enter search term and/or author name
Survey of Temporal Information Retrieval and Related Applications
Ricardo Campos, Gaël Dias, Alípio M. Jorge, Adam Jatowt
Article No.: 15
Temporal information retrieval has been a topic of great interest in recent years. Its purpose is to improve the effectiveness of information retrieval methods by exploiting temporal information in documents and queries. In this article, we...
Modeling biological systems to understand their mechanistic behavior is an important activity in molecular systems biology. Mathematical modeling typically requires deep mathematical or computing knowledge, and this limits the spread of modeling...
Analysis of Fork/Join and Related Queueing Systems
Article No.: 17
Fork/join (F/J) requests arise in contexts such as parallel computing, query processing in parallel databases, and parallel disk access in RAID. F/J requests spawn K tasks that are sent to K parallel servers, and the completion of...
We survey the notion of provably secure searchable encryption (SE) by giving a complete and comprehensive overview of the two main SE techniques: searchable symmetric encryption (SSE) and public key encryption with keyword search (PEKS). Since the...
A Survey of Methods for Analyzing and Improving GPU Energy Efficiency
Sparsh Mittal, Jeffrey S. Vetter
Article No.: 19
Recent years have witnessed phenomenal growth in the computational capabilities and applications of GPUs. However, this trend has also led to a dramatic increase in their power consumption. This article surveys research works on analyzing and...
A Survey on DHT-Based Routing for Large-Scale Mobile Ad Hoc Networks
Shahbaz Akhtar Abid, Mazliza Othman, Nadir Shah
Article No.: 20
Mobile ad hoc networks (MANETs) are infrastructureless and distributed communication systems that require sophisticated approaches to routing to cope with node mobility and heterogeneous application requirements. In the past few years, distributed...
Regression Testing of Web Service: A Systematic Mapping Study
Dong Qiu, Bixin Li, Shunhui Ji, Hareton Leung
Article No.: 21
Web service is a widely used implementation technique under the paradigm of Service-Oriented Architecture (SOA). A service-based system is subjected to continuous evolution and regression testing is required to check whether new faults have been...
Opportunistic Routing in Wireless Networks: Models, Algorithms, and Classifications
Azzedine Boukerche, Amir Darehshoorzadeh
Article No.: 22
Opportunistic Routing (OR) is a new promising paradigm that has been proposed for wireless networks. OR has gained a lot of attention from the research communities for its ability to increase the performance of wireless networks. It benefits from...
A Survey of Interdependent Information Security Games
Aron Laszka, Mark Felegyhazi, Levente Buttyan
Article No.: 23
Risks faced by information system operators and users are not only determined by their own security posture, but are also heavily affected by the security-related decisions of others. This interdependence between information system operators and...
Key management is required for basic security services of confidentiality, integrity, and data source authentication. Wireless sensor networks (WSNs) are a challenging environment to provide such services due to the resource constraints and the...
Urban Sensing Using Mobile Phone Network Data: A Survey of Research
Francesco Calabrese, Laura Ferrari, Vincent D. Blondel
Article No.: 25
The recent development of telecommunication networks is producing an unprecedented wealth of information and, as a consequence, an increasing interest in analyzing such data both from telecoms and from other stakeholders' points of view. In...
Automated Generation of Music Playlists: Survey and Experiments
Geoffray Bonnin, Dietmar Jannach
Article No.: 26
Most of the time when we listen to music on the radio or on our portable devices, the order in which the tracks are played is governed by so-called playlists. These playlists are basically sequences of tracks that traditionally are designed...
Software-Defined Networking Paradigms in Wireless Networks: A Survey
Nachikethas A. Jagadeesan, Bhaskar Krishnamachari
Article No.: 27
Software-defined networking (SDN) has generated tremendous interest from both academia and industry. SDN aims at simplifying network management while enabling researchers to experiment with network protocols on deployed networks. This article is a...
A Survey on Antispoofing Schemes for Fingerprint Recognition Systems
Emanuela Marasco, Arun Ross
Article No.: 28
Several issues related to the vulnerability of fingerprint recognition systems to attacks have been highlighted in the biometrics literature. One such vulnerability involves the use of artificial fingers, where materials such as Play-Doh,...
A Model for Context in the Design of Open Production Communities
Article No.: 29
Open production communities (OPCs) provide technical features and social norms for a vast but dispersed and diverse crowd to collectively accumulate content. In OPCs, certain mechanisms, policies, and technologies are provided for voluntary users...
A Survey on Green-Energy-Aware Power Management for Datacenters
Fanxin Kong, Xue Liu
Article No.: 30
Megawatt-scale datacenters have emerged to meet the increasing demand for IT applications and services. The hunger for power brings large electricity bills to datacenter operators and causes significant impacts to the environment. To reduce costs...
Supporting Novice to Expert Transitions in User Interfaces
Andy Cockburn, Carl Gutwin, Joey Scarr, Sylvain Malacria
Article No.: 31
Interface design guidelines encourage designers to provide high-performance mechanisms for expert users. However, research shows that many expert interface components are seldom used and that there is a tendency for users to persistently fail to...
The Vehicle Routing Problem (VRP) is a well-known research line in the optimization research community. Its different basic variants have been widely explored in the literature. Even though it has been studied for years, the research around it is...
Cloud computing is today’s most emphasized Information and Communications Technology (ICT) paradigm that is directly or indirectly used by almost every online user. However, such great significance comes with the support of a great...
We review the computation of 3D geometric data mapping, which establishes one-to-one correspondence between or among spatial/spatiotemporal objects. Effective mapping benefits many scientific and engineering tasks that involve the modeling and...
Case-based planning (CBP) is an approach to automated planning that tries to save computational effort by reusing previously found solutions. In 2001, Spalazzi published a survey of work in CBP; here, we present an updated overview of systems that...
Low-Rank Modeling and Its Applications in Image Analysis
Xiaowei Zhou, Can Yang, Hongyu Zhao, Weichuan Yu
Article No.: 36
Low-rank modeling generally refers to a class of methods that solves problems by representing variables of interest as low-rank matrices. It has achieved great success in various fields including computer vision, data mining, signal processing,...
Mitigation of Radiation Effects in SRAM-Based FPGAs for Space Applications
Felix Siegle, Tanya Vladimirova, Jørgen Ilstad, Omar Emam
Article No.: 37
The use of static random access memory (SRAM)-based field programmable gate arrays (FPGAs) in harsh radiation environments has grown in recent years. These types of programmable devices require special mitigation techniques targeting the...