enter search term and/or author name
Systematic Review of Software Behavioral Model Consistency Checking
Faiz ul Muram, Huy Tran, Uwe Zdun
Article No.: 17
In software development, models are often used to represent multiple views of the same system. Such models need to be properly related to each other in order to provide a consistent description of the developed system. Models may contain...
Changes as First-Class Citizens: A Research Perspective on Modern Software Tooling
Quinten David Soetens, Romain Robbes, Serge Demeyer
Article No.: 18
Software must evolve to keep up with an ever-changing context, the real world. We discuss an emergent trend in software evolution research revolving around the central notion that drives evolution: Change. By reifying change, and by modelling it...
In online scenarios requests arrive over time, and each request must be serviced in an irrevocable manner before the next request arrives. Online algorithms with advice is an area of research where one attempts to measure how much knowledge of...
Deep Learning Advances in Computer Vision with 3D Data: A Survey
Anastasia Ioannidou, Elisavet Chatzilari, Spiros Nikolopoulos, Ioannis Kompatsiaris
Article No.: 20
Deep learning has recently gained popularity achieving state-of-the-art performance in tasks involving text, sound, or image processing. Due to its outstanding performance, there have been efforts to apply it in more challenging scenarios, for...
Imitation learning techniques aim to mimic human behavior in a given task. An agent (a learning machine) is trained to perform a task from demonstrations by learning a mapping between observations and actions. The idea of teaching by imitation has...
Team-based invasion sports such as football, basketball, and hockey are similar in the sense that the players are able to move freely around the playing area and that player and team performance cannot be fully analysed without considering...
A Survey on Ensemble Learning for Data Stream Classification
Heitor Murilo Gomes, Jean Paul Barddal, Fabrício Enembreck, Albert Bifet
Article No.: 23
Ensemble-based methods are among the most widely used techniques for data stream classification. Their popularity is attributable to their good performance in comparison to strong single learners while being relatively easy to deploy in real-world...
A Survey and Comparative Study of Hard and Soft Real-Time Dynamic Resource Allocation Strategies for Multi-/Many-Core Systems
Amit Kumar Singh, Piotr Dziurzanski, Hashan Roshantha Mendis, Leandro Soares Indrusiak
Article No.: 24
Multi-/many-core systems are envisioned to satisfy the ever-increasing performance requirements of complex applications in various domains such as embedded and high-performance computing. Such systems need to cater to increasingly dynamic...
Current State of Text Sentiment Analysis from Opinion to Emotion Mining
Ali Yadollahi, Ameneh Gholipour Shahraki, Osmar R. Zaiane
Article No.: 25
Sentiment analysis from text consists of extracting information about opinions, sentiments, and even emotions conveyed by writers towards topics of interest. It is often equated to opinion mining, but it should also encompass emotion mining....
Cloud services and applications prove indispensable amid today’s modern utility-based computing. The cloud has displayed a disruptive and growing impact on everyday computing tasks. However, facilitating the orchestration of cloud resources...
A Survey of Techniques for Cache Partitioning in Multicore Processors
Article No.: 27
As the number of on-chip cores and memory demands of applications increase, judicious management of cache resources has become not merely attractive but imperative. Cache partitioning, that is, dividing cache space between applications based on...
Simulation and Experimentation Platforms for Underwater Acoustic Sensor Networks: Advancements and Challenges
Hanjiang Luo, Kaishun Wu, Rukhsana Ruby, Feng Hong, Zhongwen Guo, Lionel M. Ni
Article No.: 28
Ocean and water basically cover the major parts of our planet. To obtain the best utilization of the underlying resources on these parts of the Earth, people have made some research advancements. Specifically, the research on underwater wireless...
Effective Regression Test Case Selection: A Systematic Literature Review
Rafaqut Kazmi, Dayang N. A. Jawawi, Radziah Mohamad, Imran Ghani
Article No.: 29
Regression test case selection techniques attempt to increase the testing effectiveness based on the measurement capabilities, such as cost, coverage, and fault detection. This systematic literature review presents state-of-the-art research in...
Game Theory for Cyber Security and Privacy
Cuong T. Do, Nguyen H. Tran, Choongseon Hong, Charles A. Kamhoua, Kevin A. Kwiat, Erik Blasch, Shaolei Ren, Niki Pissinou, Sundaraja Sitharama Iyengar
Article No.: 30
In this survey, we review the existing game-theoretic approaches for cyber security and privacy issues, categorizing their application into two classes, security and privacy. To show how game theory is utilized in cyberspace security and privacy,...
A Survey on Reliability Protocols in Wireless Sensor Networks
Mohamed Amine Kafi, Jalel Ben Othman, Nadjib Badache
Article No.: 31
Wireless Sensor Network (WSN) applications have become more and more attractive with the miniaturization of circuits and the large variety of sensors. The different application domains, especially critical fields of WSN use, make the reliability...