enter search term and/or author name below:
Deterministic replay is a type of emerging technique dedicated to providing deterministic executions of computer programs in the presence of nondeterministic factors. The application scopes of deterministic replay are very broad, making it an...
Systems of Systems Engineering: Basic Concepts, Model-Based Techniques, and Research Directions
Claus Ballegaard Nielsen, Peter Gorm Larsen, John Fitzgerald, Jim Woodcock, Jan Peleska
Article No.: 18
The term “System of Systems” (SoS) has been used since the 1950s to describe systems that are composed of independent constituent systems, which act jointly towards a common goal through the synergism between them. Examples of SoS...
Linearisability is a key correctness criterion for concurrent data structures, ensuring that each history of the concurrent object under consideration is consistent with respect to a history of the corresponding abstract data structure....
Visible light LEDs, due to their numerous advantages, are expected to become the dominant indoor lighting technology. These lights can also be switched ON/OFF at high frequency, enabling their additional use for wireless communication and indoor...
Foot-operated computer interfaces have been studied since the inception of human--computer interaction. Thanks to the miniaturisation and decreasing cost of sensing technology, there is an increasing interest exploring this alternative input...
Energy Efficiency Techniques in Cloud Computing: A Survey and Taxonomy
Tarandeep Kaur, Inderveer Chana
Article No.: 22
The increase in energy consumption is the most critical problem worldwide. The growth and development of complex data-intensive applications have promulgated the creation of huge data centers that have heightened the energy demand. In this...
Recent advances in mobile device, wireless networking, and positional technologies have helped location-aware applications become pervasive. However, location trajectory privacy concerns hinder the adoptability of such applications. In this...
Detecting Malicious Data Injections in Wireless Sensor Networks: A Survey
Vittorio P. Illiano, Emil C. Lupu
Article No.: 24
Wireless Sensor Networks are widely advocated to monitor environmental parameters, structural integrity of the built environment and use of urban spaces, services and utilities. However, embedded sensors are vulnerable to compromise by external...
Thinking Like a Vertex: A Survey of Vertex-Centric Frameworks for Large-Scale Distributed Graph Processing
Robert Ryan McCune, Tim Weninger, Greg Madey
Article No.: 25
The vertex-centric programming model is an established computational paradigm recently incorporated into distributed processing frameworks to address challenges in large-scale graph processing. Billion-node graphs that exceed the memory capacity...
A Survey on Lightweight Entity Authentication with Strong PUFs
Jeroen Delvaux, Roel Peeters, Dawu Gu, Ingrid Verbauwhede
Article No.: 26
Physically unclonable functions (PUFs) exploit the unavoidable manufacturing variations of an Integrated Circuit (IC). Their input-output behavior serves as a unique IC “fingerprint.” Therefore, they have been envisioned as an...
Trust and Reputation Models for Multiagent Systems
Jones Granatyr, Vanderson Botelho, Otto Robert Lessing, Edson Emílio Scalabrin, Jean-Paul Barthès, Fabrício Enembreck
Article No.: 27
Finding reliable partners to interact with in open environments is a challenging task for software agents, and trust and reputation mechanisms are used to handle this issue. From this viewpoint, we can observe the growing body of research on this...
The concept of trust and/or trust management has received considerable attention in engineering research communities as trust is perceived as the basis for decision making in many contexts and the motivation for maintaining long-term relationships...
How Close are We to Realizing a Pragmatic VANET Solution? A Meta-Survey
Mukesh Saini, Abdulhameed Alelaiwi, Abdulmotaleb El Saddik
Article No.: 29
Vehicular Ad-hoc Networks (VANETs) are seen as the key enabling technology of Intelligent Transportation Systems (ITS). In addition to safety, VANETs also provide a cost-effective platform for numerous comfort and entertainment applications. A...
Finger augmentation devices, those that are worn and operated by fingers, are a rapidly growing field in the human--computer interaction domain. This field is rooted in ancient history; however, still the academic research arena is booming with...
Mapping QoE through QoS in an Approach to DDB Architectures: Research Analysis and Conceptualization
Ramon Hugo De Souza, Mário Antônio Ribeiro Dantas
Article No.: 31
In the context of distributed databases (DDBs), the absence of mathematically well defined equations to evaluate quality of service (QoS), especially with statistical models, seems to have taken database community attention from the possible...
A Survey on Cache Management Mechanisms for Real-Time Embedded Systems
Giovani Gracioli, Ahmed Alhammad, Renato Mancuso, Antônio Augusto Fröhlich, Rodolfo Pellizzoni
Article No.: 32
Multicore processors are being extensively used by real-time systems, mainly because of their demand for increased computing power. However, multicore processors have shared resources that affect the predictability of real-time systems, which is...