enter search term and/or author name
Security is oftentimes centrally managed. An alternative trend of using collaboration in order to improve security has gained momentum over the past few years. Collaborative security is an abstract concept that applies to a wide variety of systems...
The cloud computing paradigm has become a mainstream solution for the deployment of business processes and applications. In the public cloud vision, infrastructure, platform, and software services are provisioned to tenants (i.e., customers and...
Logic-Based Modeling Approaches for Qualitative and Hybrid Reasoning in Dynamic Spatial Systems
Stefan Mitsch, André Platzer, Werner Retschitzegger, Wieland Schwinger
Article No.: 3
Autonomous agents that operate as components of dynamic spatial systems are becoming increasingly popular and mainstream. Applications can be found in consumer robotics, in road, rail, and air transportation, manufacturing, and military...
Performance Anomaly Detection and Bottleneck Identification
Olumuyiwa Ibidunmoye, Francisco Hernández-Rodriguez, Erik Elmroth
Article No.: 4
In order to meet stringent performance requirements, system administrators must effectively detect undesirable performance behaviours, identify potential root causes, and take adequate corrective measures. The problem of uncovering and...
The Impact of Bio-Inspired Approaches Toward the Advancement of Face Recognition
Bisan Alsalibi, Ibrahim Venkat, K.G. Subramanian, Syaheerah Lebai Lutfi, Philippe De Wilde
Article No.: 5
An increased number of bio-inspired face recognition systems have emerged in recent decades owing to their intelligent problem-solving ability, flexibility, scalability, and adaptive nature. Hence, this survey aims to present a detailed overview...
Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including...
Mobile Crowd Sensing and Computing: The Review of an Emerging Human-Powered Sensing Paradigm
Bin Guo, Zhu Wang, Zhiwen Yu, Yu Wang, Neil Y. Yen, Runhe Huang, Xingshe Zhou
Article No.: 7
With the surging of smartphone sensing, wireless networking, and mobile social networking techniques, Mobile Crowd Sensing and Computing (MCSC) has become a promising paradigm for cross-space and large-scale sensing. MCSC extends the vision of...
Survey on Broadcast Algorithms for Mobile Ad Hoc Networks
Patricia Ruiz, Pascal Bouvry
Article No.: 8
Networking at any time and any place paves the way for a large number of possible applications in ad hoc networks, from disaster relief in remote areas to network extension. Thus, for the past decades, many works have been proposed trying to make...
Lifetime Reliability Enhancement of Microprocessors: Mitigating the Impact of Negative Bias Temperature Instability
Hyejeong Hong, Jaeil Lim, Hyunyul Lim, Sungho Kang
Article No.: 9
Ensuring lifetime reliability of microprocessors has become more critical. Continuous scaling and increasing temperatures due to growing power density are threatening lifetime reliability. Negative bias temperature instability (NBTI) has been...
A Survey on Hypervisor-Based Monitoring: Approaches, Applications, and Evolutions
Erick Bauman, Gbadebo Ayoade, Zhiqiang Lin
Article No.: 10
When designing computer monitoring systems, one goal has always been to have a complete view of the monitored target and at the same time stealthily protect the monitor itself. One way to achieve this is to use hypervisor-based, or more generally...
Allocation of Virtual Machines in Cloud Data Centers—A Survey of Problem Models and Optimization Algorithms
Zoltán Ádám Mann
Article No.: 11
Data centers in public, private, and hybrid cloud settings make it possible to provision virtual machines (VMs) with unprecedented flexibility. However, purchasing, operating, and maintaining the underlying physical resources incurs significant...
The evaluation of computer intrusion detection systems (which we refer to as intrusion detection systems) is an active research area. In this article, we survey and systematize common practices in the area of evaluation of such systems. For this...
Multiobjective evolutionary algorithms (MOEAs) have been widely used in real-world applications. However, most MOEAs based on Pareto-dominance handle many-objective problems (MaOPs) poorly due to a high proportion of incomparable and thus mutually...
Digital video enables manifold ways of multimedia content interaction. Over the last decade, many proposals for improving and enhancing video content interaction were published. More recent work particularly leverages on highly capable devices...
A Systematic Survey of Online Data Mining Technology Intended for Law Enforcement
Matthew Edwards, Awais Rashid, Paul Rayson
Article No.: 15
As an increasing amount of crime takes on a digital aspect, law enforcement bodies must tackle an online environment generating huge volumes of data. With manual inspections becoming increasingly infeasible, law enforcement bodies are optimising...
The Multiple Facets of Software Diversity: Recent Developments in Year 2000 and Beyond
Benoit Baudry, Martin Monperrus
Article No.: 16
Early experiments with software diversity in the mid 1970s investigated N-version programming and recovery blocks to increase the reliability of embedded systems. Four decades later, the literature about software diversity has expanded in multiple...