Catálogo de publicaciones - revistas

Compartir en
redes sociales


ACM Computing Surveys (CSUR)

Resumen/Descripción – provisto por la editorial en inglés
A journal of the Association for Computing Machinery (ACM), which publishes surveys, tutorials, and special reports on all areas of computing research. Volumes are published yearly in four issues appearing in March, June, September, and December.
Palabras clave – provistas por la editorial

No disponibles.

Disponibilidad
Institución detectada Período Navegá Descargá Solicitá
No detectada desde mar. 1969 / hasta dic. 2023 ACM Digital Library

Información

Tipo de recurso:

revistas

ISSN impreso

0360-0300

ISSN electrónico

1557-7341

Editor responsable

Association for Computing Machinery (ACM)

País de edición

Estados Unidos

Fecha de publicación

Tabla de contenidos

A Survey on the Use of Preferences for Virtual Machine Placement in Cloud Data Centers

Abdulaziz Alashaikh; Eisa AlanaziORCID; Ala Al-Fuqaha

<jats:p>With the rapid development of virtualization techniques, cloud data centers allow for cost-effective, flexible, and customizable deployments of applications on virtualized infrastructure. Virtual machine (VM) placement aims to assign each virtual machine to a server in the cloud environment. VM Placement is of paramount importance to the design of cloud data centers. Typically, VM placement involves complex relations and multiple design factors as well as local policies that govern the assignment decisions. It also involves different constituents including cloud administrators and customers that might have disparate preferences while opting for a placement solution. Thus, it is often valuable to return not only an optimized solution to the VM placement problem but also a solution that reflects the given preferences of the constituents. In this article, we provide a detailed review on the role of preferences in the recent literature on VM placement. We examine different preference representations found in the literature, explain their existing usage, and explain the adopted solving approaches. We further discuss key challenges and identify possible research opportunities to better incorporate preferences within the context of VM placement.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-39

A Survey of Field-based Testing Techniques

Antonia Bertolino; Pietro Braione; Guglielmo De AngelisORCID; Luca Gazzola; Fitsum Kifetew; Leonardo Mariani; Matteo Orrù; Mauro Pezzè; Roberto Pietrantuono; Stefano Russo; Paolo Tonella

<jats:p> Field testing refers to testing techniques that operate in the field to reveal those faults that escape in-house testing. Field testing techniques are becoming increasingly popular with the growing complexity of contemporary software systems. In this article, we present the first systematic survey of field testing approaches over a body of 80 collected studies, and propose their categorization based on the environment and the system on which field testing is performed. We discuss four research questions addressing <jats:italic>how</jats:italic> software is tested in the field, <jats:italic>what</jats:italic> is tested in the field, which are the <jats:italic>requirements</jats:italic> , and how field tests are <jats:italic>managed</jats:italic> , and identify many challenging research directions. </jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-39

A Systematic Literature Review on Federated Machine Learning

Sin Kit LoORCID; Qinghua Lu; Chen Wang; Hye-Young PaikORCID; Liming Zhu

<jats:p>Federated learning is an emerging machine learning paradigm where clients train models locally and formulate a global model based on the local model updates. To identify the state-of-the-art in federated learning and explore how to develop federated learning systems, we perform a systematic literature review from a software engineering perspective, based on 231 primary studies. Our data synthesis covers the lifecycle of federated learning system development that includes background understanding, requirement analysis, architecture design, implementation, and evaluation. We highlight and summarise the findings from the results and identify future trends to encourage researchers to advance their current work.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-39

A Survey of Unsupervised Generative Models for Exploratory Data Analysis and Representation Learning

Mohanad Abukmeil; Stefano Ferrari; Angelo GenoveseORCID; Vincenzo Piuri; Fabio Scotti

<jats:p>For more than a century, the methods for data representation and the exploration of the intrinsic structures of data have developed remarkably and consist of supervised and unsupervised methods. However, recent years have witnessed the flourishing of big data, where typical dataset dimensions are high and the data can come in messy, incomplete, unlabeled, or corrupted forms. Consequently, discovering the hidden structure buried inside such data becomes highly challenging. From this perspective, exploratory data analysis plays a substantial role in learning the hidden structures that encompass the significant features of the data in an ordered manner by extracting patterns and testing hypotheses to identify anomalies. Unsupervised generative learning models are a class of machine learning models characterized by their potential to reduce the dimensionality, discover the exploratory factors, and learn representations without any predefined labels; moreover, such models can generate the data from the reduced factors’ domain. The beginner researchers can find in this survey the recent unsupervised generative learning models for the purpose of data exploration and learning representations; specifically, this article covers three families of methods based on their usage in the era of big data: blind source separation, manifold learning, and neural networks, from shallow to deep architectures.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1-40

Eye-Tracking Technologies in Mobile Devices Using Edge Computing: A Systematic Review

Nishan GunawardenaORCID; Jeewani Anupama GinigeORCID; Bahman JavadiORCID

<jats:p>Eye-tracking provides invaluable insight into the cognitive activities underlying a wide range of human behaviours. Identifying cognitive activities provide valuable perceptions of human learning patterns and signs of cognitive diseases like Alzheimer’s, Parkinson’s, autism. Also, mobile devices have changed the way that we experience daily life and become a pervasive part. This systematic review provides a detailed analysis of mobile device eye-tracking technology reported in 36 studies published in high ranked scientific journals from 2010 to 2020 (September), along with several reports from grey literature. The review provides in-depth analysis on algorithms, additional apparatus, calibration methods, computational systems, and metrics applied to measure the performance of the proposed solutions. Also, the review presents a comprehensive classification of mobile device eye-tracking applications used across various domains such as healthcare, education, road safety, news and human authentication. We have outlined the shortcomings identified in the literature and the limitations of the current mobile device eye-tracking technologies, such as using the front-facing mobile camera. Further, we have proposed an edge computing driven eye tracking solution to achieve the real-time eye tracking experience. Based on the findings, the paper outlines various research gaps and future opportunities that are expected to be of significant value for improving the work in the eye-tracking domain.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. No disponible

A Critical Review on the Use (and Misuse) of Differential Privacy in Machine Learning

Alberto Blanco-Justicia; David Sánchez; Josep Domingo-Ferrer; Krishnamurty Muralidhar

<jats:p> We review the use of differential privacy (DP) for privacy protection in machine learning (ML). We show that, driven by the aim of preserving the accuracy of the learned models, DP-based ML implementations are so loose that they do not offer the <jats:italic>ex ante</jats:italic> privacy guarantees of DP. Instead, what they deliver is basically noise addition similar to the traditional (and often criticized) statistical disclosure control approach. Due to the lack of formal privacy guarantees, the actual level of privacy offered must be experimentally assessed <jats:italic>ex post</jats:italic> , which is done very seldom. In this respect, we present empirical results showing that standard anti-overfitting techniques in ML can achieve a better utility/privacy/efficiency trade-off than DP. </jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. No disponible

A survey of joint intent detection and slot filling models in natural language understanding

Henry WeldORCID; Xiaoqi HuangORCID; Siqu LongORCID; Josiah PoonORCID; Soyeon Caren HanORCID

<jats:p>Intent classification, to identify the speaker’s intention, and slot filling, to label each token with a semantic type, are critical tasks in natural language understanding. Traditionally the two tasks have been addressed independently. More recently joint models, that address the two tasks together, have achieved state-of-the-art performance for each task, and have shown there exists a strong relationship between the two. In this survey we bring the coverage of methods up to 2021 including the many applications of deep learning in the field. As well as a technological survey we look at issues addressed in the joint task, and the approaches designed to address these issues. We cover data sets, evaluation metrics, experiment design and supply a summary of reported performance on the standard data sets.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. No disponible

Post-hoc Interpretability for Neural NLP: A Survey

Andreas Madsen; Siva Reddy; Sarath Chandar

<jats:p>Neural networks for NLP are becoming increasingly complex and widespread, and there is a growing concern if these models are responsible to use. Explaining models helps to address the safety and ethical concerns and is essential for accountability. Interpretability serves to provide these explanations in terms that are understandable to humans. Additionally, post-hoc methods provide explanations after a model is learned and are generally model-agnostic. This survey provides a categorization of how recent post-hoc interpretability methods communicate explanations to humans, it discusses each method in-depth, and how they are validated, as the latter is often a common concern.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. No disponible

Privacy Intelligence: A Survey on Image Privacy in Online Social Networks

Chi LiuORCID; Tianqing ZhuORCID; Jun ZhangORCID; Wanlei ZhouORCID

<jats:p>Image sharing on online social networks (OSNs) has become an indispensable part of daily social activities, but it has also increased the risk of privacy invasion. An online image can reveal various types of sensitive information, prompting the public to rethink individual privacy needs in OSN image sharing critically. However, the interaction of images and OSN makes the privacy issues significantly complicated. The current real-world solutions for privacy management fail to provide adequate personalized, accurate and flexible privacy protection. Constructing a more intelligent environment for privacy-friendly OSN image sharing is urgent in the near future. Meanwhile, given the dynamics in both users’ privacy needs and OSN context, a comprehensive understanding of OSN image privacy throughout the entire sharing process is preferable to any views from a single side, dimension or level. To fill this gap, we contribute a survey of ”privacy intelligence” that targets modern privacy issues in dynamic OSN image sharing from a user-centric perspective. Specifically, we present the important properties and a taxonomy of OSN image privacy, along with a high-level privacy analysis framework based on the lifecycle of OSN image sharing. The framework consists of three stages with different principles of privacy by design. At each stage, we identify typical user behaviors in OSN image sharing and their associated privacy issues. Then a systematic review of representative intelligent solutions to those privacy issues is conducted, also in a stage-based manner. The analysis results in an intelligent ”privacy firewall” for closed-loop privacy management. Challenges and future directions in this area are also discussed.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. No disponible

A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference Techniques

Minzhao Lyu; Hassan Habibi Gharakheili; Vijay Sivaraman

<jats:p>The domain name system (DNS) that maps alphabetic names to numeric Internet Protocol (IP) addresses plays a foundational role in Internet communications. By default, DNS queries and responses are exchanged in unencrypted plaintext, and hence, can be read and/or hijacked by third parties. To protect user privacy, the networking community has proposed standard encryption technologies such as DNS over TLS (DoT), DNS over HTTPS (DoH), and DNS over QUIC (DoQ) for DNS communications, enabling clients to perform secure and private domain name lookups. We survey the DNS encryption literature published from 2016 to 2021, focusing on its current landscape and how it is misused by malware, and highlighting the existing techniques developed to make inferences from encrypted DNS traffic. First, we provide an overview of various standards developed in the space of DNS encryption and their adoption status, performance, benefits, and security issues. Second, we highlight ways that various malware families can exploit DNS encryption to their advantage for botnet communications and/or data exfiltration. Third, we discuss existing inference methods for profiling normal patterns and/or detecting malicious encrypted DNS traffic. Several directions are presented to motivate future research in enhancing the performance and security of DNS encryption.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. No disponible