enter search term and/or author name below:
Classification Framework for Analysis and Modeling of Physically Induced Reliability Violations
Dimitrios Rodopoulos, Georgia Psychou, Mohamed M. Sabry, Francky Catthoor, Antonis Papanikolaou, Dimitrios Soudris, Tobias G. Noll, David Atienza
Article No.: 38
Technology downscaling is expected to amplify a variety of reliability concerns in future digital systems. A good understanding of reliability threats is crucial for the creation of efficient mitigation techniques. This survey performs a...
Data centers can go green by saving electricity in two major areas: computing and cooling. Servers in data centers require a constant supply of cold air from on-site cooling mechanisms for reliability. An increased computational load makes servers...
Domain-Specific Aspect Languages (DSALs) are Domain-Specific Languages (DSLs) designed to express crosscutting concerns. Compared to DSLs, their aspectual nature greatly amplifies the language design space. We structure this space in order to shed...
Secure the Cloud: From the Perspective of a Service-Oriented Organization
Arpan Roy, Santonu Sarkar, Rajeshwari Ganesan, Geetika Goel
Article No.: 41
In response to the revival of virtualized technology by Rosenblum and Garfinkel , NIST defined cloud computing, a new paradigm in service computing infrastructures. In cloud environments, the basic security mechanism is ingrained in...
This article explains the full reconfigurable multidecree Paxos (or multi-Paxos) protocol. Paxos is by no means a simple protocol, even though it is based on relatively simple invariants. We provide pseudocode and explain it guided by invariants....
A Review and Meta-Analysis of Multimodal Affect Detection Systems
Sidney K. D'mello, Jacqueline Kory
Article No.: 43
Affect detection is an important pattern recognition problem that has inspired researchers from several areas. The field is in need of a systematic review due to the recent influx of Multimodal (MM) affect detection systems that differ in several...
3D Mesh Compression: Survey, Comparisons, and Emerging Trends
Adrien Maglo, Guillaume Lavoué, Florent Dupont, Céline Hudelot
Article No.: 44
3D meshes are commonly used to represent virtual surface and volumes. However, their raw data representations take a large amount of space. Hence, 3D mesh compression has been an active research topic since the mid 1990s. In 2005, two very good...
A Qualitative Review on 3D Coarse Registration Methods
Yago Díez, Ferran Roure, Xavier Lladó, Joaquim Salvi
Article No.: 45
3D registration or matching is a crucial step in 3D model reconstruction. Registration applications span along a variety of research fields, including computational geometry, computer vision, and geometric modeling. This variety of applications...
Large interactive displays are increasingly placed in public (or semipublic) locations, including museums, shops, various city settings, and offices. This article discusses the evolution of such displays by looking at their use and analyzing how...
Anticipatory Mobile Computing: A Survey of the State of the Art and Research Challenges
Veljko Pejovic, Mirco Musolesi
Article No.: 47
Today’s mobile phones are far from the mere communication devices they were 10 years ago. Equipped with sophisticated sensors and advanced computing hardware, phones can be used to infer users’ location, activity, social setting, and...
Graph-Based Label Propagation in Digital Media: A Review
Olga Zoidi, Eftychia Fotiadou, Nikos Nikolaidis, Ioannis Pitas
Article No.: 48
The expansion of the Internet over the last decade and the proliferation of online social communities, such as Facebook, Google+, and Twitter, as well as multimedia sharing sites, such as YouTube, Flickr, and Picasa, has led to a vast...
Classification Framework of MapReduce Scheduling Algorithms
Nidhi Tiwari, Santonu Sarkar, Umesh Bellur, Maria Indrawan
Article No.: 49
A MapReduce scheduling algorithm plays a critical role in managing large clusters of hardware nodes and meeting multiple quality requirements by controlling the order and distribution of users, jobs, and tasks execution. A comprehensive and...
Pattern-Based Survey and Categorization of Network Covert Channel Techniques
Steffen Wendzel, Sebastian Zander, Bernhard Fechner, Christian Herdin
Article No.: 50
Network covert channels are used to hide communication inside network protocols. Various techniques for covert channels have arisen in the past few decades. We surveyed and analyzed 109 techniques developed between 1987 and 2013 and show that...
Renegotiation in Service Level Agreement Management for a Cloud-Based System
Ahmad Fadzil M. Hani, Irving Vitra Paputungan, Mohd Fadzil Hassan
Article No.: 51
Managing Service Level Agreement (SLA) within a cloud-based system is important to maintain service continuity and improve trust due to cloud flexibility and scalability. We conduct a general review on cloud-based systems to understand how service...
Multilabel learning has become a relevant learning paradigm in the past years due to the increasing number of fields where it can be applied and also to the emerging number of techniques that are being developed. This article presents an...
A Survey of TDMA Scheduling Schemes in Wireless Multihop Networks
Aggeliki Sgora, Dimitrios J. Vergados, Dimitrios D. Vergados
Article No.: 53
One of the major problems in wireless multihop networks is the scheduling of transmissions in a fair and efficient manner. Time Division Multiple Access (TDMA) seems to be one of the dominant solutions to achieve this goal since it is a simple...
Mobility Increases Localizability: A Survey on Wireless Indoor Localization using Inertial Sensors
Zheng Yang, Chenshu Wu, Zimu Zhou, Xinglin Zhang, Xu Wang, Yunhao Liu
Article No.: 54
Wireless indoor positioning has been extensively studied for the past 2 decades and continuously attracted growing research efforts in mobile computing context. As the integration of multiple inertial sensors (e.g., accelerometer, gyroscope, and...