Issue Downloads
A Survey on Power Management Techniques for Oversubscription of Multi-Tenant Data Centers
Power management for data centers has been extensively studied in the past 10 years. Most research has focused on owner-operated data centers with less focus on Multi-Tenant Data Centers (MTDC) or colocation data centers. In an MTDC, an operator owns ...
Edge Cloud Offloading Algorithms: Issues, Methods, and Perspectives
Mobile devices supporting the “Internet of Things” often have limited capabilities in computation, battery energy, and storage space, especially to support resource-intensive applications involving virtual reality, augmented reality, multimedia delivery,...
Code Authorship Attribution: Methods and Challenges
Code authorship attribution is the process of identifying the author of a given code. With increasing numbers of malware and advanced mutation techniques, the authors of malware are creating a large number of malware variants. To better deal with this ...
A Survey on Graph Drawing Beyond Planarity
Graph Drawing Beyond Planarity is a rapidly growing research area that classifies and studies geometric representations of nonplanar graphs in terms of forbidden crossing configurations. The aim of this survey is to describe the main research directions ...
Deep Learning Based Recommender System: A Survey and New Perspectives
With the growing volume of online information, recommender systems have been an effective strategy to overcome information overload. The utility of recommender systems cannot be overstated, given their widespread adoption in many web applications, along ...
Graph-Based Skill Acquisition For Reinforcement Learning
In machine learning, Reinforcement Learning (RL) is an important tool for creating intelligent agents that learn solely through experience. One particular subarea within the RL domain that has received great attention is how to define macro-actions, ...
Recent Advances in Transfer Learning for Cross-Dataset Visual Recognition: A Problem-Oriented Perspective
This article takes a problem-oriented perspective and presents a comprehensive review of transfer-learning methods, both shallow and deep, for cross-dataset visual recognition. Specifically, it categorises the cross-dataset recognition into 17 problems ...
Brownout Approach for Adaptive Management of Resources and Applications in Cloud Computing Systems: A Taxonomy and Future Directions
Cloud computing has been regarded as an emerging approach to provisioning resources and managing applications. It provides attractive features, such as an on-demand model, scalability enhancement, and management cost reduction. However, cloud computing ...
Conceptual Representations for Computational Concept Creation
- Ping Xiao,
- Hannu Toivonen,
- Oskar Gross,
- Amílcar Cardoso,
- João Correia,
- Penousal Machado,
- Pedro Martins,
- Hugo Goncalo Oliveira,
- Rahul Sharma,
- Alexandre Miguel Pinto,
- Alberto Díaz,
- Virginia Francisco,
- Pablo Gervás,
- Raquel Hervás,
- Carlos León,
- Jamie Forth,
- Matthew Purver,
- Geraint A. Wiggins,
- Dragana Miljković,
- Vid Podpečan,
- Senja Pollak,
- Jan Kralj,
- Martin Žnidaršič,
- Marko Bohanec,
- Nada Lavrač,
- Tanja Urbančič,
- Frank Van Der Velde,
- Stuart Battersby
Computational creativity seeks to understand computational mechanisms that can be characterized as creative. The creation of new concepts is a central challenge for any creative system. In this article, we outline different approaches to computational ...
How Generative Adversarial Networks and Their Variants Work: An Overview
Generative Adversarial Networks (GANs) have received wide attention in the machine learning field for their potential to learn high-dimensional, complex real data distribution. Specifically, they do not rely on any assumptions about the distribution and ...
Sustainable Offloading in Mobile Cloud Computing: Algorithmic Design and Implementation
Mobile Cloud Computing (MCC) has been extensively explored to be applied as a vital tool to enhance the capabilities of mobile devices, increasing computing power, expanding storage capacity, and prolonging battery life. Offloading works as the ...
An Exhaustive Survey on Security Concerns and Solutions at Different Components of Virtualization
Virtualization is a key enabler of various modern computing technologies. However, it brings additional vulnerabilities that can be exploited to affect the availability, integrity, and confidentiality of the underlying resources and services. The ...
A Survey on Bayesian Nonparametric Learning
Bayesian (machine) learning has been playing a significant role in machine learning for a long time due to its particular ability to embrace uncertainty, encode prior knowledge, and endow interpretability. On the back of Bayesian learning’s great ...
Probabilistic Worst-Case Timing Analysis: Taxonomy and Comprehensive Survey
- Francisco J. Cazorla,
- Leonidas Kosmidis,
- Enrico Mezzetti,
- Carles Hernandez,
- Jaume Abella,
- Tullio Vardanega
The unabated increase in the complexity of the hardware and software components of modern embedded real-time systems has given momentum to a host of research in the use of probabilistic and statistical techniques for timing analysis. In the last few ...
Modeling Information Retrieval by Formal Logic: A Survey
Several mathematical frameworks have been used to model the information retrieval (IR) process, among them, formal logics. Logic-based IR models upgrade the IR process from document-query comparison to an inference process, in which both documents and ...
Lp Samplers and Their Applications: A Survey
The notion of Lp sampling, and corresponding algorithms known as Lp samplers, has found a wide range of applications in the design of data stream algorithms and beyond. In this survey, we present some of the core algorithms to achieve this sampling ...
Urban Computing Leveraging Location-Based Social Network Data: A Survey
- Thiago H. Silva,
- Aline Carneiro Viana,
- Fabrício Benevenuto,
- Leandro Villas,
- Juliana Salles,
- Antonio Loureiro,
- Daniele Quercia
Urban computing is an emerging area of investigation in which researchers study cities using digital data. Location-Based Social Networks (LBSNs) generate one specific type of digital data that offers unprecedented geographic and temporal resolutions. ...
The Real-Time Linux Kernel: A Survey on PREEMPT_RT
The increasing functional and nonfunctional requirements of real-time applications, the advent of mixed criticality computing, and the necessity of reducing costs are leading to an increase in the interest for employing COTS hardware in real-time ...
Trust Evaluation in Cross-Cloud Federation: Survey and Requirement Analysis
Cross-Cloud Federation (CCF) is beneficial for heterogeneous Cloud Service Providers (CSPs) for leasing additional resources from each other. Despite the benefits of on-demand scalability and enhanced service footprints for better service quality, the ...
Survey on Brain-Computer Interface: An Emerging Computational Intelligence Paradigm
A brain-computer interface (BCI) provides a way to develop interaction between a brain and a computer. The communication is developed as a result of neural responses generated in the brain because of motor movements or cognitive activities. The means of ...
A Survey on Various Threats and Current State of Security in Android Platform
The advent of the Android system has brought smartphone technology to the doorsteps of the masses. The latest technologies have made it affordable for every section of the society. However, the emergence of the Android platform has also escalated the ...
Identifying Top-k Nodes in Social Networks: A Survey
Top-k nodes are the important actors for a subjectively determined topic in a social network. To some extent, a topic is taken as a ranking criteria for identifying top-k nodes. Within a viral marketing network, subjectively selected topics can include ...