enter search term and/or author name below:
Taxonomy and Survey of Collaborative Intrusion Detection
Emmanouil Vasilomanolakis, Shankar Karuppayah, Max Mühlhäuser, Mathias Fischer
Article No.: 55
The dependency of our society on networked computers has become frightening: In the economy, all-digital networks have turned from facilitators to drivers; as cyber-physical systems are coming of age, computer networks are now becoming the central...
We review data mining and related computer science techniques that have been studied in the area of drug safety to identify signals of adverse drug reactions from different data sources, such as spontaneous reporting databases, electronic health...
Remote rendering means rendering 3D graphics on a computing device and displaying the results on another computing device connected through a network. The concept was originally developed for sharing computing resources remotely. It has been...
Securing Android: A Survey, Taxonomy, and Challenges
Sufatrio, Darell J. J. Tan, Tong-Wei Chua, Vrizlynn L. L. Thing
Article No.: 58
Recent years have seen a global adoption of smart mobile devices, particularly those based on Android. However, Android’s widespread adoption is marred with increasingly rampant malware threats. This article gives a survey and taxonomy of...
Accounting and Accountability in Content Distribution Architectures: A Survey
Diarmuid Ó Coileáin, Donal O'mahony
Article No.: 59
Many content distribution architectures offer desirable elements that lead to less bandwidth usage, reduced network congestion, higher content availability, and reduced costs. However, their level of adoption and utilization in commercial...
Implicit surfaces (IS) are commonly used in image creation, modeling environments, modeling objects, and scientific data visualization. In this article, we present a survey of different techniques for fast visualization of IS. The main classes of...
A Survey of Multiobjective Evolutionary Clustering
Anirban Mukhopadhyay, Ujjwal Maulik, Sanghamitra Bandyopadhyay
Article No.: 61
Data clustering is a popular unsupervised data mining tool that is used for partitioning a given dataset into homogeneous groups based on some similarity/dissimilarity metric. Traditional clustering algorithms often make prior assumptions about...
The Partitioned Global Address Space (PGAS) model is a parallel programming model that aims to improve programmer productivity while at the same time aiming for high performance. The main premise of PGAS is that a globally shared address space...
Cloud Computing Resource Scheduling and a Survey of Its Evolutionary Approaches
Zhi-Hui Zhan, Xiao-Fang Liu, Yue-Jiao Gong, Jun Zhang, Henry Shu-Hung Chung, Yun Li
Article No.: 63
A disruptive technology fundamentally transforming the way that computing services are delivered, cloud computing offers information and communication technology users a new dimension of convenience of resources, as services via the Internet....
Energy-Efficient Networking Solutions in Cloud-Based Environments: A Systematic Literature Review
Fahimeh Alizadeh Moghaddam, Patricia Lago, Paola Grosso
Article No.: 64
The energy consumed by data centers hosting cloud services is increasing enormously. This brings the need to reduce energy consumption of different components in data centers. In this work, we focus on energy efficiency of the networking...
Remote Data Auditing in Cloud Computing Environments: A Survey, Taxonomy, and Open Issues
Mehdi Sookhak, Abdullah Gani, Hamid Talebian, Adnan Akhunzada, Samee U. Khan, Rajkumar Buyya, Albert Y. Zomaya
Article No.: 65
Cloud computing has emerged as a long-dreamt vision of the utility computing paradigm that provides reliable and resilient infrastructure for users to remotely store data and use on-demand applications and services. Currently, many individuals and...
Assessing the Structural Complexity of Computer and Communication Networks
Andrzej Kamisiński, Piotr Chołda, Andrzej Jajszczyk
Article No.: 66
In this tutorial, 17 structural complexity indices are presented and compared, each representing one of the following categories: adjacency- and distance-based metrics, Shannon entropy-based metrics, product measures, subgraph-based metrics, and...
Processing Social Media Messages in Mass Emergency: A Survey
Muhammad Imran, Carlos Castillo, Fernando Diaz, Sarah Vieweg
Article No.: 67
Social media platforms provide active communication channels during mass convergence and emergency events such as disasters caused by natural hazards. As a result, first responders, decision makers, and the public can use this information to gain...
The public Infrastructure-as-a-Service (IaaS) cloud industry has reached a critical mass in the past few years, with many cloud service providers fielding competing services. Despite the competition, we find some of the security mechanisms offered...
A Survey of CPU-GPU Heterogeneous Computing Techniques
Sparsh Mittal, Jeffrey S. Vetter
Article No.: 69
As both CPUs and GPUs become employed in a wide range of applications, it has been acknowledged that both of these Processing Units (PUs) have their unique features and strengths and hence, CPU-GPU collaboration is inevitable to achieve...
Systems Approaches to Tackling Configuration Errors: A Survey
Tianyin Xu, Yuanyuan Zhou
Article No.: 70
In recent years, configuration errors (i.e., misconfigurations) have become one of the dominant causes of system failures, resulting in many severe service outages and downtime. Unfortunately, it is notoriously difficult for system users (e.g.,...