enter search term and/or author name below:
Thread-Level Speculation (TLS) is a promising technique that allows the parallel execution of sequential code without relying on a prior, compile-time-dependence analysis. In this work, we introduce the technique, present a taxonomy of TLS...
A novel class of covert channel, out-of-band covert channels, is presented by extending Simmons’ prisoners’ problem. This new class of covert channel is established by surveying the existing covert channel, device-pairing, and...
The increasing demand for traveler clearance at international border crossing points (BCPs) has motivated research for finding more efficient solutions. Automated border control (ABC) is emerging as a solution to enhance the convenience of...
A Survey on Wireless Indoor Localization from the Device Perspective
Jiang Xiao, Zimu Zhou, Youwen Yi, Lionel M. Ni
Article No.: 25
With the marvelous development of wireless techniques and ubiquitous deployment of wireless systems indoors, myriad indoor location-based services (ILBSs) have permeated into numerous aspects of modern life. The most fundamental functionality is...
Survey: Live Migration and Disaster Recovery over Long-Distance Networks
Panagiotis Kokkinos, Dimitris Kalogeras, Anna Levin, Emmanouel Varvarigos
Article No.: 26
We study the virtual machine live migration (LM) and disaster recovery (DR) from a networking perspective, considering long-distance networks, for example, between data centers. These networks are usually constrained by limited available...
Confidentiality-Preserving Publish/Subscribe: A Survey
Emanuel Onica, Pascal Felber, Hugues Mercier, Etienne Rivière
Article No.: 27
Publish/subscribe (pub/sub) is an attractive communication paradigm for large-scale distributed applications running across multiple administrative domains. Pub/sub allows event-based information dissemination based on constraints on the nature of...
Like It or Not: A Survey of Twitter Sentiment Analysis Methods
Anastasia Giachanou, Fabio Crestani
Article No.: 28
Sentiment analysis in Twitter is a field that has recently attracted research interest. Twitter is one of the most popular microblog platforms on which users can publish their thoughts and opinions. Sentiment analysis in Twitter tackles the...
Heap data is potentially unbounded and seemingly arbitrary. Hence, unlike stack and static data, heap data cannot be abstracted in terms of a fixed set of program variables. This makes it an interesting topic of study and there is an abundance of...
Target-tracking algorithms typically organize the network into a logical structure (e.g., tree, cluster, or faces) to enable data fusion and reduce communication costs. These algorithms often predict the target’s future position. In addition...
A Survey of Predictive Modeling on Imbalanced Domains
Paula Branco, Luís Torgo, Rita P. Ribeiro
Article No.: 31
Many real-world data-mining applications involve obtaining predictive models using datasets with strongly imbalanced distributions of the target variable. Frequently, the least-common values of this target variable are associated with events that...
Performance and Security Improvements for Tor: A Survey
Mashael Alsabah, Ian Goldberg
Article No.: 32
Tor [Dingledine et al. 2004] is the most widely used anonymity network today, serving millions of users on a daily basis using a growing number of volunteer-run routers. Since its deployment in 2003, there have been more than three dozen...
The Six Pillars for Building Big Data Analytics Ecosystems
Shadi Khalifa, Yehia Elshater, Kiran Sundaravarathan, Aparna Bhat, Patrick Martin, Fahim Imam, Dan Rope, Mike Mcroberts, Craig Statchuk
Article No.: 33
With almost everything now online, organizations look at the Big Data collected to gain insights for improving their services. In the analytics process, derivation of such insights requires experimenting-with and integrating different analytics...
Knuckle Print Biometrics and Fusion Schemes -- Overview, Challenges, and Solutions
Gaurav Jaswal, Amit Kaul, Ravinder Nath
Article No.: 34
Numerous behavioral or physiological biometric traits, including iris, signature, hand geometry, speech, palm print, face, etc. have been used to discriminate individuals in a number of security applications over the last 30 years. Among these,...
A Survey of Recent Prefetching Techniques for Processor Caches
Article No.: 35
As the trends of process scaling make memory systems an even more crucial bottleneck, the importance of latency hiding techniques such as prefetching grows further. However, naively using prefetching can harm performance and energy efficiency and,...
User Intent in Multimedia Search: A Survey of the State of the Art and Future Challenges
Christoph Kofler, Martha Larson, Alan Hanjalic
Article No.: 36
Today's multimedia search engines are expected to respond to queries reflecting a wide variety of information needs from users with different goals. The topical dimension (“what” the user is searching for) of these information needs is...
Parallel and Distributed Collaborative Filtering: A Survey
Efthalia Karydi, Konstantinos Margaritis
Article No.: 37
Collaborative filtering is among the most preferred techniques when implementing recommender systems. Recently, great interest has turned toward parallel and distributed implementations of collaborative filtering algorithms. This work is a survey...
Toward Engineering a Secure Android Ecosystem: A Survey of Existing Techniques
Meng Xu, Chengyu Song, Yang Ji, Ming-Wei Shih, Kangjie Lu, Cong Zheng, Ruian Duan, Yeongjin Jang, Byoungyoung Lee, Chenxiong Qian, Sangho Lee, Taesoo Kim
Article No.: 38
The openness and extensibility of Android have made it a popular platform for mobile devices and a strong candidate to drive the Internet-of-Things. Unfortunately, these properties also leave Android vulnerable, attracting attacks for profit or...
A Survey of Measures and Methods for Matching Geospatial Vector Datasets
Emerson M. A. Xavier, Francisco J. Ariza-López, Manuel A. Ureña-Cámara
Article No.: 39
The field of Geographical Information Systems (GIS) has experienced a rapid and ongoing growth of available sources for geospatial data. This growth has demanded more data integration in order to explore the benefits of these data further....
The last decade witnessed a tremendous increase in popularity and usage of social network services, such as Facebook, Twitter, and YouTube. Moreover, advances in Web technologies coupled with social networks has enabled users to not only access,...