enter search term and/or author name below:
Software Platforms for Smart Cities: Concepts, Requirements, Challenges, and a Unified Reference Architecture
Eduardo Felipe Zambom Santana, Ana Paula Chaves, Marco Aurelio Gerosa, Fabio Kon, Dejan S. Milojicic
Article No.: 78
Information and communication technologies (ICT) can be instrumental in progressing towards smarter city environments, which improve city services, sustainability, and citizens’ quality of life. Smart City software platforms can support...
A Survey of Fault-Tolerance Algorithms for Reconfigurable Nano-Crossbar Arrays
Onur Tunali, Mustafa Altun
Article No.: 79
Nano-crossbar arrays have emerged as a promising and viable technology to improve computing performance of electronic circuits beyond the limits of current CMOS. Arrays offer both structural efficiency with reconfiguration and prospective...
Towards Reasoning Vehicles: A Survey of Fuzzy Logic-Based Solutions in Vehicular Networks
Irina Tal, Gabriel-Miro Muntean
Article No.: 80
Vehicular networks and their associated technologies enable an extremely varied plethora of applications and therefore attract increasing attention from a wide audience. However, vehicular networks also have many challenges that arise mainly due...
Graph Processing on GPUs: A Survey
Xuanhua Shi, Zhigao Zheng, Yongluan Zhou, Hai Jin, Ligang He, Bo Liu, Qiang-Sheng Hua
Article No.: 81
A Survey of Research into Mixed Criticality Systems
Alan Burns, Robert I. Davis
Article No.: 82
This survey covers research into mixed criticality systems that has been published since Vestal’s seminal paper in 2007, up until the end of 2016. The survey is organised along the lines of the major research areas within this topic. These...
A Survey on Fully Homomorphic Encryption: An Engineering Perspective
Paulo Martins, Leonel Sousa, Artur Mariano
Article No.: 83
It is unlikely that a hacker is able to compromise sensitive data that is stored in an encrypted form. However, when data is to be processed, it has to be decrypted, becoming vulnerable to attacks. Homomorphic encryption fixes this vulnerability...
Cooperative multi-agent planning (MAP) is a relatively recent research field that combines technologies, algorithms, and techniques developed by the Artificial Intelligence Planning and Multi-Agent Systems communities. While planning has been...
Mining Electronic Health Records (EHRs): A Survey
Pranjul Yadav, Michael Steinbach, Vipin Kumar, Gyorgy Simon
Article No.: 85
The analysis of authorial style, termed stylometry, assumes that style is quantifiably measurable for evaluation of distinctive qualities. Stylometry research has yielded several methods and tools over the past 200 years to handle a variety of...
Systematic Literature Review on Usability of Firewall Configuration
Artem Voronkov, Leonardo Horn Iwaya, Leonardo A. Martucci, Stefan Lindskog
Article No.: 87
Firewalls are network security components that handle incoming and outgoing network traffic based on a set of rules. The process of correctly configuring a firewall is complicated and prone to error, and it worsens as the network complexity grows....
A Survey on Authenticated Encryption--ASIC Designer’s Perspective
Elif Bilge Kavun, Hristina Mihajloska, Tolga Yalçin
Article No.: 88
Authenticated encryption (AE) has been a vital operation in cryptography due to its ability to provide confidentiality, integrity, and authenticity at the same time. Its use has soared in parallel with widespread use of the internet and has led to...
Optical on-chip data transmission enabled by silicon photonics (SiP) is widely considered a key technology to overcome the bandwidth and energy limitations of electrical interconnects. The possibility of integrating optical links into the on-chip...
Data-Driven Approaches to Game Player Modeling: A Systematic Literature Review
Danial Hooshyar, Moslem Yousefi, Heuiseok Lim
Article No.: 90
Data Storage Management in Cloud Environments: Taxonomy, Survey, and Future Directions
Yaser Mansouri, Adel Nadjaran Toosi, Rajkumar Buyya
Article No.: 91
An Offensive and Defensive Exposition of Wearable Computing
Prakash Shrestha, Nitesh Saxena
Article No.: 92
Wearable computing is rapidly getting deployed in many—commercial, medical, and personal—domains of day-to-day life. Wearable devices appear in various forms, shapes, and sizes and facilitate a wide variety of applications in many...
The Experience Sampling Method (ESM) is used by scientists from various disciplines to gather insights into the intra-psychic elements of human life. Researchers have used the ESM in a wide variety of studies, with the method seeing increased...
Feature selection, as a data preprocessing strategy, has been proven to be effective and efficient in preparing data (especially high-dimensional data) for various data-mining and machine-learning problems. The objectives of feature selection...
Canonical correlation analysis is a family of multivariate statistical methods for the analysis of paired sets of variables. Since its proposition, canonical correlation analysis has, for instance, been extended to extract relations between two...
The presence construct, most commonly defined as the sense of “being there,” has driven research and development of virtual environments (VEs) for decades. Despite that, there is not widespread agreement on how to define or...
Geomagnetism for Smartphone-Based Indoor Localization: Challenges, Advances, and Comparisons
Suining He, Kang G. Shin
Article No.: 97
Geomagnetism has recently attracted considerable attention for indoor localization due to its pervasiveness and independence from extra infrastructure. Its location signature has been observed to be temporally stable and spatially discernible for...
Understanding Application-Level Caching in Web Applications: A Comprehensive Introduction and Survey of State-of-the-Art Approaches
Jhonny Mertz, Ingrid Nunes
Article No.: 98
A new form of caching, namely application-level caching, has been recently employed in web applications to improve their performance and increase scalability. It consists of the insertion of caching logic into the application base code to...