Catálogo de publicaciones - revistas

Compartir en
redes sociales


ACM Computing Surveys (CSUR)

Resumen/Descripción – provisto por la editorial en inglés
A journal of the Association for Computing Machinery (ACM), which publishes surveys, tutorials, and special reports on all areas of computing research. Volumes are published yearly in four issues appearing in March, June, September, and December.
Palabras clave – provistas por la editorial

No disponibles.

Disponibilidad
Institución detectada Período Navegá Descargá Solicitá
No detectada desde mar. 1969 / hasta dic. 2023 ACM Digital Library

Información

Tipo de recurso:

revistas

ISSN impreso

0360-0300

ISSN electrónico

1557-7341

Editor responsable

Association for Computing Machinery (ACM)

País de edición

Estados Unidos

Fecha de publicación

Tabla de contenidos

Dimensionality Reduction Methods for Brain Imaging Data Analysis

Yunbo Tang; Dan Chen; Xiaoli Li

<jats:p> The past century has witnessed the grand success of brain imaging technologies, such as electroencephalography and magnetic resonance imaging, in probing cognitive states and pathological brain dynamics for neuroscience research and neurology practices. Human brain is “the most complex object in the universe,” and brain imaging data ( <jats:italic>BID</jats:italic> ) are routinely of multiple/many attributes and highly non-stationary. These are determined by the nature of <jats:italic>BID</jats:italic> as the recordings of the evolving processes of the brain(s) under examination in various views. Driven by the increasingly high demands for precision, efficiency, and reliability in neuro-science and engineering tasks, dimensionality reduction has become a priority issue in <jats:italic>BID</jats:italic> analysis to handle the notoriously high dimensionality and large scale of big <jats:italic>BID</jats:italic> sets as well as the enormously complicated interdependencies among data elements. This has become particularly urgent and challenging in this big data era. </jats:p> <jats:p> Dimensionality reduction theories and methods manifest unrivaled potential in revealing key insights to <jats:italic>BID</jats:italic> via offering the low-dimensional/tiny representations/features, which may preserve critical characterizations of massive neuronal activities and brain functional and/or malfunctional states of interest. This study surveys the most salient work along this direction conforming to a 3-dimensional taxonomy with respect to (1) the <jats:italic>scale</jats:italic> of <jats:italic>BID</jats:italic> , of which the design with this consideration is important for the potential applications; (2) the <jats:italic>order</jats:italic> of <jats:italic>BID</jats:italic> , in which a higher order denotes more <jats:italic>BID</jats:italic> attributes manipulatable by the method; and (3) <jats:italic>linearity</jats:italic> , in which the method’s degree of linearity largely determines the “fidelity” in <jats:italic>BID</jats:italic> exploration. This study defines criteria for qualitative evaluations of these works in terms of effectiveness, interpretability, efficiency, and scalability. The classifications and evaluations based on the taxonomy provide comprehensive guides to (1) how existing research and development efforts are distributed and (2) their performance, features, and potential in influential applications especially when involving big data. In the end, this study crystallizes the open technical issues and proposes research challenges that must be solved to enable further researches in this area of great potential. </jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-36

IoT Cloud Security Review

Fei Chen; Duming Luo; Tao Xiang; Ping Chen; Junfeng Fan; Hong-Linh Truong

<jats:p> Recent years have seen the rapid development and integration of the Internet of Things (IoT) and cloud computing. The market is providing various consumer-oriented smart IoT devices; the mainstream cloud service providers are building their software stacks to support IoT services. With this emerging trend even growing, the security of such smart IoT cloud systems has drawn much research attention in recent years. To better understand the emerging consumer-oriented smart IoT cloud systems for practical engineers and new researchers, this article presents a review of the most recent research efforts on <jats:italic>existing, real, already deployed</jats:italic> consumer-oriented IoT cloud applications in the past five years using typical case studies. Specifically, we first present a general model for the IoT cloud ecosystem. Then, using the model, we review and summarize recent, representative research works on emerging smart IoT cloud system security using 10 detailed case studies, with the aim that the case studies together provide insights into the insecurity of current emerging IoT cloud systems. We further present a systematic approach to conduct a security analysis for IoT cloud systems. Based on the proposed security analysis approach, we review and suggest potential security risk mitigation methods to protect IoT cloud systems. We also discuss future research challenges for the IoT cloud security area. </jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-36

The Programmable Data Plane

Oliver Michel; Roberto Bifulco; Gábor Rétvári; Stefan Schmid

<jats:p>Programmable data plane technologies enable the systematic reconfiguration of the low-level processing steps applied to network packets and are key drivers toward realizing the next generation of network services and applications. This survey presents recent trends and issues in the design and implementation of programmable network devices, focusing on prominent abstractions, architectures, algorithms, and applications proposed, debated, and realized over the past years. We elaborate on the trends that led to the emergence of this technology and highlight the most important pointers from the literature, casting different taxonomies for the field, and identifying avenues for future research.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-36

Vision-based Autonomous Vehicle Recognition

Azzedine BoukercheORCID; Xiren MaORCID

<jats:p>Vision-based Automated Vehicle Recognition (VAVR) has attracted considerable attention recently. Particularly given the reliance on emerging deep learning methods, which have powerful feature extraction and pattern learning abilities, vehicle recognition has made significant progress. VAVR is an essential part of Intelligent Transportation Systems. The VAVR system can fast and accurately locate a target vehicle, which significantly helps improve regional security. A comprehensive VAVR system contains three components: Vehicle Detection (VD), Vehicle Make and Model Recognition (VMMR), and Vehicle Re-identification (VRe-ID). These components perform coarse-to-fine recognition tasks in three steps. In this article, we conduct a thorough review and comparison of the state-of-the-art deep learning--based models proposed for VAVR. We present a detailed introduction to different vehicle recognition datasets used for a comprehensive evaluation of the proposed models. We also critically discuss the major challenges and future research trends involved in each task. Finally, we summarize the characteristics of the methods for each task. Our comprehensive model analysis will help researchers that are interested in VD, VMMR, and VRe-ID and provide them with possible directions to solve current challenges and further improve the performance and robustness of models.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-37

Knowledge Graphs

Aidan HoganORCID; Eva Blomqvist; Michael Cochez; Claudia D’amato; Gerard De Melo; Claudio GutierrezORCID; Sabrina Kirrane; José Emilio Labra Gayo; Roberto Navigli; Sebastian Neumaier; Axel-Cyrille Ngonga Ngomo; Axel Polleres; Sabbir M. Rashid; Anisa Rula; Lukas Schmelzeisen; Juan Sequeda; Steffen Staab; Antoine Zimmermann

<jats:p>In this article, we provide a comprehensive introduction to knowledge graphs, which have recently garnered significant attention from both industry and academia in scenarios that require exploiting diverse, dynamic, large-scale collections of data. After some opening remarks, we motivate and contrast various graph-based data models, as well as languages used to query and validate knowledge graphs. We explain how knowledge can be represented and extracted using a combination of deductive and inductive techniques. We conclude with high-level future research directions for knowledge graphs.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-37

PLS-SEM for Software Engineering Research

Daniel RussoORCID; Klaas-Jan StolORCID

<jats:p>Software Engineering (SE) researchers are increasingly paying attention to organizational and human factors. Rather than focusing only on variables that can be directly measured, such as lines of code, SE research studies now also consider unobservable variables, such as organizational culture and trust. To measure such latent variables, SE scholars have adopted Partial Least Squares Structural Equation Modeling (PLS-SEM), which is one member of the larger SEM family of statistical analysis techniques. As the SE field is facing the introduction of new methods such as PLS-SEM, a key issue is that not much is known about how to evaluate such studies. To help SE researchers learn about PLS-SEM, we draw on the latest methodological literature on PLS-SEM to synthesize an introduction. Further, we conducted a survey of PLS-SEM studies in the SE literature and evaluated those based on recommended guidelines.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-38

Recurrent Neural Networks for Edge Intelligence

Varsha S. LalapuraORCID; J. Amudha; Hariramn Selvamuruga Satheesh

<jats:p> Recurrent Neural Networks are ubiquitous and pervasive in many artificial intelligence applications such as speech recognition, predictive healthcare, creative art, and so on. Although they provide accurate superior solutions, they pose a massive challenge <jats:italic>“training havoc.”</jats:italic> Current expansion of IoT demands intelligent models to be deployed at the edge. This is precisely to handle increasing model sizes and complex network architectures. Design efforts to meet these for greater performance have had inverse effects on portability on edge devices with real-time constraints of memory, latency, and energy. This article provides a detailed insight into various compression techniques widely disseminated in the deep learning regime. They have become key in mapping powerful RNNs onto resource-constrained devices. While compression of RNNs is the main focus of the survey, it also highlights challenges encountered while training. The training procedure directly influences model performance and compression alongside. Recent advancements to overcome the training challenges with their strengths and drawbacks are discussed. In short, the survey covers the three-step process, namely, architecture selection, efficient training process, and suitable compression technique applicable to a resource-constrained environment. It is thus one of the comprehensive survey guides a developer can adapt for a time-series problem context and an RNN solution for the edge. </jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-38

Hardware Information Flow Tracking

Wei HuORCID; Armaiti Ardeshiricham; Ryan KastnerORCID

<jats:p>Information flow tracking (IFT) is a fundamental computer security technique used to understand how information moves through a computing system. Hardware IFT techniques specifically target security vulnerabilities related to the design, verification, testing, manufacturing, and deployment of hardware circuits. Hardware IFT can detect unintentional design flaws, malicious circuit modifications, timing side channels, access control violations, and other insecure hardware behaviors. This article surveys the area of hardware IFT. We start with a discussion on the basics of IFT, whose foundations were introduced by Denning in the 1970s. Building upon this, we develop a taxonomy for hardware IFT. We use this to classify and differentiate hardware IFT tools and techniques. Finally, we discuss the challenges yet to be resolved. The survey shows that hardware IFT provides a powerful technique for identifying hardware security vulnerabilities, as well as verifying and enforcing hardware security properties.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-39

Deep Learning for Sensor-based Human Activity Recognition

Kaixuan Chen; Dalin Zhang; Lina Yao; Bin Guo; Zhiwen Yu; Yunhao Liu

<jats:p>The vast proliferation of sensor devices and Internet of Things enables the applications of sensor-based activity recognition. However, there exist substantial challenges that could influence the performance of the recognition system in practical scenarios. Recently, as deep learning has demonstrated its effectiveness in many areas, plenty of deep methods have been investigated to address the challenges in activity recognition. In this study, we present a survey of the state-of-the-art deep learning methods for sensor-based human activity recognition. We first introduce the multi-modality of the sensory data and provide information for public datasets that can be used for evaluation in different challenge tasks. We then propose a new taxonomy to structure the deep methods by challenges. Challenges and challenge-related deep methods are summarized and analyzed to form an overview of the current research progress. At the end of this work, we discuss the open issues and provide some insights for future directions.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-40

Fashion Meets Computer Vision

Wen-Huang Cheng; Sijie Song; Chieh-Yun Chen; Shintami Chusnul Hidayati; Jiaying LiuORCID

<jats:p>Fashion is the way we present ourselves to the world and has become one of the world’s largest industries. Fashion, mainly conveyed by vision, has thus attracted much attention from computer vision researchers in recent years. Given the rapid development, this article provides a comprehensive survey of more than 200 major fashion-related works covering four main aspects for enabling intelligent fashion: (1) Fashion detection includes landmark detection, fashion parsing, and item retrieval; (2) Fashion analysis contains attribute recognition, style learning, and popularity prediction; (3) Fashion synthesis involves style transfer, pose transformation, and physical simulation; and (4) Fashion recommendation comprises fashion compatibility, outfit matching, and hairstyle suggestion. For each task, the benchmark datasets and the evaluation protocols are summarized. Furthermore, we highlight promising directions for future research.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-41