首页 > 最新文献

ACM Computing Surveys最新文献

英文 中文
A Meta-Study of Software-Change Intentions 软件变更意向的元研究
IF 16.6 1区 计算机科学 Q1 Mathematics Pub Date : 2024-04-25 DOI: 10.1145/3661484
Jacob Krüger, Yi Li, Kirill Lossev, Chenguang Zhu, Marsha Chechik, Thorsten Berger, Julia Rubin

Every software system undergoes changes, for example, to add new features, fix bugs, or refactor code. The importance of understanding software changes has been widely recognized, resulting in various techniques and studies, for instance, on change-impact analysis or classifying developers’ activities. Since changes are triggered by developers’ intentions—something they plan or want to change in the system, many researchers have studied intentions behind changes. While there appears to be a consensus among software-engineering researchers and practitioners that knowing the intentions behind software changes is important, it is not clear how developers can actually benefit from this knowledge. In fact, there is no consolidated, recent overview of the state-of-the-art on software-change intentions (SCIs) and their relevance for software engineering. We present a meta-study of 122 publications, which we used to derive a categorization of SCIs; and to discuss motivations, evidence, and techniques relating to SCIs. Unfortunately, we found that individual pieces of research are often disconnected from each other because a common understanding is missing. Similarly, some publications showcase the potential of knowing SCIs, but more substantial research to understand the practical benefits of knowing SCIs is needed. Our contributions can help researchers and practitioners improve their understanding of SCIs and how SCIs can aid software engineering tasks.

每个软件系统都会发生变化,例如,增加新功能、修复错误或重构代码。理解软件变更的重要性已得到广泛认可,并由此产生了各种技术和研究,例如变更影响分析或开发人员活动分类。由于变更是由开发人员的意图--他们计划或希望在系统中改变的东西--引发的,因此许多研究人员对变更背后的意图进行了研究。虽然软件工程研究人员和从业人员似乎已经达成共识,认为了解软件变更背后的意图非常重要,但并不清楚开发人员如何才能真正从这些知识中获益。事实上,关于软件变更意图(SCIs)及其与软件工程的相关性,目前还没有最新的综合概述。我们对 122 篇出版物进行了荟萃研究,从中得出了 SCIs 的分类,并讨论了与 SCIs 相关的动机、证据和技术。遗憾的是,我们发现,由于缺乏共同的理解,单项研究往往相互脱节。同样,一些出版物展示了了解 SCI 的潜力,但还需要更多的实质性研究来了解了解 SCI 的实际好处。我们的贡献可以帮助研究人员和从业人员更好地理解 SCI,以及 SCI 如何帮助软件工程任务。
{"title":"A Meta-Study of Software-Change Intentions","authors":"Jacob Krüger, Yi Li, Kirill Lossev, Chenguang Zhu, Marsha Chechik, Thorsten Berger, Julia Rubin","doi":"10.1145/3661484","DOIUrl":"https://doi.org/10.1145/3661484","url":null,"abstract":"<p>Every software system undergoes changes, for example, to add new features, fix bugs, or refactor code. The importance of understanding software changes has been widely recognized, resulting in various techniques and studies, for instance, on change-impact analysis or classifying developers’ activities. Since changes are triggered by developers’ intentions—something they plan or want to change in the system, many researchers have studied intentions behind changes. While there appears to be a consensus among software-engineering researchers and practitioners that knowing the intentions behind software changes is important, it is not clear how developers can actually benefit from this knowledge. In fact, there is no consolidated, recent overview of the state-of-the-art on software-change intentions (SCIs) and their relevance for software engineering. We present a meta-study of 122 publications, which we used to derive a categorization of SCIs; and to discuss motivations, evidence, and techniques relating to SCIs. Unfortunately, we found that individual pieces of research are often disconnected from each other because a common understanding is missing. Similarly, some publications showcase the potential of knowing SCIs, but more substantial research to understand the practical benefits of knowing SCIs is needed. Our contributions can help researchers and practitioners improve their understanding of SCIs and how SCIs can aid software engineering tasks.</p>","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":16.6,"publicationDate":"2024-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140642472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Hybrid-Optimization Video Coding 实现混合优化视频编码
IF 16.6 1区 计算机科学 Q1 Mathematics Pub Date : 2024-04-24 DOI: 10.1145/3652148
Shuai Huo, Dong Liu, Haotian Zhang, Li Li, Siwei Ma, Feng Wu, Wen Gao

Video coding that pursues the highest compression efficiency is the art of computing for rate-distortion optimization. The optimization has been approached in different ways, exemplified by two typical frameworks: block-based hybrid video coding and end-to-end learned video coding. The block-based hybrid framework encompasses more and more coding modes that are available at the decoder side; an encoder tries to search for the optimal coding mode for each block to be coded. This is an online, discrete, search-based optimization strategy. The end-to-end learned framework embraces more and more sophisticated neural networks; the network parameters are learned from a collection of videos, typically using gradient descent-based methods. This is an offline, continuous, numerical optimization strategy. Having analyzed these two strategies, both conceptually and with concrete schemes, this paper suggests investigating hybrid-optimization video coding, that is to combine online and offline, discrete and continuous, search-based and numerical optimization. For instance, we propose a hybrid-optimization video coding scheme, where the decoder consists of trained neural networks and supports several coding modes, and the encoder adopts both numerical and search-based algorithms for the online optimization. Our scheme achieves promising compression efficiency on par with H.265/HM for the random-access configuration.

追求最高压缩效率的视频编码是计算速率-失真优化的艺术。优化的方法多种多样,两个典型的框架就是例证:基于块的混合视频编码和端到端学习视频编码。基于块的混合框架包括越来越多的解码器侧可用的编码模式;编码器尝试为每个待编码的块搜索最佳编码模式。这是一种在线、离散、基于搜索的优化策略。端到端学习框架包含越来越复杂的神经网络;网络参数从视频集合中学习,通常使用基于梯度下降的方法。这是一种离线、连续的数值优化策略。通过对这两种策略的概念和具体方案进行分析,本文建议研究混合优化视频编码,即结合在线和离线、离散和连续、基于搜索和数值优化。例如,我们提出了一种混合优化视频编码方案,其中解码器由训练有素的神经网络组成,支持多种编码模式,编码器采用数值算法和基于搜索的算法进行在线优化。在随机访问配置下,我们的方案有望实现与 H.265/HM 相当的压缩效率。
{"title":"Towards Hybrid-Optimization Video Coding","authors":"Shuai Huo, Dong Liu, Haotian Zhang, Li Li, Siwei Ma, Feng Wu, Wen Gao","doi":"10.1145/3652148","DOIUrl":"https://doi.org/10.1145/3652148","url":null,"abstract":"<p>Video coding that pursues the highest compression efficiency is the art of computing for rate-distortion optimization. The optimization has been approached in different ways, exemplified by two typical frameworks: block-based hybrid video coding and end-to-end learned video coding. The block-based hybrid framework encompasses more and more coding modes that are available at the decoder side; an encoder tries to search for the optimal coding mode for each block to be coded. This is an online, discrete, search-based optimization strategy. The end-to-end learned framework embraces more and more sophisticated neural networks; the network parameters are learned from a collection of videos, typically using gradient descent-based methods. This is an offline, continuous, numerical optimization strategy. Having analyzed these two strategies, both conceptually and with concrete schemes, this paper suggests investigating <i>hybrid</i>-optimization video coding, that is to combine online and offline, discrete and continuous, search-based and numerical optimization. For instance, we propose a hybrid-optimization video coding scheme, where the decoder consists of trained neural networks and supports several coding modes, and the encoder adopts both numerical and search-based algorithms for the online optimization. Our scheme achieves promising compression efficiency on par with H.265/HM for the random-access configuration.</p>","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":16.6,"publicationDate":"2024-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140639716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mix-Zones as an Effective Privacy Enhancing Technique in Mobile and Vehicular Ad-hoc Networks 混合区是移动和车载 Ad-hoc 网络中一种有效的隐私增强技术
IF 16.6 1区 计算机科学 Q1 Mathematics Pub Date : 2024-04-22 DOI: 10.1145/3659576
Nirupama Ravi, C. M. Krishna, Israel Koren

Intelligent Transportation Systems (ITS) promise significant increases in throughput and reductions in trip delay. ITS makes extensive use of Connected and Autonomous Vehicles (CAV) frequently broadcasting location, speed, and intention information. However, with such extensive communication comes the risk to privacy. Preserving privacy while still exchanging vehicle state information has been recognized as an important problem.

Mix zones have emerged as a potentially effective way of protecting user privacy in ITS. CAVs are assigned pseudonyms to mask their identity; a mix zone is an area where CAVs can change their pseudonyms to resist being tracked.

In order to be effective, mix zone placement must take account of traffic flows. Also, since a mix zone can degrade throughput, mix zones must be used sparingly. Determining the number and placement of mix zones is a difficult dynamic optimization problem. This paper outlines the various approaches recently taken by researchers to deal with this problem.

智能交通系统(ITS)有望显著提高吞吐量并减少行程延误。智能交通系统广泛使用互联和自动驾驶车辆(CAV),经常广播位置、速度和意图信息。然而,如此广泛的通信也带来了隐私风险。在交换车辆状态信息的同时保护隐私已被视为一个重要问题。混合区作为一种在智能交通系统中保护用户隐私的潜在有效方法应运而生。为 CAV 分配假名以掩盖其身份;混合区是 CAV 可以更改其假名以防止被跟踪的区域。混合区的布置必须考虑交通流量,这样才能有效。此外,由于混合区会降低吞吐量,因此必须慎用混合区。确定混合区的数量和位置是一个困难的动态优化问题。本文概述了研究人员最近为解决这一问题而采取的各种方法。
{"title":"Mix-Zones as an Effective Privacy Enhancing Technique in Mobile and Vehicular Ad-hoc Networks","authors":"Nirupama Ravi, C. M. Krishna, Israel Koren","doi":"10.1145/3659576","DOIUrl":"https://doi.org/10.1145/3659576","url":null,"abstract":"<p>Intelligent Transportation Systems (ITS) promise significant increases in throughput and reductions in trip delay. ITS makes extensive use of Connected and Autonomous Vehicles (CAV) frequently broadcasting location, speed, and intention information. However, with such extensive communication comes the risk to privacy. Preserving privacy while still exchanging vehicle state information has been recognized as an important problem. </p><p>Mix zones have emerged as a potentially effective way of protecting user privacy in ITS. CAVs are assigned pseudonyms to mask their identity; a mix zone is an area where CAVs can change their pseudonyms to resist being tracked. </p><p>In order to be effective, mix zone placement must take account of traffic flows. Also, since a mix zone can degrade throughput, mix zones must be used sparingly. Determining the number and placement of mix zones is a difficult dynamic optimization problem. This paper outlines the various approaches recently taken by researchers to deal with this problem.</p>","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":16.6,"publicationDate":"2024-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140632255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Resilience in Information Sharing on Networks: Taxonomy and Applied Techniques 网络信息共享中的复原力调查:分类学与应用技术
IF 16.6 1区 计算机科学 Q1 Mathematics Pub Date : 2024-04-20 DOI: 10.1145/3659944
Agnaldo de Souza Batista, Aldri L. dos Santos

Information sharing is vital in any communication network environment to enable network operating services take decisions based on the information collected by several deployed computing devices. The various networks that compose cyberspace, as Internet-of-Things (IoT) ecosystems, have significantly increased the need to constantly share information, which is often subject to disturbances. In this sense, the damage of anomalous operations boosted researches aimed at improving resilience to information sharing. Hence, in this survey, we present a systematization of knowledge about scientific efforts for achieving resilience to information sharing on networks. First, we introduce a taxonomy to organize the strategies applied to attain resilience to information sharing on networks, offering brief concepts about network anomalies and connectivity services. Then, we detail the taxonomy in the face of malicious threats, network disruptions, and performance issues, discussing the presented solutions. Next, we analyze the techniques existing in the literature to foster resilience to information exchanged on communication networks to verify their benefits and constraints. Throughout the text, we highlight and argue issues that restrain the use of these techniques during the design and runtime.

信息共享在任何通信网络环境中都至关重要,它能使网络运营服务根据多台部署的计算设备收集到的信息做出决策。作为物联网(IoT)生态系统,组成网络空间的各种网络大大增加了不断共享信息的需求,而这些信息往往会受到干扰。从这个意义上说,异常操作的破坏推动了旨在提高信息共享弹性的研究。因此,在本调查报告中,我们系统地介绍了为实现网络信息共享的弹性而做出的科学努力。首先,我们介绍了一种分类法,以整理实现网络信息共享复原力的策略,并提供了有关网络异常和连接服务的简要概念。然后,面对恶意威胁、网络中断和性能问题,我们详细介绍了该分类法,并讨论了提出的解决方案。接下来,我们分析了文献中现有的促进通信网络信息交换弹性的技术,以验证其优势和限制因素。在全文中,我们强调并论证了在设计和运行过程中限制使用这些技术的问题。
{"title":"A Survey on Resilience in Information Sharing on Networks: Taxonomy and Applied Techniques","authors":"Agnaldo de Souza Batista, Aldri L. dos Santos","doi":"10.1145/3659944","DOIUrl":"https://doi.org/10.1145/3659944","url":null,"abstract":"<p>Information sharing is vital in any communication network environment to enable network operating services take decisions based on the information collected by several deployed computing devices. The various networks that compose cyberspace, as Internet-of-Things (IoT) ecosystems, have significantly increased the need to constantly share information, which is often subject to disturbances. In this sense, the damage of anomalous operations boosted researches aimed at improving resilience to information sharing. Hence, in this survey, we present a systematization of knowledge about scientific efforts for achieving resilience to information sharing on networks. First, we introduce a taxonomy to organize the strategies applied to attain resilience to information sharing on networks, offering brief concepts about network anomalies and connectivity services. Then, we detail the taxonomy in the face of malicious threats, network disruptions, and performance issues, discussing the presented solutions. Next, we analyze the techniques existing in the literature to foster resilience to information exchanged on communication networks to verify their benefits and constraints. Throughout the text, we highlight and argue issues that restrain the use of these techniques during the design and runtime.</p>","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":16.6,"publicationDate":"2024-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140621594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applying Generative Machine Learning to Intrusion Detection: A Systematic Mapping Study and Review 将生成式机器学习应用于入侵检测:系统映射研究与回顾
IF 16.6 1区 计算机科学 Q1 Mathematics Pub Date : 2024-04-20 DOI: 10.1145/3659575
James Halvorsen, Clemente Izurieta, Haipeng Cai, Assefaw H. Gebremedhin

Intrusion Detection Systems (IDSs) are an essential element of modern cyber defense, alerting users to when and where cyber-attacks occur. Machine learning can enable IDSs to further distinguish between benign and malicious behaviors, but it comes with several challenges, including lack of quality training data and high false positive rates. Generative Machine Learning Models (GMLMs) can help overcome these challenges. This paper offers an in-depth exploration of GMLMs’ application to intrusion detection. It gives: (1) a systematic mapping study of research at the intersection of GMLMs and IDSs, and (2) a detailed review providing insights and directions for future research.

入侵检测系统(IDS)是现代网络防御的重要组成部分,可在网络攻击发生的时间和地点向用户发出警报。机器学习可以使 IDS 进一步区分良性和恶意行为,但它也面临着一些挑战,包括缺乏高质量的训练数据和高误报率。生成式机器学习模型(GMLM)有助于克服这些挑战。本文深入探讨了 GMLM 在入侵检测中的应用。它给出了:(1) 对 GMLM 和 IDS 交叉领域研究的系统性映射研究;(2) 提供见解和未来研究方向的详细综述。
{"title":"Applying Generative Machine Learning to Intrusion Detection: A Systematic Mapping Study and Review","authors":"James Halvorsen, Clemente Izurieta, Haipeng Cai, Assefaw H. Gebremedhin","doi":"10.1145/3659575","DOIUrl":"https://doi.org/10.1145/3659575","url":null,"abstract":"<p>Intrusion Detection Systems (IDSs) are an essential element of modern cyber defense, alerting users to when and where cyber-attacks occur. Machine learning can enable IDSs to further distinguish between benign and malicious behaviors, but it comes with several challenges, including lack of quality training data and high false positive rates. Generative Machine Learning Models (GMLMs) can help overcome these challenges. This paper offers an in-depth exploration of GMLMs’ application to intrusion detection. It gives: (1) a systematic mapping study of research at the intersection of GMLMs and IDSs, and (2) a detailed review providing insights and directions for future research.</p>","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":16.6,"publicationDate":"2024-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140621494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Qualitative Approaches to Voice UX 语音用户体验的定性方法
IF 16.6 1区 计算机科学 Q1 Mathematics Pub Date : 2024-04-20 DOI: 10.1145/3658666
Katie Seaborn, Jacqueline Urakami, Peter Pennefather, Norihisa P. Miyake

Voice is a natural mode of expression offered by modern computer-based systems. Qualitative perspectives on voice-based user experiences (voice UX) offer rich descriptions of complex interactions that numbers alone cannot fully represent. We conducted a systematic review of the literature on qualitative approaches to voice UX, capturing the nature of this body of work in a systematic map and offering a qualitative synthesis of findings. We highlight the benefits of qualitative methods for voice UX research, identify opportunities for increasing rigour in methods and outcomes, and distill patterns of experience across a diversity of devices and modes of qualitative praxis.

语音是现代计算机系统提供的一种自然表达方式。基于语音的用户体验(语音用户体验)的定性视角为复杂的交互提供了丰富的描述,而这些描述仅靠数字是无法完全体现的。我们对有关语音用户体验定性方法的文献进行了系统回顾,以系统地图的形式捕捉了这一工作的本质,并对研究结果进行了定性综合。我们强调了定性方法在语音用户体验研究中的优势,确定了提高方法和结果严谨性的机会,并提炼了各种设备和定性实践模式的经验模式。
{"title":"Qualitative Approaches to Voice UX","authors":"Katie Seaborn, Jacqueline Urakami, Peter Pennefather, Norihisa P. Miyake","doi":"10.1145/3658666","DOIUrl":"https://doi.org/10.1145/3658666","url":null,"abstract":"<p>Voice is a natural mode of expression offered by modern computer-based systems. Qualitative perspectives on voice-based user experiences (voice UX) offer rich descriptions of complex interactions that numbers alone cannot fully represent. We conducted a systematic review of the literature on qualitative approaches to voice UX, capturing the nature of this body of work in a systematic map and offering a qualitative synthesis of findings. We highlight the benefits of qualitative methods for voice UX research, identify opportunities for increasing rigour in methods and outcomes, and distill patterns of experience across a diversity of devices and modes of qualitative praxis.</p>","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":16.6,"publicationDate":"2024-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140621509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Topology-aware Federated Learning in Edge Computing: A Comprehensive Survey 边缘计算中的拓扑感知联合学习:全面调查
IF 16.6 1区 计算机科学 Q1 Mathematics Pub Date : 2024-04-18 DOI: 10.1145/3659205
Jiajun Wu, Fan Dong, Henry Leung, Zhuangdi Zhu, Jiayu Zhou, Steve Drew

The ultra-low latency requirements of 5G/6G applications and privacy constraints call for distributed machine learning systems to be deployed at the edge. With its simple yet effective approach, federated learning (FL) is a natural solution for massive user-owned devices in edge computing with distributed and private training data. FL methods based on FedAvg typically follow a naive star topology, ignoring the heterogeneity and hierarchy of the volatile edge computing architectures and topologies in reality. Several other network topologies exist and can address the limitations and bottlenecks of the star topology. This motivates us to survey network topology-related FL solutions. In this paper, we conduct a comprehensive survey of the existing FL works focusing on network topologies. After a brief overview of FL and edge computing networks, we discuss various edge network topologies as well as their advantages and disadvantages. Lastly, we discuss the remaining challenges and future works for applying FL to topology-specific edge networks.

5G/6G 应用的超低延迟要求和隐私限制要求在边缘部署分布式机器学习系统。联盟学习(FL)方法简单而有效,是边缘计算中大规模用户自有设备与分布式私有训练数据的自然解决方案。基于 FedAvg 的联合学习方法通常采用天真的星形拓扑结构,忽略了现实中多变的边缘计算架构和拓扑结构的异质性和层次性。现有的几种其他网络拓扑结构可以解决星形拓扑结构的局限性和瓶颈。这促使我们调查与网络拓扑相关的 FL 解决方案。在本文中,我们将对现有的 FL 作品进行全面调查,重点关注网络拓扑结构。在简要概述 FL 和边缘计算网络之后,我们讨论了各种边缘网络拓扑结构及其优缺点。最后,我们讨论了将 FL 应用于特定拓扑边缘网络的其余挑战和未来工作。
{"title":"Topology-aware Federated Learning in Edge Computing: A Comprehensive Survey","authors":"Jiajun Wu, Fan Dong, Henry Leung, Zhuangdi Zhu, Jiayu Zhou, Steve Drew","doi":"10.1145/3659205","DOIUrl":"https://doi.org/10.1145/3659205","url":null,"abstract":"<p>The ultra-low latency requirements of 5G/6G applications and privacy constraints call for distributed machine learning systems to be deployed at the edge. With its simple yet effective approach, federated learning (FL) is a natural solution for massive user-owned devices in edge computing with distributed and private training data. FL methods based on FedAvg typically follow a naive star topology, ignoring the heterogeneity and hierarchy of the volatile edge computing architectures and topologies in reality. Several other network topologies exist and can address the limitations and bottlenecks of the star topology. This motivates us to survey network topology-related FL solutions. In this paper, we conduct a comprehensive survey of the existing FL works focusing on network topologies. After a brief overview of FL and edge computing networks, we discuss various edge network topologies as well as their advantages and disadvantages. Lastly, we discuss the remaining challenges and future works for applying FL to topology-specific edge networks.</p>","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":16.6,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140607945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A challenge-based survey of e-recruitment recommendation systems 基于挑战的电子招聘推荐系统调查
IF 16.6 1区 计算机科学 Q1 Mathematics Pub Date : 2024-04-18 DOI: 10.1145/3659942
Yoosof Mashayekhi, Nan Li, Bo Kang, Jefrey Lijffijt, Tijl De Bie

E-recruitment recommendation systems recommend jobs to job seekers and job seekers to recruiters. The recommendations are generated based on the suitability of job seekers for positions and on job seekers’ and recruiters’ preferences. Therefore, e-recruitment recommendation systems may greatly impact people’s careers. Moreover, by affecting the hiring processes of the companies, e-recruitment recommendation systems play an important role in shaping the competitive edge of companies. Hence, it seems prudent to consider what (unique) challenges there are for recommendation systems in e-recruitment. Existing surveys on this topic discuss past studies from the algorithmic perspective, e.g., by categorizing them into collaborative filtering, content-based, and hybrid methods. This survey, instead, takes a complementary, challenge-based approach. We believe this is more practical for developers facing a concrete e-recruitment design task with a specific set of challenges, and also for researchers that look for impactful research projects in this domain. In this survey, we first identify the main challenges in the e-recruitment recommendation research. Next, we discuss how those challenges have been studied in the literature. Finally, we provide future research directions that we consider most promising in the e-recruitment recommendation domain.

电子招聘推荐系统向求职者推荐工作,向招聘者推荐求职者。这些推荐是根据求职者对职位的适合程度以及求职者和招聘者的偏好生成的。因此,电子招聘推荐系统可能会极大地影响人们的职业生涯。此外,通过影响企业的招聘流程,电子招聘推荐系统在塑造企业的竞争优势方面发挥着重要作用。因此,考虑电子招聘推荐系统面临哪些(独特的)挑战似乎是明智之举。关于这一主题的现有调查报告从算法的角度讨论了过去的研究,例如将其分为协同过滤法、基于内容的方法和混合方法。而本调查则采用了一种基于挑战的补充方法。我们认为,对于面临具体电子招聘设计任务和一系列特定挑战的开发人员,以及在该领域寻找有影响力研究项目的研究人员来说,这种方法更为实用。在本调查中,我们首先确定了电子招聘推荐研究中的主要挑战。接下来,我们将讨论文献中是如何研究这些挑战的。最后,我们提供了我们认为在电子招聘推荐领域最有前景的未来研究方向。
{"title":"A challenge-based survey of e-recruitment recommendation systems","authors":"Yoosof Mashayekhi, Nan Li, Bo Kang, Jefrey Lijffijt, Tijl De Bie","doi":"10.1145/3659942","DOIUrl":"https://doi.org/10.1145/3659942","url":null,"abstract":"<p>E-recruitment recommendation systems recommend jobs to job seekers and job seekers to recruiters. The recommendations are generated based on the suitability of job seekers for positions and on job seekers’ and recruiters’ preferences. Therefore, e-recruitment recommendation systems may greatly impact people’s careers. Moreover, by affecting the hiring processes of the companies, e-recruitment recommendation systems play an important role in shaping the competitive edge of companies. Hence, it seems prudent to consider what (unique) challenges there are for recommendation systems in e-recruitment. Existing surveys on this topic discuss past studies from the algorithmic perspective, e.g., by categorizing them into collaborative filtering, content-based, and hybrid methods. This survey, instead, takes a complementary, challenge-based approach. We believe this is more practical for developers facing a concrete e-recruitment design task with a specific set of challenges, and also for researchers that look for impactful research projects in this domain. In this survey, we first identify the main challenges in the e-recruitment recommendation research. Next, we discuss how those challenges have been studied in the literature. Finally, we provide future research directions that we consider most promising in the e-recruitment recommendation domain.</p>","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":16.6,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140607874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deceived by Immersion: A Systematic Analysis of Deceptive Design in Extended Reality 沉浸式欺骗:对扩展现实中欺骗性设计的系统分析
IF 16.6 1区 计算机科学 Q1 Mathematics Pub Date : 2024-04-17 DOI: 10.1145/3659945
Hilda Hadan, Lydia Choong, Leah Zhang-Kennedy, Lennart E. Nacke

The well-established deceptive design literature has focused on conventional user interfaces. With the rise of extended reality (XR), understanding deceptive design’s unique manifestations in this immersive domain is crucial. However, existing research lacks a full, cross-disciplinary analysis that analyzes how XR technologies enable new forms of deceptive design. Our study reviews the literature on deceptive design in XR environments. We use thematic synthesis to identify key themes. We found that XR’s immersive capabilities and extensive data collection enable subtle and powerful manipulation strategies. We identified eight themes outlining these strategies and discussed existing countermeasures. Our findings show the unique risks of deceptive design in XR, highlighting implications for researchers, designers, and policymakers. We propose future research directions that explore unintentional deceptive design, data-driven manipulation solutions, user education, and the link between ethical design and policy regulations.

成熟的欺骗性设计文献主要集中在传统的用户界面上。随着扩展现实(XR)的兴起,了解欺骗性设计在这一沉浸式领域的独特表现至关重要。然而,现有的研究缺乏全面、跨学科的分析,无法分析 XR 技术是如何实现新形式的欺骗性设计的。我们的研究回顾了有关 XR 环境中欺骗性设计的文献。我们采用主题综合法来确定关键主题。我们发现,XR 的沉浸式功能和广泛的数据收集使得微妙而强大的操纵策略成为可能。我们确定了概述这些策略的八个主题,并讨论了现有的应对措施。我们的研究结果表明了 XR 中欺骗性设计的独特风险,强调了对研究人员、设计人员和政策制定者的影响。我们提出了未来的研究方向,以探索无意的欺骗性设计、数据驱动的操纵解决方案、用户教育以及道德设计与政策法规之间的联系。
{"title":"Deceived by Immersion: A Systematic Analysis of Deceptive Design in Extended Reality","authors":"Hilda Hadan, Lydia Choong, Leah Zhang-Kennedy, Lennart E. Nacke","doi":"10.1145/3659945","DOIUrl":"https://doi.org/10.1145/3659945","url":null,"abstract":"<p>The well-established deceptive design literature has focused on conventional user interfaces. With the rise of extended reality (XR), understanding deceptive design’s unique manifestations in this immersive domain is crucial. However, existing research lacks a full, cross-disciplinary analysis that analyzes how XR technologies enable new forms of deceptive design. Our study reviews the literature on deceptive design in XR environments. We use thematic synthesis to identify key themes. We found that XR’s immersive capabilities and extensive data collection enable subtle and powerful manipulation strategies. We identified eight themes outlining these strategies and discussed existing countermeasures. Our findings show the unique risks of deceptive design in XR, highlighting implications for researchers, designers, and policymakers. We propose future research directions that explore unintentional deceptive design, data-driven manipulation solutions, user education, and the link between ethical design and policy regulations.</p>","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":16.6,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140603974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integration of Sensing, Communication and Computing for Metaverse: A Survey 元宇宙的传感、通信和计算集成:调查
IF 16.6 1区 计算机科学 Q1 Mathematics Pub Date : 2024-04-17 DOI: 10.1145/3659946
Xiaojie Wang, Qi Guo, Zhaolong Ning, Lei Guo, Guoyin Wang, Xinbo Gao, Yan Zhang

The metaverse is an Artificial Intelligence (AI)-generated virtual world, in which people can game, work, learn and socialize. The realization of metaverse not only requires a large amount of computing resources to realize the rendering of the virtual world, but also requires communication resources to realize real-time transmission of massive data to ensure a good user experience. The metaverse is currently moving from fiction to reality with the development of advanced technologies represented by AI, blockchain, extended reality and Digital Twins (DT). However, due to the shortage of communication as well as computing resources, how to realize secure and efficient data interaction between the virtual and the real is an important issue for the metaverse. In this article, we first discuss the characteristics and architecture of the metaverse, and introduce its enabling technologies. To cope with the conflict between limited resources and user demands, the article next introduces an Integrated Sensing, Communication, and Computing (SCC) technology, and describes its basic principles and related characteristics of SCC. After that, solutions based on SCC in the metaverse scenarios are summarized and relevant lessons are summarized. Finally, we discuss some research challenges and open issues.

元宇宙是人工智能(AI)生成的虚拟世界,人们可以在其中游戏、工作、学习和社交。元世界的实现不仅需要大量的计算资源来实现虚拟世界的渲染,还需要通信资源来实现海量数据的实时传输,以保证良好的用户体验。目前,随着以人工智能、区块链、扩展现实和数字双胞胎(DT)为代表的先进技术的发展,元宇宙正在从虚构走向现实。然而,由于通信以及计算资源的短缺,如何实现虚拟与现实之间安全、高效的数据交互是元宇宙面临的重要问题。本文首先讨论了元宇宙的特点和架构,并介绍了其使能技术。为了应对有限资源与用户需求之间的矛盾,文章接下来介绍了集成传感、通信和计算(SCC)技术,并阐述了其基本原理和 SCC 的相关特点。随后,总结了基于 SCC 的元宇宙场景解决方案,并归纳了相关经验。最后,我们讨论了一些研究挑战和有待解决的问题。
{"title":"Integration of Sensing, Communication and Computing for Metaverse: A Survey","authors":"Xiaojie Wang, Qi Guo, Zhaolong Ning, Lei Guo, Guoyin Wang, Xinbo Gao, Yan Zhang","doi":"10.1145/3659946","DOIUrl":"https://doi.org/10.1145/3659946","url":null,"abstract":"<p>The metaverse is an <b>Artificial Intelligence (AI)</b>-generated virtual world, in which people can game, work, learn and socialize. The realization of metaverse not only requires a large amount of computing resources to realize the rendering of the virtual world, but also requires communication resources to realize real-time transmission of massive data to ensure a good user experience. The metaverse is currently moving from fiction to reality with the development of advanced technologies represented by AI, blockchain, extended reality and <b>Digital Twins (DT)</b>. However, due to the shortage of communication as well as computing resources, how to realize secure and efficient data interaction between the virtual and the real is an important issue for the metaverse. In this article, we first discuss the characteristics and architecture of the metaverse, and introduce its enabling technologies. To cope with the conflict between limited resources and user demands, the article next introduces an <b>Integrated Sensing, Communication, and Computing (SCC)</b> technology, and describes its basic principles and related characteristics of SCC. After that, solutions based on SCC in the metaverse scenarios are summarized and relevant lessons are summarized. Finally, we discuss some research challenges and open issues.</p>","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":16.6,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140603941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Computing Surveys
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1