Anthony Skjellum
Applied Filters
- Anthony Skjellum
- AuthorRemove filter
People
Colleagues
- Anthony Skjellum (73)
- Purushotham Venkataramaiah Bangalore (9)
- R. Brightwell (8)
- Manoj Apte (6)
- Matthew L Curry (6)
- Ewing “Rusty” Lusk (5)
- Srigurunath Chakravarthi (5)
- W. Gropp (5)
- Jothi P Neelamegam (4)
- Kathryn M Mohror (4)
- Nicolas H Younan (4)
- Torey Alford (4)
- Vijay P Shah (4)
- Yoginder Singh Dandass (4)
- Anand Pillai (3)
- Ignacio Laguna (3)
- Mark Yampolskiy (3)
- Martin Christopher Herbordt (3)
- Nawrin Sultana (3)
- Susan Mcmanus Bridges (3)
Publication
Journal/Magazine Names
- Concurrency and Computation: Practice & Experience (5)
- Parallel Computing (4)
- Computers and Security (2)
- International Journal of High Performance Computing Applications (2)
- ACM Transactions on Storage (1)
- Cluster Computing (1)
- Computational Optimization and Applications (1)
- Digital Threats: Research and Practice (1)
- Future Generation Computer Systems (1)
- Integrated Computer-Aided Engineering (1)
- International Journal of Critical Infrastructure Protection (1)
- International Journal of Parallel Programming (1)
- Journal of Integrated Design & Process Science (1)
- Journal of Parallel and Distributed Computing (1)
- Science of Computer Programming (1)
Proceedings/Book Names
- MPIDC '96: Proceedings of the Second MPI Developers Conference (3)
- EuroMPI '18: Proceedings of the 25th European MPI Users' Group Meeting (2)
- ExaMPI '15: Proceedings of the 3rd Workshop on Exascale MPI (2)
- LCN '02: Proceedings of the 27th Annual IEEE Conference on Local Computer Networks (2)
- RAID '21: Proceedings of the 24th International Symposium on Research in Attacks, Intrusions and Defenses (2)
- SCC '12: Proceedings of the 2012 SC Companion: High Performance Computing, Networking Storage and Analysis (2)
- EuroMPI '13: Proceedings of the 20th European MPI Users' Group Meeting (1)
- EuroMPI '16: Proceedings of the 23rd European MPI Users' Group Meeting (1)
- EuroMPI '17: Proceedings of the 24th European MPI Users' Group Meeting (1)
- EuroMPI '19: Proceedings of the 26th European MPI Users' Group Meeting (1)
- EuroMPI '23: Proceedings of the 30th European MPI Users' Group Meeting (1)
- EuroMPI/ASIA '14: Proceedings of the 21st European MPI Users' Group Meeting (1)
- EuroMPI/USA '20: Proceedings of the 27th European MPI Users' Group Meeting (1)
- ICPP Workshops '21: 50th International Conference on Parallel Processing Workshop (1)
- ICS '23: Proceedings of the 37th ACM International Conference on Supercomputing (1)
- ICS '24: Proceedings of the 38th ACM International Conference on Supercomputing (1)
- JGI '02: Proceedings of the 2002 joint ACM-ISCOPE conference on Java Grande (1)
- SAC '08: Proceedings of the 2008 ACM symposium on Applied computing (1)
- SC '19: Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis (1)
- SC-W '23: Proceedings of the SC '23 Workshops of The International Conference on High Performance Computing, Network, Storage, and Analysis (1)
Publisher
- Association for Computing Machinery (22)
- IEEE Computer Society (18)
- Elsevier Science Publishers B. V. (6)
- John Wiley and Sons Ltd. (5)
- Springer-Verlag (5)
- Kluwer Academic Publishers (3)
- Elsevier Advanced Technology Publications (2)
- IOS Press (2)
- MIT Press (2)
- Sage Publications, Inc. (2)
- Academic Press, Inc. (1)
- Computer Science Press, Inc. (1)
- Elsevier North-Holland, Inc. (1)
- Mississippi State University (1)
- Society for Computer Simulation International (1)
- The MIT Press (1)
Publication Date
Export Citations
Publications
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-article
MitM attacks on intellectual property and integrity of additive manufacturing systems: A security analysis
- Hamza Alkofahi
Software Engineering Department, Jordan University of Science and Technology, Irbid, Jordan
, - Heba Alawneh
Cybersecurity Department, Jordan University of Science and Technology, Irbid, Jordan
, - Anthony Skjellum
Computer Science and Engineering Department, The University of Tennessee at Chattanooga, Chattanooga, TN, United States
AbstractAdditive Manufacturing (AM) was originally invented to reduce the cost of the prototyping process. Over time, the technology evolved to be faster, more accurate, and affordable. These factors, in addition to the potential use of AM in parts ...
- 0Citation
MetricsTotal Citations0
- Hamza Alkofahi
- research-articleOpen AccessPublished By ACMPublished By ACM
SmartFuse: Reconfigurable Smart Switches to Accelerate Fused Collectives in HPC Applications
- Pouya Haghi
University of Rochester, United States of America
, - Cheng Tan
Microsoft, USA
, - Anqi Guo
Boston University, USA
, - Chunshu Wu
University of Rochester, USA
, - Dongfang Liu
Rochester Institute of Technology, USA
, - Ang Li
PNNL, United States of America
, - Anthony Skjellum
Tennessee Tech University, USA
, - Tong Geng
University of Rochester, USA
, - Martin Herbordt
Boston University, United States of America
ICS '24: Proceedings of the 38th ACM International Conference on Supercomputing•May 2024, pp 413-425• https://doi.org/10.1145/3650200.3656616Communication switches have sometimes been augmented to process collectives, e.g., in the IBM BlueGene and Mellanox SHArP switches. In this work, we find that there is a great acceleration opportunity through the further augmentation of switches to ...
- 0Citation
- 283
- Downloads
MetricsTotal Citations0Total Downloads283Last 12 Months283Last 6 weeks70
- Pouya Haghi
- research-articleOpen AccessPublished By ACMPublished By ACM
Implementation-Oblivious Transparent Checkpoint-Restart for MPI
- Yao Xu
Northeastern University, United States of America
, - Leonid Belyaev
Northeastern University, United States of America
, - Twinkle Jain
Northeastern University, United States of America
, - Derek Schafer
University of New Mexico, United States of America
, - Anthony Skjellum
Tennessee Tech University, United States of America
, - Gene Cooperman
Northeastern University, United States of America
SC-W '23: Proceedings of the SC '23 Workshops of The International Conference on High Performance Computing, Network, Storage, and Analysis•November 2023, pp 1738-1747• https://doi.org/10.1145/3624062.3624255This work presents experience with traditional use cases of checkpointing on a novel platform. A single codebase (MANA) transparently checkpoints production workloads for major available MPI implementations: “develop once, run everywhere”. The new ...
- 0Citation
- 186
- Downloads
MetricsTotal Citations0Total Downloads186Last 12 Months186Last 6 weeks33- 1
Supplementary Materialimplementation-oblivious_transparent_checkpoint-restart_for_mpi (1080p).mp4
- Yao Xu
- research-articlePublished By ACMPublished By ACM
View-aware Message Passing Through the Integration of Kokkos and ExaMPI
- Evan Suggs
University of Tennessee at Chattanooga, USA
, - Stephen Olivier
Sandia National Laboratories, USA
, - Jan Ciesko
Sandia National Laboratories, USA
, - Anthony Skjellum
Tennessee Technological University, USA
EuroMPI '23: Proceedings of the 30th European MPI Users' Group Meeting•September 2023, Article No.: 3, pp 1-10• https://doi.org/10.1145/3615318.3615321Kokkos provides in-memory advanced data structures, concurrency, and algorithms to support performance portable C++ parallel programming across CPUs and GPUs. The Message Passing Interface (MPI) provides the most widely used message passing model for ...
- 0Citation
- 59
- Downloads
MetricsTotal Citations0Total Downloads59Last 12 Months52
- Evan Suggs
- research-article
BEAST: Behavior as a Service for Trust management in IoT devices
- Brennan Huber
Computer Science and Software Engineering, Auburn University, Auburn AL 36849, USA
, - Farah Kandah
Computer Science and Software Engineering, Auburn University, Auburn AL 36849, USA
, - Anthony Skjellum
SimCenter, University of Tennessee at Chattanooga, Chattanooga TN 37403, USA
Future Generation Computer Systems, Volume 144, Issue C•Jul 2023, pp 165-178 • https://doi.org/10.1016/j.future.2023.02.003AbstractAs the internet becomes intertwined into every aspect of human life, the security of the Internet of Things (IoT) is also becoming increasingly critical. IoT devices are becoming the primary data source for a variety of smart-city ...
Highlights- Monitoring data in trust-based applications provides a more dynamic security layer.
- 0Citation
MetricsTotal Citations0
- Brennan Huber
- research-articlePublished By ACMPublished By ACM
FLASH: FPGA-Accelerated Smart Switches with GCN Case Study
- Pouya Haghi
Boston University, Boston, USA
, - William Krska
Boston University, Boston, USA
, - Cheng Tan
Microsoft, Bellevue, USA
, - Tong Geng
University of Rochester, Rochester, USA
, - Po Hao Chen
Boston University, Boston, USA
, - Connor Greenwood
Boston University, Boston, USA
, - Anqi Guo
Boston University, Boston, USA
, - Thomas Hines
University of Tennessee at Chattanooga, Chattanooga, USA
, - Chunshu Wu
Boston University, Boston, USA
, - Ang Li
Pacific Northwest National Laboratory, Richland, United States of America
, - Anthony Skjellum
University of Tennessee at Chattanooga, Chattanooga, United States of America
, - Martin Herbordt
Boston University, Boston, United States of America
ICS '23: Proceedings of the 37th ACM International Conference on Supercomputing•June 2023, pp 450-462• https://doi.org/10.1145/3577193.3593739Some communication switches, e.g., the Mellanox SHArP and those in the IBM BlueGene clusters, are augmented to process packets at the application level with fixed-function collectives. This approach, however, lacks flexibility, which limits their ...
- 3Citation
- 317
- Downloads
MetricsTotal Citations3Total Downloads317Last 12 Months190Last 6 weeks11
- Pouya Haghi
- research-article
A Fault-Model-Relevant Classification of Consensus Mechanisms for MPI and HPC
- Grace Nansamba
University of Tennessee at Chattanooga, Chattanooga, USA
, - Amani Altarawneh
Colorado State University, Fort Collins, USA
, - Anthony Skjellum
University of Tennessee at Chattanooga, Chattanooga, USA
International Journal of Parallel Programming, Volume 51, Issue 2-3•Jun 2023, pp 128-149 • https://doi.org/10.1007/s10766-022-00749-yAbstractLarge-scale HPC systems experience failures arising from faults in hardware, software, and/or networking. Failure rates continue to grow as systems scale up and out. Crash fault tolerance has up to now been the focus when considering means to ...
- 0Citation
MetricsTotal Citations0
- Grace Nansamba
- research-article
Design of a heuristic algorithm for the generalized multi-objective set covering problem
- Lakmali Weerasena
Department of Mathematics, University of Tennessee at Chattanooga, 615 McCallie Avenue, 37403-2598, Chattanooga, TN, USA
, - Aniekan Ebiefung
Department of Mathematics, University of Tennessee at Chattanooga, 615 McCallie Avenue, 37403-2598, Chattanooga, TN, USA
, - Anthony Skjellum
SIM Center, University of Tennessee at Chattanooga, 615 McCallie Avenue, 37403-2598, Chattanooga, TN, USA
Computational Optimization and Applications, Volume 82, Issue 3•Jul 2022, pp 717-751 • https://doi.org/10.1007/s10589-022-00379-7AbstractSet covering optimization problems (SCPs) are important and of broad interest because of their extensive applications in the real world. This study addresses the generalized multi-objective SCP (GMOSCP), which is an augmentation of the well-known ...
- 0Citation
MetricsTotal Citations0
- Lakmali Weerasena
- research-articleOpen AccessPublished By ACMPublished By ACM
Scrybe: A Secure Audit Trail for Clinical Trial Data Fusion
- Jonathan Oakley
Clemson University, USA
, - Carl Worley
Clemson University, USA
, - Lu Yu
Clemson University, USA
, - Richard R. Brooks
Clemson University, USA
, - İlker Özçelik
University of Tennessee at Chattanooga, USA
, - Anthony Skjellum
University of Tennessee at Chattanooga, USA
, - Jihad S. Obeid
Medical University of South Carolina, USA
Digital Threats: Research and Practice, Volume 4, Issue 2•June 2023, Article No.: 24, pp 1-20 • https://doi.org/10.1145/3491258Clinical trials are a multi-billion-dollar industry. One of the biggest challenges facing the clinical trial research community is satisfying Part 11 of Title 21 of the Code of Federal Regulations [7] and ISO 27789 [40]. These controls provide audit ...
- 0Citation
- 873
- Downloads
MetricsTotal Citations0Total Downloads873Last 12 Months649Last 6 weeks107
- Jonathan Oakley
- research-article
Implementation and evaluation of MPI 4.0 partitioned communication libraries
- Matthew G.F. Dosanjh
Sandia National Laboratories, Albuquerque, NM, United States of America
, - Andrew Worley
Tennessee Tech University, Cookeville, TN, United States of America
, - Derek Schafer
University of Tennessee at Chattanooga, Chattanooga, TN, United States of America
, - Prema Soundararajan
University of Alabama at Birmingham, Birmingham, AL, United States of America
, - Sheikh Ghafoor
Tennessee Tech University, Cookeville, TN, United States of America
, - Anthony Skjellum
University of Tennessee at Chattanooga, Chattanooga, TN, United States of America
, - Purushotham V. Bangalore
University of Alabama, Tuscaloosa, AL, United States of America
, - Ryan E. Grant
Sandia National Laboratories, Albuquerque, NM, United States of America
Queens University, Kingston, Ontario, Canada
AbstractPartitioned point-to-point communication primitives provide a performance-oriented mechanism to support a hybrid parallel programming model and have been included in the upcoming MPI-4.0 standard. These primitives enable an MPI library ...
Highlights- Motivation and applications for MPI Partitioned communication.
- A summary of the ...
- 7Citation
MetricsTotal Citations7
- Matthew G.F. Dosanjh
- research-articleOpen AccessPublished By ACMPublished By ACM
Encryption is Futile: Reconstructing 3D-Printed Models Using the Power Side-Channel
- Jacob Gatlin
Auburn University, US
, - Sofia Belikovetsky
Johns Hopkins University, US
, - Yuval Elovici
Ben Gurion University of the Negev, Israle
, - Anthony Skjellum
University of Tennessee at Chattanooga, US
, - Joshua Lubell
National Institute of Standards and Technology, US
, - Paul Witherell
National Institute of Standards and Technology, US
, - Mark Yampolskiy
Auburn University, US
RAID '21: Proceedings of the 24th International Symposium on Research in Attacks, Intrusions and Defenses•October 2021, pp 135-147• https://doi.org/10.1145/3471621.3471850Outsourced Additive Manufacturing (AM) exposes sensitive design data to external malicious actors. Even with end-to-end encryption between the design owner and 3D-printer, side-channel attacks can be used to bypass cyber-security measures and obtain ...
- 10Citation
- 1,195
- Downloads
MetricsTotal Citations10Total Downloads1,195Last 12 Months402Last 6 weeks165
- Jacob Gatlin
- research-articleOpen AccessPublished By ACMPublished By ACM
What Did You Add to My Additive Manufacturing Data?: Steganographic Attacks on 3D Printing Files
- Mark Yampolskiy
Auburn University, USA
, - Lynne Graves
University of South Alabama, USA
, - Jacob Gatlin
Auburn University, USA
, - Anthony Skjellum
University of Tennessee at Chattanooga, USA
, - Moti Yung
Google LLC and Columbia University, USA
RAID '21: Proceedings of the 24th International Symposium on Research in Attacks, Intrusions and Defenses•October 2021, pp 266-281• https://doi.org/10.1145/3471621.3471843Additive Manufacturing (AM) adoption is increasing in home and industrial settings, but information security for this technology is still immature. Thus far, three security threat categories have been identified: technical data theft, sabotage, and ...
- 3Citation
- 1,480
- Downloads
MetricsTotal Citations3Total Downloads1,480Last 12 Months765Last 6 weeks82
- Mark Yampolskiy
- research-articlePublished By ACMPublished By ACM
Design of a Portable Implementation of Partitioned Point-to-Point Communication Primitives
- Andrew Worley
Tennessee Technological University, United States of America
, - Prema Prema Soundararajan
University of Alabama at Birmingham, United States of America
, - Derek Schafer
University of Tennessee at Chattanooga, United States of America
, - Purushotham Bangalore
University of Alabama at Birmingham, United States of America
, - Ryan Grant
Sandia National Laboratories, United States of America
, - Matthew Dosanjh
Sandia National Laboratories, United States of America
, - Anthony Skjellum
University of Tennessee, Chattanooga; SimCenter, United States of America
, - Sheikh Ghafoor
Tennessee Technological University, United States of America
ICPP Workshops '21: 50th International Conference on Parallel Processing Workshop•August 2021, Article No.: 35, pp 1-11• https://doi.org/10.1145/3458744.3474046The Message Passing Interface (MPI) has been the dominant message passing solution for scientific computing for decades. MPI point-to-point communications are highly efficient mechanisms for process-to-process communication. However, MPI performance is ...
- 6Citation
- 160
- Downloads
MetricsTotal Citations6Total Downloads160Last 12 Months43Last 6 weeks2
- Andrew Worley
- research-article
Availability analysis of a permissioned blockchain with a lightweight consensus protocol
- Amani Altarawneh
SimCenter & Dept. of Computer Science and Engineering, University of Tennessee at Chattanooga, Chattanooga, USA
, - Fei Sun
Dept. of Electrical and Computer Engineering, Clemson University, Clemson, SC
, - Richard R. Brooks
Dept. of Electrical and Computer Engineering, Clemson University, Clemson, SC
, - Owulakemi Hambolu
Dept. of Electrical and Computer Engineering, Clemson University, Clemson, SC
, - Lu Yu
Dept. of Electrical and Computer Engineering, Clemson University, Clemson, SC
, - Anthony Skjellum
SimCenter & Dept. of Computer Science and Engineering, University of Tennessee at Chattanooga, Chattanooga, USA
AbstractThis paper offers a novel approach to the evaluation of provenance blockchain security and reliability using analytical methods for assessing system availability against malicious miner DoS attacks. In particular, we present the ...
- 1Citation
MetricsTotal Citations1
- Amani Altarawneh
- research-articlePublished By ACMPublished By ACM
Why is MPI (perceived to be) so complex?: Part 1—Does strong progress simplify MPI?
- Daniel J. Holmes
University of Edinburgh, United Kingdom
, - Anthony Skjellum
University of Tennessee at Chattanooga, USA
, - Derek Schafer
University of Tennessee at Chattanooga, USA
EuroMPI/USA '20: Proceedings of the 27th European MPI Users' Group Meeting•September 2020, pp 21-30• https://doi.org/10.1145/3416315.3416318Strong progress is optional in MPI. MPI allows implementations where progress (for example, updating the message-transport state machines or interaction with network devices) is only made during certain MPI procedure calls. Generally speaking, strong ...
- 3Citation
- 104
- Downloads
MetricsTotal Citations3Total Downloads104Last 12 Months18Last 6 weeks2
- Daniel J. Holmes
- research-articleOpen AccessPublished By ACMPublished By ACM
A large-scale study of MPI usage in open-source HPC applications
- Ignacio Laguna
Lawrence Livermore National Laboratory
, - Ryan Marshall
University of Tennessee
, - Kathryn Mohror
Lawrence Livermore National Laboratory
, - Martin Ruefenacht
University of Tennessee
, - Anthony Skjellum
University of Tennessee
, - Nawrin Sultana
Auburn University
SC '19: Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis•November 2019, Article No.: 31, pp 1-14• https://doi.org/10.1145/3295500.3356176Understanding the state-of-the-practice in MPI usage is paramount for many aspects of supercomputing, including optimizing the communication of HPC applications and informing standardization bodies and HPC systems procurements regarding the most ...
- 51Citation
- 2,831
- Downloads
MetricsTotal Citations51Total Downloads2,831Last 12 Months740Last 6 weeks65
- Ignacio Laguna
- research-articlePublic AccessPublished By ACMPublished By ACM
Exposition, clarification, and expansion of MPI semantic terms and conventions: is a nonblocking MPI function permitted to block?
- Purushotham V. Bangalore
University of Alabama at Birmingham
, - Rolf Rabenseifner
University of Stuttgart, Stuttgart, Germany
, - Daniel J. Holmes
The University of Edinburgh, Edinburgh, Scotland, UK
, - Julien Jaeger
CEA, France
, - Guillaume Mercier
Bordeaux Institute of Technology, Inria, France
, - Claudia Blaas-Schenner
VSC Research Center, Austria
, - Anthony Skjellum
Univ. of Tennessee at Chattanooga
EuroMPI '19: Proceedings of the 26th European MPI Users' Group Meeting•September 2019, Article No.: 2, pp 1-10• https://doi.org/10.1145/3343211.3343213This paper offers a timely study and proposed clarifications, revisions, and enhancements to the Message Passing Interface's (MPI's) Semantic Terms and Conventions. To enhance MPI, a clearer understanding of the meaning of the key terminology has proven ...
- 5Citation
- 311
- Downloads
MetricsTotal Citations5Total Downloads311Last 12 Months55Last 6 weeks10
- Purushotham V. Bangalore
- research-article
Failure recovery for bulk synchronous applications with MPI stages
- Nawrin Sultana
Auburn University, 345 W. Magnolia Ave, Auburn, AL 36849, United States
, - Martin Rüfenacht
University of Tennessee at Chattanooga, Chattanooga, TN, United States
, - Anthony Skjellum
University of Tennessee at Chattanooga, Chattanooga, TN, United States
, - Ignacio Laguna
Lawrence Livermore National Laboratory, Livermore, CA, United States
, - Kathryn Mohror
Lawrence Livermore National Laboratory, Livermore, CA, United States
Parallel Computing, Volume 84, Issue C•May 2019, pp 1-14 • https://doi.org/10.1016/j.parco.2019.02.007AbstractWhen an MPI program experiences a failure, the most common recovery approach is to restart all processes from a previous checkpoint and to re-queue the entire job. A disadvantage of this method is that, although the failure occurred ...
- 2Citation
MetricsTotal Citations2
- Nawrin Sultana
- research-articlefree
High performance erasure coding for very large stripe sizes
- Walker Haddock
University of Alabama at Birmingham
, - Purushotham V. Bangalore
University of Alabama at Birmingham
, - Matthew L. Curry
Sandia National Laboratories
, - Anthony Skjellum
University of Tennessee at Chattanooga
HPC '19: Proceedings of the High Performance Computing Symposium•April 2019, Article No.: 13, pp 1-12Exascale computing demands high bandwidth and low latency I/O on the computing edge. Object storage systems can provide higher bandwidth and lower latencies than tape archive. File transfer nodes present a single point of mediation through which data ...
- 0Citation
- 1,525
- Downloads
MetricsTotal Citations0Total Downloads1,525Last 12 Months242Last 6 weeks39
- Walker Haddock
- research-articlePublished By ACMPublished By ACM
MPI Stages: Checkpointing MPI State for Bulk Synchronous Applications
- Nawrin Sultana
Auburn University, Auburn, AL
, - Anthony Skjellum
University of Tennessee at Chattanooga, Chattanooga, TN
, - Ignacio Laguna
Lawrence Livermore National Laboratory, Livermore, CA
, - Matthew Shane Farmer
Auburn University, Auburn, AL
, - Kathryn Mohror
Lawrence Livermore National Laboratory, Livermore, CA
, - Murali Emani
Lawrence Livermore National Laboratory, Livermore, CA
EuroMPI '18: Proceedings of the 25th European MPI Users' Group Meeting•September 2018, Article No.: 13, pp 1-11• https://doi.org/10.1145/3236367.3236385When an MPI program experiences a failure, the most common recovery approach is to restart all processes from a previous checkpoint and to re-queue the entire job. A disadvantage of this method is that, although the failure occurred within the main ...
- 7Citation
- 193
- Downloads
MetricsTotal Citations7Total Downloads193Last 12 Months8
- Nawrin Sultana
Author Profile Pages
- Description: The Author Profile Page initially collects all the professional information known about authors from the publications record as known by the ACM bibliographic database, the Guide. Coverage of ACM publications is comprehensive from the 1950's. Coverage of other publishers generally starts in the mid 1980's. The Author Profile Page supplies a quick snapshot of an author's contribution to the field and some rudimentary measures of influence upon it. Over time, the contents of the Author Profile page may expand at the direction of the community.
Please see the following 2007 Turing Award winners' profiles as examples: - History: Disambiguation of author names is of course required for precise identification of all the works, and only those works, by a unique individual. Of equal importance to ACM, author name normalization is also one critical prerequisite to building accurate citation and download statistics. For the past several years, ACM has worked to normalize author names, expand reference capture, and gather detailed usage statistics, all intended to provide the community with a robust set of publication metrics. The Author Profile Pages reveal the first result of these efforts.
- Normalization: ACM uses normalization algorithms to weigh several types of evidence for merging and splitting names.
These include:- co-authors: if we have two names and cannot disambiguate them based on name alone, then we see if they have a co-author in common. If so, this weighs towards the two names being the same person.
- affiliations: names in common with same affiliation weighs toward the two names being the same person.
- publication title: names in common whose works are published in same journal weighs toward the two names being the same person.
- keywords: names in common whose works address the same subject matter as determined from title and keywords, weigh toward being the same person.
The more conservative the merging algorithms, the more bits of evidence are required before a merge is made, resulting in greater precision but lower recall of works for a given Author Profile. Many bibliographic records have only author initials. Many names lack affiliations. With very common family names, typical in Asia, more liberal algorithms result in mistaken merges.
Automatic normalization of author names is not exact. Hence it is clear that manual intervention based on human knowledge is required to perfect algorithmic results. ACM is meeting this challenge, continuing to work to improve the automated merges by tweaking the weighting of the evidence in light of experience.
- Bibliometrics: In 1926, Alfred Lotka formulated his power law (known as Lotka's Law) describing the frequency of publication by authors in a given field. According to this bibliometric law of scientific productivity, only a very small percentage (~6%) of authors in a field will produce more than 10 articles while the majority (perhaps 60%) will have but a single article published. With ACM's first cut at author name normalization in place, the distribution of our authors with 1, 2, 3..n publications does not match Lotka's Law precisely, but neither is the distribution curve far off. For a definition of ACM's first set of publication statistics, see Bibliometrics
- Future Direction:
The initial release of the Author Edit Screen is open to anyone in the community with an ACM account, but it is limited to personal information. An author's photograph, a Home Page URL, and an email may be added, deleted or edited. Changes are reviewed before they are made available on the live site.
ACM will expand this edit facility to accommodate more types of data and facilitate ease of community participation with appropriate safeguards. In particular, authors or members of the community will be able to indicate works in their profile that do not belong there and merge others that do belong but are currently missing.
A direct search interface for Author Profiles will be built.
An institutional view of works emerging from their faculty and researchers will be provided along with a relevant set of metrics.
It is possible, too, that the Author Profile page may evolve to allow interested authors to upload unpublished professional materials to an area available for search and free educational use, but distinct from the ACM Digital Library proper. It is hard to predict what shape such an area for user-generated content may take, but it carries interesting potential for input from the community.
Bibliometrics
The ACM DL is a comprehensive repository of publications from the entire field of computing.
It is ACM's intention to make the derivation of any publication statistics it generates clear to the user.
- Average citations per article = The total Citation Count divided by the total Publication Count.
- Citation Count = cumulative total number of times all authored works by this author were cited by other works within ACM's bibliographic database. Almost all reference lists in articles published by ACM have been captured. References lists from other publishers are less well-represented in the database. Unresolved references are not included in the Citation Count. The Citation Count is citations TO any type of work, but the references counted are only FROM journal and proceedings articles. Reference lists from books, dissertations, and technical reports have not generally been captured in the database. (Citation Counts for individual works are displayed with the individual record listed on the Author Page.)
- Publication Count = all works of any genre within the universe of ACM's bibliographic database of computing literature of which this person was an author. Works where the person has role as editor, advisor, chair, etc. are listed on the page but are not part of the Publication Count.
- Publication Years = the span from the earliest year of publication on a work by this author to the most recent year of publication of a work by this author captured within the ACM bibliographic database of computing literature (The ACM Guide to Computing Literature, also known as "the Guide".
- Available for download = the total number of works by this author whose full texts may be downloaded from an ACM full-text article server. Downloads from external full-text sources linked to from within the ACM bibliographic space are not counted as 'available for download'.
- Average downloads per article = The total number of cumulative downloads divided by the number of articles (including multimedia objects) available for download from ACM's servers.
- Downloads (cumulative) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server since the downloads were first counted in May 2003. The counts displayed are updated monthly and are therefore 0-31 days behind the current date. Robotic activity is scrubbed from the download statistics.
- Downloads (12 months) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server over the last 12-month period for which statistics are available. The counts displayed are usually 1-2 weeks behind the current date. (12-month download counts for individual works are displayed with the individual record.)
- Downloads (6 weeks) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server over the last 6-week period for which statistics are available. The counts displayed are usually 1-2 weeks behind the current date. (6-week download counts for individual works are displayed with the individual record.)
ACM Author-Izer Service
Summary Description
ACM Author-Izer is a unique service that enables ACM authors to generate and post links on both their homepage and institutional repository for visitors to download the definitive version of their articles from the ACM Digital Library at no charge.
Downloads from these sites are captured in official ACM statistics, improving the accuracy of usage and impact measurements. Consistently linking to definitive version of ACM articles should reduce user confusion over article versioning.
ACM Author-Izer also extends ACM’s reputation as an innovative “Green Path” publisher, making ACM one of the first publishers of scholarly works to offer this model to its authors.
To access ACM Author-Izer, authors need to establish a free ACM web account. Should authors change institutions or sites, they can utilize the new ACM service to disable old links and re-authorize new links for free downloads from a different site.
How ACM Author-Izer Works
Authors may post ACM Author-Izer links in their own bibliographies maintained on their website and their own institution’s repository. The links take visitors to your page directly to the definitive version of individual articles inside the ACM Digital Library to download these articles for free.
The Service can be applied to all the articles you have ever published with ACM.
Depending on your previous activities within the ACM DL, you may need to take up to three steps to use ACM Author-Izer.
For authors who do not have a free ACM Web Account:
- Go to the ACM DL http://dl.acm.org/ and click SIGN UP. Once your account is established, proceed to next step.
For authors who have an ACM web account, but have not edited their ACM Author Profile page:
- Sign in to your ACM web account and go to your Author Profile page. Click "Add personal information" and add photograph, homepage address, etc. Click ADD AUTHOR INFORMATION to submit change. Once you receive email notification that your changes were accepted, you may utilize ACM Author-izer.
For authors who have an account and have already edited their Profile Page:
- Sign in to your ACM web account, go to your Author Profile page in the Digital Library, look for the ACM Author-izer link below each ACM published article, and begin the authorization process. If you have published many ACM articles, you may find a batch Authorization process useful. It is labeled: "Export as: ACM Author-Izer Service"
ACM Author-Izer also provides code snippets for authors to display download and citation statistics for each “authorized” article on their personal pages. Downloads from these pages are captured in official ACM statistics, improving the accuracy of usage and impact measurements. Consistently linking to the definitive version of ACM articles should reduce user confusion over article versioning.
Note: You still retain the right to post your author-prepared preprint versions on your home pages and in your institutional repositories with DOI pointers to the definitive version permanently maintained in the ACM Digital Library. But any download of your preprint versions will not be counted in ACM usage statistics. If you use these AUTHOR-IZER links instead, usage by visitors to your page will be recorded in the ACM Digital Library and displayed on your page.
FAQ
- Q. What is ACM Author-Izer?
A. ACM Author-Izer is a unique, link-based, self-archiving service that enables ACM authors to generate and post links on either their home page or institutional repository for visitors to download the definitive version of their articles for free.
- Q. What articles are eligible for ACM Author-Izer?
- A. ACM Author-Izer can be applied to all the articles authors have ever published with ACM. It is also available to authors who will have articles published in ACM publications in the future.
- Q. Are there any restrictions on authors to use this service?
- A. No. An author does not need to subscribe to the ACM Digital Library nor even be a member of ACM.
- Q. What are the requirements to use this service?
- A. To access ACM Author-Izer, authors need to have a free ACM web account, must have an ACM Author Profile page in the Digital Library, and must take ownership of their Author Profile page.
- Q. What is an ACM Author Profile Page?
- A. The Author Profile Page initially collects all the professional information known about authors from the publications record as known by the ACM Digital Library. The Author Profile Page supplies a quick snapshot of an author's contribution to the field and some rudimentary measures of influence upon it. Over time, the contents of the Author Profile page may expand at the direction of the community. Please visit the ACM Author Profile documentation page for more background information on these pages.
- Q. How do I find my Author Profile page and take ownership?
- A. You will need to take the following steps:
- Create a free ACM Web Account
- Sign-In to the ACM Digital Library
- Find your Author Profile Page by searching the ACM Digital Library for your name
- Find the result you authored (where your author name is a clickable link)
- Click on your name to go to the Author Profile Page
- Click the "Add Personal Information" link on the Author Profile Page
- Wait for ACM review and approval; generally less than 24 hours
- Q. Why does my photo not appear?
- A. Make sure that the image you submit is in .jpg or .gif format and that the file name does not contain special characters
- Q. What if I cannot find the Add Personal Information function on my author page?
- A. The ACM account linked to your profile page is different than the one you are logged into. Please logout and login to the account associated with your Author Profile Page.
- Q. What happens if an author changes the location of his bibliography or moves to a new institution?
- A. Should authors change institutions or sites, they can utilize ACM Author-Izer to disable old links and re-authorize new links for free downloads from a new location.
- Q. What happens if an author provides a URL that redirects to the author’s personal bibliography page?
- A. The service will not provide a free download from the ACM Digital Library. Instead the person who uses that link will simply go to the Citation Page for that article in the ACM Digital Library where the article may be accessed under the usual subscription rules.
However, if the author provides the target page URL, any link that redirects to that target page will enable a free download from the Service.
- Q. What happens if the author’s bibliography lives on a page with several aliases?
- A. Only one alias will work, whichever one is registered as the page containing the author’s bibliography. ACM has no technical solution to this problem at this time.
- Q. Why should authors use ACM Author-Izer?
- A. ACM Author-Izer lets visitors to authors’ personal home pages download articles for no charge from the ACM Digital Library. It allows authors to dynamically display real-time download and citation statistics for each “authorized” article on their personal site.
- Q. Does ACM Author-Izer provide benefits for authors?
- A. Downloads of definitive articles via Author-Izer links on the authors’ personal web page are captured in official ACM statistics to more accurately reflect usage and impact measurements.
Authors who do not use ACM Author-Izer links will not have downloads from their local, personal bibliographies counted. They do, however, retain the existing right to post author-prepared preprint versions on their home pages or institutional repositories with DOI pointers to the definitive version permanently maintained in the ACM Digital Library.
- Q. How does ACM Author-Izer benefit the computing community?
- A. ACM Author-Izer expands the visibility and dissemination of the definitive version of ACM articles. It is based on ACM’s strong belief that the computing community should have the widest possible access to the definitive versions of scholarly literature. By linking authors’ personal bibliography with the ACM Digital Library, user confusion over article versioning should be reduced over time.
In making ACM Author-Izer a free service to both authors and visitors to their websites, ACM is emphasizing its continuing commitment to the interests of its authors and to the computing community in ways that are consistent with its existing subscription-based access model.
- Q. Why can’t I find my most recent publication in my ACM Author Profile Page?
- A. There is a time delay between publication and the process which associates that publication with an Author Profile Page. Right now, that process usually takes 4-8 weeks.
- Q. How does ACM Author-Izer expand ACM’s “Green Path” Access Policies?
- A. ACM Author-Izer extends the rights and permissions that authors retain even after copyright transfer to ACM, which has been among the “greenest” publishers. ACM enables its author community to retain a wide range of rights related to copyright and reuse of materials. They include:
- Posting rights that ensure free access to their work outside the ACM Digital Library and print publications
- Rights to reuse any portion of their work in new works that they may create
- Copyright to artistic images in ACM’s graphics-oriented publications that authors may want to exploit in commercial contexts
- All patent rights, which remain with the original owner