sensing areas are limited to a relative small range. Coarse-grained activity identification systems need to overcome the interference of other moving objects within the room-level sensing range. A novel research framework is proposed to help to summarize WDHS systems from methodology, evaluation performance, and design goals. Finally, we conclude with several open issues and present the future research directions from the perspectives of <jats:italic>data collection</jats:italic> , <jats:italic>sensing methodology</jats:italic> , <jats:italic>performance evaluation</jats:italic> , and <jats:italic>application scenario</jats:italic> . </jats:p>
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. No disponible
doi: 10.1145/3530812
Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats
Zhiyan Chen; Jinxin Liu; Yu Shen; Murat Simsek; Burak Kantarci; Hussein T. Mouftah; Petar Djukic
<jats:p>Despite its technological benefits, Internet of Things (IoT) has cyber weaknesses due to the vulnerabilities in the wireless medium. Machine learning (ML)-based methods are widely used against cyber threats in IoT networks with promising performance. Advanced persistent threat (APT) is prominent for cybercriminals to compromise networks, and it is crucial to long-term and harmful characteristics. However, it is difficult to apply ML-based approaches to identify APT attacks to obtain a promising detection performance due to an extremely small percentage among normal traffic. There are limited surveys to fully investigate APT attacks in IoT networks due to the lack of public datasets with all types of APT attacks. It is worth to bridge the state-of-the-art in network attack detection with APT attack detection in a comprehensive review article. This survey article reviews the security challenges in IoT networks and presents the well-known attacks, APT attacks, and threat models in IoT systems. Meanwhile, signature-based, anomaly-based, and hybrid IDSs are summarized for IoT networks. The article highlights statistical insights regarding frequently applied ML-based methods against network intrusion. Finally, open issues and challenges for common network intrusion and APT attacks are presented for future research.</jats:p>
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. No disponible
doi: 10.1145/3529756
A Leap among Quantum Computing and Quantum Neural Networks: A Survey
Fabio Valerio Massoli; Lucia Vadicamo; Giuseppe Amato; Fabrizio Falchi
<jats:p>In recent years, Quantum Computing witnessed massive improvements in terms of available resources and algorithms development. The ability to harness quantum phenomena to solve computational problems is a long-standing dream that has drawn the scientific community’s interest since the late 80s. In such a context, we propose our contribution. First, we introduce basic concepts related to quantum computations, and then we explain the core functionalities of technologies that implement the Gate Model and Adiabatic Quantum Computing paradigms. Finally, we gather, compare and analyze the current state-of-the-art concerning Quantum Perceptrons and Quantum Neural Networks implementations.</jats:p>
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. No disponible
doi: 10.1145/3529758
On the Edge of the Deployment: A Survey on Multi-Access Edge Computing
Pedro Cruz; Nadjib Achir; Aline Carneiro Viana
<jats:p>Multi-Access Edge Computing (MEC) attracts much attention from the scientific community due to its scientific, technical, and commercial implications. In particular, the ETSI standard convergence consolidates the discussions around MEC. Still, the existing MEC practical initiatives are incomplete in their majority, hardening or invalidating their effective deployment. To fill this gap, it is essential to understand a series of experimental prototypes, implementations, and deployments. The early implementations can reveal the potential, the limitations, the related technologies, and the development tools for MEC adoption. In this context, this work first brings a discussion on existing MEC initiatives regarding the use cases they target and their vision (i.e., whether they are more network-related or more distributed systems). Second, we survey MEC practical initiatives according to their strategies, including the ETSI MEC standard. Besides, we compare the strategies according to related limitations, impact, and deployment efforts. We also survey the existing tools making MEC systems a reality. Finally, we give hints to issues yet to be addressed in practice. By bringing a better comprehension of MEC initiatives, we believe this survey will help researchers and developers design their own MEC systems or improve and simplify the usability of existing ones.</jats:p>
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. No disponible