Issue Downloads
Naming Content on the Network Layer: A Security Analysis of the Information-Centric Network Model
The Information-Centric Network (ICN) paradigm is a future Internet approach aiming to tackle the Internet architectural problems and inefficiencies, by swapping the main entity of the network architecture from hosts to content items. In ICN, content ...
Text Analysis in Adversarial Settings: Does Deception Leave a Stylistic Trace?
Textual deception constitutes a major problem for online security. Many studies have argued that deceptiveness leaves traces in writing style, which could be detected using text classification techniques. By conducting an extensive literature review of ...
WiFi Sensing with Channel State Information: A Survey
With the high demand for wireless data traffic, WiFi networks have experienced very rapid growth, because they provide high throughput and are easy to deploy. Recently, Channel State Information (CSI) measured by WiFi networks is widely used for ...
A Survey on Collecting, Managing, and Analyzing Provenance from Scripts
Scripts are widely used to design and run scientific experiments. Scripting languages are easy to learn and use, and they allow complex tasks to be specified and executed in fewer steps than with traditional programming languages. However, they also ...
Comparison of Software Design Models: An Extended Systematic Mapping Study
Model comparison has been widely used to support many tasks in model-driven software development. For this reason, many techniques of comparing them have been proposed in the last few decades. However, academia and industry have overlooked a ...
From Hack to Elaborate Technique—A Survey on Binary Rewriting
Binary rewriting is changing the semantics of a program without having the source code at hand. It is used for diverse purposes, such as emulation (e.g., QEMU), optimization (e.g., DynInst), observation (e.g., Valgrind), and hardening (e.g., Control ...
Dance Interactive Learning Systems: A Study on Interaction Workflow and Teaching Approaches
Motion Capture and whole-body interaction technologies have been experimentally proven to contribute to the enhancement of dance learning and to the investigation of bodily knowledge, innovating at the same time the practice of dance. Designing and ...
Security and Privacy on Blockchain
Blockchain offers an innovative approach to storing information, executing transactions, performing functions, and establishing trust in an open environment. Many consider blockchain as a technology breakthrough for cryptography and cybersecurity, with ...
Evaluation of Hardware Data Prefetchers on Server Processors
Data prefetching, i.e., the act of predicting an application’s future memory accesses and fetching those that are not in the on-chip caches, is a well-known and widely used approach to hide the long latency of memory accesses. The fruitfulness of data ...
Leveraging User-related Internet of Things for Continuous Authentication: A Survey
Among all Internet of Things (IoT) devices, a subset of them are related to users. Leveraging these user-related IoT elements, it is possible to ensure the identity of the user for a period of time, thus avoiding impersonation. This need is known as ...
A Survey on Big Multimedia Data Processing and Management in Smart Cities
Integration of embedded multimedia devices with powerful computing platforms, e.g., machine learning platforms, helps to build smart cities and transforms the concept of Internet of Things into Internet of Multimedia Things (IoMT). To provide different ...
Multi-model Databases: A New Journey to Handle the Variety of Data
The variety of data is one of the most challenging issues for the research and practice in data management systems. The data are naturally organized in different formats and models, including structured data, semi-structured data, and unstructured data. ...
A Survey of Timing Verification Techniques for Multi-Core Real-Time Systems
This survey provides an overview of the scientific literature on timing verification techniques for multi-core real-time systems. It reviews the key results in the field from its origins around 2006 to the latest research published up to the end of ...
A Survey of Group Key Agreement Protocols with Constant Rounds
Group key agreement (shorten as GKA) protocol enables a group of users to negotiate a one-time session key and protect the thereafter group-oriented communication with this session key across an unreliable network. The number of communication rounds is ...
Mulsemedia DIY: A Survey of Devices and a Tutorial for Building Your Own Mulsemedia Environment
Multisensory experiences have been increasingly applied in Human-Computer Interaction (HCI). In recent years, it is commonplace to notice the development of haptic, olfactory, and even gustatory displays to create more immersive experiences. Companies ...
Survey and Taxonomy of Volunteer Computing
Volunteer Computing is a kind of distributed computing that harnesses the aggregated spare computing resources of volunteer devices. It provides a cheaper and greener alternative computing infrastructure that can complement the dedicated, centralized, ...
Privacy Analysis on Microblogging Online Social Networks: A Survey
Online Social Networks (OSNs) incorporate different forms of interactive communication, including microblogging services, multimedia sharing, business networking, and so on. They allow users to create profiles, connect with friends, and share their ...
Infrastructure-Independent Indoor Localization and Navigation
In the absence of any global positioning infrastructure for indoor environments, research on supporting human indoor localization and navigation trails decades behind research on outdoor localization and navigation. The major barrier to broader progress ...
Survey on Combinatorial Register Allocation and Instruction Scheduling
Register allocation (mapping variables to processor registers or memory) and instruction scheduling (reordering instructions to increase instruction-level parallelism) are essential tasks for generating efficient assembly code in a compiler. In the past ...
Environmental Audio Scene and Sound Event Recognition for Autonomous Surveillance: A Survey and Comparative Studies
Monitoring of human and social activities is becoming increasingly pervasive in our living environment for public security and safety applications. The recognition of suspicious events is important in both indoor and outdoor environments, such as child-...
Indoor Localization Improved by Spatial Context—A Survey
Indoor localization is essential for healthcare, security, augmented reality gaming, and many other location-based services. There is currently a wealth of relevant literature on indoor localization. This article focuses on recent advances in indoor ...