skip to main content
Volume 52, Issue 3May 2020
Editor:
  • Sartaj Sahni
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:0360-0300
EISSN:1557-7341
Reflects downloads up to 28 Oct 2024Bibliometrics
Skip Table Of Content Section
survey
Naming Content on the Network Layer: A Security Analysis of the Information-Centric Network Model
Article No.: 44, Pages 1–28https://doi.org/10.1145/3311888

The Information-Centric Network (ICN) paradigm is a future Internet approach aiming to tackle the Internet architectural problems and inefficiencies, by swapping the main entity of the network architecture from hosts to content items. In ICN, content ...

survey
Text Analysis in Adversarial Settings: Does Deception Leave a Stylistic Trace?
Article No.: 45, Pages 1–36https://doi.org/10.1145/3310331

Textual deception constitutes a major problem for online security. Many studies have argued that deceptiveness leaves traces in writing style, which could be detected using text classification techniques. By conducting an extensive literature review of ...

survey
WiFi Sensing with Channel State Information: A Survey
Article No.: 46, Pages 1–36https://doi.org/10.1145/3310194

With the high demand for wireless data traffic, WiFi networks have experienced very rapid growth, because they provide high throughput and are easy to deploy. Recently, Channel State Information (CSI) measured by WiFi networks is widely used for ...

survey
Public Access
A Survey on Collecting, Managing, and Analyzing Provenance from Scripts
Article No.: 47, Pages 1–38https://doi.org/10.1145/3311955

Scripts are widely used to design and run scientific experiments. Scripting languages are easy to learn and use, and they allow complex tasks to be specified and executed in fewer steps than with traditional programming languages. However, they also ...

survey
Comparison of Software Design Models: An Extended Systematic Mapping Study
Article No.: 48, Pages 1–41https://doi.org/10.1145/3313801

Model comparison has been widely used to support many tasks in model-driven software development. For this reason, many techniques of comparing them have been proposed in the last few decades. However, academia and industry have overlooked a ...

survey
From Hack to Elaborate Technique—A Survey on Binary Rewriting
Article No.: 49, Pages 1–37https://doi.org/10.1145/3316415

Binary rewriting is changing the semantics of a program without having the source code at hand. It is used for diverse purposes, such as emulation (e.g., QEMU), optimization (e.g., DynInst), observation (e.g., Valgrind), and hardening (e.g., Control ...

survey
Dance Interactive Learning Systems: A Study on Interaction Workflow and Teaching Approaches
Article No.: 50, Pages 1–37https://doi.org/10.1145/3323335

Motion Capture and whole-body interaction technologies have been experimentally proven to contribute to the enhancement of dance learning and to the investigation of bodily knowledge, innovating at the same time the practice of dance. Designing and ...

survey
Public Access
Security and Privacy on Blockchain
Article No.: 51, Pages 1–34https://doi.org/10.1145/3316481

Blockchain offers an innovative approach to storing information, executing transactions, performing functions, and establishing trust in an open environment. Many consider blockchain as a technology breakthrough for cryptography and cybersecurity, with ...

survey
Evaluation of Hardware Data Prefetchers on Server Processors
Article No.: 52, Pages 1–29https://doi.org/10.1145/3312740

Data prefetching, i.e., the act of predicting an application’s future memory accesses and fetching those that are not in the on-chip caches, is a well-known and widely used approach to hide the long latency of memory accesses. The fruitfulness of data ...

survey
Leveraging User-related Internet of Things for Continuous Authentication: A Survey
Article No.: 53, Pages 1–38https://doi.org/10.1145/3314023

Among all Internet of Things (IoT) devices, a subset of them are related to users. Leveraging these user-related IoT elements, it is possible to ensure the identity of the user for a period of time, thus avoiding impersonation. This need is known as ...

survey
A Survey on Big Multimedia Data Processing and Management in Smart Cities
Article No.: 54, Pages 1–29https://doi.org/10.1145/3323334

Integration of embedded multimedia devices with powerful computing platforms, e.g., machine learning platforms, helps to build smart cities and transforms the concept of Internet of Things into Internet of Multimedia Things (IoMT). To provide different ...

survey
Multi-model Databases: A New Journey to Handle the Variety of Data
Article No.: 55, Pages 1–38https://doi.org/10.1145/3323214

The variety of data is one of the most challenging issues for the research and practice in data management systems. The data are naturally organized in different formats and models, including structured data, semi-structured data, and unstructured data. ...

survey
A Survey of Timing Verification Techniques for Multi-Core Real-Time Systems
Article No.: 56, Pages 1–38https://doi.org/10.1145/3323212

This survey provides an overview of the scientific literature on timing verification techniques for multi-core real-time systems. It reviews the key results in the field from its origins around 2006 to the latest research published up to the end of ...

tutorial
A Survey of Group Key Agreement Protocols with Constant Rounds
Article No.: 57, Pages 1–32https://doi.org/10.1145/3318460

Group key agreement (shorten as GKA) protocol enables a group of users to negotiate a one-time session key and protect the thereafter group-oriented communication with this session key across an unreliable network. The number of communication rounds is ...

tutorial
Mulsemedia DIY: A Survey of Devices and a Tutorial for Building Your Own Mulsemedia Environment
Article No.: 58, Pages 1–29https://doi.org/10.1145/3319853

Multisensory experiences have been increasingly applied in Human-Computer Interaction (HCI). In recent years, it is commonplace to notice the development of haptic, olfactory, and even gustatory displays to create more immersive experiences. Companies ...

survey
Survey and Taxonomy of Volunteer Computing
Article No.: 59, Pages 1–35https://doi.org/10.1145/3320073

Volunteer Computing is a kind of distributed computing that harnesses the aggregated spare computing resources of volunteer devices. It provides a cheaper and greener alternative computing infrastructure that can complement the dedicated, centralized, ...

survey
Privacy Analysis on Microblogging Online Social Networks: A Survey
Article No.: 60, Pages 1–36https://doi.org/10.1145/3321481

Online Social Networks (OSNs) incorporate different forms of interactive communication, including microblogging services, multimedia sharing, business networking, and so on. They allow users to create profiles, connect with friends, and share their ...

survey
Infrastructure-Independent Indoor Localization and Navigation
Article No.: 61, Pages 1–24https://doi.org/10.1145/3321516

In the absence of any global positioning infrastructure for indoor environments, research on supporting human indoor localization and navigation trails decades behind research on outdoor localization and navigation. The major barrier to broader progress ...

survey
Survey on Combinatorial Register Allocation and Instruction Scheduling
Article No.: 62, Pages 1–50https://doi.org/10.1145/3200920

Register allocation (mapping variables to processor registers or memory) and instruction scheduling (reordering instructions to increase instruction-level parallelism) are essential tasks for generating efficient assembly code in a compiler. In the past ...

survey
Environmental Audio Scene and Sound Event Recognition for Autonomous Surveillance: A Survey and Comparative Studies
Article No.: 63, Pages 1–34https://doi.org/10.1145/3322240

Monitoring of human and social activities is becoming increasingly pervasive in our living environment for public security and safety applications. The recognition of suspicious events is important in both indoor and outdoor environments, such as child-...

survey
Indoor Localization Improved by Spatial Context—A Survey
Article No.: 64, Pages 1–35https://doi.org/10.1145/3322241

Indoor localization is essential for healthcare, security, augmented reality gaming, and many other location-based services. There is currently a wealth of relevant literature on indoor localization. This article focuses on recent advances in indoor ...

Subjects

Comments