skip to main content
Volume 56, Issue 8August 2024
Editor:
  • David Atienza,
  • Michela Milano
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:0360-0300
EISSN:1557-7341
Bibliometrics
Skip Table Of Content Section
survey
Distributed Graph Neural Network Training: A Survey
Article No.: 191, Pages 1–39https://doi.org/10.1145/3648358

Graph neural networks (GNNs) are a type of deep learning models that are trained on graphs and have been successfully applied in various domains. Despite the effectiveness of GNNs, it is still challenging for GNNs to efficiently scale to large graphs. As ...

survey
Social Network Analysis: A Survey on Process, Tools, and Application
Article No.: 192, Pages 1–39https://doi.org/10.1145/3648470

Due to the explosive rise of online social networks, social network analysis (SNA) has emerged as a significant academic field in recent years. Understanding and examining social relationships in networks through network analysis opens up numerous ...

survey
A Systematic Literature Review on Maintenance of Software Containers
Article No.: 193, Pages 1–38https://doi.org/10.1145/3645092

Nowadays, cloud computing is gaining tremendous attention to deliver information via the internet. Virtualization plays a major role in cloud computing as it deploys multiple virtual machines on the same physical machine and thus results in improving ...

survey
Open Access
Survey on Haptic Feedback through Sensory Illusions in Interactive Systems
Article No.: 194, Pages 1–39https://doi.org/10.1145/3648353

A growing body of work in human-computer interaction (HCI), particularly work on haptic feedback and haptic displays, relies on sensory illusions, which is a phenomenon investigated in perception research. However, an overview of which illusions are ...

survey
A Survey on Robotic Prosthetics: Neuroprosthetics, Soft Actuators, and Control Strategies
Article No.: 195, Pages 1–44https://doi.org/10.1145/3648355

The field of robotics is a quickly evolving feat of technology that accepts contributions from various genres of science. Neuroscience, Physiology, Chemistry, Material science, Computer science, and the wide umbrella of mechatronics have all ...

survey
Open Access
A Survey on Cyber Resilience: Key Strategies, Research Challenges, and Future Directions
Article No.: 196, Pages 1–48https://doi.org/10.1145/3649218

Cyber resilience has become a major concern for both academia and industry due to the increasing number of data breaches caused by the expanding attack surface of existing IT infrastructure. Cyber resilience refers to an organisation’s ability to prepare ...

survey
Computational Techniques in PET/CT Image Processing for Breast Cancer: A Systematic Mapping Review
Article No.: 197, Pages 1–38https://doi.org/10.1145/3648359

The problem arises from the lack of sufficient and comprehensive information about the necessary computer techniques. These techniques are crucial for developing information systems that assist doctors in diagnosing breast cancer, especially those related ...

survey
Open Access
A Survey on Content Retrieval on the Decentralised Web
Article No.: 198, Pages 1–39https://doi.org/10.1145/3649132

The control, governance, and management of the web have become increasingly centralised, resulting in security, privacy, and censorship concerns. Decentralised initiatives have emerged to address these issues, beginning with decentralised file systems. ...

survey
Scenario-based Adaptations of Differential Privacy: A Technical Survey
Article No.: 199, Pages 1–39https://doi.org/10.1145/3651153

Differential privacy has been a de facto privacy standard in defining privacy and handling privacy preservation. It has had great success in scenarios of local data privacy and statistical dataset privacy. As a primitive definition, standard differential ...

survey
A Comprehensive Review and New Taxonomy on Superpixel Segmentation
Article No.: 200, Pages 1–39https://doi.org/10.1145/3652509

Superpixel segmentation consists of partitioning images into regions composed of similar and connected pixels. Its methods have been widely used in many computer vision applications, since it allows for reducing the workload, removing redundant ...

survey
Mobile Near-infrared Sensing—A Systematic Review on Devices, Data, Modeling, and Applications
Article No.: 201, Pages 1–36https://doi.org/10.1145/3652596

Mobile near-infrared sensing is becoming an increasingly important method in many research and industrial areas. To help consolidate progress in this area, we use the PRISMA guidelines to conduct a systematic review of mobile near-infrared sensing, ...

survey
A Survey on Cyber-Resilience Approaches for Cyber-Physical Systems
Article No.: 202, Pages 1–37https://doi.org/10.1145/3652953

Concerns for the resilience of Cyber-Physical Systems (CPS)s in critical infrastructure are growing. CPS integrate sensing, computation, control, and networking into physical objects and mission-critical services, connecting traditional infrastructure to ...

survey
Epidemic Model-based Network Influential Node Ranking Methods: A Ranking Rationality Perspective
Article No.: 203, Pages 1–39https://doi.org/10.1145/3653296

Existing surveys and reviews on Influential Node Ranking Methods (INRMs) have primarily focused on technical details, neglecting thorough research on verifying the actual influence of these nodes in a network. This oversight may result in erroneous ...

survey
Privacy Preservation of Electronic Health Records in the Modern Era: A Systematic Survey
Article No.: 204, Pages 1–37https://doi.org/10.1145/3653297

Building a secure and privacy-preserving health data sharing framework is a topic of great interest in the healthcare sector, but its success is subject to ensuring the privacy of user data. We clarified the definitions of privacy, confidentiality and ...

survey
A Survey on Software Vulnerability Exploitability Assessment
Article No.: 205, Pages 1–41https://doi.org/10.1145/3648610

Knowing the exploitability and severity of software vulnerabilities helps practitioners prioritize vulnerability mitigation efforts. Researchers have proposed and evaluated many different exploitability assessment methods. The goal of this research is to ...

survey
Rearrangement Distance Problems: An updated survey
Article No.: 206, Pages 1–27https://doi.org/10.1145/3653295

One of the challenges in the Comparative Genomics field is to infer how close two organisms are based on the similarities and differences between their genetic materials. Recent advances in DNA sequencing have made complete genomes increasingly available. ...

survey
A Taxonomy and Survey on Grid-Based Routing Protocols Designed for Wireless Sensor Networks
Article No.: 207, Pages 1–41https://doi.org/10.1145/3653315

Minimization of energy consumption is the main attention of researchers while developing a routing protocol for wireless sensor networks, as sensor nodes are equipped with limited power supply. Virtual topology is an integral part of routing, and grid-...

survey
A Survey on the Densest Subgraph Problem and its Variants
Article No.: 208, Pages 1–40https://doi.org/10.1145/3653298

The Densest Subgraph Problem requires us to find, in a given graph, a subset of vertices whose induced subgraph maximizes a measure of density. The problem has received a great deal of attention in the algorithmic literature since the early 1970s, with ...

survey
Semantic Data Integration and Querying: A Survey and Challenges
Article No.: 209, Pages 1–35https://doi.org/10.1145/3653317

Digital revolution produces massive, heterogeneous and isolated data. These latter remain underutilized, unsuitable for integrated querying and knowledge discovering. Hence the importance of this survey on data integration which identifies challenging ...

survey
From Conventional to Programmable Matter Systems: A Review of Design, Materials, and Technologies
Article No.: 210, Pages 1–26https://doi.org/10.1145/3653671

Programmable matter represents a system of elements whose interactions can be programmed for a certain behavior to emerge (e.g., color, shape) upon suitable commands (e.g., instruction, stimuli) by altering its physical characteristics. Even though its ...

survey
Recovery from Adversarial Attacks in Cyber-physical Systems: Shallow, Deep, and Exploratory Works
Article No.: 211, Pages 1–31https://doi.org/10.1145/3653974

Cyber-physical systems (CPS) have experienced rapid growth in recent decades. However, like any other computer-based systems, malicious attacks evolve mutually, driving CPS to undesirable physical states, and potentially causing catastrophes. Although the ...

survey
Identifying Authorship in Malicious Binaries: Features, Challenges & Datasets
Article No.: 212, Pages 1–36https://doi.org/10.1145/3653973

Attributing a piece of malware to its creator typically requires threat intelligence. Binary attribution increases the level of difficulty as it mostly relies upon the ability to disassemble binaries to obtain authorship-related features. We perform a ...

survey
FairSNA: Algorithmic Fairness in Social Network Analysis
Article No.: 213, Pages 1–45https://doi.org/10.1145/3653711

In recent years, designing fairness-aware methods has received much attention in various domains, including machine learning, natural language processing, and information retrieval. However, in social network analysis (SNA), designing fairness-aware ...

survey
How many FIDO protocols are needed? Analysing the technology, security and compliance
Article No.: 214, Pages 1–51https://doi.org/10.1145/3654661

To overcome the security vulnerabilities caused by weak passwords, thus bridge the gap between user friendly interfaces and advanced security features, the Fast IDentity Online (FIDO) alliance defined a number of authentication protocols. The existing ...

survey
Machine Learning in Metaverse Security: Current Solutions and Future Challenges
Article No.: 215, Pages 1–36https://doi.org/10.1145/3654663

The Metaverse, positioned as the next frontier of the Internet, has the ambition to forge a virtual shared realm characterized by immersion, hyper-spatiotemporal dynamics, and self-sustainability. Recent technological strides in AI, Extended Reality, 6G, ...

Subjects

Comments