首页 > 最新文献

ACM Computing Surveys最新文献

英文 中文
A Survey on Diffusion Models for Time Series and Spatio-Temporal Data 时间序列和时空数据的扩散模型综述
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-10 DOI: 10.1145/3783986
Yiyuan Yang, Ming Jin, Haomin Wen, Chaoli Zhang, Yuxuan Liang, Lintao Ma, Yi Wang, Chenghao Liu, Bin Yang, Zenglin Xu, Shirui Pan, Qingsong Wen
Diffusion models have been widely used in time series and spatio-temporal data, enhancing generative, inferential, and downstream capabilities. These models are applied across diverse fields such as healthcare, recommendation, climate, energy, audio, and traffic. By separating applications for time series and spatio-temporal data, we offer a structured perspective on model category, task type, data modality, and practical application domain. This study aims to provide a solid foundation for researchers and practitioners, inspiring future innovations that tackle traditional challenges and foster novel solutions in diffusion model-based data mining tasks and applications. For more detailed information, we have open-sourced a repository.
扩散模型已广泛应用于时间序列和时空数据,增强了生成、推理和下游能力。这些模型应用于不同的领域,如医疗保健、推荐、气候、能源、音频和交通。通过分离时间序列和时空数据的应用,我们提供了一个关于模型类别、任务类型、数据模态和实际应用领域的结构化视角。本研究旨在为研究人员和从业者提供坚实的基础,激发未来创新,解决传统挑战,并在基于扩散模型的数据挖掘任务和应用中培育新的解决方案。要获得更详细的信息,我们已经开源了一个存储库。
{"title":"A Survey on Diffusion Models for Time Series and Spatio-Temporal Data","authors":"Yiyuan Yang, Ming Jin, Haomin Wen, Chaoli Zhang, Yuxuan Liang, Lintao Ma, Yi Wang, Chenghao Liu, Bin Yang, Zenglin Xu, Shirui Pan, Qingsong Wen","doi":"10.1145/3783986","DOIUrl":"https://doi.org/10.1145/3783986","url":null,"abstract":"Diffusion models have been widely used in time series and spatio-temporal data, enhancing generative, inferential, and downstream capabilities. These models are applied across diverse fields such as healthcare, recommendation, climate, energy, audio, and traffic. By separating applications for time series and spatio-temporal data, we offer a structured perspective on model category, task type, data modality, and practical application domain. This study aims to provide a solid foundation for researchers and practitioners, inspiring future innovations that tackle traditional challenges and foster novel solutions in diffusion model-based data mining tasks and applications. For more detailed information, we have open-sourced a repository.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"110 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145711161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lookup Table-based Computing: A Survey from Software Implementations to Hardware Architectures 基于查找表的计算:从软件实现到硬件架构的综述
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-06 DOI: 10.1145/3779417
Weibang Dai, Xiaogang Chen, Houpeng Chen, Sannian Song, Shunfen Li, Tao Hong, Zhitang Song
For decades, memory-based computation has been overshadowed by processor-centric paradigms. However, memory-based computation offers distinct advantages, including high-speed operation and energy efficiency. As a representative and powerful type of memory-based computation, lookup table (LUT)-based computing has seen a resurgence in interest. Recent advancements in memory technologies, particularly cost reduction in memories and the rise of emerging non-volatile memories (NVMs), have spurred widespread adoption of LUT-based approaches. In this paper, we first trace the historical evolution of LUT-based computation, then systematically analyze its modern applications across two domains: (1) software implementations, including LUT-based function evaluation and LUT-based neural networks; and (2) hardware architectures, such as LUT in FPGA and LUT-based processing-in-memory (PIM) systems. Finally, we discuss how NVMs could unlock new opportunities for next-generation LUT-based computing.
几十年来,基于内存的计算一直被以处理器为中心的范式所掩盖。然而,基于内存的计算提供了明显的优势,包括高速运行和能源效率。作为一种具有代表性且功能强大的基于内存的计算类型,基于查找表(LUT)的计算重新引起了人们的兴趣。最近存储器技术的进步,特别是存储器成本的降低和新兴的非易失性存储器(nvm)的兴起,促进了基于lut的方法的广泛采用。本文首先追溯了基于lut的计算的历史演变,然后系统地分析了其在两个领域的现代应用:(1)软件实现,包括基于lut的函数评估和基于lut的神经网络;(2)硬件架构,如FPGA中的LUT和基于LUT的内存处理(PIM)系统。最后,我们讨论了nvm如何为下一代基于lut的计算提供新的机会。
{"title":"Lookup Table-based Computing: A Survey from Software Implementations to Hardware Architectures","authors":"Weibang Dai, Xiaogang Chen, Houpeng Chen, Sannian Song, Shunfen Li, Tao Hong, Zhitang Song","doi":"10.1145/3779417","DOIUrl":"https://doi.org/10.1145/3779417","url":null,"abstract":"For decades, memory-based computation has been overshadowed by processor-centric paradigms. However, memory-based computation offers distinct advantages, including high-speed operation and energy efficiency. As a representative and powerful type of memory-based computation, lookup table (LUT)-based computing has seen a resurgence in interest. Recent advancements in memory technologies, particularly cost reduction in memories and the rise of emerging non-volatile memories (NVMs), have spurred widespread adoption of LUT-based approaches. In this paper, we first trace the historical evolution of LUT-based computation, then systematically analyze its modern applications across two domains: (1) software implementations, including LUT-based function evaluation and LUT-based neural networks; and (2) hardware architectures, such as LUT in FPGA and LUT-based processing-in-memory (PIM) systems. Finally, we discuss how NVMs could unlock new opportunities for next-generation LUT-based computing.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"115 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145680128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Community Detection with the Map Equation and Infomap: Theory and Applications 基于地图方程和信息地图的社区检测:理论与应用
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-06 DOI: 10.1145/3779648
Jelena Smiljanić, Christopher Blöcker, Anton Holmgren, Daniel Edler, Magnus Neuman, Martin Rosvall
Real-world networks have a complex topology comprising many elements often structured into communities. Revealing these communities helps researchers uncover the organizational and functional structure of the system that the network represents. However, detecting community structures in complex networks requires selecting a community detection method among a multitude of alternatives with different network representations, community interpretations, and underlying mechanisms. This tutorial focuses on a popular community detection method called the map equation and its search algorithm Infomap. The map equation framework for community detection describes communities by analyzing dynamic processes on the network. Thanks to its flexibility, the map equation provides extensions that can incorporate various assumptions about network structure and dynamics. To help decide if the map equation is a suitable community detection method for a given complex system and problem at hand – and which variant to choose – we review the map equation’s theoretical framework and guide users in applying the map equation to various research problems.
现实世界的网络具有复杂的拓扑结构,其中包含许多通常构成社区的元素。揭示这些社区有助于研究人员揭示网络所代表的系统的组织和功能结构。然而,在复杂网络中检测社区结构需要在具有不同网络表示、社区解释和底层机制的众多备选方案中选择一种社区检测方法。本教程主要介绍一种流行的社区检测方法,称为地图方程及其搜索算法Infomap。社区检测的映射方程框架通过分析网络的动态过程来描述社区。由于其灵活性,映射方程提供了可以包含关于网络结构和动态的各种假设的扩展。为了帮助确定地图方程是否是一种适合于给定复杂系统和手头问题的社区检测方法-以及选择哪种变体-我们回顾了地图方程的理论框架,并指导用户将地图方程应用于各种研究问题。
{"title":"Community Detection with the Map Equation and Infomap: Theory and Applications","authors":"Jelena Smiljanić, Christopher Blöcker, Anton Holmgren, Daniel Edler, Magnus Neuman, Martin Rosvall","doi":"10.1145/3779648","DOIUrl":"https://doi.org/10.1145/3779648","url":null,"abstract":"Real-world networks have a complex topology comprising many elements often structured into communities. Revealing these communities helps researchers uncover the organizational and functional structure of the system that the network represents. However, detecting community structures in complex networks requires selecting a community detection method among a multitude of alternatives with different network representations, community interpretations, and underlying mechanisms. This tutorial focuses on a popular community detection method called the map equation and its search algorithm Infomap. The map equation framework for community detection describes communities by analyzing dynamic processes on the network. Thanks to its flexibility, the map equation provides extensions that can incorporate various assumptions about network structure and dynamics. To help decide if the map equation is a suitable community detection method for a given complex system and problem at hand – and which variant to choose – we review the map equation’s theoretical framework and guide users in applying the map equation to various research problems.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"34 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145680127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Many Faces of Data Deletion: On the Significance and Implications of Deleting Data 数据删除的多面性:论删除数据的意义和含义
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-05 DOI: 10.1145/3779299
Ignacio Marco-Pérez, Beatriz Pérez, Angel Luis Rubio Garcia, María A. Zapata
Today, our data is not only stored on personal computers, but is managed by many devices, from cell phones or watches to smart TVs, and stored in remote repositories (usually referred to as “the cloud”). In this new context, defining what exactly “data deletion” is becomes a challenge, especially considering the many different scenarios in which it is becoming more increasingly important. This is the case, for example, of the “right to be forgotten” established by regulations such as the European General Data Protection Regulation (GDPR) or the deletion of data used as a source to feed machine learning processes, the long-term effects of which are very difficult to estimate. This work reviews the various terminology used when dealing with data deletion and analyzes the different fields and technologies to which it is related. We conclude by offering a structured discussion of key takeaways, lessons learned, and future research directions.
今天,我们的数据不仅存储在个人电脑上,而且由许多设备管理,从手机或手表到智能电视,并存储在远程存储库(通常称为“云”)中。在这种新的背景下,定义“数据删除”究竟是什么成为一项挑战,特别是考虑到它在许多不同的情况下变得越来越重要。例如,《欧洲通用数据保护条例》(GDPR)等法规规定的“被遗忘权”或删除用作机器学习过程来源的数据就是这种情况,其长期影响很难估计。这项工作回顾了处理数据删除时使用的各种术语,并分析了与之相关的不同领域和技术。最后,我们对关键要点、经验教训和未来研究方向进行了结构化的讨论。
{"title":"The Many Faces of Data Deletion: On the Significance and Implications of Deleting Data","authors":"Ignacio Marco-Pérez, Beatriz Pérez, Angel Luis Rubio Garcia, María A. Zapata","doi":"10.1145/3779299","DOIUrl":"https://doi.org/10.1145/3779299","url":null,"abstract":"Today, our data is not only stored on personal computers, but is managed by many devices, from cell phones or watches to smart TVs, and stored in remote repositories (usually referred to as “the cloud”). In this new context, defining what exactly “data deletion” is becomes a challenge, especially considering the many different scenarios in which it is becoming more increasingly important. This is the case, for example, of the “right to be forgotten” established by regulations such as the European General Data Protection Regulation (GDPR) or the deletion of data used as a source to feed machine learning processes, the long-term effects of which are very difficult to estimate. This work reviews the various terminology used when dealing with data deletion and analyzes the different fields and technologies to which it is related. We conclude by offering a structured discussion of key takeaways, lessons learned, and future research directions.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"10 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145680129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing Large Language Models: A Survey of Watermarking and Fingerprinting Techniques 保护大型语言模型:水印和指纹技术综述
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-05 DOI: 10.1145/3773028
Peigen Ye, Huali Ren, Zhengdao Li, Anli Yan, Hongyang Yan, Shaowei Wang, Jin Li
State-of-the-art watermarking and fingerprinting techniques for Large Language Models (LLMs) are explored, with our analysis spanning a wide array of methodologies designed to protect the intellectual property of LLMs. The review of watermarking techniques is based on embedding watermarks during the training, logits generation, and token sampling phases. Meanwhile, we investigate the application of watermarking technology in multimodal LLMs and potential attacks on watermarks. Moreover, our examination of fingerprinting techniques revealed the ingenuity behind methods used to identify LLMs. We discussed the development of fingerprints based on model behavior and using deep learning models to learn thresholds for fingerprint comparison. Our survey has underscored the importance of advancing security measures for LLMs, especially in light of the increasing sophistication of adversarial attacks. As LLMs continue to play a pivotal role in advancing AI technologies, developing and refining security measures that safeguard their intellectual property and ensure their ethical deployment is imperative.
探索了大型语言模型(llm)的最先进的水印和指纹识别技术,我们的分析跨越了一系列旨在保护llm知识产权的方法。对水印技术的回顾是基于在训练、逻辑生成和令牌采样阶段嵌入水印。同时,我们研究了水印技术在多模态llm中的应用以及对水印的潜在攻击。此外,我们对指纹技术的研究揭示了用于识别llm的方法背后的独创性。我们讨论了基于模型行为的指纹的发展,并使用深度学习模型来学习指纹比较的阈值。我们的调查强调了推进llm安全措施的重要性,特别是在对抗性攻击日益复杂的情况下。随着法学硕士在推进人工智能技术方面继续发挥关键作用,制定和完善保护其知识产权并确保其道德部署的安全措施势在必行。
{"title":"Securing Large Language Models: A Survey of Watermarking and Fingerprinting Techniques","authors":"Peigen Ye, Huali Ren, Zhengdao Li, Anli Yan, Hongyang Yan, Shaowei Wang, Jin Li","doi":"10.1145/3773028","DOIUrl":"https://doi.org/10.1145/3773028","url":null,"abstract":"State-of-the-art watermarking and fingerprinting techniques for Large Language Models (LLMs) are explored, with our analysis spanning a wide array of methodologies designed to protect the intellectual property of LLMs. The review of watermarking techniques is based on embedding watermarks during the training, logits generation, and token sampling phases. Meanwhile, we investigate the application of watermarking technology in multimodal LLMs and potential attacks on watermarks. Moreover, our examination of fingerprinting techniques revealed the ingenuity behind methods used to identify LLMs. We discussed the development of fingerprints based on model behavior and using deep learning models to learn thresholds for fingerprint comparison. Our survey has underscored the importance of advancing security measures for LLMs, especially in light of the increasing sophistication of adversarial attacks. As LLMs continue to play a pivotal role in advancing AI technologies, developing and refining security measures that safeguard their intellectual property and ensure their ethical deployment is imperative.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"250 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145680130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward Efficient Underwater Visual Perception through Image Enhancement, Compression, and Understanding 通过图像增强、压缩和理解实现高效的水下视觉感知
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-03 DOI: 10.1145/3779223
Rongxin Zhu, Lei Sheng, Kaitao Wu, Azzedine Boukerche, Libo Long, Qiuling Yang
The growing demand for marine exploration, environmental monitoring, and autonomous underwater operations has elevated the role of underwater image processing in both research and practical applications. However, the acquisition and transmission of underwater visual data are fundamentally constrained by the harsh aquatic environment, where factors such as limited bandwidth, strong light scattering, color distortion, and complex noise severely degrade image quality and restrict data throughput. These challenges not only hinder real-time perception and decision-making but also affect the efficiency of data-driven tasks such as mapping, object recognition, and navigation. To address these issues, a broad spectrum of underwater image processing methods has emerged, aiming to enhance visual clarity, compress data for efficient transmission, restore degraded signals, and enable accurate scene understanding. This survey provides a structured and comprehensive review of existing techniques, categorizing them into four core domains: image enhancement, image restoration, image compression and segmentation, and image classification. Representative methods within each domain are critically analyzed in terms of their underlying principles, computational complexity, and applicability across diverse underwater scenarios. Furthermore, the survey highlights emerging trends including deep learning-based approaches, cross-modal information fusion, and resource-efficient designs, offering insights for future development in underwater visual computing and communication systems.
随着海洋勘探、环境监测和自主水下作业需求的不断增长,水下图像处理在研究和实际应用中的作用得到了提升。然而,水下视觉数据的采集和传输从根本上受到了恶劣的水生环境的制约,其中有限的带宽、强烈的光散射、色彩失真、复杂的噪声等因素严重降低了图像质量,限制了数据吞吐量。这些挑战不仅阻碍了实时感知和决策,而且影响了数据驱动任务(如地图、目标识别和导航)的效率。为了解决这些问题,出现了各种各样的水下图像处理方法,旨在提高视觉清晰度,压缩数据以实现高效传输,恢复退化的信号,并实现准确的场景理解。本调查对现有技术进行了结构化和全面的回顾,将其分为四个核心领域:图像增强,图像恢复,图像压缩和分割以及图像分类。在每个领域的代表性方法严格分析其基本原理,计算复杂性和适用性在不同的水下场景。此外,该调查还强调了新兴趋势,包括基于深度学习的方法、跨模态信息融合和资源高效设计,为水下视觉计算和通信系统的未来发展提供了见解。
{"title":"Toward Efficient Underwater Visual Perception through Image Enhancement, Compression, and Understanding","authors":"Rongxin Zhu, Lei Sheng, Kaitao Wu, Azzedine Boukerche, Libo Long, Qiuling Yang","doi":"10.1145/3779223","DOIUrl":"https://doi.org/10.1145/3779223","url":null,"abstract":"The growing demand for marine exploration, environmental monitoring, and autonomous underwater operations has elevated the role of underwater image processing in both research and practical applications. However, the acquisition and transmission of underwater visual data are fundamentally constrained by the harsh aquatic environment, where factors such as limited bandwidth, strong light scattering, color distortion, and complex noise severely degrade image quality and restrict data throughput. These challenges not only hinder real-time perception and decision-making but also affect the efficiency of data-driven tasks such as mapping, object recognition, and navigation. To address these issues, a broad spectrum of underwater image processing methods has emerged, aiming to enhance visual clarity, compress data for efficient transmission, restore degraded signals, and enable accurate scene understanding. This survey provides a structured and comprehensive review of existing techniques, categorizing them into four core domains: image enhancement, image restoration, image compression and segmentation, and image classification. Representative methods within each domain are critically analyzed in terms of their underlying principles, computational complexity, and applicability across diverse underwater scenarios. Furthermore, the survey highlights emerging trends including deep learning-based approaches, cross-modal information fusion, and resource-efficient designs, offering insights for future development in underwater visual computing and communication systems.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"130 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145657753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Twins Paradigm: A Systematic Review from the Reinforcement Learning Perspective 数字孪生范式:强化学习视角下的系统回顾
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-02 DOI: 10.1145/3777367
Shahmir Khan Mohammed, Shakti Singh, Rabeb Mizouni, Hadi Otrok, Ernesto Damiani
The Digital Twins (DT) paradigm has emerged as a powerful tool for simulating and analyzing complex systems in various domains. A DT is a virtual representation of a real-world object(s) whose goal is to accurately emulate real systems, optimize processes, minimize synchronization delays, cut down on overhead, and automate decision-making. DT technology is moving at a faster than expected pace with advances in Artificial Intelligence (AI), Internet of Things (IoT), Distributed Computing, and 5/6G. Being a highly beneficial technology, DT still faces issues of - (1) limited adaptability, (2) incomplete model representation, (3) suboptimal decision making, (4) limited generalization, and (5) scalability and computational efficiency. Reinforcement Learning (RL) offers unsupervised decision-making and intelligence, which can be immensely beneficial in addressing the current challenges faced by DT. This study offers a thorough analysis of the DT paradigm from the standpoint of RL. The survey compares and contrasts existing reinforcement learning-based Digital Twin frameworks, assessing their advantages and disadvantages. Moreover, discussions of approaches highlighting the trade-offs between simulation fidelity and computing complexity is also studied. Additionally, a thorough understanding of the Digital Twins paradigm from a reinforcement learning perspective, is presented as a helpful resource for academics and industry professionals in the field. Finally, future research directions in this developing field at the nexus of digital modeling, simulation, and artificial intelligence is discussed.
数字孪生(DT)范式已经成为模拟和分析各个领域复杂系统的强大工具。DT是真实世界对象的虚拟表示,其目标是精确地模拟真实系统、优化流程、最小化同步延迟、减少开销和自动化决策。随着人工智能(AI)、物联网(IoT)、分布式计算和5/6G的进步,DT技术的发展速度比预期的要快。作为一项非常有益的技术,DT仍然面临着(1)有限的适应性,(2)不完整的模型表示,(3)次优决策,(4)有限的泛化,(5)可扩展性和计算效率等问题。强化学习(RL)提供无监督的决策和智能,这对于解决当前DT面临的挑战非常有益。本研究从RL的角度对DT范式进行了全面的分析。该调查比较和对比了现有的基于强化学习的数字孪生框架,评估了它们的优点和缺点。此外,还讨论了强调仿真保真度和计算复杂性之间权衡的方法。此外,从强化学习的角度对数字孪生范式进行了全面的理解,为该领域的学者和行业专业人士提供了有用的资源。最后,对数字建模、仿真和人工智能相结合的未来研究方向进行了展望。
{"title":"Digital Twins Paradigm: A Systematic Review from the Reinforcement Learning Perspective","authors":"Shahmir Khan Mohammed, Shakti Singh, Rabeb Mizouni, Hadi Otrok, Ernesto Damiani","doi":"10.1145/3777367","DOIUrl":"https://doi.org/10.1145/3777367","url":null,"abstract":"The Digital Twins (DT) paradigm has emerged as a powerful tool for simulating and analyzing complex systems in various domains. A DT is a virtual representation of a real-world object(s) whose goal is to accurately emulate real systems, optimize processes, minimize synchronization delays, cut down on overhead, and automate decision-making. DT technology is moving at a faster than expected pace with advances in Artificial Intelligence (AI), Internet of Things (IoT), Distributed Computing, and 5/6G. Being a highly beneficial technology, DT still faces issues of - (1) limited adaptability, (2) incomplete model representation, (3) suboptimal decision making, (4) limited generalization, and (5) scalability and computational efficiency. Reinforcement Learning (RL) offers unsupervised decision-making and intelligence, which can be immensely beneficial in addressing the current challenges faced by DT. This study offers a thorough analysis of the DT paradigm from the standpoint of RL. The survey compares and contrasts existing reinforcement learning-based Digital Twin frameworks, assessing their advantages and disadvantages. Moreover, discussions of approaches highlighting the trade-offs between simulation fidelity and computing complexity is also studied. Additionally, a thorough understanding of the Digital Twins paradigm from a reinforcement learning perspective, is presented as a helpful resource for academics and industry professionals in the field. Finally, future research directions in this developing field at the nexus of digital modeling, simulation, and artificial intelligence is discussed.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"93 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145651429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Literature Review on the Intersection of Self-X System Classes 关于Self-X系统类相交的系统文献综述
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-11-27 DOI: 10.1145/3778859
Inga Miadowicz, Daniel Maldonado Quinto, Michael Felderer
Alongside the vision of autonomous systems, similar system concepts are being discussed in the research fields of highly automated, intelligent, adaptive, autonomic, and organic systems. Although these types of system are studied in scattered research fields that consider them as distinct system classes, they share similar characteristics and are interrelated to some extent. Experts in various fields present a very heterogeneous view on the intersection of autonomous and comparable system concepts, for example, as interchangeable, distinct, or complementary research approaches. Therefore, this study performs a systematic literature review based on more than 300 articles to investigate the intersection of the system classes, emphasizing their similarities, differences, and relationships from the current state of the art.
除了自主系统的愿景,在高度自动化、智能、自适应、自主和有机系统的研究领域也在讨论类似的系统概念。虽然这些类型的系统是分散的研究领域,将它们视为不同的系统类,但它们具有相似的特征,并在一定程度上相互关联。不同领域的专家对自主和可比较系统概念的交叉点提出了非常不同的观点,例如,作为可互换的、不同的或互补的研究方法。因此,本研究在300多篇文献的基础上进行了系统的文献综述,以调查系统类的交集,强调它们的异同,以及从当前的艺术状态的关系。
{"title":"A Systematic Literature Review on the Intersection of Self-X System Classes","authors":"Inga Miadowicz, Daniel Maldonado Quinto, Michael Felderer","doi":"10.1145/3778859","DOIUrl":"https://doi.org/10.1145/3778859","url":null,"abstract":"Alongside the vision of autonomous systems, similar system concepts are being discussed in the research fields of highly automated, intelligent, adaptive, autonomic, and organic systems. Although these types of system are studied in scattered research fields that consider them as distinct system classes, they share similar characteristics and are interrelated to some extent. Experts in various fields present a very heterogeneous view on the intersection of autonomous and comparable system concepts, for example, as interchangeable, distinct, or complementary research approaches. Therefore, this study performs a systematic literature review based on more than 300 articles to investigate the intersection of the system classes, emphasizing their similarities, differences, and relationships from the current state of the art.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"14 10 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145609212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SoK: Acoustic Side Channels SoK:声学侧通道
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-11-26 DOI: 10.1145/3778350
Ping Wang, Shishir Nagaraja, Aurélien Bourquard, Haichang Gao, Jeff Yan
Acoustic side channels (ASCs) have been discovered for several decades, highlighting the tangible security risks posed by unintended sound emissions from computing and electronic systems. Their existence has drawn considerable attention from researchers, driving rapid progress in both attack methodologies and defense mechanisms across a wide range of scenarios. In this paper, we provide a state-of-the-art analysis of ASCs, covering all the significant academic research in the area. First, we clarify existing ambiguities and conceptual confusion, proposing a clear definition of ASC. Second, we analyse the characteristics of known ASCs, discuss their security implications, and propose the first taxonomy. Next, we summarise attack techniques, discuss countermeasures, and identify areas for future research. We also link side channels and inverse problems, two fields that appear to be completely isolated from each other but have deep connections.
声学侧通道(ASCs)已经被发现了几十年,突出了计算机和电子系统意外声发射带来的切实安全风险。它们的存在引起了研究人员的极大关注,推动了在各种情况下攻击方法和防御机制的快速发展。在本文中,我们提供了最先进的ASCs分析,涵盖了该领域所有重要的学术研究。首先,我们澄清了现有的歧义和概念混淆,提出了一个明确的ASC定义。其次,我们分析了已知ASCs的特征,讨论了它们的安全含义,并提出了第一种分类方法。接下来,我们总结攻击技术,讨论对策,并确定未来研究的领域。我们还将侧通道和逆问题联系起来,这两个领域看起来彼此完全隔离,但却有很深的联系。
{"title":"SoK: Acoustic Side Channels","authors":"Ping Wang, Shishir Nagaraja, Aurélien Bourquard, Haichang Gao, Jeff Yan","doi":"10.1145/3778350","DOIUrl":"https://doi.org/10.1145/3778350","url":null,"abstract":"Acoustic side channels (ASCs) have been discovered for several decades, highlighting the tangible security risks posed by unintended sound emissions from computing and electronic systems. Their existence has drawn considerable attention from researchers, driving rapid progress in both attack methodologies and defense mechanisms across a wide range of scenarios. In this paper, we provide a state-of-the-art analysis of ASCs, covering all the significant academic research in the area. First, we clarify existing ambiguities and conceptual confusion, proposing a clear definition of ASC. Second, we analyse the characteristics of known ASCs, discuss their security implications, and propose the first taxonomy. Next, we summarise attack techniques, discuss countermeasures, and identify areas for future research. We also link side channels and inverse problems, two fields that appear to be completely isolated from each other but have deep connections.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"17 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145599034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computational Humor Modeling: A Survey on the State of the Art 计算幽默建模:技术现状综述
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-11-26 DOI: 10.1145/3778357
Jens Lemmens, Victor De Marez
AI systems are not only becoming better in solving complex reasoning challenges, but also in performing creative tasks. One of the creative tasks where AI systems still struggle to achieve human performance, however, is humor processing, for which mixed results have been reported. Therefore, the goal of this survey is to categorize recent research in computational humor modeling in order to identify current trends, advancements, and remaining gaps. The scope of this work is broader than previous survey papers, as we tackle not only text-based models, but also multimodal models, and discuss a variety of detection and generation tasks.
人工智能系统不仅在解决复杂的推理挑战方面越来越好,而且在执行创造性任务方面也越来越好。然而,人工智能系统仍难以达到人类表现的创造性任务之一是幽默处理,据报道,这方面的结果好坏参半。因此,本调查的目的是对最近在计算幽默建模方面的研究进行分类,以确定当前的趋势、进步和剩余的差距。这项工作的范围比以前的调查论文更广泛,因为我们不仅处理基于文本的模型,而且还处理多模态模型,并讨论了各种检测和生成任务。
{"title":"Computational Humor Modeling: A Survey on the State of the Art","authors":"Jens Lemmens, Victor De Marez","doi":"10.1145/3778357","DOIUrl":"https://doi.org/10.1145/3778357","url":null,"abstract":"AI systems are not only becoming better in solving complex reasoning challenges, but also in performing creative tasks. One of the creative tasks where AI systems still struggle to achieve human performance, however, is humor processing, for which mixed results have been reported. Therefore, the goal of this survey is to categorize recent research in computational humor modeling in order to identify current trends, advancements, and remaining gaps. The scope of this work is broader than previous survey papers, as we tackle not only text-based models, but also multimodal models, and discuss a variety of detection and generation tasks.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"89 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145599033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Computing Surveys
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1