enter search term and/or author name below:
The Internet of Things (IoT) aims to connect billions of smart objects to the Internet, which can bring a promising future to smart cities. These objects are expected to generate large amounts of data and send the data to the cloud for further...
Arabic Online Handwriting Recognition (AOHR): A Survey
Baligh M. Al-Helali, Sabri A. Mahmoud
Article No.: 33
This article comprehensively surveys Arabic Online Handwriting Recognition (AOHR). We address the challenges posed by online handwriting recognition, including ligatures, dots and diacritic problems, online/offline touching of text, and geometric...
A Survey on Reinforcement Learning Models and Algorithms for Traffic Signal Control
Kok-Lim Alvin Yau, Junaid Qadir, Hooi Ling Khoo, Mee Hong Ling, Peter Komisarczuk
Article No.: 34
Traffic congestion has become a vexing and complex issue in many urban areas. Of particular interest are the intersections where traffic bottlenecks are known to occur despite being traditionally signalized. Reinforcement learning (RL), which is...
GPU Virtualization and Scheduling Methods: A Comprehensive Survey
Cheol-Ho Hong, Ivor Spence, Dimitrios S. Nikolopoulos
Article No.: 35
The integration of graphics processing units (GPUs) on high-end compute nodes has established a new accelerator-based heterogeneous computing model, which now permeates high-performance computing. The same paradigm nevertheless has limited...
Cross Domain Recommender Systems: A Systematic Literature Review
Muhammad Murad Khan, Roliana Ibrahim, Imran Ghani
Article No.: 36
Cross domain recommender systems (CDRS) can assist recommendations in a target domain based on knowledge learned from a source domain. CDRS consists of three building blocks: domain, user-item overlap scenarios, and recommendation tasks. The...
Power and energy efficiency are now critical concerns in extreme-scale high-performance scientific computing. Many extreme-scale computing systems today (for example: Top500) have tight integration of multicore CPU processors and accelerators (mix...
Optimization of Complex Dataflows with User-Defined Functions
Astrid Rheinländer, Ulf Leser, Goetz Graefe
Article No.: 38
In many fields, recent years have brought a sharp rise in the size of the data to be analyzed and the complexity of the analysis to be performed. Such analyses are often described as dataflows specified in declarative dataflow languages. A key...
A New Classification Framework to Evaluate the Entity Profiling on the Web: Past, Present and Future
Ahmad Barforoush, Hossein Shirazi, Hojjat Emami
Article No.: 39
Recently, we have witnessed entity profiling (EP) becoming increasingly one of the most important topics in information extraction, personalized applications, and web data analysis. EP aims to identify, extract, and represent a compact summary of...
Searchable Symmetric Encryption (SSE) when deployed in the cloud allows one to query encrypted data without the risk of data leakage. Despite the widespread interest, existing surveys do not examine in detail how SSE’s underlying structures...
A Survey on Malware Detection Using Data Mining Techniques
Yanfang Ye, Tao Li, Donald Adjeroh, S. Sitharama Iyengar
Article No.: 41
In the Internet age, malware (such as viruses, trojans, ransomware, and bots) has posed serious and evolving security threats to Internet users. To protect legitimate users from these threats, anti-malware software products from different...
This note corrects a technical error in the ACM Computing Surveys article mentioned in the title. The flaw involved constructions for showing that timed automata with urgent locations have the same expressiveness as timed automata that...
The 21st century has ushered in the age of big data and data economy, in which data DNA, which carries important knowledge, insights, and potential, has become an intrinsic constituent of all data-based organisms. An appropriate...
Nudges for Privacy and Security: Understanding and Assisting Users’ Choices Online
Alessandro Acquisti, Idris Adjerid, Rebecca Balebako, Laura Brandimarte, Lorrie Faith Cranor, Saranga Komanduri, Pedro Giovanni Leon, Norman Sadeh, Florian Schaub, Manya Sleeper, Yang Wang, Shomir Wilson
Article No.: 44
Advancements in information technology often task users with complex and consequential privacy and security decisions. A growing body of research has investigated individuals’ choices in the presence of privacy and information security...
Data-Driven Techniques in Computing System Management
Tao Li, Chunqiu Zeng, Yexi Jiang, Wubai Zhou, Liang Tang, Zheng Liu, Yue Huang
Article No.: 45
Modern forms of computing systems are becoming progressively more complex, with an increasing number of heterogeneous hardware and software components. As a result, it is quite challenging to manage these complex systems and meet the requirements...
Pat Morin, Wolfgang Mulzer, Tommy Reddad
Article No.: 46
Many proofs in discrete mathematics and theoretical computer science are based on the probabilistic method. To prove the existence of a good object, we pick a random object and show that it is bad with low probability. This method is effective,...