Nothing Special   »   [go: up one dir, main page]

skip to main content
Reflects downloads up to 22 Sep 2024Bibliometrics
Skip Table Of Content Section
research-article
Towards Interconnected Blockchains: A Comprehensive Review of the Role of Interoperability among Disparate Blockchains
Article No.: 135, Pages 1–39https://doi.org/10.1145/3460287

Unprecedented attention towards blockchain technology is serving as a game-changer in fostering the development of blockchain-enabled distinctive frameworks. However, fragmentation unleashed by its underlying concepts hinders different stakeholders from ...

research-article
More than Privacy: Adopting Differential Privacy in Game-theoretic Mechanism Design
Article No.: 136, Pages 1–37https://doi.org/10.1145/3460771

The vast majority of artificial intelligence solutions are founded on game theory, and differential privacy is emerging as perhaps the most rigorous and widely adopted privacy paradigm in the field. However, alongside all the advancements made in both ...

research-article
Affective Automotive User Interfaces–Reviewing the State of Driver Affect Research and Emotion Regulation in the Car
Article No.: 137, Pages 1–26https://doi.org/10.1145/3460938

Affective technology offers exciting opportunities to improve road safety by catering to human emotions. Modern car interiors enable the contactless detection of user states, paving the way for a systematic promotion of safe driver behavior through ...

research-article
Centralized, Distributed, and Everything in between: Reviewing Access Control Solutions for the IoT
Article No.: 138, Pages 1–34https://doi.org/10.1145/3465170

The Internet of Things is taking hold in our everyday life. Regrettably, the security of IoT devices is often being overlooked. Among the vast array of security issues plaguing the emerging IoT, we decide to focus on access control, as privacy, trust, ...

research-article
Machine Learning–based Cyber Attacks Targeting on Controlled Information: A Survey
Article No.: 139, Pages 1–36https://doi.org/10.1145/3465171

Stealing attack against controlled information, along with the increasing number of information leakage incidents, has become an emerging cyber security threat in recent years. Due to the booming development and deployment of advanced analytics ...

research-article
Text Mining in Cybersecurity: A Systematic Literature Review
Article No.: 140, Pages 1–36https://doi.org/10.1145/3462477

The growth of data volume has changed cybersecurity activities, demanding a higher level of automation. In this new cybersecurity landscape, text mining emerged as an alternative to improve the efficiency of the activities involving unstructured data. ...

research-article
Deep Learning for Medical Anomaly Detection – A Survey
Article No.: 141, Pages 1–37https://doi.org/10.1145/3464423

Machine learning–based medical anomaly detection is an important problem that has been extensively studied. Numerous approaches have been proposed across various medical application domains and we observe several similarities across these distinct ...

research-article
Public Access
Benchmarking Quantum Computers and the Impact of Quantum Noise
Article No.: 142, Pages 1–35https://doi.org/10.1145/3464420

Benchmarking is how the performance of a computing system is determined. Surprisingly, even for classical computers this is not a straightforward process. One must choose the appropriate benchmark and metrics to extract meaningful results. Different ...

research-article
A Survey of Music Visualization Techniques
Article No.: 143, Pages 1–29https://doi.org/10.1145/3461835

Music Information Research (MIR) comprises all the research topics involved in modeling and understanding music. Visualizations are frequently adopted to convey better understandings about music pieces, and the association of music with visual elements ...

research-article
Open Access
Temporal Relation Extraction in Clinical Texts: A Systematic Review
Article No.: 144, Pages 1–36https://doi.org/10.1145/3462475

Unstructured data in electronic health records, represented by clinical texts, are a vast source of healthcare information because they describe a patient's journey, including clinical findings, procedures, and information about the continuity of care. ...

research-article
Topic Modeling Using Latent Dirichlet allocation: A Survey
Article No.: 145, Pages 1–35https://doi.org/10.1145/3462478

We are not able to deal with a mammoth text corpus without summarizing them into a relatively small subset. A computational tool is extremely needed to understand such a gigantic pool of text. Probabilistic Topic Modeling discovers and explains the ...

research-article
Semantic Information Retrieval on Medical Texts: Research Challenges, Survey, and Open Issues
Article No.: 146, Pages 1–38https://doi.org/10.1145/3462476

The explosive growth and widespread accessibility of medical information on the Internet have led to a surge of research activity in a wide range of scientific communities including health informatics and information retrieval (IR). One of the common ...

research-article
Open Access
A Survey on Resilience in the IoT: Taxonomy, Classification, and Discussion of Resilience Mechanisms
Article No.: 147, Pages 1–39https://doi.org/10.1145/3462513

Internet-of-Things (IoT) ecosystems tend to grow both in scale and complexity, as they consist of a variety of heterogeneous devices that span over multiple architectural IoT layers (e.g., cloud, edge, sensors). Further, IoT systems increasingly demand ...

research-article
A Survey of Smart Contract Formal Specification and Verification
Article No.: 148, Pages 1–38https://doi.org/10.1145/3464421

A smart contract is a computer program that allows users to automate their actions on the blockchain platform. Given the significance of smart contracts in supporting important activities across industry sectors including supply chain, finance, legal, ...

research-article
A Survey of Parametric Static Analysis
Article No.: 149, Pages 1–37https://doi.org/10.1145/3464457

Understanding program behaviors is important to verify program properties or to optimize programs. Static analysis is a widely used technique to approximate program behaviors via abstract interpretation. To evaluate the quality of static analysis, ...

research-article
Beyond Multimedia Authoring: On the Need for Mulsemedia Authoring Tools
Article No.: 150, Pages 1–31https://doi.org/10.1145/3464422

The mulsemedia (Multiple Sensorial Media (MulSeMedia)) concept has been explored to provide users with new sensations using other senses beyond sight and hearing. The demand for producing such applications has motivated various studies in the mulsemedia ...

research-article
Edge Learning: The Enabling Technology for Distributed Big Data Analytics in the Edge
Article No.: 151, Pages 1–36https://doi.org/10.1145/3464419

Machine Learning (ML) has demonstrated great promise in various fields, e.g., self-driving, smart city, which are fundamentally altering the way individuals and organizations live, work, and interact. Traditional centralized learning frameworks require ...

research-article
Persistent Memory: A Survey of Programming Support and Implementations
Article No.: 152, Pages 1–37https://doi.org/10.1145/3465402

The recent rise of byte-addressable non-volatile memory technologies is blurring the dichotomy between memory and storage. In particular, they allow programmers to have direct access to persistent data instead of relying on traditional interfaces, such ...

research-article
A Comprehensive Review and a Taxonomy Proposal of Team Formation Problems
Article No.: 153, Pages 1–33https://doi.org/10.1145/3465399

With a growing interest in high-performing work teams and how to form them, a new computational challenge, denominated Team Formation Problem (TFP), has emerged. After almost two decades of research on this problem, many works continue to raise ...

research-article
A Survey on Session-based Recommender Systems
Article No.: 154, Pages 1–38https://doi.org/10.1145/3465401

Recommender systems (RSs) have been playing an increasingly important role for informed consumption, services, and decision-making in the overloaded information era and digitized economy. In recent years, session-based recommender systems (SBRSs) have ...

research-article
Two-dimensional Stroke Gesture Recognition: A Survey
Article No.: 155, Pages 1–36https://doi.org/10.1145/3465400

The expansion of touch-sensitive technologies, ranging from smartwatches to wall screens, triggered a wider use of gesture-based user interfaces and encouraged researchers to invent recognizers that are fast and accurate for end-users while being simple ...

research-article
One-Way Delay Measurement From Traditional Networks to SDN: A Survey
Article No.: 156, Pages 1–35https://doi.org/10.1145/3466167

We expose the state of the art in the topic of one-way delay measurement in both traditional and software-defined networks. A representative range of standard mechanisms and recent research works, including OpenFlow and Programming Protocol-independent ...

Subjects

Comments

Please enable JavaScript to view thecomments powered by Disqus.