Sie sind auf Seite 1von 12

List of Top 25 Articles of Computer Science

July-Sep 2013

Library Information Services, Islamabad.

Sr. No
1

Title
A survey on security issues in service delivery models of cloud computing Abstract: Cloud computing is a way to increase the capacity or add capabilities dynamically without investing in new infrastructure, training new personnel, or licensing new software. It extends Information Technologys (IT) existing capabilities. In the last few years, cloud computing has grown from being a promising business concept to one of the fast growing segments of the IT industry. But as more and more information on individuals and companies are placed in the cloud, concerns are beginning to grow about just how safe an environment it is. Despite of all the hype surrounding the cloud, enterprise customers are still reluctant to deploy their business in the cloud. Security is one of the major issues which reduces the growth of cloud computing and complications with data privacy and data protection continue to plague the market. The advent of an advanced model should not negotiate with the required functionalities and capabilities present in the current model. A new model targeting at improving features of an existing model must not risk or threaten other important features of the current model. The architecture of cloud poses such a threat to the security of the existing technologies when deployed in a cloud environment. Cloud service users need to be vigilant in understanding the risks of data breaches in this new environment. In this paper, a survey of the different security risks that pose a threat to the cloud is presented. This paper is a survey more specific to the different security issues that has emanated due to the nature of the service delivery models of a cloud computing system.

More than words: Social networks' text mining for consumer brand sentiments Abstract Blogs and social networks have recently become a valuable resource for mining sentiments in fields as diverse as customer relationship management, public opinion tracking and text filtering. In fact knowledge obtained from social networks such as Twitter and Facebook has been shown to be extremely valuable to marketing research companies, public opinion organizations and other text mining entities. However, Web texts have been classified as noisy as they represent considerable problems both at the lexical and the syntactic levels. In this research we used a random sample of 3516 tweets to evaluate consumers sentiment towards well-known brands such as Nokia, T-Mobile, IBM, KLM and DHL. We used an expert-predefined lexicon including around 6800 seed adjectives with known orientation to conduct the analysis. Our results indicate a generally positive consumer sentiment towards several famous brands. By using both a qualitative and quantitative methodology to analyze brands tweets, this study adds breadth and depth to the debate over attitudes towards cosmopolitan brands.

2|Page

Library Information Services, Islamabad.

Addressing cloud computing security issues Abstract: The recent emergence of cloud computing has drastically altered everyones perception of infrastructure architectures, software delivery and development models. Projecting as an evolutionary step, following the transition from mainframe computers to client/server deployment models, cloud computing encompasses elements from grid computing, utility computing and autonomic computing, into an innovative deployment architecture. This rapid transition towards the clouds, has fuelled concerns on a critical issue for the success of information systems, communication and information security. From a security perspective, a number of unchartered risks and challenges have been introduced from this relocation to the clouds, deteriorating much of the effectiveness of traditional protection mechanisms. As a result the aim of this paper is twofold; firstly to evaluate cloud security by identifying unique security requirements and secondly to attempt to present a viable solution that eliminates these potential threats. This paper proposes introducing a Trusted Third Party, tasked with assuring specific security characteristics within a cloud environment. The proposed solution calls upon cryptography, specifically Public Key Infrastructure operating in concert with SSO and LDAP, to ensure the authentication, integrity and confidentiality of involved data and communications. The solution, presents a horizontal level of service, available to all implicated entities, that realizes a security mesh, within which essential trust is maintained.

Application of decision-making techniques in supplier selection: A systematic review of literature Abstract Despite the importance of decision-making (DM) techniques for construction of effective decision models for supplier selection, there is a lack of a systematic literature review for it. This paper provides a systematic literature review on articles published from 2008 to 2012 on the application of DM techniques for supplier selection. By using a methodological decision analysis in four aspects including decision problems, decision makers, decision environments, and decision approaches, we finally selected and reviewed 123 journal articles. To examine the research trend on uncertain supplier selection, these articles are roughly classified into seven categories according to different uncertainties. Under such classification framework, 26 DM techniques are identified from three perspectives: (1) Multicriteria decision making (MCDM) techniques, (2) Mathematical programming (MP) techniques, and (3) Artificial intelligence (AI) techniques. We reviewed each of the 26 techniques and analyzed the means of integrating these techniques for supplier selection. Our survey provides the recommendation for future research and facilitates knowledge accumulation and creation concerning the application of DM techniques in supplier selection. Cloud computing - The business perspective Abstract:

3|Page

Library Information Services, Islamabad.

The evolution of cloud computing over the past few years is potentially one of the major advances in the history of computing. However, if cloud computing is to achieve its potential, there needs to be a clear understanding of the various issues involved, both from the perspectives of the providers and the consumers of the technology. While a lot of research is currently taking place in the technology itself, there is an equally urgent need for understanding the business-related issues surrounding cloud computing. In this article, we identify the strengths, weaknesses, opportunities and threats for the cloud computing industry. We then identify the various issues that will affect the different stakeholders of cloud computing. We also issue a set of recommendations for the practitioners who will provide and manage this technology. For IS researchers, we outline the different areas of research that need attention so that we are in a position to advice the industry in the years to come. Finally, we outline some of the key issues facing governmental agencies who, due to the unique nature of the technology, will have to become intimately involved in the regulation of cloud computing.
6

Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility Abstract: With the significant advances in Information and Communications Technology (ICT) over the last half century, there is an increasingly perceived vision that computing will one day be the 5th utility (after water, electricity, gas, and telephony). This computing utility, like all other four existing utilities, will provide the basic level of computing service that is considered essential to meet the everyday needs of the general community. To deliver this vision, a number of computing paradigms have been proposed, of which the latest one is known as Cloud computing. Hence, in this paper, we define Cloud computing and provide the architecture for creating Clouds with market-oriented resource allocation by leveraging technologies such as Virtual Machines (VMs). We also provide insights on market-based resource management strategies that encompass both customer-driven service management and computational risk management to sustain Service Level Agreement (SLA)-oriented resource allocation. In addition, we reveal our early thoughts on interconnecting Clouds for dynamically creating global Cloud exchanges and markets. Then, we present some representative Cloud platforms, especially those developed in industries, along with our current work towards realizing market-oriented resource allocation of Clouds as realized in Aneka enterprise Cloud technology. Furthermore, we highlight the difference between High Performance Computing (HPC) workload and Internet-based services workload. We also describe a meta-negotiation infrastructure to establish global Cloud exchanges and markets, and illustrate a case study of harnessing Storage Clouds for high performance content delivery. Finally, we conclude with the need for convergence of competing IT paradigms to deliver our 21st century vision.

Trademark image retrieval using an integrated shape descriptor Abstract Trademarks are distinctive visual symbols with high reputational value, due to the perception of quality and innovation associated with them.

4|Page

Library Information Services, Islamabad.

They are important reputational assets used as a marketing tool to convey a certain assurance of quality, innovation, and the standards, which the manufacturer seeks to maintain. This motivates the need for trademark protection by providing a solution to prevent infringement. This problem can be addressed by developing retrieval systems capable of comparing the visual similarity of trademarks. This paper contributes to the research in this field by proposing an innovative trademark retrieval technique with improved retrieval performance due to the integration of global and local descriptors. The global descriptor employed is the Zernike moments coefficients. The local descriptor is the edge-gradient co-occurrence matrix, derived from the contour information that is considered very important in human perception of visual similarity. The proposed retrieval technique is tested using the standard MPEG-7 shape database of 1400 images and the MPEG-7 trademark database of 3260 images. The results show 5% precision/recall improvement in the case of the MPEG-7 shape database, as well as 2.35% Bulls eye score improvement and 19.8% NMRR score improvement for the 10 randomly selected trademarks from the MPEG-7 trademarks database.
8

Mining transportation logs for understanding the after-assembly block manufacturing process in the shipbuilding industry Abstract In the after-assembly block manufacturing process in the shipbuilding industry, domain experts or industrial managers have the following questions regarding the first step in terms of reducing the overhead transportation cost due to irregularities not defined in a process design: What tasks are bottlenecks? and How long do the blocks remain waiting in stockyards? We provide the answers to these two questions. In the process mining framework, we propose a method automatically extracting the most frequent task flows from transport usage histories. Considering characteristics of our application, we use a clustering technique to identify heterogeneous groups of process instances, and then derive a process model independently by group. Process models extracted from real-world transportation logs, are verified by domain experts and labelled based on their interpretations. Consequently, we conceptualize the standard process from one global process model. Moreover, local models derived from groups of process instances reflect unknown context regarding characteristics of blocks. Our proposed method can provide conceptualized process models and process (or waiting in stockyards) times as a performance indicator. Providing reasonable answers to their questions, it helps domain experts better understand and manage the actual process. With the extension of the conventional methodology for our application problem, the main contributions of this research are that our proposed approach provides insight into the after-assembly block manufacturing process, and describes the first step for reducing transportation costs. Facebook(R) and academic performance Abstract: There is much talk of a change in modern youth often referred to as digital natives or Homo Zappiens with respect to their ability to simultaneously process multiple channels of information. In other words, kids today can multitask. Unfortunately for proponents of this position, there is much empirical documentation concerning the negative effects of attempting to simultaneously process different streams of information showing that such behavior leads to both increased study time to achieve learning parity and an increase in mistakes while processing information than those who are sequentially or serially processing that same information. This article presents the preliminary

5|Page

Library Information Services, Islamabad.

results of a descriptive and exploratory survey study involving Facebook use, often carried out simultaneously with other study activities, and its relation to academic performance as measured by self-reported Grade Point Average (GPA) and hours spent studying per week. Results show that Facebook users reported having lower GPAs and spend fewer hours per week studying than nonusers.

10

Automatic expert system for weeds/crops identification in images from maize fields Abstract Automation for the identification of plants, based on imaging sensors, in agricultural crops represents an important challenge. In maize fields, site-specific treatments, with chemical products or mechanical manipulations, can be applied for weeds elimination. This requires the identification of weeds and crop plants. Sometimes these plants appear impregnated by materials coming from the soil (particularly clays). This appears when the field is irrigated or after rain, particularly when the water falls with some force. This makes traditional approaches based on images greenness identification fail under such situations. Indeed, most pixels belonging to plants, but impregnated, are misidentified as soil pixels because they have lost their natural greenness. This loss of greenness also occurs after treatment when weeds have begun the process of death. To correctly identify all plants, independently of the loss of greenness, we design an automatic expert system based on image segmentation procedures. The performance of this method is verified favorably. The measuring and control system for improved model based diastat filling quality Abstract The article describes the development and testing of a measurement and control system in industrial environment. This system enables fast and accurate membrane expansion measurements. The membrane is part of the sensor system called diastat, which is filled with a special oil. The diastat is part of mechanical capillary thermostat. To demonstrate the right selection of the measurement equipment and data processing methods, several tests and analysis were performed: the dynamic response of the diastat membrane during filling, measuring accuracy, nonlinearity and temperature stability of the measurement system with integrated distance sensor and the most important verification measurements with reference control procedures in manufacturing process. It was demonstrated that a number of novel approaches need to be introduced enabling installation of the measurement and control system in the production of the thermostat diastats. Identity construction on Facebook: Digital empowerment in anchored relationships Abstract: Early research on online self-presentation mostly focused on identity constructions in anonymous online environments. Such studies found that individuals tended to engage in role-play games and anti-normative behaviors in the online world. More recent studies have examined identity performance in less anonymous online settings such as Internet dating sites and reported different findings. The present study investigates identity construction on Facebook, a newly emerged nonymous online environment. Based on content analysis of 63 Facebook

11

12

6|Page

Library Information Services, Islamabad.

accounts, we find that the identities produced in this nonymous environment differ from those constructed in the anonymous online environments previously reported. Facebook users predominantly claim their identities implicitly rather than explicitly; they show rather than tell and stress group and consumer identities over personally narrated ones. The characteristics of such identities are described and the implications of this finding are discussed.

13

Multi-criteria decision making approaches for supplier evaluation and selection: A literature review Abstract: Supplier evaluation and selection problem has been studied extensively. Various decision making approaches have been proposed to tackle the problem. In contemporary supply chain management, the performance of potential suppliers is evaluated against multiple criteria rather than considering a single factor-cost. This paper reviews the literature of the multi-criteria decision making approaches for supplier evaluation and selection. Related articles appearing in the international journals from 2000 to 2008 are gathered and analyzed so that the following three questions can be answered: (i) Which approaches were prevalently applied? (ii) Which evaluating criteria were paid more attention to? (iii) Is there any inadequacy of the approaches? Based on the inadequacy, if any, some improvements and possible future work are recommended. This research not only provides evidence that the multi-criteria decision making approaches are better than the traditional cost-based approach, but also aids the researchers and decision makers in applying the approaches effectively.

14

Online social networks: Why do students use facebook? Abstract: The growth and popularity of online social networks has created a new world of collaboration and communication. More than a billion individuals around the world are connected and networked together to create, collaborate, and contribute their knowledge and wisdom. Despite the importance of online social networks, there is relatively little theory-driven empirical research available to address this new type of communication and interaction phenomena. In this paper, we explored the factors that drive students to use online social networks (e.g., Facebook). Specifically, we conceptualized the use of online social networks as intentional social action and we examined the relative impact of social influence, social presence, and the five key values from the uses and gratification paradigm on We-Intention to use online social networks. An empirical study of Facebook users (n = 182) revealed that We-Intention to use online social networks is strongly determined by social presence. Among the five values, social related factors had the most significant impact on the intention to use. Implications for research and practice are discussed.

7|Page

Library Information Services, Islamabad.

15

Personality and motivations associated with Facebook use Abstract: Facebook is quickly becoming one of the most popular tools for social communication. However, Facebook is somewhat different from other Social Networking Sites as it demonstrates an offline-to-online trend; that is, the majority of Facebook Friends are met offline and then added later. The present research investigated how the Five-Factor Model of personality relates to Facebook use. Despite some expected trends regarding Extraversion and Openness to Experience, results indicated that personality factors were not as influential as previous literature would suggest. The results also indicated that a motivation to communicate was influential in terms of Facebook use. It is suggested that different motivations may be influential in the decision to use tools such as Facebook, especially when individual functions of Facebook are being considered.

16

Image registration methods: a survey Abstract This paper aims to present a review of recent as well as classic image registration methods. Image registration is the process of overlaying images (two or more) of the same scene taken at different times, from different viewpoints, and/or by different sensors. The registration geometrically align two images (thereference and sensed images). The reviewed approaches are classified according to their nature (areabasedand feature-based) and according to four basic steps of image registration procedure: feature detection,feature matching, mapping function design, and image transformation and resampling. Main contributions, advantages, and drawbacks of the methods are mentioned in the paper. Problematic issues of image registration and outlook for the future research are discussed too. The major goal of the paper is to provide a comprehensive reference source for the researchers involved in image registration, regardless of particular application areas.

8|Page

Library Information Services, Islamabad.

17

Research electronic data capture (REDCap)-A metadata-driven methodology and workflow process for providing translational research informatics support Abstract Research electronic data capture (REDCap) is a novel workflow methodology and software solution designed for rapid development and deployment of electronic data capture tools to support clinical and translational research. We present: (1) a brief description of the REDCap metadata-driven software toolset; (2) detail concerning the capture and use of study-related metadata from scientific research teams; (3) measures of impact for REDCap; (4) details concerning a consortium network of domestic and international institutions collaborating on the project; and (5) strengths and limitations of the REDCap system. REDCap is currently supporting 286 translational research projects in a growing collaborative network including 27 active partner institutions.

18

genEnsemble: A new model for the combination of classifiers and integration of biological knowledge applied to genomic data Abstract In the last years, microarray technology has become widely used in relevant biomedical areas such as drug target identification, pharmacogenomics or clinical research. However, the necessary prerequisites for the development of valuable translational microarray-based diagnostic tools are (i) a solid understanding of the relative strengths and weaknesses of underlying classification methods and (ii) a biologically plausible and understandable behaviour of such models from a biological point of view. In this paper we propose a novel classifier able to combine the advantages of ensemble approaches with the benefits obtained from the true integration of biological knowledge in the classification process of different microarray samples. The aim of the current work is to guarantee the robustness of the proposed classification model when applied to several microarray data in an inter-dataset scenario. The comparative experimental results demonstrated that our proposal working with biological knowledge outperforms other well-known simple classifiers and ensemble alternatives in binary and multiclass cancer prediction problems using publicly available data. Data mining techniques and applications - A decade review from 2000 to 2011 Abstract In order to determine how data mining techniques (DMT) and their applications have developed, during the past decade, this paper reviews data mining techniques and their applications and development, through a survey of literature and the classification of articles, from 2000 to 2011. Keyword indices and article abstracts were used to identify 216 articles concerning DMT applications, from 159 academic journals

19

9|Page

Library Information Services, Islamabad.

20

(retrieved from five online databases), this paper surveys and classifies DMT, with respect to the following three areas: knowledge types, analysis types, and architecture types, together with their applications in different research and practical domains. A discussion deals with the direction of any future developments in DMT methodologies and applications: (1) DMT is finding increasing applications in expertise orientation and the development of applications for DMT is a problem-oriented domain. (2) It is suggested that different social science methodologies, such as psychology, cognitive science and human behavior might implement DMT, as an alternative to the methodologies already on offer. (3) The ability to continually change and acquire new understanding is a driving force for the application of DMT and this will allow many new future applications The Internet of Things: A survey Abstract: This paper addresses the Internet of Things. Main enabling factor of this promising paradigm is the integration of several technologies and communications solutions. Identification and tracking technologies, wired and wireless sensor and actuator networks, enhanced communication protocols (shared with the Next Generation Internet), and distributed intelligence for smart objects are just the most relevant. As one can easily imagine, any serious contribution to the advance of the Internet of Things must necessarily be the result of synergetic activities conducted in different fields of knowledge, such as telecommunications, informatics, electronics and social science. In such a complex scenario, this survey is directed to those who want to approach this complex discipline and contribute to its development. Different visions of this Internet of Things paradigm are reported and enabling technologies reviewed. What emerges is that still major issues shall be faced by the research community. The most relevant among them are addressed in details. Mobile cloud computing: A survey Abstract Despite increasing usage of mobile computing, exploiting its full potential is difficult due to its inherent problems such as resource scarcity, frequent disconnections, and mobility. Mobile cloud computing can address these problems by executing mobile applications on resource providers external to the mobile device. In this paper, we provide an extensive survey of mobile cloud computing research, while highlighting the specific concerns in mobile cloud computing. We present a taxonomy based on the key issues in this area, and discuss the different approaches taken to tackle these issues. We conclude the paper with a critical analysis of challenges that have not yet been fully met, and highlight directions for future work. Who interacts on the Web?: The intersection of users@? personality and social media use Abstract: In the increasingly user-generated Web, users personality traits may be crucial factors leading them to engage in this participatory media. The literature suggests factors such as extraversion, emotional stability and openness to experience are related to uses of social applications on the Internet. Using a national sample of US adults, this study investigated the relationship between these three dimensions of the Big-Five model and social media use (defined as use of social networking sites and instant messages). It also examined whether gender and age played

21

22

10 | P a g e

Library Information Services, Islamabad.

23

a role in that dynamic. Results revealed that while extraversion and openness to experiences were positively related to social media use, emotional stability was a negative predictor, controlling for socio-demographics and life satisfaction. These findings differed by gender and age. While extraverted men and women were both likely to be more frequent users of social media tools, only the men with greater degrees of emotional instability were more regular users. The relationship between extraversion and social media use was particularly important among the young adult cohort. Conversely, being open to new experiences emerged as an important personality predictor of social media use for the more mature segment of the sample. Who uses Facebook? An investigation into the relationship between the Big Five, shyness, narcissism, loneliness, and Facebook usage Abstract: The unprecedented popularity of the social networking site Facebook raises a number of important questions regarding the impact it has on sociality. However, as Facebook is a very recent social phenomenon, there is a distinct lack of psychological theory relating to its use. While research has begun to identify the types of people who use Facebook, this line of investigation has been limited to student populations. The current study aimed to investigate how personality influences usage or non-usage of Facebook. The sample consisted of 1324 self-selected Australian Internet users (1158 Facebook users and 166 Facebook nonusers), between the ages of 18 and 44. Participants were required to complete an online questionnaire package comprising the Big Five Inventory (BFI), the Narcissistic Personality Inventory 29-item version (NPI-29), the Revised Cheek and Buss Shyness Scale (RCBS), and the Social and Emotional Loneliness Scale for Adults Short version (SELSA-S). Facebook users also completed a Facebook usage questionnaire. The results showed that Facebook users tend to be more extraverted and narcissistic, but less conscientious and socially lonely, than nonusers. Furthermore, frequency of Facebook use and preferences for specific features were also shown to vary as a result of certain characteristics, such as neuroticism, loneliness, shyness and narcissism. It is hoped that research in this area continues, and leads to the development of theory regarding the implications and gratifications of Facebook use. Wireless sensor network survey Abstract: A wireless sensor network (WSN) has important applications such as remote environmental monitoring and target tracking. This has been enabled by the availability, particularly in recent years, of sensors that are smaller, cheaper, and intelligent. These sensors are equipped with wireless interfaces with which they can communicate with one another to form a network. The design of a WSN depends significantly on the application, and it must consider factors such as the environment, the applications design objectives, cost, hardware, and system constraints. The goal of our survey is to present a comprehensive review of the recent literature since the publication of [I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, A survey on sensor networks, IEEE Communications Magazine, 2002]. Following a top-down approach, we give an overview of several new applications and then review the literature on various aspects of WSNs. We classify the problems into three different categories: (1) internal platform and underlying operating system, (2) communication protocol stack, and (3) network services, provisioning, and deployment. We review the major development in these three categories and outline new challenges. Wireless sensor networks: a survey

24

25

11 | P a g e

Library Information Services, Islamabad.

Abstract: This paper describes the concept of sensor networks which has been made viable by the convergence of micro-electro-mechanical systems technology, wireless communications and digital electronics. First, the sensing tasks and the potential sensor networks applications are explored, and a review of factors influencing the design of sensor networks is provided. Then, the communication architecture for sensor networks is outlined, and the algorithms and protocols developed for each layer in the literature are explored. Open research issues for the realization of sensor networks are also discussed.

12 | P a g e

Das könnte Ihnen auch gefallen