Issue Downloads
Taxonomy and Survey of Collaborative Intrusion Detection
The dependency of our society on networked computers has become frightening: In the economy, all-digital networks have turned from facilitators to drivers; as cyber-physical systems are coming of age, computer networks are now becoming the central ...
Text and Data Mining Techniques in Adverse Drug Reaction Detection
We review data mining and related computer science techniques that have been studied in the area of drug safety to identify signals of adverse drug reactions from different data sources, such as spontaneous reporting databases, electronic health records,...
A Survey of Interactive Remote Rendering Systems
Remote rendering means rendering 3D graphics on a computing device and displaying the results on another computing device connected through a network. The concept was originally developed for sharing computing resources remotely. It has been receiving ...
Securing Android: A Survey, Taxonomy, and Challenges
Recent years have seen a global adoption of smart mobile devices, particularly those based on Android. However, Android’s widespread adoption is marred with increasingly rampant malware threats. This article gives a survey and taxonomy of existing works ...
Accounting and Accountability in Content Distribution Architectures: A Survey
Many content distribution architectures offer desirable elements that lead to less bandwidth usage, reduced network congestion, higher content availability, and reduced costs. However, their level of adoption and utilization in commercial environments ...
A Survey on Implicit Surface Polygonization
Implicit surfaces (IS) are commonly used in image creation, modeling environments, modeling objects, and scientific data visualization. In this article, we present a survey of different techniques for fast visualization of IS. The main classes of ...
A Survey of Multiobjective Evolutionary Clustering
Data clustering is a popular unsupervised data mining tool that is used for partitioning a given dataset into homogeneous groups based on some similarity/dissimilarity metric. Traditional clustering algorithms often make prior assumptions about the ...
Partitioned Global Address Space Languages
The Partitioned Global Address Space (PGAS) model is a parallel programming model that aims to improve programmer productivity while at the same time aiming for high performance. The main premise of PGAS is that a globally shared address space improves ...
Cloud Computing Resource Scheduling and a Survey of Its Evolutionary Approaches
A disruptive technology fundamentally transforming the way that computing services are delivered, cloud computing offers information and communication technology users a new dimension of convenience of resources, as services via the Internet. Because ...
Energy-Efficient Networking Solutions in Cloud-Based Environments: A Systematic Literature Review
The energy consumed by data centers hosting cloud services is increasing enormously. This brings the need to reduce energy consumption of different components in data centers. In this work, we focus on energy efficiency of the networking component. ...
Remote Data Auditing in Cloud Computing Environments: A Survey, Taxonomy, and Open Issues
- Mehdi Sookhak,
- Abdullah Gani,
- Hamid Talebian,
- Adnan Akhunzada,
- Samee U. Khan,
- Rajkumar Buyya,
- Albert Y. Zomaya
Cloud computing has emerged as a long-dreamt vision of the utility computing paradigm that provides reliable and resilient infrastructure for users to remotely store data and use on-demand applications and services. Currently, many individuals and ...
Assessing the Structural Complexity of Computer and Communication Networks
In this tutorial, 17 structural complexity indices are presented and compared, each representing one of the following categories: adjacency- and distance-based metrics, Shannon entropy-based metrics, product measures, subgraph-based metrics, and path- ...
Processing Social Media Messages in Mass Emergency: A Survey
Social media platforms provide active communication channels during mass convergence and emergency events such as disasters caused by natural hazards. As a result, first responders, decision makers, and the public can use this information to gain ...
The State of Public Infrastructure-as-a-Service Cloud Security
The public Infrastructure-as-a-Service (IaaS) cloud industry has reached a critical mass in the past few years, with many cloud service providers fielding competing services. Despite the competition, we find some of the security mechanisms offered by ...
A Survey of CPU-GPU Heterogeneous Computing Techniques
As both CPUs and GPUs become employed in a wide range of applications, it has been acknowledged that both of these Processing Units (PUs) have their unique features and strengths and hence, CPU-GPU collaboration is inevitable to achieve high-performance ...
Systems Approaches to Tackling Configuration Errors: A Survey
In recent years, configuration errors (i.e., misconfigurations) have become one of the dominant causes of system failures, resulting in many severe service outages and downtime. Unfortunately, it is notoriously difficult for system users (e.g., ...