Volume 55, Issue 6June 2023
Editor:
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:0360-0300
EISSN:1557-7341
Bibliometrics
Skip Table Of Content Section
survey
Open Access
Efficient Transformers: A Survey
Article No.: 109, pp 1–28https://doi.org/10.1145/3530811

Transformer model architectures have garnered immense interest lately due to their effectiveness across a range of domains like language, vision, and reinforcement learning. In the field of natural language processing for example, Transformers have become ...

survey
Engineering Blockchain-based Software Systems: Foundations, Survey, and Future Directions
Article No.: 110, pp 1–44https://doi.org/10.1145/3530813

Many scientific and practical areas have shown increasing interest in reaping the benefits of blockchain technology to empower software systems. However, the unique characteristics and requirements associated with Blockchain-based Software (BBS) systems ...

survey
Energy-Efficient Database Systems: A Systematic Survey
Article No.: 111, pp 1–53https://doi.org/10.1145/3538225

Constructing energy-efficient database systems to reduce economic costs and environmental impact has been studied for 10 years. With the emergence of the big data age, along with the data-centric and data-intensive computing trend, the great amount of ...

survey
Survey and Taxonomy of Adversarial Reconnaissance Techniques
Article No.: 112, pp 1–38https://doi.org/10.1145/3538704

Adversaries are often able to penetrate networks and compromise systems by exploiting vulnerabilities in people and systems. The key to the success of these attacks is information that adversaries collect throughout the phases of the cyber kill chain. We ...

survey
Heterogeneous Network Access and Fusion in Smart Factory: A Survey
Article No.: 113, pp 1–31https://doi.org/10.1145/3530815

With the continuous expansion of the Industrial Internet of Things (IIoT) and the increasing connectivity among the various intelligent devices or systems, the control of access and fusion in smart factory networks has significantly gained importance. ...

survey
Open Access
Challenges in Deploying Machine Learning: A Survey of Case Studies
Article No.: 114, pp 1–29https://doi.org/10.1145/3533378

In recent years, machine learning has transitioned from a field of academic research interest to a field capable of solving real-world business problems. However, the deployment of machine learning models in production systems can present a number of ...

survey
Open Access
Systematic Review of Comparative Studies of the Impact of Realism in Immersive Virtual Experiences
Article No.: 115, pp 1–36https://doi.org/10.1145/3533377

The adoption of immersive virtual experiences (IVEs) opened new research lines where the impact of realism is being studied, allowing developers to focus resources on realism factors proven to improve the user experience the most. We analyzed papers that ...

survey
Open Access
A Survey on Synchronous Augmented, Virtual, andMixed Reality Remote Collaboration Systems
Article No.: 116, pp 1–27https://doi.org/10.1145/3533376

Remote collaboration systems have become increasingly important in today’s society, especially during times when physical distancing is advised. Industry, research, and individuals face the challenging task of collaborating and networking over long ...

survey
Open Access
Fairness in Ranking, Part II: Learning-to-Rank and Recommender Systems
Article No.: 117, pp 1–41https://doi.org/10.1145/3533380

In the past few years, there has been much work on incorporating fairness requirements into algorithmic rankers, with contributions coming from the data management, algorithms, information retrieval, and recommender systems communities. In this survey, we ...

survey
Open Access
Fairness in Ranking, Part I: Score-Based Ranking
Article No.: 118, pp 1–36https://doi.org/10.1145/3533379

In the past few years, there has been much work on incorporating fairness requirements into algorithmic rankers, with contributions coming from the data management, algorithms, information retrieval, and recommender systems communities. In this survey, we ...

tutorial
Open Access
Bayesian Hypothesis Testing Illustrated: An Introduction for Software Engineering Researchers
Article No.: 119, pp 1–28https://doi.org/10.1145/3533383

Bayesian data analysis is gaining traction in many fields, including empirical studies in software engineering. Bayesian approaches provide many advantages over traditional, or frequentist, data analysis, but the mechanics often remain opaque to beginners ...

survey
Human Body Pose Estimation for Gait Identification: A Comprehensive Survey of Datasets and Models
Article No.: 120, pp 1–42https://doi.org/10.1145/3533384

Person identification is a problem that has received substantial attention, particularly in security domains. Gait recognition is one of the most convenient approaches enabling person identification at a distance without the need for high-quality images. ...

survey
Deep Learning for Time Series Forecasting: Tutorial and Literature Survey
Article No.: 121, pp 1–36https://doi.org/10.1145/3533382

Deep learning based forecasting methods have become the methods of choice in many applications of time series prediction or forecasting often outperforming other approaches. Consequently, over the last years, these methods are now ubiquitous in large-...

survey
Examining the Current Status and Emerging Trends in Continuous Authentication Technologies through Citation Network Analysis
Article No.: 122, pp 1–31https://doi.org/10.1145/3533705

Continuous Authentication (CA) technologies enable users to be authenticated beyond just the point of entry. In this article, we conduct a comprehensive review of over 2,300 articles to (a) identify the main components of CA research to date, and (b) ...

survey
Open Access
A Survey on Empirical Security Analysis of Access-control Systems: A Real-world Perspective
Article No.: 123, pp 1–28https://doi.org/10.1145/3533703

There any many different access-control systems, yet a commonality is that they provide flexible mechanisms to enforce different access levels. Their importance in organisations to adequately restrict resources, coupled with their use in a dynamic ...

survey
Open Access
TAG: Tagged Architecture Guide
Article No.: 124, pp 1–34https://doi.org/10.1145/3533704

Software security defenses are routinely broken by the persistence of both security researchers and attackers. Hardware solutions based on tagging are emerging as a promising technique that provides strong security guarantees (e.g., memory safety) while ...

survey
Cache-related Hardware Capabilities and Their Impact on Information Security
Article No.: 125, pp 1–35https://doi.org/10.1145/3534962

Caching is an important technique to speed-up execution, and its implementation and use cases vary. When applied specifically to the memory hierarchy, caching is used to speed up memory accesses and memory translations. Different cache implementations are ...

survey
Human Movement Datasets: An Interdisciplinary Scoping Review
Article No.: 126, pp 1–29https://doi.org/10.1145/3534970

Movement dataset reviews exist but are limited in coverage, both in terms of size and research discipline. While topic-specific reviews clearly have their merit, it is critical to have a comprehensive overview based on a systematic survey across ...

survey
Timed Automata as a Formalism for Expressing Security: A Survey on Theory and Practice
Article No.: 127, pp 1–36https://doi.org/10.1145/3534967

Timed automata are a common formalism for the verification of concurrent systems subject to timing constraints. They extend finite-state automata with clocks, that constrain the system behavior in locations, and to take transitions. While timed automata ...

survey
Indexing Metric Spaces for Exact Similarity Search
Article No.: 128, pp 1–39https://doi.org/10.1145/3534963

With the continued digitization of societal processes, we are seeing an explosion in available data. This is referred to as big data. In a research setting, three aspects of the data are often viewed as the main sources of challenges when attempting to ...

survey
How to Approach Ambiguous Queries in Conversational Search: A Survey of Techniques, Approaches, Tools, and Challenges
Article No.: 129, pp 1–40https://doi.org/10.1145/3534965

The advent of recent Natural Language Processing technology has led human and machine interactions more toward conversation. In Conversational Search Systems (CSS) like chatbots and Virtual Personal Assistants such as Apple’s Siri, Amazon Alexa, Microsoft’...

survey
A Survey on Hyperdimensional Computing aka Vector Symbolic Architectures, Part I: Models and Data Transformations
Article No.: 130, pp 1–40https://doi.org/10.1145/3538531

This two-part comprehensive survey is devoted to a computing framework most commonly known under the names Hyperdimensional Computing and Vector Symbolic Architectures (HDC/VSA). Both names refer to a family of computational models that use high-...

Subjects

Comments

About Cookies On This Site

We use cookies to ensure that we give you the best experience on our website.

Learn more

Got it!