Luciana Rebelo, Francesco Basciani, Patrizio Pelliccione
{"title":"Applications of AI in Space Domain","authors":"Luciana Rebelo, Francesco Basciani, Patrizio Pelliccione","doi":"10.1145/3757317","DOIUrl":"https://doi.org/10.1145/3757317","url":null,"abstract":"We observe a growing interest in satellites, driven by small and micro-satellites, as operations become more ambitious and there is the need of changing satellites’ missions over time during their expeditions. Artificial Intelligence, especially Machine Learning, and DevOps are getting increasing attention also in the space domain. This is the first systematic survey exploring space architectures supporting Artificial Intelligence and DevOps. The study reviews 28 studies from 2012-2023; while AI integration was present in the 28 studies, DevOps implementation was limited. This discrepancy between the need for DevOps approaches and lack of studies that deal with it can be considered as one of the findings of this paper. Validation mostly relies on controlled experiments, indicating limited real-world application. Challenges encompass environment, hardware, software, communication, and culture.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"718 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144747518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Umair Qudus, Michael Röder, Muhammad Saleem, Axel-Cyrille Ngonga Ngomo
{"title":"Fact Checking Knowledge Graphs -- A Survey","authors":"Umair Qudus, Michael Röder, Muhammad Saleem, Axel-Cyrille Ngonga Ngomo","doi":"10.1145/3749838","DOIUrl":"https://doi.org/10.1145/3749838","url":null,"abstract":"Knowledge graphs are used by a growing number of applications to represent structured data. Hence, evaluating the veracity of assertions in knowledge graphs—dubbed fact checking—is currently a challenge of growing importance. However, manual fact checking is commonly impractical due to the sheer size of knowledge graphs. This paper is a systematic survey of recent works on automatic fact checking with a focus on knowledge graphs. We present recent fact-checking approaches, the varied sources they use as background knowledge, and the features they rely upon. Finally, we draw conclusions pertaining to possible future research directions in fact checking knowledge graphs.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"25 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144669781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Four Decades of Symbolic Knowledge Extraction from Sub-Symbolic Predictors. A Survey","authors":"Federico Sabbatini","doi":"10.1145/3749097","DOIUrl":"https://doi.org/10.1145/3749097","url":null,"abstract":"Issues deriving from the opaque behaviour of prediction-effective, yet non-interpretable, machine learning predictors are being studied and analysed since many decades. One of the main research branches consists of adopting anyway the unintelligible models, thanks to their predictive performance, but queueing to the learning workflow a dedicated technique aimed at post-hoc extracting human-interpretable symbolic knowledge. Following this research line, a growing number of very different knowledge-extraction procedures have been designed over the last four decades, making it difficult for end-users and researches to orient themselves towards the selection of the most suitable one. Accordingly, this survey aims at providing a guide to perform an aware selection of the knowledge-extraction techniques that most probably fit a given task.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"109 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144629785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Joan Lu, Bhavya Krishna Balasubramanian, Mike Joy, Qiang Xu
{"title":"Survey and Analysis for the Challenges in Computer Science to the Automation of Grading Systems","authors":"Joan Lu, Bhavya Krishna Balasubramanian, Mike Joy, Qiang Xu","doi":"10.1145/3748521","DOIUrl":"https://doi.org/10.1145/3748521","url":null,"abstract":"Assessment is essential to educational system. Automatic grading reduces the time and effort taken by tutors to assess the answers written by the students. To understand recent computational methods used for automatic grading, a review has been conducted. 4084 papers were initially identified using a keyword search. After filtering, the number was reduced to 57. It was found that statistical models are normally used in Automatic-Short-Answer-Grading (ASAG); vector-based similarity measures are the most popular among projects; pilot datasets are mostly used; standard datasets for evaluation are missing. Evidence shows that machine learning and deep learning are most popularly adopted methods and generative AI, e.g., LLMs and ChatGPT are also jump to the chance, which indicates that integrating AI in education is an inevitable trend. Also, most investigations prefer to adopt multiple approaches to improve computational quality, dataset analysis, and evaluation results. The identified research gaps will be a useful reference guide to users/researchers beneficial to formative/summative assessment. We concluded that the presented outcome, analysis and discussions are informative to academia and pedagogical practitioners who are interested in further developing/using ASAG systems. Although research into ASAG is still rudimentary, it is a promising area with impact on academic circles/commercially educational markets.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"13 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144622740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Atsushi Hori, Kaiming Ouyang, Min Si, Pavan Balaji, Julien Jaeger, Marc Pérache, Sam` White, Evan Ramos, Laxmikant Kale, Kevin Pedretti, Ron Brightwell, Balazs Gerofi, Yutaka Ishikawa
{"title":"A Survey on the Shared Address Space with Privatized Static Variables (SAS-PSV) Execution Model for Many-Core Era","authors":"Atsushi Hori, Kaiming Ouyang, Min Si, Pavan Balaji, Julien Jaeger, Marc Pérache, Sam` White, Evan Ramos, Laxmikant Kale, Kevin Pedretti, Ron Brightwell, Balazs Gerofi, Yutaka Ishikawa","doi":"10.1145/3746169","DOIUrl":"https://doi.org/10.1145/3746169","url":null,"abstract":"Parallel applications often use MPI processes and OpenMP threads. Those parallel execution models, multi-process and multi-thread, were invented to increase efficiency on uniprocessor systems. In the multi-process approach, each process’s isolated address space may make communication expensive; in the multi-thread design, shared variables may cause access conflicts and stall executions. Processes or threads interact and exchange information more often as CPU cores increase, and traditional execution models may create bottlenecks. The paradigm shift from uniprocessor to many-core systems necessitates the development of new parallel execution models to address challenges posed by the two parallel models. When processes share an address space, what happens? If threads don’t share static variables? Sharing an address space and privatizing static variables reduces information exchange and shared static variable exclusion costs. This survey investigates <jats:italic toggle=\"yes\">Shared Address Space with Privatized Static Variables (SAS-PSV)</jats:italic> , a new execution architecture that allows shared address space and static variable privatization. This notion is implemented by MPC, SMARTMAP, PVAS, PiP, and AMPI. Each has a different approach and execution. This paper analyzes these implementations’ concepts, details, and hidden defects. We also present SAS-PSV applications and issues that need to be solved.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"46 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144566085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tingting Hang, Shuting Liu, Jun Feng, Hamza Djigal, Jun Huang
{"title":"Few-Shot Relation Extraction Based on Prompt Learning: A Taxonomy, Survey, Challenges and Future Directions","authors":"Tingting Hang, Shuting Liu, Jun Feng, Hamza Djigal, Jun Huang","doi":"10.1145/3746281","DOIUrl":"https://doi.org/10.1145/3746281","url":null,"abstract":"Relation extraction (RE) is critical in information extraction (IE) and knowledge graph construction. RE aims to identify the semantic relations between entities from natural language texts. Traditional RE models often rely on many manually annotated training samples, which are limited when data is scarce. Therefore, exploring how to perform relation extraction under few-shot conditions has become a research focus. Recently, prompt learning has attracted attention from researchers due to its ability to fully activate the potential of Pre-trained Language Models (PLMs), especially making significant progress in Few-Shot Relation Extraction (FSRE). This paper comprehensively reviews FSRE based on prompt learning. We first introduce the fundamental concepts of FSRE and prompt learning. Then, we systematically review recent research advances in FSRE with prompt learning, focusing on two perspectives: template construction and model fine-tuning strategies. Next, we summarize the benchmark datasets, evaluation metrics, and experimental results of representative works in FSRE. Afterward, we present practical applications of prompt-based FSRE in specialized domains. Finally, we discuss the critical challenges and future research directions of FSRE tasks based on prompt learning.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"85 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144566086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cheng-Te Li, Yu-Che Tsai, Chih-Yao Chen, Jay Chiehen Liao
{"title":"Graph Neural Networks for Tabular Data Learning: A Survey with Taxonomy and Directions","authors":"Cheng-Te Li, Yu-Che Tsai, Chih-Yao Chen, Jay Chiehen Liao","doi":"10.1145/3744918","DOIUrl":"https://doi.org/10.1145/3744918","url":null,"abstract":"This survey dives into Tabular Data Learning (TDL) using Graph Neural Networks (GNNs), a domain where deep learning-based approaches have increasingly shown superior performance in both classification and regression tasks compared to traditional methods. We highlight a critical gap in deep neural TDL: the underrepresentation of latent correlations among data instances and feature values. GNNs, with their innate capability to model intricate relationships and interactions between diverse elements of tabular data, have garnered significant interest and application across TDL domains. Our survey provides a systematic review of the methods involved in designing and implementing GNNs for TDL (GNN4TDL). It encompasses a detailed investigation into the foundational aspects and an overview of GNN-based TDL methods, offering insights into their evolving landscape. We present a comprehensive taxonomy focused on constructing graph structures and representation learning within GNN-based TDL methods. We also examine various training plans, emphasize the integration of auxiliary tasks to enhance the representation quality. A critical part of our discussion is dedicated to the practical applications across a spectrum of GNN4TDL scenarios, exhibiting their versatility and impact. Last, we discuss the limitations and future directions, aiming to spur advancements in GNN4TDL. This survey serves as a resource for researchers and practitioners, offering a thorough understanding of GNNs’ role in revolutionizing TDL and pointing towards future innovations in this promising area.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"20 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144533128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy Preserving Identity Federation: A Literature Study","authors":"Anne Bumiller, Elisavet Kozyri, Håvard Dagenborg","doi":"10.1145/3745018","DOIUrl":"https://doi.org/10.1145/3745018","url":null,"abstract":"Within an <jats:italic toggle=\"yes\">Identity federation (IF)</jats:italic> system, users gain access to multiple <jats:italic toggle=\"yes\">Service Providers</jats:italic> (SPs) by submitting credentials issued by one or more <jats:italic toggle=\"yes\">Identity Providers</jats:italic> (IdPs). Such Identity Federations (IFs) raise several privacy concerns: IdPs might track user activity, by recording the accessed services, and SPs might mismanage sensitive user attributes that comprise the submitted credentials. An extensive line of research on <jats:italic toggle=\"yes\">Privacy Preserving</jats:italic> IF has been developed to expose and address these privacy concerns. This survey aims to systematize the privacy requirements and enhancement techniques that has been employed so far in this line of research. Specifically, we use Systematic Mapping Study (SMS) and Systematic Literature Review (SLR) methodologies to organize research work from the last ten years and understand (i) the requirements that privacy-preserving IF is expected to satisfy, (ii) the degree at which these requirements have been formalized, (iii) the techniques employed to enforce these requirements, (iv) the means for providing enforcement assurance, and (v) the degree at which these techniques preserve fundamental authentication objectives and are aligned with existing IF standards. Based on this characterization of the literature, we draw conclusions about the rigorousness of the proposed approaches, their deployability into practice, and lessons learned for future research and practice in the field.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"19 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144533126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Philip Empl, David Koch, Marietheres Dietz, Günther Pernul
{"title":"Digital Twins in Security Operations: State of the Art and Future Perspectives","authors":"Philip Empl, David Koch, Marietheres Dietz, Günther Pernul","doi":"10.1145/3746279","DOIUrl":"https://doi.org/10.1145/3746279","url":null,"abstract":"In an era of rapid technological advancements, digital twins are gaining attention in industry and research. These virtual representations of real-world entities, enabled by the Internet of Things (IoT), offer advanced simulation and analysis capabilities. Their application spans various sectors, from smart manufacturing to healthcare, highlighting their versatility. However, the rise of digital technologies has also escalated cybersecurity concerns. Historical cyberattacks underscore the urgency for enhanced security operations. In this context, digital twins represent a novel approach to cybersecurity. Industry and academic research are increasingly exploring their potential to protect their assets. Despite growing interest and applications, more comprehensive research synthesis needs to be done, particularly in security operations based on digital twins. Our paper aims to fill this gap through a structured literature review aggregating knowledge from 201 publications. We focus on defining the digital twin in cybersecurity, exploring its applications, and outlining implementations and challenges. To maintain transparency, our data is documented and is publicly available. This survey serves as a crucial guide for academic and industry stakeholders, fostering digital twins in security operations.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"69 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144533125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jingtao Ding, Yunke Zhang, Yu Shang, Yuheng Zhang, Zefang Zong, Jie Feng, Yuan Yuan, Hongyuan Su, Nian Li, Nicholas Sukiennik, Fengli Xu, Yong Li
{"title":"Understanding World or Predicting Future? A Comprehensive Survey of World Models","authors":"Jingtao Ding, Yunke Zhang, Yu Shang, Yuheng Zhang, Zefang Zong, Jie Feng, Yuan Yuan, Hongyuan Su, Nian Li, Nicholas Sukiennik, Fengli Xu, Yong Li","doi":"10.1145/3746449","DOIUrl":"https://doi.org/10.1145/3746449","url":null,"abstract":"The concept of world models has garnered significant attention due to advancements in multimodal large language models such as GPT-4 and video generation models such as Sora, which are central to the pursuit of artificial general intelligence. This survey offers a comprehensive review of the literature on world models. Generally, world models are regarded as tools for either understanding the present state of the world or predicting its future dynamics. This review presents a systematic categorization of world models, emphasizing two primary functions: (1) constructing internal representations to understand the mechanisms of the world, and (2) predicting future states to simulate and guide decision-making. Initially, we examine the current progress in these two categories. We then explore the application of world models in key domains, including autonomous driving, robotics, and social simulacra, with a focus on how each domain utilizes these aspects. Finally, we outline key challenges and provide insights into potential future research directions. We summarize the representative papers along with their code repositories in https://github.com/tsinghua-fib-lab/World-Model.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"11 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144503460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}