Sicong Cao, Xiaobing Sun, Ratnadira Widyasari, David Lo, Xiaoxue Wu, Lili Bo, Jiale Zhang, Bin Li, Wei Liu, Di Wu, Yixin Chen
{"title":"A Systematic Literature Review on Explainability for ML/DL-based Software Engineering","authors":"Sicong Cao, Xiaobing Sun, Ratnadira Widyasari, David Lo, Xiaoxue Wu, Lili Bo, Jiale Zhang, Bin Li, Wei Liu, Di Wu, Yixin Chen","doi":"10.1145/3763230","DOIUrl":"https://doi.org/10.1145/3763230","url":null,"abstract":"The remarkable achievements of Artificial Intelligence (AI) algorithms, particularly in Machine Learning (ML) and Deep Learning (DL), have fueled their extensive deployment across multiple sectors, including Software Engineering (SE). However, due to their black-box nature, these promising AI-driven SE models are still far from being deployed in practice. This lack of explainability poses unwanted risks for their applications in critical tasks, such as vulnerability detection, where decision-making transparency is of paramount importance. This paper endeavors to elucidate this interdisciplinary domain by presenting a systematic literature review of approaches that aim to improve the explainability of AI models within the context of SE. The review canvasses work appearing in the most prominent SE & AI conferences and journals, and spans 108 papers across 23 unique SE tasks. Based on three key Research Questions (RQs), we aim to (1) summarize the SE tasks where XAI techniques have shown success to date; (2) classify and analyze different XAI techniques; and (3) investigate existing evaluation approaches. Based on our findings, we identified a set of challenges remaining to be addressed in existing studies, together with a set of guidelines highlighting potential opportunities we deemed appropriate and important for future work.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"23 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144900549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wenyu Dong, Guangquan Xu, Shicheng Feng, Hongpeng Bai, Michael Sheng, Xi Zheng
{"title":"Escorting the Confidentiality and Integrity of UAVs: What Exactly Can Trusted Execution Environment Offer?","authors":"Wenyu Dong, Guangquan Xu, Shicheng Feng, Hongpeng Bai, Michael Sheng, Xi Zheng","doi":"10.1145/3763788","DOIUrl":"https://doi.org/10.1145/3763788","url":null,"abstract":"A UAV (Unmanned Aerial Vehicle), also commonly known as a drone, has a wide range of application scenarios and cutting-edge capabilities. Thanks to increasingly sophisticated software and hardware, algorithm, and system integration design, the comparatively tiny vehicle can now fully exploit its advantages in almost every field, which will continue to mature. Nonetheless, UAVs have revealed their particular vulnerability under the threat of sundry hostile attacks, which threaten the confidentiality, integrity, and availability of the system. To protect the confidentiality and integrity of UAVs, some researchers have found that Trusted Execution Environment (TEE) is a potential solution, which provides an independent processing environment for secure storage and computing. As the practice of fitting UAVs with TEE grows in popularity, legislation is beginning to acknowledge their capabilities and offer them special licenses. Some well-known companies, such as Dajiang Innovation and Qualcomm, have also adopted TEE on their UAV products to enhance security. In order to figure out what meaningful role TEE can play in this scenario, we conduct several investigations and attempt to draw inspiration from them. We first go over the most recent reviews of UAV security and privacy issues, so as to examine the confidentiality and integrity requirements. Then, we review the existing works for UAV confidentiality and integrity protection integrated with TEE in detail and further propose a taxonomy. We also examine the benefits, security issues, and prospects of TEE. After conducting a gap analysis, we offer some recommendations for potential future courses of action.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"23 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144906148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Filippo Pallucchini, Lorenzo Malandri, Fabio Mercorio, Mario Mezzanzanica
{"title":"Lost in Alignment: A Survey on Cross-Lingual Alignment Methods for Contextualized Representation","authors":"Filippo Pallucchini, Lorenzo Malandri, Fabio Mercorio, Mario Mezzanzanica","doi":"10.1145/3764112","DOIUrl":"https://doi.org/10.1145/3764112","url":null,"abstract":"Cross-lingual word representations allow us to analyse word meanings across diverse language settings. It is crucial in aiding cross-lingual knowledge transfer when constructing natural language processing (NLP) models for languages with limited resources. This survey presents a comprehensive classification of cross-lingual contextual embedding models. We assess their data requirements and objective functions, and we introduce a taxonomy for categorising these approaches. Then, we present a comprehensive table containing a set of hierarchical criteria to compare them better, along with information regarding the availability of code and data to enable replication of the research. Furthermore, we delve into the evaluation methodologies employed for cross-lingual embeddings, exploring their practical applications and addressing their current associated challenges.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"18 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144906147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kalana Induwara Wijegunarathna, Kristin Stock, Christopher B. Jones
{"title":"Digital Gazetteers: Review and Prospects for Place Name Knowledge Bases","authors":"Kalana Induwara Wijegunarathna, Kristin Stock, Christopher B. Jones","doi":"10.1145/3763231","DOIUrl":"https://doi.org/10.1145/3763231","url":null,"abstract":"Gazetteers typically store data on place names, place types and the associated coordinates. They play an essential role in disambiguating place names in online geographical information retrieval systems for navigation and mapping, detecting and disambiguating place names in text, and providing coordinates. Currently there are many gazetteers in use derived from many sources, with no commonly accepted standard for encoding the data. Most gazetteers are also very limited in the extent to which they represent the multiple facets of the named places yet they have potential to assist user search for locations with specific physical, commercial, social or cultural characteristics. With a focus on understanding digital gazetteer technologies and advancing their future effectiveness for information retrieval, we provide a review of data sources, components, software and data management technologies, data quality and volunteered data, and methods for matching sources that refer to the same real-world places. We highlight the need for future work on richer representation of named places, the temporal evolution of place identity and location, and the development of more effective methods for data integration.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"1 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144900553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Sequence Alignment Algorithms and State-of-the-Art Aligners","authors":"Konstantinos Prousalis, Konstantinos Georgiou, Andreas Kalogeropoulos, Dimitrios Ntalaperas, Nikos Konofaos, Lefteris Aggelis, Christos Papalitsas, Thanos Stavropoulos, Nico Gariboldi","doi":"10.1145/3763229","DOIUrl":"https://doi.org/10.1145/3763229","url":null,"abstract":"Vast amounts of genomic, proteomic, transcriptomics and other forms, commonly referred to as -omics data, are generated daily in an unprecedented way thanks to high-throughput Next Generation Sequencing technologies. One of the main processes to generate value and insights from this data in bioinformatics is “sequence alignment”, an algorithmic routine that matches a “reference” sequence to a larger sequence. Despite the plethora of approaches, pairwise and multiple sequence alignment remain a complex problem that requires high computational power. In this paper, the most prominent sequence alignment approaches of the past three decades are reviewed and categorized, examining different aspects, such as their overall algorithmic synthesis, alignment quality and performance benchmarking tests in a uniform way. The latest trends reveal an increased specialization on biology-based directions, the need for alternative heuristic approaches and a promise in optics-enabled approaches and the quantum computing paradigm shift.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"13 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144900425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Systematic Literature Review on Multimodal Text Summarization","authors":"Abid Ali, Diego Molla","doi":"10.1145/3763245","DOIUrl":"https://doi.org/10.1145/3763245","url":null,"abstract":"The proliferation of information-sharing platforms and the ease of access to diverse resources have led to an overwhelming volume of multimodal data that is increasingly difficult to process effectively. The integration of multiple data types, including text, images, video, and audio, highlights the growing importance of Multimodal Text Summarization (MMTS). Collecting and synthesizing existing research on this topic can provide a comprehensive foundation for advancing the field. Following a Systematic Literature Review (SLR) methodology, we addressed three pivotal research questions concerning methodologies, evaluation measures, and datasets in MMTS. Through a systematic analysis of 132 papers , we examined the strategies employed to address MMTS challenges, assessed the evaluation methods used to quantify performance, and compiled a detailed list of available datasets along with their limitations. This review offers critical insights and identifies future research directions, aiming to inform and guide continued innovation in this dynamic and evolving domain.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"63 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144900524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resource Management for Mission-critical Applications in Edge Computing: Systematic Review on Recent Research and Open Issues","authors":"Nayereh Rasouli, Cristian Klein, Erik Elmroth","doi":"10.1145/3762181","DOIUrl":"https://doi.org/10.1145/3762181","url":null,"abstract":"In the realm of edge computing, the optimization of latency, energy, bandwidth, and local computation is critical, especially for mission-critical applications in sectors like disaster management and healthcare. Such applications, exemplified by deploying UAVs and autonomous robots, demand instantaneous data processing. Given the inherent constraints of edge servers—characterized by their limited capacity—meticulous resource management becomes paramount. This entails judicious resource allocation, astute provisioning, strategic task offloading, and judicious application placement, all pivotal for both fixed and mobile resource service delivery. This survey delves deep into the nuances of deploying mission-critical applications in an edge environment, dissecting their technological prerequisites. Our exploration employs a systematic literature review grounded in a conventional review methodology. We analyze the cornerstone quality of service metrics pivotal for such critical applications in edge contexts, aiming for efficient service delivery. Moreover, we identified some major gaps in current resource management strategies. Our overarching ambition is to pave the way for robust edge computing paradigms tailored for mission-critical applications.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"15 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144900526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Senthil Kumar Jagatheesaperumal, Artur Gomes Barreto, Victor Hugo C. de Albuquerque
{"title":"Metaverse Platforms for Immersive Healthcare: A Survey on Telemedicine Solutions","authors":"Senthil Kumar Jagatheesaperumal, Artur Gomes Barreto, Victor Hugo C. de Albuquerque","doi":"10.1145/3762180","DOIUrl":"https://doi.org/10.1145/3762180","url":null,"abstract":"Health disorders are characterized by physical health and mental health, which are pretty standard among the majority of the population. Telemedicine solutions to address such issues are experienced only by a significant portion of health professionals and the diseased. Lack of awareness and hindrance to modern technology are identified as an impact on the usage of telemedicine solutions, and there is growing evidence that a significant number of members utilize these platforms. However, despite this growing trend, the physical presence of health professionals in face-to-face discussions seems challenging. The emergence of Metaverse has turned out to be a possible solution to facilitate immersive experiences for patients and healthcare professionals. In this paper, we survey the utilization of the Metaverse platforms to facilitate current medical diagnosis and treatment procedures through remote and immersive means. To provide secure means of healthcare solutions, we summarize the privacy and security concerns prevalent in Metaverse platforms and the potential solutions for addressing them. Finally, we summarize the future research trends by addressing six challenges of incorporating telemedicine communication in the Metaverse.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"31 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144900527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tazeem Ahmad, Alicia Morel, Nuo Cheng, Kannappan Palaniappan, Prasad Calyam, Kun Sun, Jianli Pan
{"title":"Future UAV/Drone Systems for Intelligent Active Surveillance and Monitoring","authors":"Tazeem Ahmad, Alicia Morel, Nuo Cheng, Kannappan Palaniappan, Prasad Calyam, Kun Sun, Jianli Pan","doi":"10.1145/3760389","DOIUrl":"https://doi.org/10.1145/3760389","url":null,"abstract":"The rapid development of the Internet of Things (IoT) has fueled the widespread adoption of Unmanned Aerial Vehicles (UAVs) or drones across various fields, including their use in applications such as surveillance and monitoring. UAVs flight capabilities allow to effortlessly access previously inaccessible locations, providing real-time, high-resolution data – images and videos – of any desired area or target. Furthermore, the growth of Artificial Intelligence (AI), and edge computing technologies has empowered UAVs with high computational capabilities, making them suitable for diverse applications such as agriculture, transportation and border security. These technology advancements also equip UAVs with powerful on-board processing for sophisticated decision-making that enhances UAV activeness and intelligence. This survey explores the promising areas of UAVs for intelligent active surveillance and monitoring across diverse applications. First, the various levels of UAV activeness within applications are discussed; second, prior research is examined to identify the key technologies and architectures that power intelligent UAV systems; and third, several UAV applications in surveillance and monitoring, ranging from basic tasks to highly intelligent operations are explored. Finally, the survey concludes by discussing emerging research challenges and outlines a guiding road map for future research of highly interdisciplinary and emerging areas in UAV-based systems for surveillance and monitoring.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"19 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144850853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wei Zhou, Li Yang, Lei Zhao, Runyu Zhang, Yifan Cui, Hongpu Huang, Kun Qie, Chen Wang
{"title":"Vision Technologies with Applications in Traffic Surveillance Systems: A Holistic Survey","authors":"Wei Zhou, Li Yang, Lei Zhao, Runyu Zhang, Yifan Cui, Hongpu Huang, Kun Qie, Chen Wang","doi":"10.1145/3760525","DOIUrl":"https://doi.org/10.1145/3760525","url":null,"abstract":"Traffic Surveillance Systems (TSS) have become increasingly crucial in modern intelligent transportation systems, with vision technologies playing a central role for scene perception and understanding. While existing surveys typically focus on isolated aspects of TSS, a comprehensive analytical framework bridging low-level and high-level perception tasks, particularly considering emerging technologies, remains lacking. This paper presents a systematic review of vision technologies in TSS, examining both low-level perception tasks (object detection, classification, and tracking) and high-level perception tasks (parameter estimation, anomaly detection, and behavior understanding). Specifically, we first provide a detailed methodological categorization and comprehensive performance evaluation for each task. Our investigation reveals five fundamental limitations in current TSS: perceptual data degradation in complex scenarios, data-driven learning constraints, semantic understanding gaps, sensing coverage limitations and computational resource demands. To address these challenges, we systematically analyze five categories of current approaches and potential trends: advanced perception enhancement, efficient learning paradigms, knowledge-enhanced understanding, cooperative sensing frameworks and efficient computing frameworks, critically assessing their real-world applicability. Furthermore, we evaluate the transformative potential of foundation models in TSS, which exhibit remarkable zero-shot learning abilities, strong generalization, and sophisticated reasoning capabilities across diverse tasks. This review provides a unified analytical framework bridging low-level and high-level perception tasks, systematically analyzes current limitations and solutions, and presents a structured roadmap for integrating emerging technologies, particularly foundation models, to enhance TSS capabilities.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"17 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144850852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}