enter search term and/or author name below:
Web Service Composition: A Survey of Techniques and Tools
Angel Lagares Lemos, Florian Daniel, Boualem Benatallah
Article No.: 33
Web services are a consolidated reality of the modern Web with tremendous, increasing impact on everyday computing tasks. They turned the Web into the largest, most accepted, and most vivid distributed computing platform ever. Yet, the use and...
Multioccupant Activity Recognition in Pervasive Smart Home Environments
Asma Benmansour, Abdelhamid Bouchachia, Mohammed Feham
Article No.: 34
Human activity recognition in ambient intelligent environments like homes, offices, and classrooms has been the center of a lot of research for many years now. The aim is to recognize the sequence of actions by a specific person using sensor...
Various reputation systems have been proposed for a broad range of distributed applications, such as peer-to-peer, ad-hoc, and multiagent systems. Their evaluation has been mostly based on proprietary methods due to the lack of widely acceptable...
A Survey on Energy Efficiency in P2P Systems: File Distribution, Content Streaming, and Epidemics
Simone Brienza, Sena Efsun Cebeci, Seyed Saeid Masoumzadeh, Helmut Hlavacs, Öznur Özkasap, Giuseppe Anastasi
Article No.: 36
Several Peer-to-Peer (P2P) protocols and applications have been developed to allow file distribution/sharing, video and music streaming, and data and information dissemination. These P2P systems are regularly used by a large number of users, both...
A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks
Ryan Heartfield, George Loukas
Article No.: 37
Social engineering is used as an umbrella term for a broad spectrum of computer exploitations that employ a variety of attack vectors and strategies to psychologically manipulate a user. Semantic attacks are the specific type of social...
Data-driven Human Mobility Modeling: A Survey and Engineering Guidance for Mobile Networking
Andrea Hess, Karin Anna Hummel, Wilfried N. Gansterer, Günter Haring
Article No.: 38
Over the last decades, modeling of user mobility has become increasingly important in mobile networking research and development. This has led to the adoption of modeling techniques from other disciplines such as kinetic theory or urban planning....
Software energy profilers are the tools to measure the energy consumption of mobile devices, applications running on those devices, and various hardware components. They adopt different modeling and measurement techniques. In this article, we aim...
A Survey of Automatic Protocol Reverse Engineering Tools
John Narayan, Sandeep K. Shukla, T. Charles Clancy
Article No.: 40
Computer network protocols define the rules in which two entities communicate over a network of unique hosts. Many protocol specifications are unknown, unavailable, or minimally documented, which prevents thorough analysis of the protocol for...
A Survey on Assessment and Ranking Methodologies for User-Generated Content on the Web
Elaheh Momeni, Claire Cardie, Nicholas Diakopoulos
Article No.: 41
User-generated content (UGC) on the Web, especially on social media platforms, facilitates the association of additional information with digital resources; thus, it can provide valuable supplementary content. However, UGC varies in quality and,...
QoS-Aware Autonomic Resource Management in Cloud Computing: A Systematic Review
Sukhpal Singh, Inderveer Chana
Article No.: 42
As computing infrastructure expands, resource management in a large, heterogeneous, and distributed environment becomes a challenging task. In a cloud environment, with uncertainty and dispersion of resources, one encounters problems of allocation...
A Systematic Review of Service Level Management in the Cloud
Funmilade Faniyi, Rami Bahsoon
Article No.: 43
Cloud computing make it possible to flexibly procure, scale, and release computational resources on demand in response to workload changes. Stakeholders in business and academia are increasingly exploring cloud deployment options for their...
Assessing Dependability with Software Fault Injection: A Survey
Roberto Natella, Domenico Cotroneo, Henrique S. Madeira
Article No.: 44
With the rise of software complexity, software-related accidents represent a significant threat for computer-based systems. Software Fault Injection is a method to anticipate worst-case scenarios caused by faulty software through the deliberate...
A Survey of Techniques for Architecting and Managing Asymmetric Multicore Processors
Article No.: 45
To meet the needs of a diverse range of workloads, asymmetric multicore processors (AMPs) have been proposed, which feature cores of different microarchitecture or ISAs. However, given the diversity inherent in their design and application...
Evolution of Attacks, Threat Models, and Solutions for Virtualized Systems
Daniele Sgandurra, Emil Lupu
Article No.: 46
Virtualization technology enables Cloud providers to efficiently use their computing services and resources. Even if the benefits in terms of performance, maintenance, and cost are evident, however, virtualization has also been exploited by...
This article examines in great detail the most relevant security and privacy issues affecting the protocols used by contactless chips integrated in ePassports, and presents all relevant literature together with some new attacks and insights that...
Workload characterization is a well-established discipline that plays a key role in many performance engineering studies. The large-scale social behavior inherent in the applications and services being deployed nowadays leads to rapid changes in...