Nothing Special   »   [go: up one dir, main page]

skip to main content
Volume 55, Issue 14sDecember 2023
Editor:
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:0360-0300
EISSN:1557-7341
Reflects downloads up to 16 Nov 2024Bibliometrics
survey
Open Access
A Survey on Event-Based News Narrative Extraction
Article No.: 300, Pages 1–39https://doi.org/10.1145/3584741

Narratives are fundamental to our understanding of the world, providing us with a natural structure for knowledge representation over time. Computational narrative extraction is a subfield of artificial intelligence that makes heavy use of information ...

survey
Guided Depth Map Super-Resolution: A Survey
Article No.: 301, Pages 1–36https://doi.org/10.1145/3584860

Guided depth map super-resolution (GDSR), which aims to reconstruct a high-resolution depth map from a low-resolution observation with the help of a paired high-resolution color image, is a longstanding and fundamental problem that has attracted ...

survey
Device Fingerprinting for Cyber-Physical Systems: A Survey
Article No.: 302, Pages 1–41https://doi.org/10.1145/3584944

The continued growth of the cyber-physical system (CPS) and Internet of Things technologies raises device security and monitoring concerns. For device identification, authentication, conditioning, and security, device fingerprint/fingerprinting (DFP) is ...

survey
Implementing Data Exfiltration Defense in Situ: A Survey of Countermeasures and Human Involvement
Article No.: 303, Pages 1–37https://doi.org/10.1145/3582077

In this article we consider the problem of defending against increasing data exfiltration threats in the domain of cybersecurity. We review existing work on exfiltration threats and corresponding countermeasures. We consider current problems and ...

survey
A Practical Survey on Faster and Lighter Transformers
Article No.: 304, Pages 1–40https://doi.org/10.1145/3586074

Recurrent neural networks are effective models to process sequences. However, they are unable to learn long-term dependencies because of their inherent sequential nature. As a solution, Vaswani et al. introduced the Transformer, a model solely based on ...

survey
Open Access
Doomed to Repeat with IPv6? Characterization of NAT-centric Security in SOHO Routers
Article No.: 305, Pages 1–37https://doi.org/10.1145/3586007

With the transition to IPv6, addressing constraints that necessitated a common security architecture under network address translation (NAT) are no longer present. Instead, manufacturers are now able to choose between an open model design, where devices ...

survey
Open Access
Software Fault Tolerance in Real-Time Systems: Identifying the Future Research Questions
Article No.: 306, Pages 1–30https://doi.org/10.1145/3589950

Tolerating hardware faults in modern architectures is becoming a prominent problem due to the miniaturization of the hardware components, their increasing complexity, and the necessity to reduce costs. Software-Implemented Hardware Fault Tolerance ...

survey
A Survey of AI-enabled Dynamic Manufacturing Scheduling: From Directed Heuristics to Autonomous Learning
Article No.: 307, Pages 1–36https://doi.org/10.1145/3590163

As one of the most complex parts in manufacturing systems, scheduling plays an important role in the efficient allocation of resources to meet individual customization requirements. However, due to the uncertain disruptions (e.g., task arrival time, ...

survey
Open Access
Incentive Mechanisms in Peer-to-Peer Networks — A Systematic Literature Review
Article No.: 308, Pages 1–69https://doi.org/10.1145/3578581

Centralized networks inevitably exhibit single points of failure that malicious actors regularly target. Decentralized networks are more resilient if numerous participants contribute to the network’s functionality. Most decentralized networks employ ...

survey
Open Access
Survey on Privacy-Preserving Techniques for Microdata Publication
Article No.: 309, Pages 1–42https://doi.org/10.1145/3588765

The exponential growth of collected, processed, and shared microdata has given rise to concerns about individuals’ privacy. As a result, laws and regulations have emerged to control what organisations do with microdata and how they protect it. Statistical ...

survey
Open Access
A Review on Tools, Mechanics, Benefits, and Challenges of Gamified Software Testing
Article No.: 310, Pages 1–37https://doi.org/10.1145/3582273

Gamification is an established practice in Software Engineering to increase effectiveness and engagement in many practices. This manuscript provides a characterization of the application of gamification to the Software Testing area. Such practice in fact ...

survey
Computational Challenges and Approaches for Electric Vehicles
Article No.: 311, Pages 1–35https://doi.org/10.1145/3582076

Researchers worldwide have become increasingly interested in developing computational approaches to handle challenges facing electric vehicles (EVs) in recent years. This article examines the challenges and future potential of computational approaches for ...

survey
Open Access
Content-based and Knowledge-enriched Representations for Classification Across Modalities: A Survey
Article No.: 312, Pages 1–40https://doi.org/10.1145/3583682

This survey documents representation approaches for classification across different modalities, from purely content-based methods to techniques utilizing external sources of structured knowledge. We present studies related to three paradigms used for ...

survey
Open Access
Combining Machine Learning and Semantic Web: A Systematic Mapping Study
Article No.: 313, Pages 1–41https://doi.org/10.1145/3586163

In line with the general trend in artificial intelligence research to create intelligent systems that combine learning and symbolic components, a new sub-area has emerged that focuses on combining Machine Learning components with techniques developed by ...

survey
Physical Unclonable Functions (PUF) for IoT Devices
Article No.: 314, Pages 1–31https://doi.org/10.1145/3591464

Physical Unclonable Function (PUF) has recently attracted interest from both industry and academia as a potential alternative approach to secure Internet of Things (IoT) devices from the more traditional computational-based approach using conventional ...

survey
Open Access
A Survey of Threats to Research Literature-dependent Medical AI Solutions
Article No.: 315, Pages 1–26https://doi.org/10.1145/3592597

Medical Artificial Intelligence (MedAI) harnesses the power of medical research through AI algorithms and vast data to address healthcare challenges. The security, integrity, and credibility of MedAI tools are paramount, because human lives are at stake. ...

survey
Security Threats, Countermeasures, and Challenges of Digital Supply Chains
Article No.: 316, Pages 1–40https://doi.org/10.1145/3588999

The rapid growth of Information Communication Technologies (ICT) has impacted many fields. In this context, the supply chain has also quickly evolved toward the digital supply chain where digital and electronic technologies have been integrated into every ...

survey
Conceptual Modeling: Topics, Themes, and Technology Trends
Article No.: 317, Pages 1–38https://doi.org/10.1145/3589338

Conceptual modeling is an important part of information systems development and use that involves identifying and representing relevant aspects of reality. Although the past decades have experienced continuous digitalization of services and products that ...

survey
Open Access
Detecting Mental Distresses Using Social Behavior Analysis in the Context of COVID-19: A Survey
Article No.: 318, Pages 1–30https://doi.org/10.1145/3589784

Online social media provides a channel for monitoring people’s social behaviors from which to infer and detect their mental distresses. During the COVID-19 pandemic, online social networks were increasingly used to express opinions, views, and moods due ...

survey
Down the Rabbit Hole: Detecting Online Extremism, Radicalisation, and Politicised Hate Speech
Article No.: 319, Pages 1–35https://doi.org/10.1145/3583067

Social media is a modern person’s digital voice to project and engage with new ideas and mobilise communities—a power shared with extremists. Given the societal risks of unvetted content-moderating algorithms for Extremism, Radicalisation, and Hate speech ...

survey
Open Access
A Narrative Review of Factors Affecting the Implementation of Privacy and Security Practices in Software Development
Article No.: 320, Pages 1–27https://doi.org/10.1145/3589951

Privacy and security are complex topics, raising a variety of considerations and requirements that can be challenging to implement in software development. Determining the security and privacy related factors that have an influence on software systems ...

survey
Placement of Microservices-based IoT Applications in Fog Computing: A Taxonomy and Future Directions
Article No.: 321, Pages 1–43https://doi.org/10.1145/3592598

The Fog computing paradigm utilises distributed, heterogeneous and resource-constrained devices at the edge of the network for efficient deployment of latency-critical and bandwidth-hungry IoT application services. Moreover, MicroService Architecture (MSA)...

survey
Intel Software Guard Extensions Applications: A Survey
Article No.: 322, Pages 1–38https://doi.org/10.1145/3593021

Data confidentiality is a central concern in modern computer systems and services, as sensitive data from users and companies are being increasingly delegated to such systems. Several hardware-based mechanisms have been recently proposed to enforce ...

survey
Data Provenance in Security and Privacy
Article No.: 323, Pages 1–35https://doi.org/10.1145/3593294

Provenance information corresponds to essential metadata that describes the entities, users, and processes involved in the history and evolution of a data object. The benefits of tracking provenance information have been widely understood in a variety of ...

survey
Open Access
I Know What You Trained Last Summer: A Survey on Stealing Machine Learning Models and Defences
Article No.: 324, Pages 1–41https://doi.org/10.1145/3595292

Machine-Learning-as-a-Service (MLaaS) has become a widespread paradigm, making even the most complex Machine Learning models available for clients via, e.g., a pay-per-query principle. This allows users to avoid time-consuming processes of data collection,...

survey
Open Access
A Survey on Run-time Power Monitors at the Edge
Article No.: 325, Pages 1–33https://doi.org/10.1145/3593044

Effectively managing energy and power consumption is crucial to the success of the design of any computing system, helping mitigate the efficiency obstacles given by the downsizing of the systems while also being a valuable step towards achieving green ...

survey
Security Threat Mitigation for Smart Contracts: A Comprehensive Survey
Article No.: 326, Pages 1–37https://doi.org/10.1145/3593293

The blockchain technology, initially created for cryptocurrency, has been re-purposed for recording state transitions of smart contracts—decentralized applications that can be invoked through external transactions. Smart contracts gained popularity and ...

survey
A Systematic Review of Data Quality in CPS and IoT for Industry 4.0
Article No.: 327, Pages 1–38https://doi.org/10.1145/3593043

The Internet of Things (IoT) and Cyber-Physical Systems (CPS) are the backbones of Industry 4.0, where data quality is crucial for decision support. Data quality in these systems can deteriorate due to sensor failures or uncertain operating environments. ...

survey
Interpreting Adversarial Examples in Deep Learning: A Review
Article No.: 328, Pages 1–38https://doi.org/10.1145/3594869

Deep learning technology is increasingly being applied in safety-critical scenarios but has recently been found to be susceptible to imperceptible adversarial perturbations. This raises a serious concern regarding the adversarial robustness of deep neural ...

survey
The Security in Optical Wireless Communication: A Survey
Article No.: 329, Pages 1–36https://doi.org/10.1145/3594718

With the demand for economical and high-speed wireless services, Optical Wireless Communication (OWC) has attracted increasing attention in both research and the market. In the past decades, numerous optical-related techniques (e.g., LEDs, displays, ...

Subjects

Comments

Please enable JavaScript to view thecomments powered by Disqus.