Issue Downloads
Shared-Memory Optimizations for Inter-Virtual-Machine Communication
Virtual machines (VMs) and virtualization are one of the core computing technologies today. Inter-VM communication is not only prevalent but also one of the leading costs for data-intensive systems and applications in most data centers and cloud ...
A Survey of Role Mining
Role-Based Access Control (RBAC) is the most widely used model for advanced access control deployed in diverse enterprises of all sizes. RBAC critically depends on defining roles, which are a functional intermediate between users and permissions. Thus, ...
A Systematic Review of Shared Sensor Networks
- Claudio M. De Farias,
- Wei Li,
- Flávia C. Delicato,
- Luci Pirmez,
- Albert Y. Zomaya,
- Paulo F. Pires,
- José N. De Souza
While Wireless Sensor Networks (WSNs) have been traditionally tasked with single applications, in recent years we have witnessed the emergence of Shared Sensor Networks (SSNs) as integrated cyber-physical system infrastructures for a multitude of ...
Audio Surveillance: A Systematic Review
Despite surveillance systems becoming increasingly ubiquitous in our living environment, automated surveillance, currently based on video sensory modality and machine intelligence, lacks most of the time the robustness and reliability required in ...
Seamless Outdoors-Indoors Localization Solutions on Smartphones: Implementation and Challenges
The demand for more sophisticated Location-Based Services (LBS) in terms of applications variety and accuracy is tripling every year since the emergence of the smartphone a few years ago. Equally, smartphone manufacturers are mounting several wireless ...
A Survey of Architectural Techniques for Managing Process Variation
Process variation—deviation in parameters from their nominal specifications—threatens to slow down and even pause technological scaling, and mitigation of it is the way to continue the benefits of chip miniaturization. In this article, we present a ...
The Ethics of Computing: A Survey of the Computing-Oriented Literature
Computing technologies and artifacts are increasingly integrated into most aspects of our professional, social, and private lives. One consequence of this growing ubiquity of computing is that it can have significant ethical implications that computing ...
Olfaction-Enhanced Multimedia: A Survey of Application Domains, Displays, and Research Challenges
Recently, the concept of olfaction-enhanced multimedia applications has gained traction as a step toward further enhancing user quality of experience. The next generation of rich media services will be immersive and multisensory, with olfaction playing ...
A Survey on Mobile Social Signal Processing
Understanding human behavior in an automatic but nonintrusive manner is an important area for various applications. This requires the collaboration of information technology with human sciences to transfer existing knowledge of human behavior into self-...
Rare Event Detection and Propagation in Wireless Sensor Networks
Rarely occurring events present unique challenges to energy constrained systems designed for long term sensing of their occurrence or effect. Unlike periodic sampling or query based sensing systems, longevity cannot be achieved simply by adjusting the ...
A Survey on Design Approaches to Circumvent Permanent Faults in Networks-on-Chip
Increasing fault rates in current and future technology nodes coupled with on-chip components in the hundreds calls for robust and fault-tolerant Network-on-Chip (NoC) designs. Given the central role of NoCs in today’s many-core chips, permanent faults ...
A Closer Look at GPGPU
The lack of detailed white box illustration leaves a gap in the field of GPGPU (General-Purpose Computing on the Graphic Processing Unit), thus hindering users and researchers from exploring hardware potential while improving application performance. ...
On Choosing Server- or Client-Side Solutions for BFT
Byzantine Fault Tolerant (BFT) protocols have the ability to work correctly even when up to a threshold f of system servers are compromised. This makes them appealing for the construction of critical systems connected to the Internet, which are ...
A Survey of Techniques for Approximate Computing
Approximate computing trades off computation quality with effort expended, and as rising performance demands confront plateauing resource budgets, approximate computing has become not merely attractive, but even imperative. In this article, we present a ...
Parallel Optimal Pairwise Biological Sequence Comparison: Algorithms, Platforms, and Classification
Many bioinformatics applications, such as the optimal pairwise biological sequence comparison, demand a great quantity of computing resource, thus are excellent candidates to run in high-performance computing (HPC) platforms. In the last two decades, a ...
A Survey and Analysis of the GNSS Spoofing Threat and Countermeasures
Detection and prevention of global navigation satellite system (GNSS) “spoofing” attacks, or the broadcast of false global navigation satellite system services, has recently attracted much research interest. This survey aims to fill three gaps in the ...
Type Inference on Executables
In many applications, source code and debugging symbols of a target program are not available, and the only thing that we can access is the program executable. A fundamental challenge with executables is that, during compilation, critical information ...