Issue Downloads
Systematic Review of Software Behavioral Model Consistency Checking
In software development, models are often used to represent multiple views of the same system. Such models need to be properly related to each other in order to provide a consistent description of the developed system. Models may contain contradictory ...
Changes as First-Class Citizens: A Research Perspective on Modern Software Tooling
Software must evolve to keep up with an ever-changing context, the real world. We discuss an emergent trend in software evolution research revolving around the central notion that drives evolution: Change. By reifying change, and by modelling it as a ...
Online Algorithms with Advice: A Survey
In online scenarios requests arrive over time, and each request must be serviced in an irrevocable manner before the next request arrives. Online algorithms with advice is an area of research where one attempts to measure how much knowledge of future ...
Deep Learning Advances in Computer Vision with 3D Data: A Survey
Deep learning has recently gained popularity achieving state-of-the-art performance in tasks involving text, sound, or image processing. Due to its outstanding performance, there have been efforts to apply it in more challenging scenarios, for example, ...
Imitation Learning: A Survey of Learning Methods
Imitation learning techniques aim to mimic human behavior in a given task. An agent (a learning machine) is trained to perform a task from demonstrations by learning a mapping between observations and actions. The idea of teaching by imitation has been ...
Spatio-Temporal Analysis of Team Sports
Team-based invasion sports such as football, basketball, and hockey are similar in the sense that the players are able to move freely around the playing area and that player and team performance cannot be fully analysed without considering the movements ...
A Survey on Ensemble Learning for Data Stream Classification
Ensemble-based methods are among the most widely used techniques for data stream classification. Their popularity is attributable to their good performance in comparison to strong single learners while being relatively easy to deploy in real-world ...
A Survey and Comparative Study of Hard and Soft Real-Time Dynamic Resource Allocation Strategies for Multi-/Many-Core Systems
Multi-/many-core systems are envisioned to satisfy the ever-increasing performance requirements of complex applications in various domains such as embedded and high-performance computing. Such systems need to cater to increasingly dynamic workloads, ...
Current State of Text Sentiment Analysis from Opinion to Emotion Mining
Sentiment analysis from text consists of extracting information about opinions, sentiments, and even emotions conveyed by writers towards topics of interest. It is often equated to opinion mining, but it should also encompass emotion mining. Opinion ...
A Taxonomy and Survey of Cloud Resource Orchestration Techniques
Cloud services and applications prove indispensable amid today’s modern utility-based computing. The cloud has displayed a disruptive and growing impact on everyday computing tasks. However, facilitating the orchestration of cloud resources to build ...
A Survey of Techniques for Cache Partitioning in Multicore Processors
As the number of on-chip cores and memory demands of applications increase, judicious management of cache resources has become not merely attractive but imperative. Cache partitioning, that is, dividing cache space between applications based on their ...
Simulation and Experimentation Platforms for Underwater Acoustic Sensor Networks: Advancements and Challenges
Ocean and water basically cover the major parts of our planet. To obtain the best utilization of the underlying resources on these parts of the Earth, people have made some research advancements. Specifically, the research on underwater wireless ...
Effective Regression Test Case Selection: A Systematic Literature Review
Regression test case selection techniques attempt to increase the testing effectiveness based on the measurement capabilities, such as cost, coverage, and fault detection. This systematic literature review presents state-of-the-art research in effective ...
Game Theory for Cyber Security and Privacy
- Cuong T. Do,
- Nguyen H. Tran,
- Choongseon Hong,
- Charles A. Kamhoua,
- Kevin A. Kwiat,
- Erik Blasch,
- Shaolei Ren,
- Niki Pissinou,
- Sundaraja Sitharama Iyengar
In this survey, we review the existing game-theoretic approaches for cyber security and privacy issues, categorizing their application into two classes, security and privacy. To show how game theory is utilized in cyberspace security and privacy, we ...
A Survey on Reliability Protocols in Wireless Sensor Networks
Wireless Sensor Network (WSN) applications have become more and more attractive with the miniaturization of circuits and the large variety of sensors. The different application domains, especially critical fields of WSN use, make the reliability of data ...