ACM Computing Surveys (CSUR)最新文献

筛选
英文 中文
Image and Video Coding Techniques for Ultra-low Latency 超低延迟的图像和视频编码技术
ACM Computing Surveys (CSUR) Pub Date : 2022-02-07 DOI: 10.1145/3512342
Jakub Žádník, M. Mäkitalo, Jarno Vanne, P. Jääskeläinen
{"title":"Image and Video Coding Techniques for Ultra-low Latency","authors":"Jakub Žádník, M. Mäkitalo, Jarno Vanne, P. Jääskeläinen","doi":"10.1145/3512342","DOIUrl":"https://doi.org/10.1145/3512342","url":null,"abstract":"The next generation of wireless networks fosters the adoption of latency-critical applications such as XR, connected industry, or autonomous driving. This survey gathers implementation aspects of different image and video coding schemes and discusses their tradeoffs. Standardized video coding technologies such as HEVC or VVC provide a high compression ratio, but their enormous complexity sets the scene for alternative approaches like still image, mezzanine, or texture compression in scenarios with tight resource or latency constraints. Regardless of the coding scheme, we found inter-device memory transfers and the lack of sub-frame coding as limitations of current full-system and software-programmable implementations.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"54 1","pages":"1 - 35"},"PeriodicalIF":0.0,"publicationDate":"2022-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81860407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Security and Privacy in Unified Communication 统一通信中的安全和隐私
ACM Computing Surveys (CSUR) Pub Date : 2022-02-03 DOI: 10.1145/3498335
T. Reisinger, Isabel Wagner, E. Boiten
{"title":"Security and Privacy in Unified Communication","authors":"T. Reisinger, Isabel Wagner, E. Boiten","doi":"10.1145/3498335","DOIUrl":"https://doi.org/10.1145/3498335","url":null,"abstract":"The use of unified communication; video conferencing, audio conferencing, and instant messaging has skyrocketed during the COVID-19 pandemic. However, security and privacy considerations have often been neglected. This article provides a comprehensive survey of security and privacy in Unified Communication (UC). We systematically analyze security and privacy threats and mitigations in a generic UC scenario. Based on this, we analyze security and privacy features of the major UC market leaders, and we draw conclusions on the overall UC landscape. While confidentiality in communication channels is generally well protected through encryption, other privacy properties are mostly lacking on UC platforms.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"18 1","pages":"1 - 36"},"PeriodicalIF":0.0,"publicationDate":"2022-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87697118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Constructive or Optimized: An Overview of Strategies to Design Networks for Time-Critical Applications 建设性或优化:时间关键应用网络设计策略概述
ACM Computing Surveys (CSUR) Pub Date : 2022-02-03 DOI: 10.1145/3501294
Voica Gavriluţ, Aleksander Pruski, M. Berger
{"title":"Constructive or Optimized: An Overview of Strategies to Design Networks for Time-Critical Applications","authors":"Voica Gavriluţ, Aleksander Pruski, M. Berger","doi":"10.1145/3501294","DOIUrl":"https://doi.org/10.1145/3501294","url":null,"abstract":"Distributed systems are pervasive nowadays, being found in different areas, from smart toys to smart factories. As the usage of such systems increases, so does their complexity and design. Therefore, this work aims to overview the methods for designing networks that accommodate time-constrained distributed applications. The work starts with a history of time-aware Ethernet-based protocols. Then, it continues with an overview of the design strategies from the literature. For each research paper, there are presented the model, addressed problem, exploration strategy, and results. Furthermore, for each type of problem are identified the constructive and optimization design strategies. Regarding the results, this work investigates the improvements of reliability, timeliness, and network cost.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"14 1","pages":"1 - 35"},"PeriodicalIF":0.0,"publicationDate":"2022-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87142544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Electrical-Level Attacks on CPUs, FPGAs, and GPUs: Survey and Implications in the Heterogeneous Era 对cpu、fpga和gpu的电级攻击:异构时代的调查和启示
ACM Computing Surveys (CSUR) Pub Date : 2022-02-03 DOI: 10.1145/3498337
Dina G. Mahmoud, Vincent Lenders, Mirjana Stojilović
{"title":"Electrical-Level Attacks on CPUs, FPGAs, and GPUs: Survey and Implications in the Heterogeneous Era","authors":"Dina G. Mahmoud, Vincent Lenders, Mirjana Stojilović","doi":"10.1145/3498337","DOIUrl":"https://doi.org/10.1145/3498337","url":null,"abstract":"Given the need for efficient high-performance computing, computer architectures combining central processing units (CPUs), graphics processing units (GPUs), and field-programmable gate arrays (FPGAs) are currently prevalent. However, each of these components suffers from electrical-level security risks. Moving to heterogeneous systems, with the potential of multitenancy, it is essential to understand and investigate how the security vulnerabilities of individual components may affect the system as a whole. In this work, we provide a survey on the electrical-level attacks on CPUs, FPGAs, and GPUs. Additionally, we discuss whether these attacks can extend to heterogeneous systems and highlight open research directions for ensuring the security of heterogeneous computing systems in the future.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"1 1","pages":"1 - 40"},"PeriodicalIF":0.0,"publicationDate":"2022-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86228795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Understanding Online Privacy—A Systematic Review of Privacy Visualizations and Privacy by Design Guidelines 理解在线隐私——隐私可视化和隐私设计指南的系统回顾
ACM Computing Surveys (CSUR) Pub Date : 2022-02-03 DOI: 10.1145/3502288
Susanne Barth, D. Ionita, P. Hartel
{"title":"Understanding Online Privacy—A Systematic Review of Privacy Visualizations and Privacy by Design Guidelines","authors":"Susanne Barth, D. Ionita, P. Hartel","doi":"10.1145/3502288","DOIUrl":"https://doi.org/10.1145/3502288","url":null,"abstract":"Privacy visualizations help users understand the privacy implications of using an online service. Privacy by Design guidelines provide generally accepted privacy standards for developers of online services. To obtain a comprehensive understanding of online privacy, we review established approaches, distill a unified list of 15 privacy attributes and rank them based on perceived importance by users and privacy experts. We then discuss similarities, explain notable differences, and examine trends in terms of the attributes covered. Finally, we show how our results provide a foundation for user-centric privacy visualizations, inspire best practices for developers, and give structure to privacy policies.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"75 1","pages":"1 - 37"},"PeriodicalIF":0.0,"publicationDate":"2022-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73525928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Survey on Digital Video Stabilization: Concepts, Methods, and Challenges 数字视频防抖研究:概念、方法和挑战
ACM Computing Surveys (CSUR) Pub Date : 2022-02-03 DOI: 10.1145/3494525
M. R. Souza, H. Maia, H. Pedrini
{"title":"Survey on Digital Video Stabilization: Concepts, Methods, and Challenges","authors":"M. R. Souza, H. Maia, H. Pedrini","doi":"10.1145/3494525","DOIUrl":"https://doi.org/10.1145/3494525","url":null,"abstract":"Digital video stabilization is a challenging task that aims to transform a potentially shaky video into a pleasant one by smoothing the camera trajectory. Despite the various works found in the literature addressing this task, their organization and analysis have not yet received much attention. In this work, we present a thorough review of the literature for video stabilization, organized according to a proposed taxonomy. A formal definition for the problem is introduced, along with a brief interpretation in physical terms. We also provide a comprehensive discussion on the main challenges and future trends for this active area.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"1 1","pages":"1 - 37"},"PeriodicalIF":0.0,"publicationDate":"2022-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83430098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Spatial Data Quality in the Internet of Things: Management, Exploitation, and Prospects 物联网空间数据质量:管理、开发与展望
ACM Computing Surveys (CSUR) Pub Date : 2022-02-03 DOI: 10.1145/3498338
Huan Li, Hua Lu, Christian S. Jensen, Bo Tang, M. A. Cheema
{"title":"Spatial Data Quality in the Internet of Things: Management, Exploitation, and Prospects","authors":"Huan Li, Hua Lu, Christian S. Jensen, Bo Tang, M. A. Cheema","doi":"10.1145/3498338","DOIUrl":"https://doi.org/10.1145/3498338","url":null,"abstract":"With the continued deployment of the Internet of Things (IoT), increasing volumes of devices are being deployed that emit massive spatially referenced data. Due in part to the dynamic, decentralized, and heterogeneous architecture of the IoT, the varying and often low quality of spatial IoT data (SID) presents challenges to applications built on top of this data. This survey aims to provide unique insight to practitioners who intend to develop IoT-enabled applications and to researchers who wish to conduct research that relates to data quality in the IoT setting. The survey offers an inventory analysis of major data quality dimensions in SID and covers significant data characteristics and associated quality considerations. The survey summarizes data quality related technologies from both task and technique perspectives. Organizing the technologies from the task perspective, it covers recent progress in SID quality management, encompassing location refinement, uncertainty elimination, outlier removal, fault correction, data integration, and data reduction; and it covers low-quality SID exploitation, encompassing querying, analysis, and decision-making techniques. Finally, the survey covers emerging trends and open issues concerning the quality of SID.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"33 1","pages":"1 - 41"},"PeriodicalIF":0.0,"publicationDate":"2022-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78925617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
LoRa Networking Techniques for Large-scale and Long-term IoT: A Down-to-top Survey 大规模和长期物联网的LoRa网络技术:自上而下的调查
ACM Computing Surveys (CSUR) Pub Date : 2022-02-03 DOI: 10.1145/3494673
Chenning Li, Zhichao Cao
{"title":"LoRa Networking Techniques for Large-scale and Long-term IoT: A Down-to-top Survey","authors":"Chenning Li, Zhichao Cao","doi":"10.1145/3494673","DOIUrl":"https://doi.org/10.1145/3494673","url":null,"abstract":"Low-Power Wide-Area Networks (LPWANs) are an emerging Internet-of-Things (IoT) paradigm, which caters to large-scale and long-term sensory data collection demand. Among the commercialized LPWAN technologies, LoRa (Long Range) attracts much interest from academia and industry due to its open-source physical (PHY) layer and standardized networking stack. In the flourishing LoRa community, many observations and countermeasures have been proposed to understand and improve the performance of LoRa networking in practice. From the perspective of the LoRa networking stack; however, we lack a whole picture to comprehensively understand what has been done or not and reveal what the future trends are. This survey proposes a taxonomy of a two-dimensional (i.e., networking layers, performance metrics) to categorize and compare the cutting-edge LoRa networking techniques. One dimension is the layered structure of the LoRa networking stack. From down to the top, we have the PHY layer, Link layer, Media-access Control (MAC) layer, and Application (App) layer. In each layer, we focus on the three most representative layer-specific research issues for fine-grained categorizing. The other dimension is LoRa networking performance metrics, including range, throughput, energy, and security. We compare different techniques in terms of these metrics and further overview the open issues and challenges, followed by our observed future trends. According to our proposed taxonomy, we aim at clarifying several ways to achieve a more effective LoRa networking stack and find more LoRa applicable scenarios, leading to a brand-new step toward a large-scale and long-term IoT.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"101 1","pages":"1 - 36"},"PeriodicalIF":0.0,"publicationDate":"2022-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90530661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
A Review on Fairness in Machine Learning 机器学习公平性研究综述
ACM Computing Surveys (CSUR) Pub Date : 2022-02-03 DOI: 10.1145/3494672
Dana Pessach, E. Shmueli
{"title":"A Review on Fairness in Machine Learning","authors":"Dana Pessach, E. Shmueli","doi":"10.1145/3494672","DOIUrl":"https://doi.org/10.1145/3494672","url":null,"abstract":"An increasing number of decisions regarding the daily lives of human beings are being controlled by artificial intelligence and machine learning (ML) algorithms in spheres ranging from healthcare, transportation, and education to college admissions, recruitment, provision of loans, and many more realms. Since they now touch on many aspects of our lives, it is crucial to develop ML algorithms that are not only accurate but also objective and fair. Recent studies have shown that algorithmic decision making may be inherently prone to unfairness, even when there is no intention for it. This article presents an overview of the main concepts of identifying, measuring, and improving algorithmic fairness when using ML algorithms, focusing primarily on classification tasks. The article begins by discussing the causes of algorithmic bias and unfairness and the common definitions and measures for fairness. Fairness-enhancing mechanisms are then reviewed and divided into pre-process, in-process, and post-process mechanisms. A comprehensive comparison of the mechanisms is then conducted, toward a better understanding of which mechanisms should be used in different scenarios. The article ends by reviewing several emerging research sub-fields of algorithmic fairness, beyond classification.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"122 1","pages":"1 - 44"},"PeriodicalIF":0.0,"publicationDate":"2022-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88079188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 163
Survey of Approaches for Postprocessing of Static Analysis Alarms 静态分析报警后处理方法综述
ACM Computing Surveys (CSUR) Pub Date : 2022-02-03 DOI: 10.1145/3494521
Tukaram Muske, Alexander Serebrenik
{"title":"Survey of Approaches for Postprocessing of Static Analysis Alarms","authors":"Tukaram Muske, Alexander Serebrenik","doi":"10.1145/3494521","DOIUrl":"https://doi.org/10.1145/3494521","url":null,"abstract":"Static analysis tools have showcased their importance and usefulness in automated detection of defects. However, the tools are known to generate a large number of alarms which are warning messages to the user. The large number of alarms and cost incurred by their manual inspection have been identified as two major reasons for underuse of the tools in practice. To address these concerns plentitude of studies propose postprocessing of alarms: processing the alarms after they are generated. These studies differ greatly in their approaches to postprocess alarms. A comprehensive overview of the postprocessing approaches is, however, missing. In this article, we review 130 primary studies that propose postprocessing of alarms. The studies are collected by combining keywords-based database search and snowballing. We categorize approaches proposed by the collected studies into six main categories: clustering, ranking, pruning, automated elimination of false positives, combination of static and dynamic analyses, and simplification of manual inspection. We provide overview of the categories and sub-categories identified for them, their merits and shortcomings, and different techniques used to implement the approaches. Furthermore, we provide (1) guidelines for selection of the postprocessing techniques by the users/designers of static analysis tools; and (2) directions that can be explored by the researchers.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"18 1","pages":"1 - 39"},"PeriodicalIF":0.0,"publicationDate":"2022-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83632725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信