Catálogo de publicaciones - revistas

Compartir en
redes sociales


ACM Computing Surveys (CSUR)

Resumen/Descripción – provisto por la editorial en inglés
A journal of the Association for Computing Machinery (ACM), which publishes surveys, tutorials, and special reports on all areas of computing research. Volumes are published yearly in four issues appearing in March, June, September, and December.
Palabras clave – provistas por la editorial

No disponibles.

Disponibilidad
Institución detectada Período Navegá Descargá Solicitá
No detectada desde mar. 1969 / hasta dic. 2023 ACM Digital Library

Información

Tipo de recurso:

revistas

ISSN impreso

0360-0300

ISSN electrónico

1557-7341

Editor responsable

Association for Computing Machinery (ACM)

País de edición

Estados Unidos

Fecha de publicación

Tabla de contenidos

Neural Architecture Search Survey: A Hardware Perspective

Krishna Teja Chitty-Venkata; Arun K. Somani

<jats:p> We review the problem of automating hardware-aware architectural design process of Deep Neural Networks (DNNs). The field of Convolutional Neural Network (CNN) algorithm design has led to advancements in many fields such as computer vision, virtual reality, and autonomous driving. The end-to-end design process of a CNN is a challenging and time-consuming task as it requires expertise in multiple areas such as signal and image processing, neural networks, and optimization. At the same time, several hardware platforms, general- and special-purpose, have equally contributed to the training and deployment of these complex networks in a different setting. <jats:bold>Hardware-Aware Neural Architecture Search</jats:bold> (HW-NAS) automates the architectural design process of DNNs to alleviate human effort, and generate efficient models accomplishing acceptable accuracy-performance tradeoffs. The goal of this paper is to provide insights and understanding of HW-NAS techniques for various hardware platforms (MCU, CPU, GPU, ASIC, FPGA, ReRAM, DSP, and VPU), followed by the co-search methodologies of neural algorithm and hardware accelerator specifications. </jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. No disponible

Software-Based Dialogue Systems: Survey, Taxonomy and Challenges

Quim Motger; Xavier Franch; Jordi Marco

<jats:p>The use of natural language interfaces in the field of human-computer interaction is undergoing intense study through dedicated scientific and industrial research. The latest contributions in the field, including deep learning approaches like recurrent neural networks, the potential of context-aware strategies and user-centred design approaches, have brought back the attention of the community to software-based dialogue systems, generally known as conversational agents or chatbots. Nonetheless, and given the novelty of the field, a generic, context-independent overview on the current state of research of conversational agents covering all research perspectives involved is missing. Motivated by this context, this paper reports a survey of the current state of research of conversational agents through a systematic literature review of secondary studies. The conducted research is designed to develop an exhaustive perspective through a clear presentation of the aggregated knowledge published by recent literature within a variety of domains, research focuses and contexts. As a result, this research proposes a holistic taxonomy of the different dimensions involved in the conversational agents’ field, which is expected to help researchers and to lay the groundwork for future research in the field of natural language interfaces.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. No disponible

Gamma Pseudo Random Number Generators

Elena Almaraz LuengoORCID

<jats:p>The generation of random values corresponding to an underlying Gamma distribution is a key capability in many areas of knowledge such as Probability and Statistics, Signal Processing or Digital Communication, among others. Throughout history, different algorithms have been developed for the generation of such values and advances in computing have made them increasingly faster and more efficient from a computational point of view. These advances also allow the generation of higher quality inputs (from the point of view of randomness and uniformity) for these algorithms that are easily tested by different statistical batteries such as NIST, Dieharder or TestU01 among others. This article describes the existing algorithms for the generation of (independent and identically distributed-i.i.d.-) Gamma distribution values as well as the theoretical and mathematical foundations that support their validity.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. No disponible

A Systematic Survey on Android API Usage for Data-Driven Analytics with Smartphones

Hansoo Lee; Joonyoung Park; Uichin Lee

<jats:p>Recent industrial and academic research has focused on data-driven analytics with smartphones by collecting user interaction, context, and device systems data through Application Programming Interfaces (APIs) and sensors. The Android OS provides various APIs to collect such mobile usage and sensor data for third-party developers. Usage Statistics API (US API) and Accessibility Service API (AS API) are representative Android APIs for collecting app usage data and are used for various research purposes as they can collect fine-grained interaction data (e.g., app usage history, user interaction type). Furthermore, other sensor APIs help to collect a user’s context and device state data, along with AS/US APIs. This review investigates mobile usage and sensor data-driven research using AS/US APIs, by categorizing the research purposes and the data types. In this paper, the surveyed studies are classified as follows: five themes and 21 subthemes, and a four-layer hierarchical data classification structure. This allows us to identify a data usage trend and derive insight into data collection according to research purposes. Several limitations and future research directions of mobile usage and sensor data-driven analytics research are discussed, including the impact of changes in the Android API versions on research, the privacy and data quality issues, and the mitigation of reproducibility risks with standardized data typology.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. No disponible

Cross-Technology Communication for the Internet of Things: A Survey

Yuan HeORCID; Xiuzhen GuoORCID; Xiaolong ZhengORCID; Zihao YuORCID; Jia ZhangORCID; Haotian JiangORCID; Xin NaORCID; Jiacheng ZhangORCID

<jats:p>The ever-developing Internet of Things (IoT) brings the prosperity of wireless sensing and control applications. In many scenarios, different wireless technologies coexist in the shared frequency medium as well as the physical space. Such wireless coexistence may lead to serious cross-technology interference (CTI) problems, e.g. channel competition, signal collision, throughput degradation. Compared with traditional methods like interference avoidance, tolerance, and concurrency mechanism, direct and timely information exchange among heterogeneous devices is therefore a fundamental requirement to ensure the usability, inter-operability, and reliability of the IoT. Under this circumstance, Cross-Technology Communication (CTC) technique thus becomes a hot topic in both academic and industrial fields, which aims at directly exchanging data among heterogeneous devices that follow different standards. This paper comprehensively summarizes the CTC techniques and reveals that the key challenge for CTC lies in the heterogeneity of IoT devices, including the incompatibility of technical standards and the asymmetry of connection capability. Based on the above finding, we present a taxonomy of the existing CTC works (packet-level CTCs and physical-level CTCs) and compare the existing CTC techniques in terms of throughput, reliability, hardware modification, and concurrency.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. No disponible

A Survey on Data-driven Software Vulnerability Assessment and Prioritization

Triet H. M. LeORCID; Huaming ChenORCID; M. Ali BabarORCID

<jats:p>Software Vulnerabilities (SVs) are increasing in complexity and scale, posing great security risks to many software systems. Given the limited resources in practice, SV assessment and prioritization help practitioners devise optimal SV mitigation plans based on various SV characteristics. The surges in SV data sources and data-driven techniques such as Machine Learning and Deep Learning have taken SV assessment and prioritization to the next level. Our survey provides a taxonomy of the past research efforts and highlights the best practices for data-driven SV assessment and prioritization. We also discuss the current limitations and propose potential solutions to address such issues.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. No disponible

A Survey on Wireless Device-free Human Sensing: Application Scenarios, Current Solutions, and Open Issues

Jiang Xiao; Huichuwu Li; Minrui Wu; Hai Jin; M. Jamal Deen; Jiannong Cao

<jats:p> In the last decade, many studies have significantly pushed the limits of <jats:italic>wireless device-free human sensing</jats:italic> (WDHS) technology and facilitated various applications, ranging from activity identification to vital sign monitoring. This survey presents a novel taxonomy that classifies the state-of-the-art WDHS systems into eleven categories according to their <jats:italic>sensing task type</jats:italic> and motion <jats:italic>granularity</jats:italic> . In particular, existing WDHS systems involve three primary sensing task types. The first type, <jats:italic>behavior recognition</jats:italic> , is a classification problem of recognizing predefined meaningful behaviors. The second type is <jats:italic>movement tracking</jats:italic> , monitoring the quantitative values of behavior states integrating with spatiotemporal information. The third type, <jats:italic>user identification</jats:italic> , leverages the unique features in behaviors to identify who performs the movements. The selected papers in each sensing task type can be further divided into sub-categories according to their motion granularity. Recent advances reveal that WDHS systems within a particular granularity follow similar challenges and design principles. For example, fine-grained hand recognition systems target extracting subtle motion-induced signal changes from the noisy signal responses, and their sensing areas are limited to a relative small range. Coarse-grained activity identification systems need to overcome the interference of other moving objects within the room-level sensing range. A novel research framework is proposed to help to summarize WDHS systems from methodology, evaluation performance, and design goals. Finally, we conclude with several open issues and present the future research directions from the perspectives of <jats:italic>data collection</jats:italic> , <jats:italic>sensing methodology</jats:italic> , <jats:italic>performance evaluation</jats:italic> , and <jats:italic>application scenario</jats:italic> . </jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. No disponible

Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats

Zhiyan ChenORCID; Jinxin LiuORCID; Yu ShenORCID; Murat SimsekORCID; Burak KantarciORCID; Hussein T. MouftahORCID; Petar DjukicORCID

<jats:p>Despite its technological benefits, Internet of Things (IoT) has cyber weaknesses due to the vulnerabilities in the wireless medium. Machine learning (ML)-based methods are widely used against cyber threats in IoT networks with promising performance. Advanced persistent threat (APT) is prominent for cybercriminals to compromise networks, and it is crucial to long-term and harmful characteristics. However, it is difficult to apply ML-based approaches to identify APT attacks to obtain a promising detection performance due to an extremely small percentage among normal traffic. There are limited surveys to fully investigate APT attacks in IoT networks due to the lack of public datasets with all types of APT attacks. It is worth to bridge the state-of-the-art in network attack detection with APT attack detection in a comprehensive review article. This survey article reviews the security challenges in IoT networks and presents the well-known attacks, APT attacks, and threat models in IoT systems. Meanwhile, signature-based, anomaly-based, and hybrid IDSs are summarized for IoT networks. The article highlights statistical insights regarding frequently applied ML-based methods against network intrusion. Finally, open issues and challenges for common network intrusion and APT attacks are presented for future research.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. No disponible

A Leap among Quantum Computing and Quantum Neural Networks: A Survey

Fabio Valerio Massoli; Lucia Vadicamo; Giuseppe Amato; Fabrizio Falchi

<jats:p>In recent years, Quantum Computing witnessed massive improvements in terms of available resources and algorithms development. The ability to harness quantum phenomena to solve computational problems is a long-standing dream that has drawn the scientific community’s interest since the late 80s. In such a context, we propose our contribution. First, we introduce basic concepts related to quantum computations, and then we explain the core functionalities of technologies that implement the Gate Model and Adiabatic Quantum Computing paradigms. Finally, we gather, compare and analyze the current state-of-the-art concerning Quantum Perceptrons and Quantum Neural Networks implementations.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. No disponible

On the Edge of the Deployment: A Survey on Multi-Access Edge Computing

Pedro Cruz; Nadjib Achir; Aline Carneiro Viana

<jats:p>Multi-Access Edge Computing (MEC) attracts much attention from the scientific community due to its scientific, technical, and commercial implications. In particular, the ETSI standard convergence consolidates the discussions around MEC. Still, the existing MEC practical initiatives are incomplete in their majority, hardening or invalidating their effective deployment. To fill this gap, it is essential to understand a series of experimental prototypes, implementations, and deployments. The early implementations can reveal the potential, the limitations, the related technologies, and the development tools for MEC adoption. In this context, this work first brings a discussion on existing MEC initiatives regarding the use cases they target and their vision (i.e., whether they are more network-related or more distributed systems). Second, we survey MEC practical initiatives according to their strategies, including the ETSI MEC standard. Besides, we compare the strategies according to related limitations, impact, and deployment efforts. We also survey the existing tools making MEC systems a reality. Finally, we give hints to issues yet to be addressed in practice. By bringing a better comprehension of MEC initiatives, we believe this survey will help researchers and developers design their own MEC systems or improve and simplify the usability of existing ones.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. No disponible