首页 > 最新文献

ACM Computing Surveys (CSUR)最新文献

英文 中文
Image and Video Coding Techniques for Ultra-low Latency 超低延迟的图像和视频编码技术
Pub Date : 2022-02-07 DOI: 10.1145/3512342
Jakub Žádník, M. Mäkitalo, Jarno Vanne, P. Jääskeläinen
The next generation of wireless networks fosters the adoption of latency-critical applications such as XR, connected industry, or autonomous driving. This survey gathers implementation aspects of different image and video coding schemes and discusses their tradeoffs. Standardized video coding technologies such as HEVC or VVC provide a high compression ratio, but their enormous complexity sets the scene for alternative approaches like still image, mezzanine, or texture compression in scenarios with tight resource or latency constraints. Regardless of the coding scheme, we found inter-device memory transfers and the lack of sub-frame coding as limitations of current full-system and software-programmable implementations.
下一代无线网络促进了延迟关键型应用的采用,如XR、互联工业或自动驾驶。本调查收集了不同的图像和视频编码方案的实现方面,并讨论了它们的权衡。标准化的视频编码技术(如HEVC或VVC)提供了高压缩比,但其巨大的复杂性为静态图像、夹层或纹理压缩等替代方法在资源紧张或延迟限制的情况下设置了场景。无论编码方案如何,我们发现设备间内存传输和缺乏子帧编码是当前全系统和软件可编程实现的限制。
{"title":"Image and Video Coding Techniques for Ultra-low Latency","authors":"Jakub Žádník, M. Mäkitalo, Jarno Vanne, P. Jääskeläinen","doi":"10.1145/3512342","DOIUrl":"https://doi.org/10.1145/3512342","url":null,"abstract":"The next generation of wireless networks fosters the adoption of latency-critical applications such as XR, connected industry, or autonomous driving. This survey gathers implementation aspects of different image and video coding schemes and discusses their tradeoffs. Standardized video coding technologies such as HEVC or VVC provide a high compression ratio, but their enormous complexity sets the scene for alternative approaches like still image, mezzanine, or texture compression in scenarios with tight resource or latency constraints. Regardless of the coding scheme, we found inter-device memory transfers and the lack of sub-frame coding as limitations of current full-system and software-programmable implementations.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"54 1","pages":"1 - 35"},"PeriodicalIF":0.0,"publicationDate":"2022-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81860407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Security and Privacy in Unified Communication 统一通信中的安全和隐私
Pub Date : 2022-02-03 DOI: 10.1145/3498335
T. Reisinger, Isabel Wagner, E. Boiten
The use of unified communication; video conferencing, audio conferencing, and instant messaging has skyrocketed during the COVID-19 pandemic. However, security and privacy considerations have often been neglected. This article provides a comprehensive survey of security and privacy in Unified Communication (UC). We systematically analyze security and privacy threats and mitigations in a generic UC scenario. Based on this, we analyze security and privacy features of the major UC market leaders, and we draw conclusions on the overall UC landscape. While confidentiality in communication channels is generally well protected through encryption, other privacy properties are mostly lacking on UC platforms.
采用统一通信;视频会议、音频会议和即时通讯在COVID-19大流行期间飙升。然而,安全和隐私方面的考虑常常被忽视。本文提供了统一通信(UC)中的安全性和隐私性的全面调查。我们系统地分析了通用UC场景中的安全和隐私威胁和缓解措施。在此基础上,我们分析了主要UC市场领导者的安全和隐私特征,并得出了UC整体格局的结论。虽然通信渠道的机密性通常通过加密得到很好的保护,但UC平台大多缺乏其他隐私属性。
{"title":"Security and Privacy in Unified Communication","authors":"T. Reisinger, Isabel Wagner, E. Boiten","doi":"10.1145/3498335","DOIUrl":"https://doi.org/10.1145/3498335","url":null,"abstract":"The use of unified communication; video conferencing, audio conferencing, and instant messaging has skyrocketed during the COVID-19 pandemic. However, security and privacy considerations have often been neglected. This article provides a comprehensive survey of security and privacy in Unified Communication (UC). We systematically analyze security and privacy threats and mitigations in a generic UC scenario. Based on this, we analyze security and privacy features of the major UC market leaders, and we draw conclusions on the overall UC landscape. While confidentiality in communication channels is generally well protected through encryption, other privacy properties are mostly lacking on UC platforms.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"18 1","pages":"1 - 36"},"PeriodicalIF":0.0,"publicationDate":"2022-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87697118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Constructive or Optimized: An Overview of Strategies to Design Networks for Time-Critical Applications 建设性或优化:时间关键应用网络设计策略概述
Pub Date : 2022-02-03 DOI: 10.1145/3501294
Voica Gavriluţ, Aleksander Pruski, M. Berger
Distributed systems are pervasive nowadays, being found in different areas, from smart toys to smart factories. As the usage of such systems increases, so does their complexity and design. Therefore, this work aims to overview the methods for designing networks that accommodate time-constrained distributed applications. The work starts with a history of time-aware Ethernet-based protocols. Then, it continues with an overview of the design strategies from the literature. For each research paper, there are presented the model, addressed problem, exploration strategy, and results. Furthermore, for each type of problem are identified the constructive and optimization design strategies. Regarding the results, this work investigates the improvements of reliability, timeliness, and network cost.
如今,分布式系统无处不在,从智能玩具到智能工厂,分布在不同的领域。随着这类系统的使用增加,它们的复杂性和设计也在增加。因此,这项工作旨在概述设计适应时间限制的分布式应用程序的网络的方法。这项工作从基于时间感知的以太网协议的历史开始。然后,继续对文献中的设计策略进行概述。对于每篇研究论文,都提出了模型、解决的问题、探索策略和结果。此外,针对每种类型的问题,确定了建设性和优化设计策略。对于结果,本工作探讨了可靠性、时效性和网络成本的改进。
{"title":"Constructive or Optimized: An Overview of Strategies to Design Networks for Time-Critical Applications","authors":"Voica Gavriluţ, Aleksander Pruski, M. Berger","doi":"10.1145/3501294","DOIUrl":"https://doi.org/10.1145/3501294","url":null,"abstract":"Distributed systems are pervasive nowadays, being found in different areas, from smart toys to smart factories. As the usage of such systems increases, so does their complexity and design. Therefore, this work aims to overview the methods for designing networks that accommodate time-constrained distributed applications. The work starts with a history of time-aware Ethernet-based protocols. Then, it continues with an overview of the design strategies from the literature. For each research paper, there are presented the model, addressed problem, exploration strategy, and results. Furthermore, for each type of problem are identified the constructive and optimization design strategies. Regarding the results, this work investigates the improvements of reliability, timeliness, and network cost.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"14 1","pages":"1 - 35"},"PeriodicalIF":0.0,"publicationDate":"2022-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87142544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Electrical-Level Attacks on CPUs, FPGAs, and GPUs: Survey and Implications in the Heterogeneous Era 对cpu、fpga和gpu的电级攻击:异构时代的调查和启示
Pub Date : 2022-02-03 DOI: 10.1145/3498337
Dina G. Mahmoud, Vincent Lenders, Mirjana Stojilović
Given the need for efficient high-performance computing, computer architectures combining central processing units (CPUs), graphics processing units (GPUs), and field-programmable gate arrays (FPGAs) are currently prevalent. However, each of these components suffers from electrical-level security risks. Moving to heterogeneous systems, with the potential of multitenancy, it is essential to understand and investigate how the security vulnerabilities of individual components may affect the system as a whole. In this work, we provide a survey on the electrical-level attacks on CPUs, FPGAs, and GPUs. Additionally, we discuss whether these attacks can extend to heterogeneous systems and highlight open research directions for ensuring the security of heterogeneous computing systems in the future.
考虑到对高效高性能计算的需求,结合中央处理单元(cpu)、图形处理单元(gpu)和现场可编程门阵列(fpga)的计算机体系结构目前很流行。然而,这些组件都存在电气层面的安全风险。在迁移到异构系统(具有多租户的潜力)时,有必要了解和研究单个组件的安全漏洞如何影响整个系统。在这项工作中,我们提供了对cpu, fpga和gpu的电级攻击的调查。此外,我们还讨论了这些攻击是否可以扩展到异构系统,并强调了未来确保异构计算系统安全的开放研究方向。
{"title":"Electrical-Level Attacks on CPUs, FPGAs, and GPUs: Survey and Implications in the Heterogeneous Era","authors":"Dina G. Mahmoud, Vincent Lenders, Mirjana Stojilović","doi":"10.1145/3498337","DOIUrl":"https://doi.org/10.1145/3498337","url":null,"abstract":"Given the need for efficient high-performance computing, computer architectures combining central processing units (CPUs), graphics processing units (GPUs), and field-programmable gate arrays (FPGAs) are currently prevalent. However, each of these components suffers from electrical-level security risks. Moving to heterogeneous systems, with the potential of multitenancy, it is essential to understand and investigate how the security vulnerabilities of individual components may affect the system as a whole. In this work, we provide a survey on the electrical-level attacks on CPUs, FPGAs, and GPUs. Additionally, we discuss whether these attacks can extend to heterogeneous systems and highlight open research directions for ensuring the security of heterogeneous computing systems in the future.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"1 1","pages":"1 - 40"},"PeriodicalIF":0.0,"publicationDate":"2022-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86228795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Understanding Online Privacy—A Systematic Review of Privacy Visualizations and Privacy by Design Guidelines 理解在线隐私——隐私可视化和隐私设计指南的系统回顾
Pub Date : 2022-02-03 DOI: 10.1145/3502288
Susanne Barth, D. Ionita, P. Hartel
Privacy visualizations help users understand the privacy implications of using an online service. Privacy by Design guidelines provide generally accepted privacy standards for developers of online services. To obtain a comprehensive understanding of online privacy, we review established approaches, distill a unified list of 15 privacy attributes and rank them based on perceived importance by users and privacy experts. We then discuss similarities, explain notable differences, and examine trends in terms of the attributes covered. Finally, we show how our results provide a foundation for user-centric privacy visualizations, inspire best practices for developers, and give structure to privacy policies.
隐私可视化帮助用户了解使用在线服务的隐私含义。隐私设计准则为在线服务的开发人员提供了普遍接受的隐私标准。为了全面了解在线隐私,我们回顾了已有的方法,提炼出15个隐私属性的统一列表,并根据用户和隐私专家的感知重要性对它们进行排名。然后,我们讨论相似之处,解释显著差异,并根据所涵盖的属性检查趋势。最后,我们展示了我们的结果如何为以用户为中心的隐私可视化提供基础,启发开发人员的最佳实践,并给出隐私策略的结构。
{"title":"Understanding Online Privacy—A Systematic Review of Privacy Visualizations and Privacy by Design Guidelines","authors":"Susanne Barth, D. Ionita, P. Hartel","doi":"10.1145/3502288","DOIUrl":"https://doi.org/10.1145/3502288","url":null,"abstract":"Privacy visualizations help users understand the privacy implications of using an online service. Privacy by Design guidelines provide generally accepted privacy standards for developers of online services. To obtain a comprehensive understanding of online privacy, we review established approaches, distill a unified list of 15 privacy attributes and rank them based on perceived importance by users and privacy experts. We then discuss similarities, explain notable differences, and examine trends in terms of the attributes covered. Finally, we show how our results provide a foundation for user-centric privacy visualizations, inspire best practices for developers, and give structure to privacy policies.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"75 1","pages":"1 - 37"},"PeriodicalIF":0.0,"publicationDate":"2022-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73525928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Survey on Digital Video Stabilization: Concepts, Methods, and Challenges 数字视频防抖研究:概念、方法和挑战
Pub Date : 2022-02-03 DOI: 10.1145/3494525
M. R. Souza, H. Maia, H. Pedrini
Digital video stabilization is a challenging task that aims to transform a potentially shaky video into a pleasant one by smoothing the camera trajectory. Despite the various works found in the literature addressing this task, their organization and analysis have not yet received much attention. In this work, we present a thorough review of the literature for video stabilization, organized according to a proposed taxonomy. A formal definition for the problem is introduced, along with a brief interpretation in physical terms. We also provide a comprehensive discussion on the main challenges and future trends for this active area.
数字视频稳定是一项具有挑战性的任务,旨在通过平滑相机轨迹将潜在的抖动视频转变为令人愉快的视频。尽管在文献中发现了解决这一任务的各种作品,但它们的组织和分析尚未受到太多关注。在这项工作中,我们提出了一个彻底的回顾文献视频稳定,根据提出的分类组织。本文介绍了该问题的正式定义,并用物理术语作了简要解释。我们还就这一活跃领域的主要挑战和未来趋势进行了全面的讨论。
{"title":"Survey on Digital Video Stabilization: Concepts, Methods, and Challenges","authors":"M. R. Souza, H. Maia, H. Pedrini","doi":"10.1145/3494525","DOIUrl":"https://doi.org/10.1145/3494525","url":null,"abstract":"Digital video stabilization is a challenging task that aims to transform a potentially shaky video into a pleasant one by smoothing the camera trajectory. Despite the various works found in the literature addressing this task, their organization and analysis have not yet received much attention. In this work, we present a thorough review of the literature for video stabilization, organized according to a proposed taxonomy. A formal definition for the problem is introduced, along with a brief interpretation in physical terms. We also provide a comprehensive discussion on the main challenges and future trends for this active area.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"1 1","pages":"1 - 37"},"PeriodicalIF":0.0,"publicationDate":"2022-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83430098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Spatial Data Quality in the Internet of Things: Management, Exploitation, and Prospects 物联网空间数据质量:管理、开发与展望
Pub Date : 2022-02-03 DOI: 10.1145/3498338
Huan Li, Hua Lu, Christian S. Jensen, Bo Tang, M. A. Cheema
With the continued deployment of the Internet of Things (IoT), increasing volumes of devices are being deployed that emit massive spatially referenced data. Due in part to the dynamic, decentralized, and heterogeneous architecture of the IoT, the varying and often low quality of spatial IoT data (SID) presents challenges to applications built on top of this data. This survey aims to provide unique insight to practitioners who intend to develop IoT-enabled applications and to researchers who wish to conduct research that relates to data quality in the IoT setting. The survey offers an inventory analysis of major data quality dimensions in SID and covers significant data characteristics and associated quality considerations. The survey summarizes data quality related technologies from both task and technique perspectives. Organizing the technologies from the task perspective, it covers recent progress in SID quality management, encompassing location refinement, uncertainty elimination, outlier removal, fault correction, data integration, and data reduction; and it covers low-quality SID exploitation, encompassing querying, analysis, and decision-making techniques. Finally, the survey covers emerging trends and open issues concerning the quality of SID.
随着物联网(IoT)的不断部署,越来越多的设备被部署,这些设备会发出大量的空间参考数据。部分由于物联网的动态、分散和异构架构,空间物联网数据(SID)的变化和通常低质量对基于这些数据构建的应用程序提出了挑战。本调查旨在为打算开发物联网应用程序的从业者和希望在物联网环境中进行与数据质量相关的研究的研究人员提供独特的见解。该调查提供了SID中主要数据质量维度的清单分析,涵盖了重要的数据特征和相关的质量考虑因素。该调查从任务和技术两个角度总结了数据质量相关技术。从任务的角度组织技术,涵盖SID质量管理的最新进展,包括位置细化、不确定性消除、异常值去除、故障纠正、数据集成和数据简化;它涵盖了低质量的SID开发,包括查询、分析和决策技术。最后,该调查涵盖了有关SID质量的新兴趋势和开放问题。
{"title":"Spatial Data Quality in the Internet of Things: Management, Exploitation, and Prospects","authors":"Huan Li, Hua Lu, Christian S. Jensen, Bo Tang, M. A. Cheema","doi":"10.1145/3498338","DOIUrl":"https://doi.org/10.1145/3498338","url":null,"abstract":"With the continued deployment of the Internet of Things (IoT), increasing volumes of devices are being deployed that emit massive spatially referenced data. Due in part to the dynamic, decentralized, and heterogeneous architecture of the IoT, the varying and often low quality of spatial IoT data (SID) presents challenges to applications built on top of this data. This survey aims to provide unique insight to practitioners who intend to develop IoT-enabled applications and to researchers who wish to conduct research that relates to data quality in the IoT setting. The survey offers an inventory analysis of major data quality dimensions in SID and covers significant data characteristics and associated quality considerations. The survey summarizes data quality related technologies from both task and technique perspectives. Organizing the technologies from the task perspective, it covers recent progress in SID quality management, encompassing location refinement, uncertainty elimination, outlier removal, fault correction, data integration, and data reduction; and it covers low-quality SID exploitation, encompassing querying, analysis, and decision-making techniques. Finally, the survey covers emerging trends and open issues concerning the quality of SID.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"33 1","pages":"1 - 41"},"PeriodicalIF":0.0,"publicationDate":"2022-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78925617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
LoRa Networking Techniques for Large-scale and Long-term IoT: A Down-to-top Survey 大规模和长期物联网的LoRa网络技术:自上而下的调查
Pub Date : 2022-02-03 DOI: 10.1145/3494673
Chenning Li, Zhichao Cao
Low-Power Wide-Area Networks (LPWANs) are an emerging Internet-of-Things (IoT) paradigm, which caters to large-scale and long-term sensory data collection demand. Among the commercialized LPWAN technologies, LoRa (Long Range) attracts much interest from academia and industry due to its open-source physical (PHY) layer and standardized networking stack. In the flourishing LoRa community, many observations and countermeasures have been proposed to understand and improve the performance of LoRa networking in practice. From the perspective of the LoRa networking stack; however, we lack a whole picture to comprehensively understand what has been done or not and reveal what the future trends are. This survey proposes a taxonomy of a two-dimensional (i.e., networking layers, performance metrics) to categorize and compare the cutting-edge LoRa networking techniques. One dimension is the layered structure of the LoRa networking stack. From down to the top, we have the PHY layer, Link layer, Media-access Control (MAC) layer, and Application (App) layer. In each layer, we focus on the three most representative layer-specific research issues for fine-grained categorizing. The other dimension is LoRa networking performance metrics, including range, throughput, energy, and security. We compare different techniques in terms of these metrics and further overview the open issues and challenges, followed by our observed future trends. According to our proposed taxonomy, we aim at clarifying several ways to achieve a more effective LoRa networking stack and find more LoRa applicable scenarios, leading to a brand-new step toward a large-scale and long-term IoT.
低功耗广域网(lpwan)是一种新兴的物联网(IoT)模式,它满足了大规模和长期的感官数据收集需求。在商用LPWAN技术中,LoRa (Long Range)因其开放源代码的物理层和标准化的网络堆栈而受到学术界和工业界的广泛关注。在蓬勃发展的LoRa社区中,人们提出了许多观察和对策,以便在实践中理解和提高LoRa组网的性能。从LoRa组网栈的角度;然而,我们缺乏一个全貌来全面了解已经做了什么或没有做什么,并揭示未来的趋势是什么。本调查提出了一个二维(即网络层、性能指标)的分类法,用于对先进的LoRa网络技术进行分类和比较。一个维度是LoRa网络堆栈的分层结构。从下到上,我们有物理层,链路层,媒体访问控制(MAC)层和应用程序(App)层。在每一层中,我们重点关注三个最具代表性的层特定研究问题,以进行细粒度分类。另一个维度是LoRa网络性能指标,包括范围、吞吐量、能源和安全性。我们根据这些指标比较了不同的技术,并进一步概述了开放的问题和挑战,然后是我们观察到的未来趋势。根据我们提出的分类法,我们旨在明确几种实现更有效的LoRa网络堆栈的方法,并找到更多的LoRa应用场景,从而向大规模和长期的物联网迈出全新的一步。
{"title":"LoRa Networking Techniques for Large-scale and Long-term IoT: A Down-to-top Survey","authors":"Chenning Li, Zhichao Cao","doi":"10.1145/3494673","DOIUrl":"https://doi.org/10.1145/3494673","url":null,"abstract":"Low-Power Wide-Area Networks (LPWANs) are an emerging Internet-of-Things (IoT) paradigm, which caters to large-scale and long-term sensory data collection demand. Among the commercialized LPWAN technologies, LoRa (Long Range) attracts much interest from academia and industry due to its open-source physical (PHY) layer and standardized networking stack. In the flourishing LoRa community, many observations and countermeasures have been proposed to understand and improve the performance of LoRa networking in practice. From the perspective of the LoRa networking stack; however, we lack a whole picture to comprehensively understand what has been done or not and reveal what the future trends are. This survey proposes a taxonomy of a two-dimensional (i.e., networking layers, performance metrics) to categorize and compare the cutting-edge LoRa networking techniques. One dimension is the layered structure of the LoRa networking stack. From down to the top, we have the PHY layer, Link layer, Media-access Control (MAC) layer, and Application (App) layer. In each layer, we focus on the three most representative layer-specific research issues for fine-grained categorizing. The other dimension is LoRa networking performance metrics, including range, throughput, energy, and security. We compare different techniques in terms of these metrics and further overview the open issues and challenges, followed by our observed future trends. According to our proposed taxonomy, we aim at clarifying several ways to achieve a more effective LoRa networking stack and find more LoRa applicable scenarios, leading to a brand-new step toward a large-scale and long-term IoT.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"101 1","pages":"1 - 36"},"PeriodicalIF":0.0,"publicationDate":"2022-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90530661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
A Review on Fairness in Machine Learning 机器学习公平性研究综述
Pub Date : 2022-02-03 DOI: 10.1145/3494672
Dana Pessach, E. Shmueli
An increasing number of decisions regarding the daily lives of human beings are being controlled by artificial intelligence and machine learning (ML) algorithms in spheres ranging from healthcare, transportation, and education to college admissions, recruitment, provision of loans, and many more realms. Since they now touch on many aspects of our lives, it is crucial to develop ML algorithms that are not only accurate but also objective and fair. Recent studies have shown that algorithmic decision making may be inherently prone to unfairness, even when there is no intention for it. This article presents an overview of the main concepts of identifying, measuring, and improving algorithmic fairness when using ML algorithms, focusing primarily on classification tasks. The article begins by discussing the causes of algorithmic bias and unfairness and the common definitions and measures for fairness. Fairness-enhancing mechanisms are then reviewed and divided into pre-process, in-process, and post-process mechanisms. A comprehensive comparison of the mechanisms is then conducted, toward a better understanding of which mechanisms should be used in different scenarios. The article ends by reviewing several emerging research sub-fields of algorithmic fairness, beyond classification.
越来越多的关于人类日常生活的决策正在被人工智能和机器学习(ML)算法控制,从医疗保健、交通、教育到大学招生、招聘、提供贷款等许多领域。由于它们现在涉及我们生活的许多方面,因此开发不仅准确而且客观公正的ML算法至关重要。最近的研究表明,算法决策可能天生就倾向于不公平,即使没有这种意图。本文概述了在使用ML算法时识别、测量和改进算法公平性的主要概念,主要关注分类任务。本文首先讨论了算法偏差和不公平的原因,以及公平的常见定义和措施。然后对公平性增强机制进行审查,并将其分为进程前机制、进程内机制和进程后机制。然后对这些机制进行全面的比较,以便更好地了解在不同的情况下应该使用哪些机制。文章最后回顾了算法公平性的几个新兴研究子领域,超越了分类。
{"title":"A Review on Fairness in Machine Learning","authors":"Dana Pessach, E. Shmueli","doi":"10.1145/3494672","DOIUrl":"https://doi.org/10.1145/3494672","url":null,"abstract":"An increasing number of decisions regarding the daily lives of human beings are being controlled by artificial intelligence and machine learning (ML) algorithms in spheres ranging from healthcare, transportation, and education to college admissions, recruitment, provision of loans, and many more realms. Since they now touch on many aspects of our lives, it is crucial to develop ML algorithms that are not only accurate but also objective and fair. Recent studies have shown that algorithmic decision making may be inherently prone to unfairness, even when there is no intention for it. This article presents an overview of the main concepts of identifying, measuring, and improving algorithmic fairness when using ML algorithms, focusing primarily on classification tasks. The article begins by discussing the causes of algorithmic bias and unfairness and the common definitions and measures for fairness. Fairness-enhancing mechanisms are then reviewed and divided into pre-process, in-process, and post-process mechanisms. A comprehensive comparison of the mechanisms is then conducted, toward a better understanding of which mechanisms should be used in different scenarios. The article ends by reviewing several emerging research sub-fields of algorithmic fairness, beyond classification.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"122 1","pages":"1 - 44"},"PeriodicalIF":0.0,"publicationDate":"2022-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88079188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 163
Survey of Approaches for Postprocessing of Static Analysis Alarms 静态分析报警后处理方法综述
Pub Date : 2022-02-03 DOI: 10.1145/3494521
Tukaram Muske, Alexander Serebrenik
Static analysis tools have showcased their importance and usefulness in automated detection of defects. However, the tools are known to generate a large number of alarms which are warning messages to the user. The large number of alarms and cost incurred by their manual inspection have been identified as two major reasons for underuse of the tools in practice. To address these concerns plentitude of studies propose postprocessing of alarms: processing the alarms after they are generated. These studies differ greatly in their approaches to postprocess alarms. A comprehensive overview of the postprocessing approaches is, however, missing. In this article, we review 130 primary studies that propose postprocessing of alarms. The studies are collected by combining keywords-based database search and snowballing. We categorize approaches proposed by the collected studies into six main categories: clustering, ranking, pruning, automated elimination of false positives, combination of static and dynamic analyses, and simplification of manual inspection. We provide overview of the categories and sub-categories identified for them, their merits and shortcomings, and different techniques used to implement the approaches. Furthermore, we provide (1) guidelines for selection of the postprocessing techniques by the users/designers of static analysis tools; and (2) directions that can be explored by the researchers.
静态分析工具已经展示了它们在缺陷自动检测中的重要性和实用性。然而,众所周知,这些工具会生成大量的警报,这些警报是向用户发出的警告消息。大量的警报和人工检查所产生的费用已被确定为在实践中不充分使用这些工具的两个主要原因。为了解决这些问题,大量的研究提出了对警报进行后处理:在警报产生后进行处理。这些研究在处理后处理警报的方法上有很大的不同。然而,对后处理方法的全面概述是缺失的。在本文中,我们回顾了130项提出报警后处理的初步研究。采用基于关键词的数据库检索和滚雪球法相结合的方法收集研究结果。我们将收集到的研究提出的方法分为六大类:聚类、排序、修剪、误报自动消除、静态和动态分析结合以及简化人工检查。我们概述了为它们确定的类别和子类别,它们的优点和缺点,以及用于实现这些方法的不同技术。此外,我们提供(1)静态分析工具的用户/设计师选择后处理技术的指导方针;(2)研究人员可以探索的方向。
{"title":"Survey of Approaches for Postprocessing of Static Analysis Alarms","authors":"Tukaram Muske, Alexander Serebrenik","doi":"10.1145/3494521","DOIUrl":"https://doi.org/10.1145/3494521","url":null,"abstract":"Static analysis tools have showcased their importance and usefulness in automated detection of defects. However, the tools are known to generate a large number of alarms which are warning messages to the user. The large number of alarms and cost incurred by their manual inspection have been identified as two major reasons for underuse of the tools in practice. To address these concerns plentitude of studies propose postprocessing of alarms: processing the alarms after they are generated. These studies differ greatly in their approaches to postprocess alarms. A comprehensive overview of the postprocessing approaches is, however, missing. In this article, we review 130 primary studies that propose postprocessing of alarms. The studies are collected by combining keywords-based database search and snowballing. We categorize approaches proposed by the collected studies into six main categories: clustering, ranking, pruning, automated elimination of false positives, combination of static and dynamic analyses, and simplification of manual inspection. We provide overview of the categories and sub-categories identified for them, their merits and shortcomings, and different techniques used to implement the approaches. Furthermore, we provide (1) guidelines for selection of the postprocessing techniques by the users/designers of static analysis tools; and (2) directions that can be explored by the researchers.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"18 1","pages":"1 - 39"},"PeriodicalIF":0.0,"publicationDate":"2022-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83632725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
ACM Computing Surveys (CSUR)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1