Volume 55, Issue 12December 2023Current Issue
Bibliometrics
Skip Table Of Content Section
survey
What Are the Attackers Doing Now? Automating Cyberthreat Intelligence Extraction from Text on Pace with the Changing Threat Landscape: A Survey
Article No.: 241, pp 1–36https://doi.org/10.1145/3571726

Cybersecurity researchers have contributed to the automated extraction of CTI from textual sources, such as threat reports and online articles describing cyberattack strategies, procedures, and tools. The goal of this article is to aid cybersecurity ...

survey
Resource Management in Cloud and Cloud-influenced Technologies for Internet of Things Applications
Article No.: 242, pp 1–37https://doi.org/10.1145/3571729

The trend of adopting Internet of Things (IoT) in healthcare, smart cities, Industry 4.0, and so on is increasing by means of cloud computing, which provides on-demand storage and computation facilities over the Internet. To meet specific requirements of ...

survey
Open Access
Exploring Neuromorphic Computing Based on Spiking Neural Networks: Algorithms to Hardware
Article No.: 243, pp 1–49https://doi.org/10.1145/3571155

Neuromorphic Computing, a concept pioneered in the late 1980s, is receiving a lot of attention lately due to its promise of reducing the computational energy, latency, as well as learning complexity in artificial neural networks. Taking inspiration from ...

survey
A Systematic Survey of General Sparse Matrix-matrix Multiplication
Article No.: 244, pp 1–36https://doi.org/10.1145/3571157

General Sparse Matrix-Matrix Multiplication (SpGEMM) has attracted much attention from researchers in graph analyzing, scientific computing, and deep learning. Many optimization techniques have been developed for different applications and computing ...

survey
A Survey on Perceptually Optimized Video Coding
Article No.: 245, pp 1–37https://doi.org/10.1145/3571727

To provide users with more realistic visual experiences, videos are developing in the trends of Ultra High Definition (UHD), High Frame Rate (HFR), High Dynamic Range (HDR), Wide Color Gammut (WCG), and high clarity. However, the data amount of videos ...

survey
Progress in Multivariate Cryptography: Systematic Review, Challenges, and Research Directions
Article No.: 246, pp 1–34https://doi.org/10.1145/3571071

Multivariate Public Key Cryptosystem (MPKC) seem to be promising toward future digital security even in the presence of quantum adversaries. MPKCs derive their security from the difficulty of solving a random system of multivariate polynomial equations ...

survey
Machine Learning Applications in Internet-of-Drones: Systematic Review, Recent Deployments, and Open Issues
Article No.: 247, pp 1–45https://doi.org/10.1145/3571728

Deep Learning (DL) and Machine Learning (ML) are effectively utilized in various complicated challenges in healthcare, industry, and academia. The Internet of Drones (IoD) has lately cropped up due to high adjustability to a broad range of unpredictable ...

survey
Survey of Hallucination in Natural Language Generation
Article No.: 248, pp 1–38https://doi.org/10.1145/3571730

Natural Language Generation (NLG) has improved exponentially in recent years thanks to the development of sequence-to-sequence deep learning technologies such as Transformer-based language models. This advancement has led to more fluent and coherent NLG, ...

survey
Open Access
A Comprehensive Review of the State-of-the-Art on Security and Privacy Issues in Healthcare
Article No.: 249, pp 1–38https://doi.org/10.1145/3571156

Currently, healthcare is critical environment in our society, which attracts attention to malicious activities and has caused an important number of damaging attacks. In parallel, the recent advancements in technologies, computing systems, and wireless ...

survey
Strategic Decisions: Survey, Taxonomy, and Future Directions from Artificial Intelligence Perspective
Article No.: 250, pp 1–30https://doi.org/10.1145/3571807

Strategic Decision-Making is always challenging because it is inherently uncertain, ambiguous, risky, and complex. By contrast to tactical and operational decisions, strategic decisions are decisive, pivotal, and often irreversible, which may result in ...

survey
A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions
Article No.: 251, pp 1–32https://doi.org/10.1145/3572771

Blockchain technology provides efficient and secure solutions to various online activities by utilizing a wide range of cryptographic tools. In this article, we survey the existing literature on post-quantum secure digital signatures that possess exotic ...

survey
Open Access
Approximation Opportunities in Edge Computing Hardware: A Systematic Literature Review
Article No.: 252, pp 1–49https://doi.org/10.1145/3572772

With the increasing popularity of the Internet of Things and massive Machine Type Communication technologies, the number of connected devices is rising. However, although enabling valuable effects to our lives, bandwidth and latency constraints challenge ...

survey
More Recent Advances in (Hyper)Graph Partitioning
Article No.: 253, pp 1–38https://doi.org/10.1145/3571808

In recent years, significant advances have been made in the design and evaluation of balanced (hyper)graph partitioning algorithms. We survey trends of the past decade in practical algorithms for balanced (hyper)graph partitioning together with future ...

survey
Performance Interference of Virtual Machines: A Survey
Article No.: 254, pp 1–37https://doi.org/10.1145/3573009

The rapid development of cloud computing with virtualization technology has benefited both academia and industry. For any cloud data center at scale, one of the primary challenges is how to effectively orchestrate a large number of virtual machines (VMs) ...

tutorial
Instance Space Analysis for Algorithm Testing: Methodology and Software Tools
Article No.: 255, pp 1–31https://doi.org/10.1145/3572895

Instance Space Analysis (ISA) is a recently developed methodology to (a) support objective testing of algorithms and (b) assess the diversity of test instances. Representing test instances as feature vectors, the ISA methodology extends Rice’s 1976 ...

survey
Machine Learning for Software Engineering: A Tertiary Study
Article No.: 256, pp 1–39https://doi.org/10.1145/3572905

Machine learning (ML) techniques increase the effectiveness of software engineering (SE) lifecycle activities. We systematically collected, quality-assessed, summarized, and categorized 83 reviews in ML for SE published between 2009 and 2022, covering 6,...

survey
Deep Person Generation: A Survey from the Perspective of Face, Pose, and Cloth Synthesis
Article No.: 257, pp 1–37https://doi.org/10.1145/3575656

Deep person generation has attracted extensive research attention due to its wide applications in virtual agents, video conferencing, online shopping, and art/movie production. With the advancement of deep learning, visual appearances (face, pose, cloth) ...

survey
A Survey of Implicit Discourse Relation Recognition
Article No.: 258, pp 1–34https://doi.org/10.1145/3574134

A discourse containing one or more sentences describes daily issues and events for people to communicate their thoughts and opinions. As sentences are normally consist of multiple text segments, correct understanding of the theme of a discourse should ...

survey
Efficient Deep Learning: A Survey on Making Deep Learning Models Smaller, Faster, and Better
Article No.: 259, pp 1–37https://doi.org/10.1145/3578938

Deep learning has revolutionized the fields of computer vision, natural language understanding, speech recognition, information retrieval, and more. However, with the progressive improvements in deep learning models, their number of parameters, latency, ...

survey
Deep Learning Techniques for COVID-19 Diagnosis and Prognosis Based on Radiological Imaging
Article No.: 260, pp 1–39https://doi.org/10.1145/3576898

This literature review summarizes the current deep learning methods developed by the medical imaging AI research community that have been focused on resolving lung imaging problems related to coronavirus disease 2019 (COVID-19). COVID-19 shares many of ...

survey
SoK: DAG-based Blockchain Systems
Article No.: 261, pp 1–38https://doi.org/10.1145/3576899

Limitations on high latency and low scalability of classical blockchain systems retard their adoptions and applications. Reconstructed blockchain systems have been proposed to avoid the consumption of competitive transactions caused by linear sequenced ...

survey
Cancer Prognosis and Diagnosis Methods Based on Ensemble Learning
Article No.: 262, pp 1–34https://doi.org/10.1145/3580218

Ensemble methods try to improve performance via integrating different kinds of input data, features, or learning algorithms. In addition to other areas, they are finding their applications in cancer prognosis and diagnosis. However, in this area, the ...

Subjects

Comments

About Cookies On This Site

We use cookies to ensure that we give you the best experience on our website.

Learn more

Got it!