-
Privacy-preserved and Responsible Recommenders: From Conventional Defense to Federated Learning and Blockchain ACM Comput. Surv. (IF 23.8) Pub Date : 2024-12-19 Waqar Ali, Xiangmin Zhou, Jie Shao
Recommender systems (RS) play an integral role in many online platforms. Exponential growth and potential commercial interests are raising significant concerns around privacy, security, fairness, and overall responsibility. The existing literature around responsible recommendation services is diverse and multi-disciplinary. Most literature reviews cover a specific aspect or a single technology for
-
ISP Meets Deep Learning: A Survey on Deep Learning Methods for Image Signal Processing ACM Comput. Surv. (IF 23.8) Pub Date : 2024-12-19 Claudio Filipi Goncalves dos Santos, Rodrigo Reis Arrais, Jhessica Victoria Santos da Silva, Matheus Henrique Marques da Silva, Wladimir Barroso Guedes de Araujo Neto, Leonardo Tadeu Lopes, Guilherme Augusto Bileki, Iago Oliveira Lima, Lucas Borges Rondon, Bruno Melo de Souza, Mayara Costa Regazio, Rodolfo Coelho Dalapicola, Arthur Alves Tasca
The entire Image Signal Processor (ISP) of a camera relies on several processes to transform the data from the Color Filter Array (CFA) sensor, such as demosaicing, denoising, and enhancement. These processes can be executed either by some hardware or via software. In recent years, Deep Learning(DL) has emerged as one solution for some of them or even to replace the entire ISP using a single neural
-
Adversarial Machine Learning Attacks and Defences in Multi-Agent Reinforcement Learning ACM Comput. Surv. (IF 23.8) Pub Date : 2024-12-18 Maxwell Standen, Junae Kim, Claudia Szabo
Multi-Agent Reinforcement Learning (MARL) is susceptible to Adversarial Machine Learning (AML) attacks. Execution-time AML attacks against MARL are complex due to effects that propagate across time and between agents. To understand the interaction between AML and MARL, this survey covers attacks and defences for MARL, Multi-Agent Learning (MAL), and Deep Reinforcement Learning (DRL). This survey proposes
-
Intelligent Generation of Graphical Game Assets: A Conceptual Framework and Systematic Review of the State of the Art ACM Comput. Surv. (IF 23.8) Pub Date : 2024-12-18 Kaisei Fukaya, Damon Daylamani-Zad, Harry Agius
Procedural content generation (PCG) can be applied to a wide variety of tasks in games, from narratives, levels and sounds, to trees and weapons. A large amount of game content is comprised of graphical assets , such as clouds, buildings or vegetation, that do not require gameplay function considerations. There is also a breadth of literature examining the procedural generation of such elements for
-
Towards Trustworthy Machine Learning in Production: An Overview of the Robustness in MLOps Approach ACM Comput. Surv. (IF 23.8) Pub Date : 2024-12-18 Firas Bayram, Bestoun S. Ahmed
Artificial intelligence (AI), and especially its sub-field of Machine Learning (ML), are impacting the daily lives of everyone with their ubiquitous applications. In recent years, AI researchers and practitioners have introduced principles and guidelines to build systems that make reliable and trustworthy decisions. From a practical perspective, conventional ML systems process historical data to extract
-
Encouraging altruistic user-generated content in gamified review platforms Internet Res. (IF 5.9) Pub Date : 2024-12-18 Isabel Buil, Sara Catalán, Tiago Oliveira
Purpose This study proposes and tests a model to analyse whether achievement, social and immersion motivational affordances embedded in gamified review platforms motivate consumers to altruistically create content in the post-consumption stage. Design/methodology/approach We used data from a sample of 343 reviewers and employed SmartPLS to test the research model. Findings Findings revealed that, while
-
Artificial intelligence adoption and revenue growth in European SMEs: synergies with IoT and big data analytics Internet Res. (IF 5.9) Pub Date : 2024-12-18 Lorenzo Ardito, Raffaele Filieri, Elisabetta Raguseo, Claudio Vitari
Purpose The conventional notion that adopting Artificial Intelligence (AI) positively affects firm performance is often confronted with various examples of failures. In this context, large-scale empirical evidence of the economic performance implications of adopting AI is poor, especially in the context of Small and Medium Sized Enterprises (SMEs). Drawing upon the Resource-Based View and the Digital
-
Unraveling threats in parasocial relationships: a study on social media influencers Internet Res. (IF 5.9) Pub Date : 2024-12-18 Samira Farivar, Fang Wang, Ofir Turel
Purpose With growing concerns about users’ well-being on social media, research stresses the importance of threat appraisals as a crucial first step in motivating self-protective actions. This study, in view of the prevalence of parasocial relationships between followers and social media influencers, aims to unravel the complex dynamics of followers’ threat perceptions within these relationships. Specifically
-
Crowdsourcing Home Healthcare Service: Matching Caretakers With Caregivers for Jointly Rostering and Routing IEEE Trans. Serv. Comput. (IF 5.5) Pub Date : 2024-12-17 Chun-Cheng Lin, Yi-Chun Peng, Zhen-Yin Annie Chen, Pei-Yu Liu
-
Mini-programs as substitution or promotion? Deciphering the cross-channel impact on e-marketplace purchases Internet Res. (IF 5.9) Pub Date : 2024-12-17 Juan Wang, Jie Fang, Yuting Wang
Purpose This study disentangles the impact of consumers’ adoption of mini-program channels on social media on their purchase behavior in e-marketplaces from a multichannel retailer’s perspective and examines the moderating roles of two types of brand messages (informational and transformational messages). Design/methodology/approach Based on 2,204 transaction records from a Chinese multichannel retailer
-
A Comprehensive Survey on Physical Layer Authentication Techniques: Categorization and Analysis of Model-Driven and Data-Driven Approaches ACM Comput. Surv. (IF 23.8) Pub Date : 2024-12-16 Zhifan Lai, Zikai Chang, Mingrui Sha, Qihong Zhang, Ning Xie, Changsheng Chen, Dusit (Tao) Niyato
The open and broadcast nature of wireless mediums introduces significant security vulnerabilities, making authentication a critical concern in wireless networks. In recent years, Physical-Layer Authentication (PLA) techniques have garnered considerable research interest due to their advantages over Upper-Layer Authentication (ULA) methods, such as lower complexity, enhanced security, and greater compatibility
-
Visual Content Privacy Protection: A Survey ACM Comput. Surv. (IF 23.8) Pub Date : 2024-12-16 Ruoyu Zhao, Yushu Zhang, Tao Wang, Wenying Wen, Yong Xiang, Xiaochun Cao
Vision is the most important sense for people, and it is also one of the main ways of cognition. As a result, people tend to utilize visual content to capture and share their life experiences, which greatly facilitates the transfer of information. Meanwhile, it also increases the risk of privacy violations, e.g., an image or video can reveal different kinds of privacy-sensitive information. Scholars
-
When Differential Privacy Meets Query Control: a Hybrid Framework for Practical Range Query Leakage Quantification and Mitigation IEEE Trans. Serv. Comput. (IF 5.5) Pub Date : 2024-12-16 Xinyan Li, Yuefeng Du, Cong Wang
-
A Game-based Computation Offloading with Imperfect Information in Multi-Edge Environments IEEE Trans. Serv. Comput. (IF 5.5) Pub Date : 2024-12-16 Bing Lin, Jie Weng, Xing Chen, Yun Ma, Ching-Hsien Hsu
-
TFEGRU: Time-Frequency Enhanced Gated Recurrent Unit With Attention for Cloud Workload Prediction IEEE Trans. Serv. Comput. (IF 5.5) Pub Date : 2024-12-16 Feiyu Zhao, Weiwei Lin, Shengsheng Lin, Haocheng Zhong, Keqin Li
-
How does augmented reality enhance brand equity? The mediating role of the vividness experience Internet Res. (IF 5.9) Pub Date : 2024-12-13 Jiahong Xu, Hefu Liu, Jingmei Zhou
Purpose Advancements in augmented reality (AR) technology have increased the interest in improving brand equity by creating AR-enhanced branding experiences. However, despite the potential of AR branding, knowledge regarding the underlying mechanisms required for AR features to build brand equity remains limited. Thus, we considered embodied cognition theory to investigate how designing AR features
-
Distributed Machine Learning in Edge Computing: Challenges, Solutions and Future Directions ACM Comput. Surv. (IF 23.8) Pub Date : 2024-12-13 Jingke Tu, Lei Yang, Jiannong Cao
Distributed machine learning on edges is widely used in intelligent transportation, smart home, industrial manufacturing, and underground pipe network monitoring to achieve low latency and real time data processing and prediction. However, the presence of a large number of sensing and edge devices with limited computing, storage, and communication capabilities prevents the deployment of huge machine
-
FeDistSlice: Federated Policy Distillation for Collaborative Intelligence in Multi-Tenant RAN Slicing IEEE Trans. Serv. Comput. (IF 5.5) Pub Date : 2024-12-12 Guolin Sun, Daniel Ayepah- Mensah, Huan Chen, Gordon Owusu Boateng, Guisong Liu
-
PetTC: Pairwise Joint Embedding Based Contrastive Tensor Completion for Network Traffic Monitoring Services IEEE Trans. Serv. Comput. (IF 5.5) Pub Date : 2024-12-12 Haoxuan Wang, Kun Xie, Jigang Wen, Guangxing Zhang, Wei Liang, Gaogang Xie, Kenli Li
-
MEC-Enabled Task Replication With Resource Allocation for Reliability-Sensitive Services in 5 G mMTC Networks IEEE Trans. Serv. Comput. (IF 5.5) Pub Date : 2024-12-12 Rui Huang, Wushao Wen, Zhi Zhou, Chongwu Dong, Xu Chen
-
Task Offloading and Resource Pricing Based on Game Theory in UAV-Assisted Edge Computing IEEE Trans. Serv. Comput. (IF 5.5) Pub Date : 2024-12-11 Zhuoyue Chen, Yaozong Yang, Jiajie Xu, Ying Chen, Jiwei Huang
-
A Survey on Privacy-Preserving Caching at Network Edge: Classification, Solutions, and Challenges ACM Comput. Surv. (IF 23.8) Pub Date : 2024-12-10 Xianzhi Zhang, Yipeng Zhou, Di Wu, Quan Z. Sheng, Shazia Riaz, Miao Hu, Linchang Xiao
Caching content at the edge network is a popular and effective technique widely deployed to alleviate the burden of network backhaul, shorten service delay and improve service quality. However, there has been some controversy over privacy violations in caching content at the edge network. On the one hand, the multi-access open edge network provides an ideal entrance or interface for external attackers
-
Trace Encoding Techniques for Multi‐Perspective Process Mining: A Comparative Study WIREs Data Mining Knowl. Discov. (IF 6.4) Pub Date : 2024-12-10 Antonino Rullo, Farhana Alam, Edoardo Serra
Process mining (PM) comprises a variety of methods for discovering information about processes from their execution logs. Some of them, such as trace clustering, trace classification, and anomalous trace detection require a preliminary preprocessing step in which the raw data is encoded into a numerical feature space. To this end, encoding techniques are used to generate vectorial representations of
-
Continued engagement intention with social media influencers: the role of experience Internet Res. (IF 5.9) Pub Date : 2024-12-10 Ameet Pandit, Fraser McLeay, Moulik M. Zaveri, Jabir Al Mursalin, Philip J. Rosenberger
Purpose The emergence of social media platforms has revolutionized how brands develop partnerships with social media influencers (SMIs). However, users are seeking more meaningful engagement with SMIs, and little is known about how brands can shift their focus from transient engagements to continued engagement that builds long-term brand–consumer relationships. Extant research has provided inconsistent
-
Recent Advances of Foundation Language Models-based Continual Learning: A Survey ACM Comput. Surv. (IF 23.8) Pub Date : 2024-12-09 Yutao Yang, Jie Zhou, Xuanwen Ding, Tianyu Huai, Shunyu Liu, Qin Chen, Yuan Xie, Liang He
Recently, foundation language models (LMs) have marked significant achievements in the domains of natural language processing (NLP) and computer vision (CV). Unlike traditional neural network models, foundation LMs obtain a great ability for transfer learning by acquiring rich commonsense knowledge through pre-training on extensive unsupervised datasets with a vast number of parameters. Despite these
-
TaxiGuider: Pick-Up Service Recommendation via Multiple Spatial-Temporal Trajectories IEEE Trans. Serv. Comput. (IF 5.5) Pub Date : 2024-12-09 Zhipeng Zhang, Mianxiong Dong, Kaoru Ota, Yao Zhang, Yonggong Ren
-
ObliuSky: Oblivious User-Defined Skyline Query Processing in the Cloud IEEE Trans. Serv. Comput. (IF 5.5) Pub Date : 2024-12-09 Yifeng Zheng, Weibo Wang, Songlei Wang, Zhongyun Hua, Yansong Gao
-
A Resource-Efficient Multiple Recognition Services Framework for IoT Devices IEEE Trans. Serv. Comput. (IF 5.5) Pub Date : 2024-12-09 Chuntao Ding, Zhuo Liu, Ao Zhou, Jinhui Yu, Yidong Li, Shangguang Wang
-
A Survey of AI-Generated Content (AIGC) ACM Comput. Surv. (IF 23.8) Pub Date : 2024-12-06 Yihan Cao, Siyu Li, Yixin Liu, Zhiling Yan, Yutong Dai, Philip Yu, Lichao Sun
Recently, Artificial Intelligence Generated Content (AIGC) has gained significant attention from society, especially with the rise of Generative AI (GAI) techniques such as ChatGPT, GPT-4 [165], DALL-E-3 [184], and Sora [137]. AIGC involves using AI models to create digital content, such as images, music, and natural language, with the goal of making the content creation process more efficient and
-
Weakly-supervised Semantic Segmentation with Image-level Labels: From Traditional Models to Foundation Models ACM Comput. Surv. (IF 23.8) Pub Date : 2024-12-06 Zhaozheng Chen, Qianru Sun
The rapid development of deep learning has driven significant progress in image semantic segmentation—a fundamental task in computer vision. Semantic segmentation algorithms often depend on the availability of pixel-level labels (i.e., masks of objects), which are expensive, time-consuming, and labor-intensive. Weakly-supervised semantic segmentation (WSSS) is an effective solution to avoid such labeling
-
Adversarial Binaries: AI-guided Instrumentation Methods for Malware Detection Evasion ACM Comput. Surv. (IF 23.8) Pub Date : 2024-12-06 Luke Koch, Edmon Begoli
Adversarial binaries are executable files that have been altered without loss of function by an AI agent in order to deceive malware detection systems. Progress in this emergent vein of research has been constrained by the complex and rigid structure of executable files. Although prior work has demonstrated that these binaries deceive a variety of malware classification models which rely on disparate
-
LiDAR-Based Place Recognition For Autonomous Driving: A Survey ACM Comput. Surv. (IF 23.8) Pub Date : 2024-12-05 Yongjun Zhang, Pengcheng Shi, Jiayuan Li
LiDAR has gained popularity in autonomous driving due to advantages like long measurement distance, rich 3D information, and stability in harsh environments. Place Recognition (PR) enables vehicles to identify previously visited locations despite variations in appearance, weather, and viewpoints, even determining their global location within prior maps. This capability is crucial for accurate localization
-
The Internet of Bio-Nano Things with Insulin-Glucose, Security and Research Challenges: A Survey ACM Comput. Surv. (IF 23.8) Pub Date : 2024-12-05 PHANI KRISHNA BULASARA, Somya Sahoo, Nitin Gupta, Zhu Han, Neeraj Kumar
The Internet of Bio-Nano Things (IoBNT) is collaborative cell biology and nanodevice technology interacting through Molecular Communication (MC). The IoBNT can be accomplished by using the Information and Communication Theory (ICT) study of biological networks. Various technologies such as the Internet of Nano Things (IoNT), the Internet of Bio-degradable Things (IoBDT) and the Internet of Ingestible
-
Privacy-Preserving Competitive Detour Tasking in Spatial Crowdsourcing IEEE Trans. Serv. Comput. (IF 5.5) Pub Date : 2024-12-05 Yifeng Zheng, Menglun Zhou, Songlei Wang, Zhongyun Hua, Jinghua Jiang, Yansong Gao
-
How does anthropomorphism promote consumer responses to social chatbots: mind perception perspective Internet Res. (IF 5.9) Pub Date : 2024-12-05 Baoku Li, Ruoxi Yao, Yafeng Nan
Purpose Benefiting from the development and innovation of artificial intelligence and affective computing technology, social chatbots that integrate cognitive analysis and affective social services have flooded into the consumer market. For cognition and emotion-oriented tasks, social chatbots do not always receive positive consumer responses. In addition, consumers have a contradictory attitude toward
-
Examining the use of multiple cognitive load measures in evaluating online shopping convenience: an EEG study Internet Res. (IF 5.9) Pub Date : 2024-12-05 Mahdi Mirhoseini, Pierre-Majorique Léger, Sylvain Sénécal
Purpose In the past decade, the use of neurophysiological measures as a complementary source of information has contributed to our understanding of human–computer interaction. However, less attention has been given to their capability in providing measures with high temporal resolution. Two studies are designed to address the challenge of measuring users’ cognitive load in an online shopping environment
-
Exploring user engagement behavior with short-form video advertising on short-form video platforms: a visual-audio perspective Internet Res. (IF 5.9) Pub Date : 2024-12-03 Lin Xiao, Xiaofeng Li, Jian Mou
Purpose Short-form video advertisements have recently gained popularity and are widely used. However, creating attractive short video advertisements remains a challenge for sellers. Based on the visual-audio perspective and signaling theory, this study investigated the impacts of three visual features (number of shots, pixel-level image complexity and vertical versus horizontal formats) and two audio
-
Virtual vs. traditional learning in higher education: A systematic review of comparative studies Comput. Educ. (IF 8.9) Pub Date : 2024-12-03 Tommaso Santilli, Silvia Ceccacci, Maura Mengoni, Catia Giaconi
The evolving landscape of educational technologies has ushered Virtual Reality (VR) in the forefront of higher education. As the COVID-19 pandemic propelled a rapid shift toward e-learning, the demand for high-quality distance education has surged, prompting an exploration of VR as a viable solution. While existing research indicates that VR supports student engagement and learning experiences compared
-
How does social support detected automatically in discussion forums relate to online learning burnout? The moderating role of students’ self-regulated learning Comput. Educ. (IF 8.9) Pub Date : 2024-12-03 Changqin Huang, Yaxin Tu, Qiyun Wang, Mingxi Li, Tao He, Di Zhang
Engaging students in online discussion forums with social support holds significant potential for preventing and alleviating student burnout. However, the mechanisms by which different types of social support influence learning burnout remain poorly understood. Additionally, existing methods for detecting social support detection are limited in both practical application and theoretical advancement
-
Security Challenges, Mitigation Strategies, and Future Trends in Wireless Sensor Networks: A Review ACM Comput. Surv. (IF 23.8) Pub Date : 2024-12-02 Ahmet Oztoprak, Reza Hassanpour, Aysegul Ozkan, Kasim Oztoprak
Wireless Sensor Networks (WSNs) represent an innovative technology that integrates compact, energy-efficient sensors with wireless communication functionalities, facilitating instantaneous surveillance and data gathering from the surrounding environment. WSNs are utilized across diverse domains, such as environmental monitoring, industrial automation, healthcare, smart agriculture, home automation
-
Telemedicine Monitoring System Based on Fog/Edge Computing: A Survey IEEE Trans. Serv. Comput. (IF 5.5) Pub Date : 2024-12-02 Qiang He, Zhaolin Xi, Zheng Feng, Yueyang Teng, Lianbo Ma, Yuliang Cai, Keping Yu
-
The effects of different metacognitive patterns on students' self-regulated learning in blended learning Comput. Educ. (IF 8.9) Pub Date : 2024-12-01 Xingyu Geng, Yu-Sheng Su
Self-regulated learning has significant importance in blended learning, necessitating an exploration into the effects of metacognition on SRL. Furthermore, SRL exhibits interdependence, thus highlighting the urgent need for research that can capture the temporal processes of SRL in multi-task activities during blended learning. Over 18 weeks, 44 students participated in three SRL tasks designed for
-
The esports experience economy: a multiple-case study of esports events, peripherals and fashion Internet Res. (IF 5.9) Pub Date : 2024-12-02 Tom Brock, Garry Crawford
Purpose This study aims to examine the cultural and economic circumstances that shape esports consumer agency through case studies of “experiential consumption” (Miles, 2021). Design/methodology/approach A multiple-case study approach (Stake, 2006) is deployed alongside participant observation and document analysis to identify three cases of experiential consumption in esports – an esports tournament
-
IoT Authentication Protocols: Challenges, and Comparative Analysis ACM Comput. Surv. (IF 23.8) Pub Date : 2024-11-30 Amar Alsheavi, Ammar Hawbani, Wajdy Othman, XINGFU WANG, Gamil Qaid, Liang Zhao, Ahmed Al-Dubai, Liu Zhi, A.S. Ismail, Rutvij Jhaveri, Saeed Alsamhi, Mohammed A. A. Al-qaness
In the ever-evolving information technology landscape, the Internet of Things (IoT) is a groundbreaking concept that bridges the physical and digital worlds. It is the backbone of an increasingly sophisticated interactive environment, yet it is a subject of intricate security challenges spawned by its multifaceted manifestations. Central to securing IoT infrastructures is the crucial aspect of authentication
-
When SDN Meets Low-rate Threats: A Survey of Attacks and Countermeasures in Programmable Networks ACM Comput. Surv. (IF 23.8) Pub Date : 2024-11-30 Dan Tang, Rui Dai, Yudong Yan, Keqin Li, Wei Liang, Zheng Qin
Low-rate threats are a class of attack vectors that are disruptive and stealthy, typically crafted for security vulnerabilities. They have been the significant concern for cyber security, impacting both conventional IP-based networks and emerging Software-Defined Networking (SDN). SDN is a revolutionary architecture that separates the control and data planes, offering advantages such as enhanced manageability
-
A Systematic Literature Review of Enterprise Architecture Evaluation Methods ACM Comput. Surv. (IF 23.8) Pub Date : 2024-11-30 Norbert Rudolf Busch, Andrzej Zalewski
Enterprise Architecture (EA) is a systematic and holistic approach to designing and managing an organization's information systems components, aiding in optimizing resources, managing risk, and facilitating change. It weighs different architectural quality attributes against each other to achieve the most advantageous architecture. However, the evaluation of EA lacks a systematic approach. This study
-
Object Selection and Manipulation in VR Headsets: Research Challenges, Solutions, and Success Measurements ACM Comput. Surv. (IF 23.8) Pub Date : 2024-11-30 Difeng Yu, Tilman Dingler, Eduardo Velloso, Jorge Goncalves
Object selection and manipulation are the foundation of VR interactions. With the rapid development of VR technology and the field of virtual object selection and manipulation, the literature demands a structured understanding of the core research challenges and a critical reflection of the current practices. To provide such understanding and reflections, we systematically reviewed 106 papers. We identified
-
Effectiveness of gamified intelligent tutoring in physical education through the lens of self-determination theory Comput. Educ. (IF 8.9) Pub Date : 2024-11-30 Lu-Ho Hsia, Yen-Nan Lin, Chung-Hisenh Lin, Gwo-Jen Hwang
Scholars have recommended the application of an intelligent tutoring and instant feedback system (ITIFS) to enhance students' motor skills performance by automatically evaluating their learning performance and providing personalized guidance and feedback. However, solely providing personalized evaluation and feedback may not necessarily attract students' active and sustained engagement in practice
-
Physician’s service quality and patient’s review behavior: managing online review to attract more patients Internet Res. (IF 5.9) Pub Date : 2024-11-28 Junhui Yan, Changyong Liang, Peiyu Zhou
Purpose Online patient reviews are of considerable importance on online health platforms. However, there is limited understanding of how these reviews are generated and their impact on patients' choices of physicians. Therefore, this study aims to investigate the antecedents and consequences of online patient reviews on online health platforms. Design/methodology/approach This study introduced an online
-
Designed to last: crowdfunding platforms’ strategic choices for long-term survival Internet Res. (IF 5.9) Pub Date : 2024-11-28 Jasmina Berbegal-Mirabent, Inés Alegre, Dolors Gil-Doménech
Purpose Multiple crowdfunding platforms have been created over the last decade. Some have become extremely successful, but many others have failed. This study focuses on those strategic choices that founders of crowdfunding platforms need to make early on and which determine the basic characteristics of a platform. Specifically, it examines which combination(s) of these initial strategic choices shape(s)
-
Resource-efficient Algorithms and Systems of Foundation Models: A Survey ACM Comput. Surv. (IF 23.8) Pub Date : 2024-11-29 Mengwei Xu, Dongqi Cai, Wangsong Yin, Shangguang Wang, Xin Jin, Xuanzhe Liu
Large foundation models, including large language models, vision transformers, diffusion, and LLM-based multimodal models, are revolutionizing the entire machine learning lifecycle, from training to deployment. However, the substantial advancements in versatility and performance these models offer come at a significant cost in terms of hardware resources. To support the growth of these large models
-
SoK: Access Control Policy Generation from High-level Natural Language Requirements ACM Comput. Surv. (IF 23.8) Pub Date : 2024-11-28 Sakuna Harinda Jayasundara, Nalin Asanka Gamagedara Arachchilage, Giovanni Russello
Administrator-centered access control failures can cause data breaches, putting organizations at risk of financial loss and reputation damage. Existing graphical policy configuration tools and automated policy generation frameworks attempt to help administrators configure and generate access control policies by avoiding such failures. However, graphical policy configuration tools are prone to human
-
Unboxing maturity models: A set-theoretic perspective on e-Government configurations over time J. Strategic Inf. Syst. (IF 8.7) Pub Date : 2024-11-28 F. Iannacci, S. Karanasios, G. Viscusi, R. McManus, C. Rupietta, C.W. Tan
This study conceptualizes e-Government maturity from the theoretical lens of strategic change. Drawing on a multiplicity of theories, it undertakes a fuzzy-set Qualitative Comparative Analysis of the drivers of e-Government maturity over the 2010–2020 decade. It bypasses partially conflicting findings about the contribution of human capital to high levels of e-Government maturity by showcasing instead
-
Hyper‐Parameter Optimization of Kernel Functions on Multi‐Class Text Categorization: A Comparative Evaluation WIREs Data Mining Knowl. Discov. (IF 6.4) Pub Date : 2024-11-28 Michael Loki, Agnes Mindila, Wilson Cheruiyot
In recent years, machine learning (ML) has witnessed a paradigm shift in kernel function selection, which is pivotal in optimizing various ML models. Despite multiple studies about its significance, a comprehensive understanding of kernel function selection, particularly about model performance, still needs to be explored. Challenges remain in selecting and optimizing kernel functions to improve model
-
Learning to Evaluate (Mis)information in an Online Game: Strategies Matter! Comput. Educ. (IF 8.9) Pub Date : 2024-11-26 Sarit Barzilai, Marc Stadtler
Digital games can help students learn how to cope with misinformation. However, misinformation games typically include multiple game mechanics, making it hard to identify which mechanics contribute to learning. Hence, the aim of this study was to clarify how misinformation games promote learning by examining the effects of two promising misinformation game mechanics– simulating evaluation strategies
-
Content-Specific and Buffer-Based Migration Schemes for Fog Computing IEEE Trans. Serv. Comput. (IF 5.5) Pub Date : 2024-11-26 Mohammed A. Jasim
-
Does personality matter? Understanding the impacts of real-self and avatar personality traits on metaverse satisfaction Internet Res. (IF 5.9) Pub Date : 2024-11-26 Shuiqing Yang, Kang Lin, Xi Wang, Yixiao Li, Yuangao Chen, June Wei
Purpose The metaverse enables users to create their own avatars in a shared virtual space, giving rise to a new avatar personality that differs from their real-self personality. The aim of this research is to explore how users' real-self and avatar personalities may affect their behavioral engagement and satisfaction in the metaverse context. Design/methodology/approach This research applies self-discrepancy
-
Wi-Fi Sensing Techniques for Human Activity Recognition: Brief Survey, Potential Challenges, and Research Directions ACM Comput. Surv. (IF 23.8) Pub Date : 2024-11-25 Fucheng Miao, Youxiang Huang, Zhiyi Lu, Tomoaki Ohtsuki, Guan Gui, Hikmet Sari
Recent advancements in wireless communication technologies have made Wi-Fi signals indispensable in both personal and professional settings. The utilization of these signals for Human Activity Recognition (HAR) has emerged as a cutting-edge technology. By leveraging the fluctuations in Wi-Fi signals for HAR, this approach offers enhanced privacy compared to traditional visual surveillance methods.
-
AI-powered Fraud Detection in Decentralized Finance: A Project Life Cycle Perspective ACM Comput. Surv. (IF 23.8) Pub Date : 2024-11-25 Bingqiao Luo, Zhen Zhang, Qian Wang, Anli Ke, Shengliang Lu, Bingsheng He
Decentralized finance (DeFi) represents a novel financial system but faces significant fraud challenges, leading to substantial losses. Recent advancements in artificial intelligence (AI) show potential for complex fraud detection. Despite growing interest, a systematic review of these methods is lacking. This survey correlates fraud types with DeFi project stages, presenting a taxonomy based on the
-
RMDF-CV: a Reliable Multi-source Data Fusion Scheme with Cross Validation for Quality Service Construction in Mobile Crowd Sensing IEEE Trans. Serv. Comput. (IF 5.5) Pub Date : 2024-11-25 Kejia Fan, Jialin Guo, Runsheng Li, Yuanye Li, Anfeng Liu, Jianheng Tang, Tian Wang, Mianxiong Dong, Houbing Song