99,082 research outputs found
The Landscape of Academic Literature in Quantum Technologies
In this study, we investigated the academic literature on quantum
technologies (QT) using bibliometric tools. We used a set of 49,823 articles
obtained from the Web of Science (WoS) database using a search query
constructed through expert opinion. Analysis of this revealed that QT is deeply
rooted in physics, and the majority of the articles are published in physics
journals. Keyword analysis revealed that the literature could be clustered into
three distinct sets, which are (i) quantum communication/cryptography, (ii)
quantum computation, and (iii) physical realizations of quantum systems. We
performed a burst analysis that showed the emergence and fading away of certain
key concepts in the literature. This is followed by co-citation analysis on the
highly cited articles provided by the WoS, using these we devised a set of core
corpus of 34 publications. Comparing the most highly cited articles in this set
with respect to the initial set we found that there is a clear difference in
most cited subjects. Finally, we performed co-citation analyses on country and
organization levels to find the central nodes in the literature. Overall, the
analyses of the datasets allowed us to cluster the literature into three
distinct sets, construct the core corpus of the academic literature in QT, and
to identify the key players on country and organization levels, thus offering
insight into the current state of the field. Search queries and access to
figures are provided in the appendix.Comment: 32 pages, 10 figures, draft version of a working pape
Introduction to the Special Issue: The AgentLink III Technical Forums
This article introduces the special issue of ACM Transactions on Autonomous and Adaptive Systems devoted to research papers arising from the three Technical Forum Group meetings held in 2004 and 2005 that were organized and sponsored by the European FP6 Coordination Action AgentLink III
The effect of personality on collaborative task performance and interaction
Collocated, multi-user technologies, which support group-work are becoming increasingly popular. Examples include MERL's Diamondtouch and Microsoft's Surface, both of which have evolved from research prototypes to commercial products. Many applications have been developed for such technologies which support the work and entertainment needs of small groups of people. None of these applications however, have been studied in terms of the interactions and performances of their users with regards to their personality. In this paper, we address this research gap by conducting a series of user studies involving dyads working on a number of multi-user applications on the DiamondTouch tabletop device
Re-designing Dynamic Content Delivery in the Light of a Virtualized Infrastructure
We explore the opportunities and design options enabled by novel SDN and NFV
technologies, by re-designing a dynamic Content Delivery Network (CDN) service.
Our system, named MOSTO, provides performance levels comparable to that of a
regular CDN, but does not require the deployment of a large distributed
infrastructure. In the process of designing the system, we identify relevant
functions that could be integrated in the future Internet infrastructure. Such
functions greatly simplify the design and effectiveness of services such as
MOSTO. We demonstrate our system using a mixture of simulation, emulation,
testbed experiments and by realizing a proof-of-concept deployment in a
planet-wide commercial cloud system.Comment: Extended version of the paper accepted for publication in JSAC
special issue on Emerging Technologies in Software-Driven Communication -
November 201
Research Directions, Challenges and Issues in Opinion Mining
Rapid growth of Internet and availability of user reviews on the web for any product has provided a need for an effective system to analyze the web reviews. Such reviews are useful to some extent, promising both the customers and product manufacturers. For any popular product, the number of reviews can be in hundreds or even thousands. This creates difficulty for a customer to analyze them and make important decisions on whether to purchase the product or to not. Mining such product reviews or opinions is termed as opinion mining which is broadly classified into two main categories namely facts and opinions. Though there are several approaches for opinion mining, there remains a challenge to decide on the recommendation provided by the system. In this paper, we analyze the basics of opinion mining, challenges, pros & cons of past opinion mining systems and provide some directions for the future research work, focusing on the challenges and issues
Performance-oriented Cloud Provisioning: Taxonomy and Survey
Cloud computing is being viewed as the technology of today and the future.
Through this paradigm, the customers gain access to shared computing resources
located in remote data centers that are hosted by cloud providers (CP). This
technology allows for provisioning of various resources such as virtual
machines (VM), physical machines, processors, memory, network, storage and
software as per the needs of customers. Application providers (AP), who are
customers of the CP, deploy applications on the cloud infrastructure and then
these applications are used by the end-users. To meet the fluctuating
application workload demands, dynamic provisioning is essential and this
article provides a detailed literature survey of dynamic provisioning within
cloud systems with focus on application performance. The well-known types of
provisioning and the associated problems are clearly and pictorially explained
and the provisioning terminology is clarified. A very detailed and general
cloud provisioning classification is presented, which views provisioning from
different perspectives, aiding in understanding the process inside-out. Cloud
dynamic provisioning is explained by considering resources, stakeholders,
techniques, technologies, algorithms, problems, goals and more.Comment: 14 pages, 3 figures, 3 table
Systemization of Pluggable Transports for Censorship Resistance
An increasing number of countries implement Internet censorship at different
scales and for a variety of reasons. In particular, the link between the
censored client and entry point to the uncensored network is a frequent target
of censorship due to the ease with which a nation-state censor can control it.
A number of censorship resistance systems have been developed thus far to help
circumvent blocking on this link, which we refer to as link circumvention
systems (LCs). The variety and profusion of attack vectors available to a
censor has led to an arms race, leading to a dramatic speed of evolution of
LCs. Despite their inherent complexity and the breadth of work in this area,
there is no systematic way to evaluate link circumvention systems and compare
them against each other. In this paper, we (i) sketch an attack model to
comprehensively explore a censor's capabilities, (ii) present an abstract model
of a LC, a system that helps a censored client communicate with a server over
the Internet while resisting censorship, (iii) describe an evaluation stack
that underscores a layered approach to evaluate LCs, and (iv) systemize and
evaluate existing censorship resistance systems that provide link
circumvention. We highlight open challenges in the evaluation and development
of LCs and discuss possible mitigations.Comment: Content from this paper was published in Proceedings on Privacy
Enhancing Technologies (PoPETS), Volume 2016, Issue 4 (July 2016) as "SoK:
Making Sense of Censorship Resistance Systems" by Sheharbano Khattak, Tariq
Elahi, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch and Ian Goldberg
(DOI 10.1515/popets-2016-0028
- âŠ