首页 > 最新文献

ACM Computing Surveys最新文献

英文 中文
From 5G to 6G: A Survey on Security, Privacy, and Standardization Pathways 从5G到6G:安全、隐私和标准化路径调查
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-18 DOI: 10.1145/3785467
Mengmeng Yang, Youyang Qu, Thilina Ranbaduge, Chandra Thapa, Nazatul Haque Sultan, Ming Ding, Hajime Suzuki, Wei Ni, Sharif Abuadbba, David Smith, Paul Tyler, Josef Pieprzyk, Thierry Rakotoarivelo, Xinlong Guan, Sirine Mrabet
The vision for 6G aims to enhance network capabilities, supporting an intelligent digital ecosystem where artificial intelligence (AI) is a key. However, the expansion of 6G raises critical security and privacy concerns due to the increased integration of IoT devices, edge computing, and AI. This survey provides a comprehensive overview of 6G protocols with a focus on security and privacy, identifying risks that have not been experienced in preceding 5G systems, and presenting mitigation strategies. While many vulnerabilities from earlier generations persist, the introduction of AI/ML introduces novel risks like model inversion and malicious manipulation of AI. Vulnerabilities in emerging personal IoT networks and autonomous vehicles are also underscored, where falsified command signaling or privacy leakage can pose safety and ethical concerns. The survey also discusses the transition toward lattice-based, post-quantum encryption standards, and identifies limitations in current security frameworks and calls for new, dynamic approaches tailored to 6G’s complexity. Close collaboration among stakeholders, including governments, industry, and researchers, is indispensable to developing robust standards, secure architectures, and risk assessment frameworks that address AI, quantum threats, and privacy at scale.
6G的愿景旨在增强网络功能,支持以人工智能(AI)为关键的智能数字生态系统。然而,由于物联网设备、边缘计算和人工智能的集成增加,6G的扩展引发了关键的安全和隐私问题。本调查全面概述了6G协议,重点是安全性和隐私性,确定了之前5G系统未经历的风险,并提出了缓解策略。虽然前几代的许多漏洞仍然存在,但人工智能/机器学习的引入引入了新的风险,如模型反演和人工智能的恶意操纵。新兴的个人物联网网络和自动驾驶汽车的脆弱性也得到了强调,其中伪造的命令信号或隐私泄露可能带来安全和道德问题。该调查还讨论了向基于格的后量子加密标准的过渡,并确定了当前安全框架的局限性,并呼吁针对6G的复杂性量身定制新的动态方法。包括政府、行业和研究人员在内的利益相关者之间的密切合作,对于制定强大的标准、安全架构和风险评估框架,以解决大规模的人工智能、量子威胁和隐私问题,是不可或缺的。
{"title":"From 5G to 6G: A Survey on Security, Privacy, and Standardization Pathways","authors":"Mengmeng Yang, Youyang Qu, Thilina Ranbaduge, Chandra Thapa, Nazatul Haque Sultan, Ming Ding, Hajime Suzuki, Wei Ni, Sharif Abuadbba, David Smith, Paul Tyler, Josef Pieprzyk, Thierry Rakotoarivelo, Xinlong Guan, Sirine Mrabet","doi":"10.1145/3785467","DOIUrl":"https://doi.org/10.1145/3785467","url":null,"abstract":"The vision for 6G aims to enhance network capabilities, supporting an intelligent digital ecosystem where artificial intelligence (AI) is a key. However, the expansion of 6G raises critical security and privacy concerns due to the increased integration of IoT devices, edge computing, and AI. This survey provides a comprehensive overview of 6G protocols with a focus on security and privacy, identifying risks that have not been experienced in preceding 5G systems, and presenting mitigation strategies. While many vulnerabilities from earlier generations persist, the introduction of AI/ML introduces novel risks like model inversion and malicious manipulation of AI. Vulnerabilities in emerging personal IoT networks and autonomous vehicles are also underscored, where falsified command signaling or privacy leakage can pose safety and ethical concerns. The survey also discusses the transition toward lattice-based, post-quantum encryption standards, and identifies limitations in current security frameworks and calls for new, dynamic approaches tailored to 6G’s complexity. Close collaboration among stakeholders, including governments, industry, and researchers, is indispensable to developing robust standards, secure architectures, and risk assessment frameworks that address AI, quantum threats, and privacy at scale.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"34 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145771129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-Sovereign Identity as a Secure and Trustworthy Approach to Digital Identity Management: A Comprehensive Survey 自我主权身份作为一种安全可信的数字身份管理方法:一项综合调查
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-17 DOI: 10.1145/3785466
Efat Fathalla, Mohamed Azab, ChunSheng Xin, Hongyi Wu
The digital landscape increasingly relies on data exchange, underscoring the importance of Digital Identity Management (DIM) systems. However, current models face vulnerabilities, leading to the demand for more secure, decentralized, and user-centric solutions. Self-sovereign Identity (SSI) has emerged as a promising paradigm supported by blockchain technology, granting users control over their digital identities. This paper reviews existing research and commercial SSI solutions, assessing their feasibility and effectiveness. We thoroughly explore SSI’s concept, structure, and components while addressing challenges like scalability, usability, Quantum computing-based attacks and corresponding resistance mechanisms, data storage, and governance. Additionally, we highlight recent advancements and identify research gaps, suggesting future directions for enhanced DIM solutions.
数字景观越来越依赖于数据交换,强调了数字身份管理(DIM)系统的重要性。然而,当前的模型面临着漏洞,导致对更安全、分散和以用户为中心的解决方案的需求。自我主权身份(Self-sovereign Identity, SSI)已成为区块链技术支持的一种有前途的范式,允许用户控制自己的数字身份。本文回顾了现有的研究和商业SSI解决方案,评估了它们的可行性和有效性。我们深入探讨了SSI的概念、结构和组件,同时解决了可扩展性、可用性、基于量子计算的攻击和相应的抵抗机制、数据存储和治理等挑战。此外,我们强调了最近的进展,并确定了研究差距,提出了增强DIM解决方案的未来方向。
{"title":"Self-Sovereign Identity as a Secure and Trustworthy Approach to Digital Identity Management: A Comprehensive Survey","authors":"Efat Fathalla, Mohamed Azab, ChunSheng Xin, Hongyi Wu","doi":"10.1145/3785466","DOIUrl":"https://doi.org/10.1145/3785466","url":null,"abstract":"The digital landscape increasingly relies on data exchange, underscoring the importance of Digital Identity Management (DIM) systems. However, current models face vulnerabilities, leading to the demand for more secure, decentralized, and user-centric solutions. Self-sovereign Identity (SSI) has emerged as a promising paradigm supported by blockchain technology, granting users control over their digital identities. This paper reviews existing research and commercial SSI solutions, assessing their feasibility and effectiveness. We thoroughly explore SSI’s concept, structure, and components while addressing challenges like scalability, usability, Quantum computing-based attacks and corresponding resistance mechanisms, data storage, and governance. Additionally, we highlight recent advancements and identify research gaps, suggesting future directions for enhanced DIM solutions.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"23 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145765469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Off-chain Technologies Off-chain技术综述
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-17 DOI: 10.1145/3765897
Chaoming Shi, Haomeng Xie, Zheng Yan, Laurence T. Yang
Blockchain is a decentralized ledger with a secure and immutable chain structure. The advanced attributes of blockchain, including decentralization, anonymity, transparency, and zero trust support, have positioned it as a transformative technology across different areas of expertise, like medicine, finance, and the Internet of Things (IoT). Nonetheless, blockchain’s progress has been constrained in various aspects, revealing inefficiency, privacy, high transaction fees, and challenges with on-chain storage. To address these limitations, off-chain technology has emerged as a solution by moving computation and storage overhead away from the blockchain. However, a comprehensive survey on off-chain schemes is lacking in the current literature. In this paper, we conduct a thorough survey on off-chain technologies. We first introduce the fundamental concepts and characteristics of both blockchain and off-chain technologies. Furthermore, we establish a thorough taxonomy of off-chain technologies based on distinct application scenarios. We put forth a series of evaluation criteria, based on which we seriously review and analyze the existing off-chain schemes to assess their strengths and limitations. Conclusively, we outline a list of open issues and propose promising future research directions based on our thorough review and analysis on off-chain technologies.
区块链是一个分散的账本,具有安全不可变的链结构。区块链的高级属性,包括去中心化、匿名性、透明度和零信任支持,使其成为跨医学、金融和物联网(IoT)等不同专业领域的变革性技术。尽管如此,区块链的进展在各个方面都受到限制,暴露出效率低下、隐私、高交易费用以及链上存储的挑战。为了解决这些限制,链下技术作为一种解决方案出现了,它将计算和存储开销从区块链移开。然而,目前文献中缺乏对脱链方案的全面调查。在本文中,我们对链下技术进行了深入的调查。我们首先介绍区块链和off-chain技术的基本概念和特点。此外,我们基于不同的应用场景建立了一个完整的链下技术分类。我们提出了一系列的评估标准,在此基础上,我们认真审查和分析现有的脱链方案,以评估其优势和局限性。最后,我们在对脱链技术进行全面回顾和分析的基础上,概述了一系列悬而未决的问题,并提出了有希望的未来研究方向。
{"title":"A Survey on Off-chain Technologies","authors":"Chaoming Shi, Haomeng Xie, Zheng Yan, Laurence T. Yang","doi":"10.1145/3765897","DOIUrl":"https://doi.org/10.1145/3765897","url":null,"abstract":"Blockchain is a decentralized ledger with a secure and immutable chain structure. The advanced attributes of blockchain, including decentralization, anonymity, transparency, and zero trust support, have positioned it as a transformative technology across different areas of expertise, like medicine, finance, and the Internet of Things (IoT). Nonetheless, blockchain’s progress has been constrained in various aspects, revealing inefficiency, privacy, high transaction fees, and challenges with on-chain storage. To address these limitations, off-chain technology has emerged as a solution by moving computation and storage overhead away from the blockchain. However, a comprehensive survey on off-chain schemes is lacking in the current literature. In this paper, we conduct a thorough survey on off-chain technologies. We first introduce the fundamental concepts and characteristics of both blockchain and off-chain technologies. Furthermore, we establish a thorough taxonomy of off-chain technologies based on distinct application scenarios. We put forth a series of evaluation criteria, based on which we seriously review and analyze the existing off-chain schemes to assess their strengths and limitations. Conclusively, we outline a list of open issues and propose promising future research directions based on our thorough review and analysis on off-chain technologies.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"152 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145765468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methods for Acquiring and Incorporating Knowledge into Stock Price Prediction: A Survey 股票价格预测知识的获取与运用方法综述
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-16 DOI: 10.1145/3773079
Liping Wang, Jiawei Li, Lifan Zhao, Zhizhuo Kou, Xiaohan Wang, Xinyi Zhu, Hao Wang, Yanyan Shen, Chen Lei
Predicting stock prices presents a challenging research problem due to the inherent volatility and non-linear nature of the stock market. In recent years, knowledge-enhanced stock price prediction methods have shown groundbreaking results by utilizing external knowledge to understand the stock market. Despite the importance of these methods, there is a scarcity of scholarly works that systematically synthesize previous studies from the perspective of external knowledge types. Specifically, the external knowledge can be modeled in different data structures, which we group into non-graph-based formats and graph-based formats: 1) non-graph-based knowledge captures contextual information and multimedia descriptions specifically associated with an individual stock; 2) graph-based knowledge captures interconnected and interdependent information in the stock market. This survey paper aims to provide a systematic and comprehensive description of methods for acquiring external knowledge from various unstructured data sources and then incorporating it into stock price prediction models. We also explore fusion methods for combining external knowledge with historical price features. Moreover, this paper includes a compilation of relevant datasets and delves into potential future research directions in this domain.
由于股票市场固有的波动性和非线性特性,股票价格预测是一个具有挑战性的研究问题。近年来,利用外部知识来了解股票市场的知识增强股价预测方法取得了突破性的成果。尽管这些方法很重要,但从外部知识类型的角度系统地综合前人研究的学术著作却很少。具体而言,外部知识可以用不同的数据结构建模,我们将其分为非基于图的格式和基于图的格式:1)非基于图的知识捕获与单个股票特定相关的上下文信息和多媒体描述;2)基于图的知识捕获了股票市场中相互关联和相互依赖的信息。本文旨在系统全面地描述从各种非结构化数据源获取外部知识并将其纳入股票价格预测模型的方法。我们还探索了将外部知识与历史价格特征相结合的融合方法。此外,本文还汇编了相关数据集,并对该领域未来可能的研究方向进行了探讨。
{"title":"Methods for Acquiring and Incorporating Knowledge into Stock Price Prediction: A Survey","authors":"Liping Wang, Jiawei Li, Lifan Zhao, Zhizhuo Kou, Xiaohan Wang, Xinyi Zhu, Hao Wang, Yanyan Shen, Chen Lei","doi":"10.1145/3773079","DOIUrl":"https://doi.org/10.1145/3773079","url":null,"abstract":"Predicting stock prices presents a challenging research problem due to the inherent volatility and non-linear nature of the stock market. In recent years, knowledge-enhanced stock price prediction methods have shown groundbreaking results by utilizing external knowledge to understand the stock market. Despite the importance of these methods, there is a scarcity of scholarly works that systematically synthesize previous studies from the perspective of external knowledge types. Specifically, the external knowledge can be modeled in different data structures, which we group into non-graph-based formats and graph-based formats: 1) <jats:italic toggle=\"yes\">non-graph-based knowledge</jats:italic> captures contextual information and multimedia descriptions specifically associated with an individual stock; 2) <jats:italic toggle=\"yes\">graph-based knowledge</jats:italic> captures interconnected and interdependent information in the stock market. This survey paper aims to provide a systematic and comprehensive description of methods for acquiring external knowledge from various unstructured data sources and then incorporating it into stock price prediction models. We also explore fusion methods for combining external knowledge with historical price features. Moreover, this paper includes a compilation of relevant datasets and delves into potential future research directions in this domain.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"20 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145759516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Task Offloading for CAVs Edge Computing Environment: Taxonomy, Critical Review, and Future Road Map 自动驾驶汽车边缘计算环境的任务卸载:分类、关键审查和未来路线图
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-15 DOI: 10.1145/3783984
Bhoopendra Kumar, Aditya Bhardwaj, Dinesh Prasad Sahu
The rapid advancement of Intelligent Transportation Systems (ITS) has led to a paradigm shift towards the adoption of Connected Autonomous Vehicles (CAVs). In recent years, CAVs have emerged as a prominent research focus due to their potential to reduce road traffic accidents caused by human error, optimize traffic flow, create new economic opportunities, and enhance travel convenience. However, the increasing demand for compute and delay-sensitive applications, such as real-time navigation and sensor data processing, exceeds the capabilities of current onboard vehicle resources. Consequently, task offloading has gained significant attention, allowing certain computational tasks generated by CAVs operations to be offloaded to external cloud or edge servers. The existing review literature has been limited in its focus on task offloading techniques specifically for CAVs architecture. Therefore, this study aims to present a comprehensive survey on task offloading in CAVs through a systematic review guided by key research questions. We first provide a technical background and then propose a broad coverage taxonomy of existing literature, analyzing promising solutions such as Machine Learning (ML) and heuristic-based techniques. In addition, we present a taxonomy of execution environments, metrics, and datasets. Finally, we highlight key research challenges and future trends, providing valuable insights for advancing task offloading in CAVs architecture.
智能交通系统(ITS)的快速发展导致了一种范式的转变,即采用联网自动驾驶汽车(cav)。近年来,自动驾驶汽车因其在减少人为失误导致的道路交通事故、优化交通流、创造新的经济机会和提高出行便利性方面的潜力而成为一个突出的研究热点。然而,对计算和延迟敏感应用(如实时导航和传感器数据处理)日益增长的需求超出了当前车载资源的能力。因此,任务卸载获得了极大的关注,允许将cav操作生成的某些计算任务卸载到外部云或边缘服务器。现有的评论文献在关注cav架构的任务卸载技术方面受到了限制。因此,本研究旨在通过以关键研究问题为导向的系统综述,对cav的任务卸载进行全面调查。我们首先提供技术背景,然后提出现有文献的广泛覆盖分类,分析有前途的解决方案,如机器学习(ML)和基于启发式的技术。此外,我们还提供了执行环境、度量和数据集的分类。最后,我们强调了关键的研究挑战和未来趋势,为推进自动驾驶汽车架构中的任务卸载提供了有价值的见解。
{"title":"Task Offloading for CAVs Edge Computing Environment: Taxonomy, Critical Review, and Future Road Map","authors":"Bhoopendra Kumar, Aditya Bhardwaj, Dinesh Prasad Sahu","doi":"10.1145/3783984","DOIUrl":"https://doi.org/10.1145/3783984","url":null,"abstract":"The rapid advancement of Intelligent Transportation Systems (ITS) has led to a paradigm shift towards the adoption of Connected Autonomous Vehicles (CAVs). In recent years, CAVs have emerged as a prominent research focus due to their potential to reduce road traffic accidents caused by human error, optimize traffic flow, create new economic opportunities, and enhance travel convenience. However, the increasing demand for compute and delay-sensitive applications, such as real-time navigation and sensor data processing, exceeds the capabilities of current onboard vehicle resources. Consequently, task offloading has gained significant attention, allowing certain computational tasks generated by CAVs operations to be offloaded to external cloud or edge servers. The existing review literature has been limited in its focus on task offloading techniques specifically for CAVs architecture. Therefore, this study aims to present a comprehensive survey on task offloading in CAVs through a systematic review guided by key research questions. We first provide a technical background and then propose a broad coverage taxonomy of existing literature, analyzing promising solutions such as Machine Learning (ML) and heuristic-based techniques. In addition, we present a taxonomy of execution environments, metrics, and datasets. Finally, we highlight key research challenges and future trends, providing valuable insights for advancing task offloading in CAVs architecture.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"9 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145752827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximate Computing in High-Level Synthesis: From Survey to Practical Implementation 高级综合中的近似计算:从调查到实际实现
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-12 DOI: 10.1145/3785334
Benjamin Carrion Schafer, Baharealsadat Parchamdar
Approximate Computing in hardware design has emerged as an alternative way to further reduce the power consumption of integrated circuits (ICs) by trading off errors at the output with simpler, and more efficient logic. So far, the main approaches in approximate computing have been to simplify the hardware circuit by applying different approximation primitives of different aggressiveness to the original hardware description until the maximum error threshold is met. Multiple of these primitives can also be combined to obtain better results. These primitives are often applied at different VLSI design stages to maximize their effect. Because of the importance of this topic, there exists a very large body of work and multiple surveys have tried to cover all of it. In this work we take a different approach and concentrate only on approximation computing techniques applied at the High-Level Synthesis (HLS) stage of the VLSI design flow. The reason for this is that approximations applied at the highest possible level of VLSI design abstraction also have the highest impact on the resultant circuit. Moreover, HLS is finally being widely embraced by hardware designers, and this work aims at presenting practical examples of how the different approximation primitives can be easily applied using commercial HLS tools. We finally present some typical pitfalls that designers should avoid when using approximate computing and point to some future direction in this area.
在硬件设计中,近似计算已经成为进一步降低集成电路(ic)功耗的一种替代方法,通过使用更简单、更高效的逻辑来抵消输出错误。到目前为止,近似计算的主要方法是通过对原始硬件描述应用不同程度的近似原语来简化硬件电路,直到满足最大误差阈值。这些原语中的多个也可以组合起来以获得更好的结果。这些原语通常应用于不同的VLSI设计阶段,以最大化其效果。由于这一主题的重要性,存在着大量的工作和多项调查,试图涵盖所有内容。在这项工作中,我们采取了不同的方法,只集中在VLSI设计流程的高级综合(HLS)阶段应用的近似计算技术。这样做的原因是,在VLSI设计抽象的最高可能水平上应用的近似也对所得电路产生最大的影响。此外,HLS最终被硬件设计师广泛接受,本工作旨在展示如何使用商业HLS工具轻松应用不同近似原语的实际示例。最后,我们提出了设计师在使用近似计算时应该避免的一些典型陷阱,并指出了该领域的一些未来方向。
{"title":"Approximate Computing in High-Level Synthesis: From Survey to Practical Implementation","authors":"Benjamin Carrion Schafer, Baharealsadat Parchamdar","doi":"10.1145/3785334","DOIUrl":"https://doi.org/10.1145/3785334","url":null,"abstract":"Approximate Computing in hardware design has emerged as an alternative way to further reduce the power consumption of integrated circuits (ICs) by trading off errors at the output with simpler, and more efficient logic. So far, the main approaches in approximate computing have been to simplify the hardware circuit by applying different approximation primitives of different aggressiveness to the original hardware description until the maximum error threshold is met. Multiple of these primitives can also be combined to obtain better results. These primitives are often applied at different VLSI design stages to maximize their effect. Because of the importance of this topic, there exists a very large body of work and multiple surveys have tried to cover all of it. In this work we take a different approach and concentrate only on approximation computing techniques applied at the High-Level Synthesis (HLS) stage of the VLSI design flow. The reason for this is that approximations applied at the highest possible level of VLSI design abstraction also have the highest impact on the resultant circuit. Moreover, HLS is finally being widely embraced by hardware designers, and this work aims at presenting practical examples of how the different approximation primitives can be easily applied using commercial HLS tools. We finally present some typical pitfalls that designers should avoid when using approximate computing and point to some future direction in this area.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"6 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145728835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Diffusion Models for Time Series and Spatio-Temporal Data 时间序列和时空数据的扩散模型综述
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-10 DOI: 10.1145/3783986
Yiyuan Yang, Ming Jin, Haomin Wen, Chaoli Zhang, Yuxuan Liang, Lintao Ma, Yi Wang, Chenghao Liu, Bin Yang, Zenglin Xu, Shirui Pan, Qingsong Wen
Diffusion models have been widely used in time series and spatio-temporal data, enhancing generative, inferential, and downstream capabilities. These models are applied across diverse fields such as healthcare, recommendation, climate, energy, audio, and traffic. By separating applications for time series and spatio-temporal data, we offer a structured perspective on model category, task type, data modality, and practical application domain. This study aims to provide a solid foundation for researchers and practitioners, inspiring future innovations that tackle traditional challenges and foster novel solutions in diffusion model-based data mining tasks and applications. For more detailed information, we have open-sourced a repository.
扩散模型已广泛应用于时间序列和时空数据,增强了生成、推理和下游能力。这些模型应用于不同的领域,如医疗保健、推荐、气候、能源、音频和交通。通过分离时间序列和时空数据的应用,我们提供了一个关于模型类别、任务类型、数据模态和实际应用领域的结构化视角。本研究旨在为研究人员和从业者提供坚实的基础,激发未来创新,解决传统挑战,并在基于扩散模型的数据挖掘任务和应用中培育新的解决方案。要获得更详细的信息,我们已经开源了一个存储库。
{"title":"A Survey on Diffusion Models for Time Series and Spatio-Temporal Data","authors":"Yiyuan Yang, Ming Jin, Haomin Wen, Chaoli Zhang, Yuxuan Liang, Lintao Ma, Yi Wang, Chenghao Liu, Bin Yang, Zenglin Xu, Shirui Pan, Qingsong Wen","doi":"10.1145/3783986","DOIUrl":"https://doi.org/10.1145/3783986","url":null,"abstract":"Diffusion models have been widely used in time series and spatio-temporal data, enhancing generative, inferential, and downstream capabilities. These models are applied across diverse fields such as healthcare, recommendation, climate, energy, audio, and traffic. By separating applications for time series and spatio-temporal data, we offer a structured perspective on model category, task type, data modality, and practical application domain. This study aims to provide a solid foundation for researchers and practitioners, inspiring future innovations that tackle traditional challenges and foster novel solutions in diffusion model-based data mining tasks and applications. For more detailed information, we have open-sourced a repository.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"110 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145711161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lookup Table-based Computing: A Survey from Software Implementations to Hardware Architectures 基于查找表的计算:从软件实现到硬件架构的综述
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-06 DOI: 10.1145/3779417
Weibang Dai, Xiaogang Chen, Houpeng Chen, Sannian Song, Shunfen Li, Tao Hong, Zhitang Song
For decades, memory-based computation has been overshadowed by processor-centric paradigms. However, memory-based computation offers distinct advantages, including high-speed operation and energy efficiency. As a representative and powerful type of memory-based computation, lookup table (LUT)-based computing has seen a resurgence in interest. Recent advancements in memory technologies, particularly cost reduction in memories and the rise of emerging non-volatile memories (NVMs), have spurred widespread adoption of LUT-based approaches. In this paper, we first trace the historical evolution of LUT-based computation, then systematically analyze its modern applications across two domains: (1) software implementations, including LUT-based function evaluation and LUT-based neural networks; and (2) hardware architectures, such as LUT in FPGA and LUT-based processing-in-memory (PIM) systems. Finally, we discuss how NVMs could unlock new opportunities for next-generation LUT-based computing.
几十年来,基于内存的计算一直被以处理器为中心的范式所掩盖。然而,基于内存的计算提供了明显的优势,包括高速运行和能源效率。作为一种具有代表性且功能强大的基于内存的计算类型,基于查找表(LUT)的计算重新引起了人们的兴趣。最近存储器技术的进步,特别是存储器成本的降低和新兴的非易失性存储器(nvm)的兴起,促进了基于lut的方法的广泛采用。本文首先追溯了基于lut的计算的历史演变,然后系统地分析了其在两个领域的现代应用:(1)软件实现,包括基于lut的函数评估和基于lut的神经网络;(2)硬件架构,如FPGA中的LUT和基于LUT的内存处理(PIM)系统。最后,我们讨论了nvm如何为下一代基于lut的计算提供新的机会。
{"title":"Lookup Table-based Computing: A Survey from Software Implementations to Hardware Architectures","authors":"Weibang Dai, Xiaogang Chen, Houpeng Chen, Sannian Song, Shunfen Li, Tao Hong, Zhitang Song","doi":"10.1145/3779417","DOIUrl":"https://doi.org/10.1145/3779417","url":null,"abstract":"For decades, memory-based computation has been overshadowed by processor-centric paradigms. However, memory-based computation offers distinct advantages, including high-speed operation and energy efficiency. As a representative and powerful type of memory-based computation, lookup table (LUT)-based computing has seen a resurgence in interest. Recent advancements in memory technologies, particularly cost reduction in memories and the rise of emerging non-volatile memories (NVMs), have spurred widespread adoption of LUT-based approaches. In this paper, we first trace the historical evolution of LUT-based computation, then systematically analyze its modern applications across two domains: (1) software implementations, including LUT-based function evaluation and LUT-based neural networks; and (2) hardware architectures, such as LUT in FPGA and LUT-based processing-in-memory (PIM) systems. Finally, we discuss how NVMs could unlock new opportunities for next-generation LUT-based computing.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"115 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145680128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Community Detection with the Map Equation and Infomap: Theory and Applications 基于地图方程和信息地图的社区检测:理论与应用
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-06 DOI: 10.1145/3779648
Jelena Smiljanić, Christopher Blöcker, Anton Holmgren, Daniel Edler, Magnus Neuman, Martin Rosvall
Real-world networks have a complex topology comprising many elements often structured into communities. Revealing these communities helps researchers uncover the organizational and functional structure of the system that the network represents. However, detecting community structures in complex networks requires selecting a community detection method among a multitude of alternatives with different network representations, community interpretations, and underlying mechanisms. This tutorial focuses on a popular community detection method called the map equation and its search algorithm Infomap. The map equation framework for community detection describes communities by analyzing dynamic processes on the network. Thanks to its flexibility, the map equation provides extensions that can incorporate various assumptions about network structure and dynamics. To help decide if the map equation is a suitable community detection method for a given complex system and problem at hand – and which variant to choose – we review the map equation’s theoretical framework and guide users in applying the map equation to various research problems.
现实世界的网络具有复杂的拓扑结构,其中包含许多通常构成社区的元素。揭示这些社区有助于研究人员揭示网络所代表的系统的组织和功能结构。然而,在复杂网络中检测社区结构需要在具有不同网络表示、社区解释和底层机制的众多备选方案中选择一种社区检测方法。本教程主要介绍一种流行的社区检测方法,称为地图方程及其搜索算法Infomap。社区检测的映射方程框架通过分析网络的动态过程来描述社区。由于其灵活性,映射方程提供了可以包含关于网络结构和动态的各种假设的扩展。为了帮助确定地图方程是否是一种适合于给定复杂系统和手头问题的社区检测方法-以及选择哪种变体-我们回顾了地图方程的理论框架,并指导用户将地图方程应用于各种研究问题。
{"title":"Community Detection with the Map Equation and Infomap: Theory and Applications","authors":"Jelena Smiljanić, Christopher Blöcker, Anton Holmgren, Daniel Edler, Magnus Neuman, Martin Rosvall","doi":"10.1145/3779648","DOIUrl":"https://doi.org/10.1145/3779648","url":null,"abstract":"Real-world networks have a complex topology comprising many elements often structured into communities. Revealing these communities helps researchers uncover the organizational and functional structure of the system that the network represents. However, detecting community structures in complex networks requires selecting a community detection method among a multitude of alternatives with different network representations, community interpretations, and underlying mechanisms. This tutorial focuses on a popular community detection method called the map equation and its search algorithm Infomap. The map equation framework for community detection describes communities by analyzing dynamic processes on the network. Thanks to its flexibility, the map equation provides extensions that can incorporate various assumptions about network structure and dynamics. To help decide if the map equation is a suitable community detection method for a given complex system and problem at hand – and which variant to choose – we review the map equation’s theoretical framework and guide users in applying the map equation to various research problems.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"34 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145680127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Many Faces of Data Deletion: On the Significance and Implications of Deleting Data 数据删除的多面性:论删除数据的意义和含义
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-05 DOI: 10.1145/3779299
Ignacio Marco-Pérez, Beatriz Pérez, Angel Luis Rubio Garcia, María A. Zapata
Today, our data is not only stored on personal computers, but is managed by many devices, from cell phones or watches to smart TVs, and stored in remote repositories (usually referred to as “the cloud”). In this new context, defining what exactly “data deletion” is becomes a challenge, especially considering the many different scenarios in which it is becoming more increasingly important. This is the case, for example, of the “right to be forgotten” established by regulations such as the European General Data Protection Regulation (GDPR) or the deletion of data used as a source to feed machine learning processes, the long-term effects of which are very difficult to estimate. This work reviews the various terminology used when dealing with data deletion and analyzes the different fields and technologies to which it is related. We conclude by offering a structured discussion of key takeaways, lessons learned, and future research directions.
今天,我们的数据不仅存储在个人电脑上,而且由许多设备管理,从手机或手表到智能电视,并存储在远程存储库(通常称为“云”)中。在这种新的背景下,定义“数据删除”究竟是什么成为一项挑战,特别是考虑到它在许多不同的情况下变得越来越重要。例如,《欧洲通用数据保护条例》(GDPR)等法规规定的“被遗忘权”或删除用作机器学习过程来源的数据就是这种情况,其长期影响很难估计。这项工作回顾了处理数据删除时使用的各种术语,并分析了与之相关的不同领域和技术。最后,我们对关键要点、经验教训和未来研究方向进行了结构化的讨论。
{"title":"The Many Faces of Data Deletion: On the Significance and Implications of Deleting Data","authors":"Ignacio Marco-Pérez, Beatriz Pérez, Angel Luis Rubio Garcia, María A. Zapata","doi":"10.1145/3779299","DOIUrl":"https://doi.org/10.1145/3779299","url":null,"abstract":"Today, our data is not only stored on personal computers, but is managed by many devices, from cell phones or watches to smart TVs, and stored in remote repositories (usually referred to as “the cloud”). In this new context, defining what exactly “data deletion” is becomes a challenge, especially considering the many different scenarios in which it is becoming more increasingly important. This is the case, for example, of the “right to be forgotten” established by regulations such as the European General Data Protection Regulation (GDPR) or the deletion of data used as a source to feed machine learning processes, the long-term effects of which are very difficult to estimate. This work reviews the various terminology used when dealing with data deletion and analyzes the different fields and technologies to which it is related. We conclude by offering a structured discussion of key takeaways, lessons learned, and future research directions.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"10 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145680129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Computing Surveys
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1