Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 52, Issue 2March 2020
Editor:
  • Sartaj Sahni
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:0360-0300
EISSN:1557-7341
Reflects downloads up to 01 Sep 2024Bibliometrics
Skip Table Of Content Section
survey
Computer-aided Arrhythmia Diagnosis with Bio-signal Processing: A Survey of Trends and Techniques
Article No.: 23, Pages 1–37https://doi.org/10.1145/3297711

Signals obtained from a patient, i.e., bio-signals, are utilized to analyze the health of patient. One such bio-signal of paramount importance is the electrocardiogram (ECG), which represents the functioning of the heart. Any abnormal behavior in the ...

survey
Machine Learning for Smart Building Applications: Review and Taxonomy
Article No.: 24, Pages 1–36https://doi.org/10.1145/3311950

The use of machine learning (ML) in smart building applications is reviewed in this article. We split existing solutions into two main classes: occupant-centric versus energy/devices-centric. The first class groups solutions that use ML for aspects ...

survey
Computational Understanding of Visual Interestingness Beyond Semantics: Literature Survey and Analysis of Covariates
Article No.: 25, Pages 1–37https://doi.org/10.1145/3301299

Understanding visual interestingness is a challenging task addressed by researchers in various disciplines ranging from humanities and psychology to, more recently, computer vision and multimedia. The rise of infographics and the visual information ...

survey
Quality Evaluation of Solution Sets in Multiobjective Optimisation: A Survey
Article No.: 26, Pages 1–38https://doi.org/10.1145/3300148

Complexity and variety of modern multiobjective optimisation problems result in the emergence of numerous search techniques, from traditional mathematical programming to various randomised heuristics. A key issue raised consequently is how to evaluate ...

survey
A Survey on Multithreading Alternatives for Soft Error Fault Tolerance
Article No.: 27, Pages 1–38https://doi.org/10.1145/3302255

Smaller transistor sizes and reduction in voltage levels in modern microprocessors induce higher soft error rates. This trend makes reliability a primary design constraint for computer systems. Redundant multithreading (RMT) makes use of parallelism in ...

survey
Software-defined Networking-based DDoS Defense Mechanisms
Article No.: 28, Pages 1–36https://doi.org/10.1145/3301614

Distributed Denial of Service attack (DDoS) is recognized to be one of the most catastrophic attacks against various digital communication entities. Software-defined networking (SDN) is an emerging technology for computer networks that uses open ...

survey
Cooperative Heterogeneous Multi-Robot Systems: A Survey
Article No.: 29, Pages 1–31https://doi.org/10.1145/3303848

The emergence of the Internet of things and the widespread deployment of diverse computing systems have led to the formation of heterogeneous multi-agent systems (MAS) to complete a variety of tasks. Motivated to highlight the state of the art on ...

survey
Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures
Article No.: 30, Pages 1–40https://doi.org/10.1145/3303771

Insider threats are one of today’s most challenging cybersecurity issues that are not well addressed by commonly employed security solutions. In this work, we propose structural taxonomy and novel categorization of research that contribute to the ...

survey
Passive Vision Region-Based Road Detection: A Literature Review
Article No.: 31, Pages 1–34https://doi.org/10.1145/3311951

We present a literature review to analyze the state of the art in the area of road detection based upon frontal images. For this purpose, a systematic literature review (SLR) was conducted that focuses on analyzing region-based works, since they can ...

survey
Negative Sequence Analysis: A Review
Article No.: 32, Pages 1–39https://doi.org/10.1145/3311952

Negative sequential patterns (NSPs) produced by negative sequence analysis (NSA) capture more informative and actionable knowledge than classic positive sequential patterns (PSPs) due to involving both occurring and nonoccurring items, which appear in ...

survey
Gait-based Person Re-identification: A Survey
Article No.: 33, Pages 1–34https://doi.org/10.1145/3243043

The way people walk is a strong correlate of their identity. Several studies have shown that both humans and machines can recognize individuals just by their gait, given that proper measurements of the observed motion patterns are available. For ...

tutorial
Countermeasures against Worm Spreading: A New Challenge for Vehicular Networks
Article No.: 34, Pages 1–25https://doi.org/10.1145/3284748

Vehicular ad hoc networks (VANETs) are essential components of the intelligent transport systems. They are attracting an increasing amount of interest in research and industrial sectors. Vehicular nodes are capable of transporting, sensing, processing ...

survey
Indoor Positioning Based on Visible Light Communication: A Performance-based Survey of Real-world Prototypes
Article No.: 35, Pages 1–36https://doi.org/10.1145/3299769

The emergent context-aware applications in ubiquitous computing demands for obtaining accurate location information of humans or objects in real-time. Indoor location-based services can be delivered through implementing different types of technology, ...

survey
A Comprehensive Survey on Parallelization and Elasticity in Stream Processing
Article No.: 36, Pages 1–37https://doi.org/10.1145/3303849

Stream Processing (SP) has evolved as the leading paradigm to process and gain value from the high volume of streaming data produced, e.g., in the domain of the Internet of Things. An SP system is a middleware that deploys a network of operators between ...

survey
A Multi-Vocal Review of Security Orchestration
Article No.: 37, Pages 1–45https://doi.org/10.1145/3305268

Organizations use diverse types of security solutions to prevent cyber-attacks. Multiple vendors provide security solutions developed using heterogeneous technologies and paradigms. Hence, it is a challenging rather impossible to easily make security ...

survey
Anomaly Detection Methods for Categorical Data: A Review
Article No.: 38, Pages 1–35https://doi.org/10.1145/3312739

Anomaly detection has numerous applications in diverse fields. For example, it has been widely used for discovering network intrusions and malicious events. It has also been used in numerous other applications such as identifying medical malpractice or ...

survey
Public Access
A Survey on Modality Characteristics, Performance Evaluation Metrics, and Security for Traditional and Wearable Biometric Systems
Article No.: 39, Pages 1–36https://doi.org/10.1145/3309550

Biometric research is directed increasingly toward Wearable Biometric Systems (WBS) for user authentication and identification. However, prior to engaging in WBS research, how their operational dynamics and design considerations differ from those of ...

survey
Deep Neural Network Approximation for Custom Hardware: Where We've Been, Where We're Going
Article No.: 40, Pages 1–39https://doi.org/10.1145/3309551

Deep neural networks have proven to be particularly effective in visual and audio recognition tasks. Existing models tend to be computationally expensive and memory intensive, however, and so methods for hardware-oriented approximation have become a hot ...

survey
Public Access
Smart City System Design: A Comprehensive Study of the Application and Data Planes
Article No.: 41, Pages 1–38https://doi.org/10.1145/3309545

Recent global smart city efforts resemble the establishment of electricity networks when electricity was first invented, which meant the start of a new era to sell electricity as a utility. A century later, in the smart era, the network to deliver ...

survey
A Survey of Chip-level Thermal Simulators
Article No.: 42, Pages 1–35https://doi.org/10.1145/3309544

Thermal modeling and simulation have become imperative in recent years owing to the increased power density of high performance microprocessors. Temperature is a first-order design criteria, and hence special consideration has to be given to it in every ...

survey
Handcrafted and Deep Trackers: Recent Visual Object Tracking Approaches and Trends
Article No.: 43, Pages 1–44https://doi.org/10.1145/3309665

In recent years, visual object tracking has become a very active research area. An increasing number of tracking algorithms are being proposed each year. It is because tracking has wide applications in various real-world problems such as human-computer ...

Subjects

Comments