Issue Downloads
Data-Driven Techniques in Disaster Information Management
- Tao Li,
- Ning Xie,
- Chunqiu Zeng,
- Wubai Zhou,
- Li Zheng,
- Yexi Jiang,
- Yimin Yang,
- Hsin-Yu Ha,
- Wei Xue,
- Yue Huang,
- Shu-Ching Chen,
- Jainendra Navlakha,
- S. S. Iyengar
Improving disaster management and recovery techniques is one of national priorities given the huge toll caused by man-made and nature calamities. Data-driven disaster management aims at applying advanced data collection and analysis technologies to ...
Business Process Variability Modeling: A Survey
It is common for organizations to maintain multiple variants of a given business process, such as multiple sales processes for different products or multiple bookkeeping processes for different countries. Conventional business process modeling languages ...
Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence
Wireless Body Area Network (WBAN) has been a key element in e-health to monitor bodies. This technology enables new applications under the umbrella of different domains, including the medical field, the entertainment and ambient intelligence areas. This ...
Evaluation of Knowledge Gaps in Mathematical Applications of Thermal Image Processing Techniques for Fire Prevention
In this article, we present literature reviews on fire prevention methods, especially in mining industries, using thermal image processing techniques. Fire protection systems are crucial because of the increased loss of human lives due to coal fires and ...
A Survey on Data-Flow Testing
Data-flow testing (DFT) is a family of testing strategies designed to verify the interactions between each program variable’s definition and its uses. Such a test objective of interest is referred to as a def-use pair. DFT selects test data with respect ...
A Survey of Timing Channels and Countermeasures
A timing channel is a communication channel that can transfer information to a receiver/decoder by modulating the timing behavior of an entity. Examples of this entity include the interpacket delays of a packet stream, the reordering packets in a packet ...
A Survey of Qualitative Spatial and Temporal Calculi: Algebraic and Computational Properties
- Frank Dylla,
- Jae Hee Lee,
- Till Mossakowski,
- Thomas Schneider,
- André Van Delden,
- Jasper Van De Ven,
- Diedrich Wolter
Qualitative spatial and temporal reasoning (QSTR) is concerned with symbolic knowledge representation, typically over infinite domains. The motivations for employing QSTR techniques include exploiting computational properties that allow efficient ...
Presentation Attack Detection Methods for Face Recognition Systems: A Comprehensive Survey
The vulnerability of face recognition systems to presentation attacks (also known as direct attacks or spoof attacks) has received a great deal of interest from the biometric community. The rapid evolution of face recognition systems into real-time ...
Hypervideos and Interactive Multimedia Presentations
Hypervideos and interactive multimedia presentations allow the creation of fully interactive and enriched video. It is possible to organize video scenes in a nonlinear way. Additional information can be added to the video ranging from short descriptions ...
Smart Computing and Sensing Technologies for Animal Welfare: A Systematic Review
Animals play a profoundly important and intricate role in our lives today. Dogs have been human companions for thousands of years, but now they work to assist the disabled, and in combat and search and rescue situations. Farm animals are a critical part ...
Hashing Techniques: A Survey and Taxonomy
With the rapid development of information storage and networking technologies, quintillion bytes of data are generated every day from social networks, business transactions, sensors, and many other domains. The increasing data volumes impose significant ...
Understanding Human-Machine Networks: A Cross-Disciplinary Survey
- Milena Tsvetkova,
- Taha Yasseri,
- Eric T. Meyer,
- J. Brian Pickering,
- Vegard Engen,
- Paul Walland,
- Marika Lüders,
- Asbjørn Følstad,
- George Bravos
In the current hyperconnected era, modern Information and Communication Technology (ICT) systems form sophisticated networks where not only do people interact with other people, but also machines take an increasingly visible and participatory role. Such ...
Surviving the Web: A Journey into Web Session Security
In this article, we survey the most common attacks against web sessions, that is, attacks that target honest web browser users establishing an authenticated session with a trusted web application. We then review existing security solutions that prevent ...
CASE Tool Support for Variability Management in Software Product Lines
Software product lines (SPL) aim at reducing time-to-market and increasing software quality through extensive, planned reuse of artifacts. An essential activity in SPL is variability management, i.e., defining and managing commonality and variability ...
A Survey on Financial Applications of Metaheuristics
Modern heuristics or metaheuristics are optimization algorithms that have been increasingly used during the last decades to support complex decision-making in a number of fields, such as logistics and transportation, telecommunication networks, ...
Control-Flow Integrity: Precision, Security, and Performance
Memory corruption errors in C/C++ programs remain the most common source of security vulnerabilities in today’s systems. Control-flow hijacking attacks exploit memory corruption vulnerabilities to divert program execution away from the intended control ...