Volume 54, Issue 9December 2022
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Firmware Over-the-air Programming Techniques for IoT Networks - A Survey
December 2022, Article No.: 178, pp 1–36https://doi.org/10.1145/3472292

The devices forming Internet of Things (IoT) networks need to be re-programmed over the air, so that new features are added, software bugs or security vulnerabilities are resolved, and their applications can be re-purposed. The limitations of IoT devices, ...

FPGA/GPU-based Acceleration for Frequent Itemsets Mining: A Comprehensive Review
December 2022, Article No.: 179, pp 1–35https://doi.org/10.1145/3472289

In data mining, Frequent Itemsets Mining is a technique used in several domains with notable results. However, the large volume of data in modern datasets increases the processing time of Frequent Itemset Mining algorithms, making them unsuitable for many ...

A Survey of Deep Active Learning
December 2022, Article No.: 180, pp 1–40https://doi.org/10.1145/3472291

Active learning (AL) attempts to maximize a model’s performance gain while annotating the fewest samples possible. Deep learning (DL) is greedy for data and requires a large amount of data supply to optimize a massive number of parameters if the model is ...

Computer Vision for Autonomous UAV Flight Safety: An Overview and a Vision-based Safe Landing Pipeline Example
December 2022, Article No.: 181, pp 1–37https://doi.org/10.1145/3472288

Recent years have seen an unprecedented spread of Unmanned Aerial Vehicles (UAVs, or “drones”), which are highly useful for both civilian and military applications. Flight safety is a crucial issue in UAV navigation, having to ensure accurate compliance ...

Open Access
A Survey on Data-driven Network Intrusion Detection
December 2022, Article No.: 182, pp 1–36https://doi.org/10.1145/3472753

Data-driven network intrusion detection (NID) has a tendency towards minority attack classes compared to normal traffic. Many datasets are collected in simulated environments rather than real-world networks. These challenges undermine the performance of ...

Weight-Sharing Neural Architecture Search: A Battle to Shrink the Optimization Gap
December 2022, Article No.: 183, pp 1–37https://doi.org/10.1145/3473330

Neural architecture search (NAS) has attracted increasing attention. In recent years, individual search methods have been replaced by weight-sharing search methods for higher search efficiency, but the latter methods often suffer lower instability. This ...

A Survey on Haptic Technologies for Mobile Augmented Reality
December 2022, Article No.: 184, pp 1–35https://doi.org/10.1145/3465396

Augmented reality (AR) applications have gained much research and industry attention. Moreover, the mobile counterpart—mobile augmented reality (MAR) is one of the most explosive growth areas for AR applications in the mobile environment (e.g., ...

Design Guidelines for Cooperative UAV-supported Services and Applications
December 2022, Article No.: 185, pp 1–35https://doi.org/10.1145/3467964

Internet of Things (IoT) systems have advanced greatly in the past few years, especially with the support of Machine Learning (ML) and Artificial Intelligence (AI) solutions. Numerous AI-supported IoT devices are playing a significant role in providing ...

Open Access
MEC-enabled 5G Use Cases: A Survey on Security Vulnerabilities and Countermeasures
December 2022, Article No.: 186, pp 1–37https://doi.org/10.1145/3474552

The future of mobile and internet technologies are manifesting advancements beyond the existing scope of science. The concepts of automated driving, augmented-reality, and machine-type-communication are quite sophisticated and require an elevation of the ...

Screen Content Quality Assessment: Overview, Benchmark, and Beyond
December 2022, Article No.: 187, pp 1–36https://doi.org/10.1145/3470970

Screen content, which is often computer-generated, has many characteristics distinctly different from conventional camera-captured natural scene content. Such characteristic differences impose major challenges to the corresponding content quality ...

Service Computing for Industry 4.0: State of the Art, Challenges, and Research Opportunities
December 2022, Article No.: 188, pp 1–38https://doi.org/10.1145/3478680

Recent advances in the large-scale adoption of information and communication technologies in manufacturing processes, known as Industry 4.0 or Smart Manufacturing, provide us a window into how the manufacturing sector will evolve in the coming decades. As ...

A Survey on Concept Drift in Process Mining
December 2022, Article No.: 189, pp 1–38https://doi.org/10.1145/3472752

Concept drift in process mining (PM) is a challenge as classical methods assume processes are in a steady-state, i.e., events share the same process version. We conducted a systematic literature review on the intersection of these areas, and thus, we ...

Efficiency and Effectiveness of Web Application Vulnerability Detection Approaches: A Review
December 2022, Article No.: 190, pp 1–35https://doi.org/10.1145/3474553

Most existing surveys and reviews on web application vulnerability detection (WAVD) approaches focus on comparing and summarizing the approaches’ technical details. Although some studies have analyzed the efficiency and effectiveness of specific methods, ...

Open Access
Computing Graph Neural Networks: A Survey from Algorithms to Accelerators
December 2022, Article No.: 191, pp 1–38https://doi.org/10.1145/3477141

Graph Neural Networks (GNNs) have exploded onto the machine learning scene in recent years owing to their capability to model and learn from graph-structured data. Such an ability has strong implications in a wide variety of fields whose data are ...

Gotta CAPTCHA ’Em All: A Survey of 20 Years of the Human-or-computer Dilemma
December 2022, Article No.: 192, pp 1–33https://doi.org/10.1145/3477142

A recent study has found that malicious bots generated nearly a quarter of overall website traffic in 2019 [102]. These malicious bots perform activities such as price and content scraping, account creation and takeover, credit card fraud, denial of ...

A Survey on Uncertainty Estimation in Deep Learning Classification Systems from a Bayesian Perspective
December 2022, Article No.: 193, pp 1–35https://doi.org/10.1145/3477140

Decision-making based on machine learning systems, especially when this decision-making can affect human lives, is a subject of maximum interest in the Machine Learning community. It is, therefore, necessary to equip these systems with a means of ...

A Survey on Client Throughput Prediction Algorithms in Wired and Wireless Networks
December 2022, Article No.: 194, pp 1–33https://doi.org/10.1145/3477204

Network communication has become a part of everyday life, and the interconnection among devices and people will increase even more in the future. Nevertheless, prediction of Quality of Service parameters, particularly throughput, is quite a challenging ...

Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: A Survey
December 2022, Article No.: 195, pp 1–37https://doi.org/10.1145/3477139

With capability of performing computations on encrypted data without needing the secret key, homomorphic encryption (HE) is a promising cryptographic technique that makes outsourced computations secure and privacy-preserving. A decade after Gentry’s ...

Opportunities and Challenges in Code Search Tools
December 2022, Article No.: 196, pp 1–40https://doi.org/10.1145/3480027

Code search is a core software engineering task. Effective code search tools can help developers substantially improve their software development efficiency and effectiveness. In recent years, many code search studies have leveraged different techniques, ...

Ransomware Mitigation in the Modern Era: A Comprehensive Review, Research Challenges, and Future Directions
December 2022, Article No.: 197, pp 1–36https://doi.org/10.1145/3479393

Although ransomware has been around since the early days of personal computers, its sophistication and aggression have increased substantially over the years. Ransomware, as a type of malware to extort ransom payments from victims, has evolved to deliver ...

Open Access
Adversary Models for Mobile Device Authentication
December 2022, Article No.: 198, pp 1–35https://doi.org/10.1145/3477601

Mobile device authentication has been a highly active research topic for over 10 years, with a vast range of methods proposed and analyzed. In related areas, such as secure channel protocols, remote authentication, or desktop user authentication, strong, ...

Handling Iterations in Distributed Dataflow Systems
December 2022, Article No.: 199, pp 1–38https://doi.org/10.1145/3477602

Over the past decade, distributed dataflow systems (DDS) have become a standard technology. In these systems, users write programs in restricted dataflow programming models, such as MapReduce, which enable them to scale out program execution to a shared-...



About Cookies On This Site

We use cookies to ensure that we give you the best experience on our website.

Learn more

Got it!