scispace - formally typeset
Search or ask a question

Showing papers in "Computer Science Review in 2016"


Journal ArticleDOI
TL;DR: This article presents a comprehensive overview of the evaluation methods and metrics that have been employed by the research community in order to test active learning strategies for collaborative filtering, and examines whether active learning is guided by a single criterion (heuristic) or by multiple criteria.

237 citations


Journal ArticleDOI
TL;DR: A novel taxonomy is introduced to study Named Data Networking features in depth and identifies a set of open challenges which should be addressed by researchers in due course.

228 citations


Journal ArticleDOI
TL;DR: One of the conclusions of this research is that while it does not exist, an enhanced portable framework is needed and it would be beneficial to combine automation of core technologies, producing a reusable automation framework for VR training.

91 citations


Journal ArticleDOI
TL;DR: The automated analysis of bibliometrics can present the land marks of SE and, with thematic analysis, characterize the entire field, which can be useful for students and other new comers to SE and for presenting the authors' achievements to other disciplines.

90 citations


Journal ArticleDOI
TL;DR: In this article, the authors investigate and discuss security and privacy challenges and requirements, considering a variety of adversarial capabilities, and characteristics in the scope of MapReduce, and provide a review of existing security protocols and discuss their overhead issues.

64 citations


Journal ArticleDOI
TL;DR: In this article, the authors present a survey of parallel platforms that support multi-agent simulations and their execution on high performance resources as parallel clusters, and their evaluation in the context of high performance computing.

40 citations


Journal ArticleDOI
TL;DR: This paper presents an up-to-date survey of the well-known NIR methods that are used to solve the problem of illumination and includes a discussion of the benefits and drawbacks of various Nir methods.

37 citations


Journal ArticleDOI
TL;DR: This paper provides an easy-to-grasp overview over functional aspects, security parameters, and robustness offerings by the CAESAR candidates, clustered by their underlying designs (block-cipher-, stream- cipher-, permutation-/sponge-, compression-function-based, dedicated).

30 citations


Journal ArticleDOI
TL;DR: An analytical study on some popular MAC protocols for Wireless Sensor Networks (WSNs) based on the design techniques and an implementation viewpoint of different design approaches of MAC protocols in WSN are reported.

30 citations


Journal ArticleDOI
TL;DR: A survey of administrative document image retrieval in relation to seals and logos is dealt with, where all the available datasets, feature extraction and classification techniques for logo and seal detection/recognition are discussed systematically.

23 citations


Journal ArticleDOI
TL;DR: Current location management schemes for mobile network are discussed and compared with respect to their cost consumption in terms of bytes and the key issues are addressed in the context of location management for future generation mobile network.

Journal ArticleDOI
TL;DR: This paper reviews the existing permutation sorting and permutation decomposition procedures for sorting on graphs with line, star, complete, and ring topologies by adjacent swaps and describes how abstract group-theoretical methods are used to find a minimum-length sequence of adjacent swaps needed to sort objects on those graphs.

Journal ArticleDOI
TL;DR: This work gives a self-contained treatment of an interior-point method which is particularly tailored to the typical mathematical background of CS students, with only limited knowledge of linear algebra and calculus assumed.