Volume 55, Issue 7July 2023
Editor:
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:0360-0300
EISSN:1557-7341
Bibliometrics
Skip Table Of Content Section
survey
Automatic Performance Assessment in Three-dimensional Interactive Haptic Medical Simulators: A Systematic Review
Article No.: 131, pp 1–35https://doi.org/10.1145/3539222

This study presents a literature systematic review of automatic performance assessment in three-dimensional interactive medical and dental simulators with haptic feedback, resulting in 63 included articles. The main contributions regard analysis and ...

survey
Survey on Aspect Category Detection
Article No.: 132, pp 1–37https://doi.org/10.1145/3544557

In recent years, aspect category detection has become popular due to the rapid growth in customer reviews data on e-commerce and other online platforms. Aspect Category Detection, a sub-task of Aspect-based Sentiment Analysis, categorizes the reviews ...

survey
A Comprehensive Survey on Imputation of Missing Data in Internet of Things
Article No.: 133, pp 1–38https://doi.org/10.1145/3533381

The Internet of Things (IoT) is enabled by the latest developments in smart sensors, communication technologies, and Internet protocols with broad applications. Collecting data from IoT and generating information from these data become tedious tasks in ...

survey
Threats to Training: A Survey of Poisoning Attacks and Defenses on Machine Learning Systems
Article No.: 134, pp 1–36https://doi.org/10.1145/3538707

Machine learning (ML) has been universally adopted for automated decisions in a variety of fields, including recognition and classification applications, recommendation systems, natural language processing, and so on. However, in light of high expenses on ...

survey
Open Access
Provenance-based Intrusion Detection Systems: A Survey
Article No.: 135, pp 1–36https://doi.org/10.1145/3539605

Traditional Intrusion Detection Systems (IDS) cannot cope with the increasing number and sophistication of cyberattacks such as Advanced Persistent Threats (APT). Due to their high false-positive rate and the required effort of security experts to ...

survey
Open Access
How Can Incentive Mechanisms and Blockchain Benefit with Each Other? A Survey
Article No.: 136, pp 1–38https://doi.org/10.1145/3539604

In a blockchain-based system, the lack of centralized control requires active participation and cooperative behaviors of system entities to ensure system security and sustainability. However, dynamic environments and unpredictable entity behaviors ...

survey
Open Access
Fuzzing of Embedded Systems: A Survey
Article No.: 137, pp 1–33https://doi.org/10.1145/3538644

Security attacks abuse software vulnerabilities of IoT devices; hence, detecting and eliminating these vulnerabilities immediately are crucial. Fuzzing is an efficient method to identify vulnerabilities automatically, and many publications have been ...

survey
Kubernetes Scheduling: Taxonomy, Ongoing Issues and Challenges
Article No.: 138, pp 1–37https://doi.org/10.1145/3539606

Continuous integration enables the development of microservices-based applications using container virtualization technology. Container orchestration systems such as Kubernetes, which has become the de facto standard, simplify the deployment of container-...

survey
Interest Flooding Attacks in Named Data Networking: Survey of Existing Solutions, Open Issues, Requirements, and Future Directions
Article No.: 139, pp 1–37https://doi.org/10.1145/3539730

Named Data Networking (NDN) is a prominent realization of the vision of Information-Centric Networking. The NDN architecture adopts name-based routing and location-independent data retrieval. Among other important features, NDN integrates security ...

survey
Open Access
Semantic Knowledge Graphs for the News: A Review
Article No.: 140, pp 1–38https://doi.org/10.1145/3543508

ICT platforms for news production, distribution, and consumption must exploit the ever-growing availability of digital data. These data originate from different sources and in different formats; they arrive at different velocities and in different ...

survey
A Survey on Data-driven COVID-19 and Future Pandemic Management
Article No.: 141, pp 1–36https://doi.org/10.1145/3542818

The COVID-19 pandemic has resulted in more than 440 million confirmed cases globally and almost 6 million reported deaths as of March 2022. Consequently, the world experienced grave repercussions to citizens’ lives, health, wellness, and the economy. In ...

survey
Microarchitectural Attacks in Heterogeneous Systems: A Survey
Article No.: 142, pp 1–40https://doi.org/10.1145/3544102

With the increasing proliferation of hardware accelerators and the predicted continued increase in the heterogeneity of future computing systems, it is necessary to understand the security properties of such systems. In this survey article, we consider ...

survey
Methodological Standards in Accessibility Research on Motor Impairments: A Survey
Article No.: 143, pp 1–35https://doi.org/10.1145/3543509

The design and evaluation of accessibility technology is a core component of the computer science landscape, aiming to ensure that digital innovations are accessible to all. One of the most prominent and long-lasting areas of accessibility research ...

survey
Open Access
Asset Management in Machine Learning: State-of-research and State-of-practice
Article No.: 144, pp 1–35https://doi.org/10.1145/3543847

Machine learning components are essential for today’s software systems, causing a need to adapt traditional software engineering practices when developing machine-learning-based systems. This need is pronounced due to many development-related challenges ...

survey
Reinforcement Learning based Recommender Systems: A Survey
Article No.: 145, pp 1–38https://doi.org/10.1145/3543846

Recommender systems (RSs) have become an inseparable part of our everyday lives. They help us find our favorite items to purchase, our friends on social networks, and our favorite movies to watch. Traditionally, the recommendation problem was considered ...

survey
A Survey on Data Augmentation for Text Classification
Article No.: 146, pp 1–39https://doi.org/10.1145/3544558

Data augmentation, the artificial creation of training data for machine learning by transformations, is a widely studied research field across machine learning disciplines. While it is useful for increasing a model's generalization capabilities, it can ...

survey
GPU Devices for Safety-Critical Systems: A Survey
Article No.: 147, pp 1–37https://doi.org/10.1145/3549526

 Graphics Processing Unit (GPU) devices and their associated software programming languages and frameworks can deliver the computing performance required to facilitate the development of next-generation high-performance safety-critical systems such as ...

survey
Anomaly Analysis in Images and Videos: A Comprehensive Review
Article No.: 148, pp 1–37https://doi.org/10.1145/3544014

Anomaly analysis is an important component of any surveillance system. In recent years, it has drawn the attention of the computer vision and machine learning communities. In this article, our overarching goal is thus to provide a coherent and systematic ...

survey
A Survey on Dynamic Fuzzy Machine Learning
Article No.: 149, pp 1–42https://doi.org/10.1145/3544013

Dynamic fuzzy characteristics are ubiquitous in a lot of scientific and engineering problems. Specifically, the physical systems and learning processes in machine learning are dynamic and fuzzy in general. This fact has driven researchers to integrate ...

survey
Open Access
Multimodal Classification: Current Landscape, Taxonomy and Future Directions
Article No.: 150, pp 1–31https://doi.org/10.1145/3543848

Multimodal classification research has been gaining popularity with new datasets in domains such as satellite imagery, biometrics, and medicine. Prior research has shown the benefits of combining data from multiple sources compared to traditional unimodal ...

survey
Custom Scheduling in Kubernetes: A Survey on Common Problems and Solution Approaches
Article No.: 151, pp 1–37https://doi.org/10.1145/3544788

Since its release in 2014, Kubernetes has become a popular choice for orchestrating containerized workloads at scale. To determine the most appropriate node to host a given workload, Kubernetes makes use of a scheduler that takes into account a set of ...

survey
Scheduling IoT Applications in Edge and Fog Computing Environments: A Taxonomy and Future Directions
Article No.: 152, pp 1–41https://doi.org/10.1145/3544836

Fog computing, as a distributed paradigm, offers cloud-like services at the edge of the network with low latency and high-access bandwidth to support a diverse range of IoT application scenarios. To fully utilize the potential of this computing paradigm, ...

Subjects

Currently Not Available

Comments

About Cookies On This Site

We use cookies to ensure that we give you the best experience on our website.

Learn more

Got it!