[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Reflects downloads up to 01 Jan 2025Bibliometrics
Skip Table Of Content Section
research-article
Visual Affordance and Function Understanding: A Survey
Article No.: 47, Pages 1–35https://doi.org/10.1145/3446370

Nowadays, robots are dominating the manufacturing, entertainment, and healthcare industries. Robot vision aims to equip robots with the capabilities to discover information, understand it, and interact with the environment, which require an agent to ...

research-article
Community Detection in Multiplex Networks
Article No.: 48, Pages 1–35https://doi.org/10.1145/3444688

A multiplex network models different modes of interaction among same-type entities. In this article, we provide a taxonomy of community detection algorithms in multiplex networks. We characterize the different algorithms based on various properties and ...

research-article
Mobility Trace Analysis for Intelligent Vehicular Networks: Methods, Models, and Applications
Article No.: 49, Pages 1–38https://doi.org/10.1145/3446679

Intelligent vehicular networks emerge as a promising technology to provide efficient data communication in transportation systems and smart cities. At the same time, the popularization of devices with attached sensors has allowed the obtaining of a ...

research-article
Machine Learning for Detecting Data Exfiltration: A Review
Article No.: 50, Pages 1–47https://doi.org/10.1145/3442181

Context: Research at the intersection of cybersecurity, Machine Learning (ML), and Software Engineering (SE) has recently taken significant steps in proposing countermeasures for detecting sophisticated data exfiltration attacks. It is important to ...

research-article
A Survey of Binary Code Similarity
Article No.: 51, Pages 1–38https://doi.org/10.1145/3446371

Binary code similarityapproaches compare two or more pieces of binary code to identify their similarities and differences. The ability to compare binary code enables many real-world applications on scenarios where source code may not be available such ...

research-article
Cytology Image Analysis Techniques Toward Automation: Systematically Revisited
Article No.: 52, Pages 1–41https://doi.org/10.1145/3447238

Cytology is a branch of pathology that deals with the microscopic examination of cells for diagnosis of carcinoma or inflammatory conditions. In the present work, the term cytology is used to indicate solid organ cytology. Automation in cytology started ...

research-article
Open Access
Software Testing Effort Estimation and Related Problems: A Systematic Literature Review
Article No.: 53, Pages 1–38https://doi.org/10.1145/3442694

Although testing effort estimation is a very important task in software project management, it is rarely described in the literature. There are many difficulties in finding any useful methods or tools for this purpose. Solutions to many other problems ...

research-article
Public Access
Survey of Transient Execution Attacks and Their Mitigations
Article No.: 54, Pages 1–36https://doi.org/10.1145/3442479

Transient execution attacks, also known as speculative execution attacks, have drawn much interest in the last few years as they can cause critical data leakage. Since the first disclosure of Spectre and Meltdown attacks in January 2018, a number of new ...

research-article
Natural Language Processing for Requirements Engineering: A Systematic Mapping Study
Article No.: 55, Pages 1–41https://doi.org/10.1145/3444689

Natural Language Processing for Requirements Engineering (NLP4RE) is an area of research and development that seeks to apply natural language processing (NLP) techniques, tools, and resources to the requirements engineering (RE) process, to support ...

research-article
A Review on Outlier/Anomaly Detection in Time Series Data
Article No.: 56, Pages 1–33https://doi.org/10.1145/3444690

Recent advances in technology have brought major breakthroughs in data collection, enabling a large amount of data to be gathered over time and thus generating time series. Mining this data has become an important task for researchers and practitioners ...

research-article
Cybersecurity Standards in the Context of Operating System: Practical Aspects, Analysis, and Comparisons
Article No.: 57, Pages 1–36https://doi.org/10.1145/3442480

Cyber threats have been growing tremendously in recent years. There are significant advancements in the threat space that have led towards an essential need for the strengthening of digital infrastructure security. Better security can be achieved by ...

research-article
Open Access
Blockchain-empowered Data-driven Networks: A Survey and Outlook
Article No.: 58, Pages 1–38https://doi.org/10.1145/3446373

The paths leading to future networks are pointing towards a data-driven paradigm to better cater to the explosive growth of mobile services as well as the increasing heterogeneity of mobile devices, many of which generate and consume large volumes and ...

research-article
Open Access
Human Induction in Machine Learning: A Survey of the Nexus
Article No.: 59, Pages 1–18https://doi.org/10.1145/3444691

As our epistemic ambitions grow, the common and scientific endeavours are becoming increasingly dependent on Machine Learning (ML). The field rests on a single experimental paradigm, which consists of splitting the available data into a training and ...

research-article
The Application of the Blockchain Technology in Voting Systems: A Review
Article No.: 60, Pages 1–28https://doi.org/10.1145/3439725

Voting is a formal expression of opinion or choice, either positive or negative, made by an individual or a group of individuals. However, conventional voting systems tend to be centralized, which are known to suffer from security and efficiency ...

research-article
Access Control Mechanisms in Named Data Networks: A Comprehensive Survey
Article No.: 61, Pages 1–35https://doi.org/10.1145/3442150

Information-Centric Networking (ICN) has recently emerged as a prominent candidate for the Future Internet Architecture (FIA) that addresses existing issues with the host-centric communication model of the current TCP/IP-based Internet. Named Data ...

research-article
Deep Learning--based Text Classification: A Comprehensive Review
Article No.: 62, Pages 1–40https://doi.org/10.1145/3439726

Deep learning--based models have surpassed classical machine learning--based approaches in various text classification tasks, including sentiment analysis, news categorization, question answering, and natural language inference. In this article, we ...

research-article
Generative Adversarial Networks (GANs): Challenges, Solutions, and Future Directions
Article No.: 63, Pages 1–42https://doi.org/10.1145/3446374

Generative Adversarial Networks (GANs) is a novel class of deep generative models that has recently gained significant attention. GANs learn complex and high-dimensional distributions implicitly over images, audio, and data. However, there exist major ...

research-article
User Response Prediction in Online Advertising
Article No.: 64, Pages 1–43https://doi.org/10.1145/3446662

Online advertising, as a vast market, has gained significant attention in various platforms ranging from search engines, third-party websites, social media, and mobile apps. The prosperity of online campaigns is a challenge in online marketing and is ...

research-article
Syntactic Pattern Recognition in Computer Vision: A Systematic Review
Article No.: 65, Pages 1–35https://doi.org/10.1145/3447241

Using techniques derived from the syntactic methods for visual pattern recognition is not new and was much explored in the area called syntactical or structural pattern recognition. Syntactic methods have been useful because they are intuitively simple ...

research-article
A Survey on Edge Performance Benchmarking
Article No.: 66, Pages 1–33https://doi.org/10.1145/3444692

Edge computing is the next Internet frontier that will leverage computing resources located near users, sensors, and data stores to provide more responsive services. Therefore, it is envisioned that a large-scale, geographically dispersed, and resource-...

research-article
Ultrasound Medical Imaging Techniques: A Survey
Article No.: 67, Pages 1–38https://doi.org/10.1145/3447243

Ultrasound (US) imaging for medical purposes has been increasing in popularity over the years. The US technology has some valuable strengths, such as it is harmless, very cheap, and can provide real-time feedback. At the same time, it has also some ...

research-article
Fuzzy Logic in Surveillance Big Video Data Analysis: Comprehensive Review, Challenges, and Research Directions
Article No.: 68, Pages 1–33https://doi.org/10.1145/3444693

CCTV cameras installed for continuous surveillance generate enormous amounts of data daily, forging the term Big Video Data (BVD). The active practice of BVD includes intelligent surveillance and activity recognition, among other challenging tasks. To ...

research-article
Social Media Identity Deception Detection: A Survey
Article No.: 69, Pages 1–35https://doi.org/10.1145/3446372

Social media have been growing rapidly and become essential elements of many people’s lives. Meanwhile, social media have also come to be a popular source for identity deception. Many social media identity deception cases have arisen over the past few ...

Subjects

Comments

Please enable JavaScript to view thecomments powered by Disqus.