for Journals by Title or ISSN
for Articles by Keywords
help

Publisher: Elsevier   (Total: 3163 journals)

 A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

        1 2 3 4 5 6 7 8 | Last   [Sort by number of followers]   [Restore default list]

Showing 1 - 200 of 3163 Journals sorted alphabetically
A Practical Logic of Cognitive Systems     Full-text available via subscription   (Followers: 9)
AASRI Procedia     Open Access   (Followers: 14)
Academic Pediatrics     Hybrid Journal   (Followers: 30, SJR: 1.655, CiteScore: 2)
Academic Radiology     Hybrid Journal   (Followers: 22, SJR: 1.015, CiteScore: 2)
Accident Analysis & Prevention     Partially Free   (Followers: 88, SJR: 1.462, CiteScore: 3)
Accounting Forum     Hybrid Journal   (Followers: 25, SJR: 0.932, CiteScore: 2)
Accounting, Organizations and Society     Hybrid Journal   (Followers: 35, SJR: 1.771, CiteScore: 3)
Achievements in the Life Sciences     Open Access   (Followers: 5)
Acta Anaesthesiologica Taiwanica     Open Access   (Followers: 7)
Acta Astronautica     Hybrid Journal   (Followers: 395, SJR: 0.758, CiteScore: 2)
Acta Automatica Sinica     Full-text available via subscription   (Followers: 2)
Acta Biomaterialia     Hybrid Journal   (Followers: 27, SJR: 1.967, CiteScore: 7)
Acta Colombiana de Cuidado Intensivo     Full-text available via subscription   (Followers: 2)
Acta de Investigación Psicológica     Open Access   (Followers: 3)
Acta Ecologica Sinica     Open Access   (Followers: 8, SJR: 0.18, CiteScore: 1)
Acta Haematologica Polonica     Free   (Followers: 1, SJR: 0.128, CiteScore: 0)
Acta Histochemica     Hybrid Journal   (Followers: 3, SJR: 0.661, CiteScore: 2)
Acta Materialia     Hybrid Journal   (Followers: 243, SJR: 3.263, CiteScore: 6)
Acta Mathematica Scientia     Full-text available via subscription   (Followers: 5, SJR: 0.504, CiteScore: 1)
Acta Mechanica Solida Sinica     Full-text available via subscription   (Followers: 9, SJR: 0.542, CiteScore: 1)
Acta Oecologica     Hybrid Journal   (Followers: 10, SJR: 0.834, CiteScore: 2)
Acta Otorrinolaringologica (English Edition)     Full-text available via subscription  
Acta Otorrinolaringológica Española     Full-text available via subscription   (Followers: 2, SJR: 0.307, CiteScore: 0)
Acta Pharmaceutica Sinica B     Open Access   (Followers: 1, SJR: 1.793, CiteScore: 6)
Acta Poética     Open Access   (Followers: 4, SJR: 0.101, CiteScore: 0)
Acta Psychologica     Hybrid Journal   (Followers: 27, SJR: 1.331, CiteScore: 2)
Acta Sociológica     Open Access  
Acta Tropica     Hybrid Journal   (Followers: 6, SJR: 1.052, CiteScore: 2)
Acta Urológica Portuguesa     Open Access  
Actas Dermo-Sifiliograficas     Full-text available via subscription   (Followers: 3, SJR: 0.374, CiteScore: 1)
Actas Dermo-Sifiliográficas (English Edition)     Full-text available via subscription   (Followers: 2)
Actas Urológicas Españolas     Full-text available via subscription   (Followers: 3, SJR: 0.344, CiteScore: 1)
Actas Urológicas Españolas (English Edition)     Full-text available via subscription   (Followers: 1)
Actualites Pharmaceutiques     Full-text available via subscription   (Followers: 6, SJR: 0.19, CiteScore: 0)
Actualites Pharmaceutiques Hospitalieres     Full-text available via subscription   (Followers: 3)
Acupuncture and Related Therapies     Hybrid Journal   (Followers: 6)
Acute Pain     Full-text available via subscription   (Followers: 15, SJR: 2.671, CiteScore: 5)
Ad Hoc Networks     Hybrid Journal   (Followers: 11, SJR: 0.53, CiteScore: 4)
Addictive Behaviors     Hybrid Journal   (Followers: 16, SJR: 1.29, CiteScore: 3)
Addictive Behaviors Reports     Open Access   (Followers: 8, SJR: 0.755, CiteScore: 2)
Additive Manufacturing     Hybrid Journal   (Followers: 9, SJR: 2.611, CiteScore: 8)
Additives for Polymers     Full-text available via subscription   (Followers: 22)
Advanced Cement Based Materials     Full-text available via subscription   (Followers: 3, SJR: 0.732, CiteScore: 3)
Advanced Drug Delivery Reviews     Hybrid Journal   (Followers: 137, SJR: 4.09, CiteScore: 13)
Advanced Engineering Informatics     Hybrid Journal   (Followers: 11, SJR: 1.167, CiteScore: 4)
Advanced Powder Technology     Hybrid Journal   (Followers: 16, SJR: 0.694, CiteScore: 3)
Advances in Accounting     Hybrid Journal   (Followers: 8, SJR: 0.277, CiteScore: 1)
Advances in Agronomy     Full-text available via subscription   (Followers: 12, SJR: 2.384, CiteScore: 5)
Advances in Anesthesia     Full-text available via subscription   (Followers: 28, SJR: 0.126, CiteScore: 0)
Advances in Antiviral Drug Design     Full-text available via subscription   (Followers: 2)
Advances in Applied Mathematics     Full-text available via subscription   (Followers: 10, SJR: 0.992, CiteScore: 1)
Advances in Applied Mechanics     Full-text available via subscription   (Followers: 10, SJR: 1.551, CiteScore: 4)
Advances in Applied Microbiology     Full-text available via subscription   (Followers: 22, SJR: 2.089, CiteScore: 5)
Advances In Atomic, Molecular, and Optical Physics     Full-text available via subscription   (Followers: 14, SJR: 0.572, CiteScore: 2)
Advances in Biological Regulation     Hybrid Journal   (Followers: 4, SJR: 2.61, CiteScore: 7)
Advances in Botanical Research     Full-text available via subscription   (Followers: 2, SJR: 0.686, CiteScore: 2)
Advances in Cancer Research     Full-text available via subscription   (Followers: 29, SJR: 3.043, CiteScore: 6)
Advances in Carbohydrate Chemistry and Biochemistry     Full-text available via subscription   (Followers: 7, SJR: 1.453, CiteScore: 2)
Advances in Catalysis     Full-text available via subscription   (Followers: 5, SJR: 1.992, CiteScore: 5)
Advances in Cell Aging and Gerontology     Full-text available via subscription   (Followers: 3)
Advances in Cellular and Molecular Biology of Membranes and Organelles     Full-text available via subscription   (Followers: 12)
Advances in Chemical Engineering     Full-text available via subscription   (Followers: 27, SJR: 0.156, CiteScore: 1)
Advances in Child Development and Behavior     Full-text available via subscription   (Followers: 10, SJR: 0.713, CiteScore: 1)
Advances in Chronic Kidney Disease     Full-text available via subscription   (Followers: 10, SJR: 1.316, CiteScore: 2)
Advances in Clinical Chemistry     Full-text available via subscription   (Followers: 28, SJR: 1.562, CiteScore: 3)
Advances in Colloid and Interface Science     Full-text available via subscription   (Followers: 19, SJR: 1.977, CiteScore: 8)
Advances in Computers     Full-text available via subscription   (Followers: 14, SJR: 0.205, CiteScore: 1)
Advances in Dermatology     Full-text available via subscription   (Followers: 15)
Advances in Developmental Biology     Full-text available via subscription   (Followers: 11)
Advances in Digestive Medicine     Open Access   (Followers: 8)
Advances in DNA Sequence-Specific Agents     Full-text available via subscription   (Followers: 5)
Advances in Drug Research     Full-text available via subscription   (Followers: 23)
Advances in Ecological Research     Full-text available via subscription   (Followers: 42, SJR: 2.524, CiteScore: 4)
Advances in Engineering Software     Hybrid Journal   (Followers: 27, SJR: 1.159, CiteScore: 4)
Advances in Experimental Biology     Full-text available via subscription   (Followers: 7)
Advances in Experimental Social Psychology     Full-text available via subscription   (Followers: 43, SJR: 5.39, CiteScore: 8)
Advances in Exploration Geophysics     Full-text available via subscription   (Followers: 1)
Advances in Fluorine Science     Full-text available via subscription   (Followers: 9)
Advances in Food and Nutrition Research     Full-text available via subscription   (Followers: 53, SJR: 0.591, CiteScore: 2)
Advances in Fuel Cells     Full-text available via subscription   (Followers: 17)
Advances in Genetics     Full-text available via subscription   (Followers: 15, SJR: 1.354, CiteScore: 4)
Advances in Genome Biology     Full-text available via subscription   (Followers: 8, SJR: 12.74, CiteScore: 13)
Advances in Geophysics     Full-text available via subscription   (Followers: 6, SJR: 1.193, CiteScore: 3)
Advances in Heat Transfer     Full-text available via subscription   (Followers: 21, SJR: 0.368, CiteScore: 1)
Advances in Heterocyclic Chemistry     Full-text available via subscription   (Followers: 11, SJR: 0.749, CiteScore: 3)
Advances in Human Factors/Ergonomics     Full-text available via subscription   (Followers: 22)
Advances in Imaging and Electron Physics     Full-text available via subscription   (Followers: 2, SJR: 0.193, CiteScore: 0)
Advances in Immunology     Full-text available via subscription   (Followers: 37, SJR: 4.433, CiteScore: 6)
Advances in Inorganic Chemistry     Full-text available via subscription   (Followers: 8, SJR: 1.163, CiteScore: 2)
Advances in Insect Physiology     Full-text available via subscription   (Followers: 2, SJR: 1.938, CiteScore: 3)
Advances in Integrative Medicine     Hybrid Journal   (Followers: 6, SJR: 0.176, CiteScore: 0)
Advances in Intl. Accounting     Full-text available via subscription   (Followers: 3)
Advances in Life Course Research     Hybrid Journal   (Followers: 8, SJR: 0.682, CiteScore: 2)
Advances in Lipobiology     Full-text available via subscription   (Followers: 1)
Advances in Magnetic and Optical Resonance     Full-text available via subscription   (Followers: 9)
Advances in Marine Biology     Full-text available via subscription   (Followers: 14, SJR: 0.88, CiteScore: 2)
Advances in Mathematics     Full-text available via subscription   (Followers: 11, SJR: 3.027, CiteScore: 2)
Advances in Medical Sciences     Hybrid Journal   (Followers: 6, SJR: 0.694, CiteScore: 2)
Advances in Medicinal Chemistry     Full-text available via subscription   (Followers: 5)
Advances in Microbial Physiology     Full-text available via subscription   (Followers: 4, SJR: 1.158, CiteScore: 3)
Advances in Molecular and Cell Biology     Full-text available via subscription   (Followers: 21)
Advances in Molecular and Cellular Endocrinology     Full-text available via subscription   (Followers: 8)
Advances in Molecular Toxicology     Full-text available via subscription   (Followers: 7, SJR: 0.182, CiteScore: 0)
Advances in Nanoporous Materials     Full-text available via subscription   (Followers: 3)
Advances in Oncobiology     Full-text available via subscription   (Followers: 1)
Advances in Organ Biology     Full-text available via subscription   (Followers: 1)
Advances in Organometallic Chemistry     Full-text available via subscription   (Followers: 16, SJR: 1.875, CiteScore: 4)
Advances in Parallel Computing     Full-text available via subscription   (Followers: 6, SJR: 0.174, CiteScore: 0)
Advances in Parasitology     Full-text available via subscription   (Followers: 5, SJR: 1.579, CiteScore: 4)
Advances in Pediatrics     Full-text available via subscription   (Followers: 24, SJR: 0.461, CiteScore: 1)
Advances in Pharmaceutical Sciences     Full-text available via subscription   (Followers: 10)
Advances in Pharmacology     Full-text available via subscription   (Followers: 16, SJR: 1.536, CiteScore: 3)
Advances in Physical Organic Chemistry     Full-text available via subscription   (Followers: 8, SJR: 0.574, CiteScore: 1)
Advances in Phytomedicine     Full-text available via subscription  
Advances in Planar Lipid Bilayers and Liposomes     Full-text available via subscription   (Followers: 3, SJR: 0.109, CiteScore: 1)
Advances in Plant Biochemistry and Molecular Biology     Full-text available via subscription   (Followers: 8)
Advances in Plant Pathology     Full-text available via subscription   (Followers: 5)
Advances in Porous Media     Full-text available via subscription   (Followers: 5)
Advances in Protein Chemistry     Full-text available via subscription   (Followers: 18)
Advances in Protein Chemistry and Structural Biology     Full-text available via subscription   (Followers: 19, SJR: 0.791, CiteScore: 2)
Advances in Psychology     Full-text available via subscription   (Followers: 59)
Advances in Quantum Chemistry     Full-text available via subscription   (Followers: 6, SJR: 0.371, CiteScore: 1)
Advances in Radiation Oncology     Open Access   (SJR: 0.263, CiteScore: 1)
Advances in Small Animal Medicine and Surgery     Hybrid Journal   (Followers: 3, SJR: 0.101, CiteScore: 0)
Advances in Space Biology and Medicine     Full-text available via subscription   (Followers: 5)
Advances in Space Research     Full-text available via subscription   (Followers: 386, SJR: 0.569, CiteScore: 2)
Advances in Structural Biology     Full-text available via subscription   (Followers: 5)
Advances in Surgery     Full-text available via subscription   (Followers: 10, SJR: 0.555, CiteScore: 2)
Advances in the Study of Behavior     Full-text available via subscription   (Followers: 30, SJR: 2.208, CiteScore: 4)
Advances in Veterinary Medicine     Full-text available via subscription   (Followers: 17)
Advances in Veterinary Science and Comparative Medicine     Full-text available via subscription   (Followers: 13)
Advances in Virus Research     Full-text available via subscription   (Followers: 5, SJR: 2.262, CiteScore: 5)
Advances in Water Resources     Hybrid Journal   (Followers: 46, SJR: 1.551, CiteScore: 3)
Aeolian Research     Hybrid Journal   (Followers: 6, SJR: 1.117, CiteScore: 3)
Aerospace Science and Technology     Hybrid Journal   (Followers: 338, SJR: 0.796, CiteScore: 3)
AEU - Intl. J. of Electronics and Communications     Hybrid Journal   (Followers: 8, SJR: 0.42, CiteScore: 2)
African J. of Emergency Medicine     Open Access   (Followers: 6, SJR: 0.296, CiteScore: 0)
Ageing Research Reviews     Hybrid Journal   (Followers: 10, SJR: 3.671, CiteScore: 9)
Aggression and Violent Behavior     Hybrid Journal   (Followers: 438, SJR: 1.238, CiteScore: 3)
Agri Gene     Hybrid Journal   (SJR: 0.13, CiteScore: 0)
Agricultural and Forest Meteorology     Hybrid Journal   (Followers: 15, SJR: 1.818, CiteScore: 5)
Agricultural Systems     Hybrid Journal   (Followers: 31, SJR: 1.156, CiteScore: 4)
Agricultural Water Management     Hybrid Journal   (Followers: 43, SJR: 1.272, CiteScore: 3)
Agriculture and Agricultural Science Procedia     Open Access   (Followers: 1)
Agriculture and Natural Resources     Open Access   (Followers: 2)
Agriculture, Ecosystems & Environment     Hybrid Journal   (Followers: 56, SJR: 1.747, CiteScore: 4)
Ain Shams Engineering J.     Open Access   (Followers: 5, SJR: 0.589, CiteScore: 3)
Air Medical J.     Hybrid Journal   (Followers: 6, SJR: 0.26, CiteScore: 0)
AKCE Intl. J. of Graphs and Combinatorics     Open Access   (SJR: 0.19, CiteScore: 0)
Alcohol     Hybrid Journal   (Followers: 11, SJR: 1.153, CiteScore: 3)
Alcoholism and Drug Addiction     Open Access   (Followers: 9)
Alergologia Polska : Polish J. of Allergology     Full-text available via subscription   (Followers: 1)
Alexandria Engineering J.     Open Access   (Followers: 1, SJR: 0.604, CiteScore: 3)
Alexandria J. of Medicine     Open Access   (Followers: 1, SJR: 0.191, CiteScore: 1)
Algal Research     Partially Free   (Followers: 10, SJR: 1.142, CiteScore: 4)
Alkaloids: Chemical and Biological Perspectives     Full-text available via subscription   (Followers: 2)
Allergologia et Immunopathologia     Full-text available via subscription   (Followers: 1, SJR: 0.504, CiteScore: 1)
Allergology Intl.     Open Access   (Followers: 5, SJR: 1.148, CiteScore: 2)
Alpha Omegan     Full-text available via subscription   (SJR: 3.521, CiteScore: 6)
ALTER - European J. of Disability Research / Revue Européenne de Recherche sur le Handicap     Full-text available via subscription   (Followers: 9, SJR: 0.201, CiteScore: 1)
Alzheimer's & Dementia     Hybrid Journal   (Followers: 50, SJR: 4.66, CiteScore: 10)
Alzheimer's & Dementia: Diagnosis, Assessment & Disease Monitoring     Open Access   (Followers: 4, SJR: 1.796, CiteScore: 4)
Alzheimer's & Dementia: Translational Research & Clinical Interventions     Open Access   (Followers: 4, SJR: 1.108, CiteScore: 3)
Ambulatory Pediatrics     Hybrid Journal   (Followers: 6)
American Heart J.     Hybrid Journal   (Followers: 50, SJR: 3.267, CiteScore: 4)
American J. of Cardiology     Hybrid Journal   (Followers: 51, SJR: 1.93, CiteScore: 3)
American J. of Emergency Medicine     Hybrid Journal   (Followers: 44, SJR: 0.604, CiteScore: 1)
American J. of Geriatric Pharmacotherapy     Full-text available via subscription   (Followers: 10)
American J. of Geriatric Psychiatry     Hybrid Journal   (Followers: 14, SJR: 1.524, CiteScore: 3)
American J. of Human Genetics     Hybrid Journal   (Followers: 32, SJR: 7.45, CiteScore: 8)
American J. of Infection Control     Hybrid Journal   (Followers: 26, SJR: 1.062, CiteScore: 2)
American J. of Kidney Diseases     Hybrid Journal   (Followers: 34, SJR: 2.973, CiteScore: 4)
American J. of Medicine     Hybrid Journal   (Followers: 43)
American J. of Medicine Supplements     Full-text available via subscription   (Followers: 3, SJR: 1.967, CiteScore: 2)
American J. of Obstetrics and Gynecology     Hybrid Journal   (Followers: 201, SJR: 2.7, CiteScore: 4)
American J. of Ophthalmology     Hybrid Journal   (Followers: 61, SJR: 3.184, CiteScore: 4)
American J. of Ophthalmology Case Reports     Open Access   (Followers: 5, SJR: 0.265, CiteScore: 0)
American J. of Orthodontics and Dentofacial Orthopedics     Full-text available via subscription   (Followers: 6, SJR: 1.289, CiteScore: 1)
American J. of Otolaryngology     Hybrid Journal   (Followers: 25, SJR: 0.59, CiteScore: 1)
American J. of Pathology     Hybrid Journal   (Followers: 27, SJR: 2.139, CiteScore: 4)
American J. of Preventive Medicine     Hybrid Journal   (Followers: 27, SJR: 2.164, CiteScore: 4)
American J. of Surgery     Hybrid Journal   (Followers: 37, SJR: 1.141, CiteScore: 2)
American J. of the Medical Sciences     Hybrid Journal   (Followers: 12, SJR: 0.767, CiteScore: 1)
Ampersand : An Intl. J. of General and Applied Linguistics     Open Access   (Followers: 6)
Anaerobe     Hybrid Journal   (Followers: 4, SJR: 1.144, CiteScore: 3)
Anaesthesia & Intensive Care Medicine     Full-text available via subscription   (Followers: 63, SJR: 0.138, CiteScore: 0)
Anaesthesia Critical Care & Pain Medicine     Full-text available via subscription   (Followers: 15, SJR: 0.411, CiteScore: 1)
Anales de Cirugia Vascular     Full-text available via subscription  
Anales de Pediatría     Full-text available via subscription   (Followers: 3, SJR: 0.277, CiteScore: 0)
Anales de Pediatría (English Edition)     Full-text available via subscription  
Anales de Pediatría Continuada     Full-text available via subscription  
Analytic Methods in Accident Research     Hybrid Journal   (Followers: 5, SJR: 4.849, CiteScore: 10)
Analytica Chimica Acta     Hybrid Journal   (Followers: 39, SJR: 1.512, CiteScore: 5)
Analytical Biochemistry     Hybrid Journal   (Followers: 175, SJR: 0.633, CiteScore: 2)
Analytical Chemistry Research     Open Access   (Followers: 10, SJR: 0.411, CiteScore: 2)
Analytical Spectroscopy Library     Full-text available via subscription   (Followers: 11)
Anesthésie & Réanimation     Full-text available via subscription   (Followers: 2)
Anesthesiology Clinics     Full-text available via subscription   (Followers: 23, SJR: 0.683, CiteScore: 2)
Angiología     Full-text available via subscription   (SJR: 0.121, CiteScore: 0)
Angiologia e Cirurgia Vascular     Open Access   (Followers: 1, SJR: 0.111, CiteScore: 0)

        1 2 3 4 5 6 7 8 | Last   [Sort by number of followers]   [Restore default list]

Journal Cover
Advances in Computers
Journal Prestige (SJR): 0.205
Citation Impact (citeScore): 1
Number of Followers: 14  
 
  Full-text available via subscription Subscription journal
ISSN (Print) 0065-2458
Published by Elsevier Homepage  [3163 journals]
  • Chapter One A Detailed Analysis of NoSQL and NewSQL Databases for Bigdata
           Analytics and Distributed Computing
    • Authors: Pethuru Raj
      Pages: 1 - 48
      Abstract: Publication date: 2018
      Source:Advances in Computers, Volume 109
      Author(s): Pethuru Raj
      In the recent past, different database management systems are emerging and evolving fast in order to systematically and spontaneously tackle the growing varieties and vagaries of data structures, schemas, sizes, speeds, and scopes. That is, all kinds of data have to be carefully and consciously collected, cleansed, and crunched in order to squeeze out actionable and timely insights out of exponentially exploding data heaps. Data is turning out be a strategic asset for any growing and glowing organization across the world in order to devise perfect and precise strategies and roll out correct activities in time with all the clarity, continuity, and confidence. The noteworthy point here is that you cannot throw out any data (internal as well as external) as data can potentially emit viable and venerable information and insights when subjected to decisive and deeper investigations. Not only for data transformation, ingestion, mining, processing, and analytics but also for effective data engineering, management, governance, representation, exchange, persistence, and science, we need efficient technologies, tools, and tips. As we are heading toward the dreamt knowledge era, the role and responsibility of new-generation database systems are bound to escalate in the days ahead. This chapter is primarily prepared to tell all about the various NoSQL and NewSQL databases and how they come handy in augmenting, accelerating, and automating the highly complicated phenomenon of next-generation data analytics.

      PubDate: 2018-04-25T12:13:07Z
      DOI: 10.1016/bs.adcom.2018.01.002
      Issue No: Vol. 109 (2018)
       
  • Chapter Two NewSQL Databases and Scalable In-Memory Analytics
    • Authors: Siddhartha Duggirala
      Pages: 49 - 76
      Abstract: Publication date: 2018
      Source:Advances in Computers, Volume 109
      Author(s): Siddhartha Duggirala
      The velocity of the data generation is accelerated and the value associated with it diminishes with time. If not processed in real time businesses have to face lost opportunities with financial implications and sometimes, especially in industrial IoT scenarios, can result in fatal situations. The question we will be trying to find an answer for is how do we organize scalable stored data with low-latency read and writes and process it in real time' SQL is the industry standard language that stands for Structured Query Language. This is the language used by relational databases to query and manage data. These databases form the bedrock for the world's transactions. These databases are strongly ACID compliant. NoSQL is Not Only SQL database which is a group of data management systems with common characteristic of high availability and massive scaling. NewSQL databases are massively scalable ACID-compliant databases. SAP HANA, NuoDB, and VoltDB are few NewSQL databases. In-memory databases are group of databases for which the primary data storage is in memory instead of disk storage. This provides huge performance improvements due to sheer access latency difference between memory and disk. In this chapter we will study the SQL databases and NoSQL databases in the purview of the IMDBs.

      PubDate: 2018-04-25T12:13:07Z
      DOI: 10.1016/bs.adcom.2018.01.004
      Issue No: Vol. 109 (2018)
       
  • Introduction to Emerging SRAM-Based FPGA Architectures in Dark Silicon Era
    • Abstract: Publication date: Available online 19 June 2018
      Source:Advances in Computers
      Author(s): Zeinab Seifoori, Zahra Ebrahimi, Behnam Khaleghi, Hossein Asadi
      The increased leakage power of deep-nano technologies in the one hand, and exponential growth in the number of transistors in a given die particularly in Field-Programmable Gate Arrays (FPGAs) have resulted in an intensified rate of static power dissipation as well as power density. This ever-increasing static power consumption acts as a power wall to further integration of transistors and has caused the breakdown of Dennard scaling. To meet the available power budget and preclude reliability challenges associated with high power density, designers are obligated to restrict the active percentage of the chip by powering off a selective fraction of silicon die, referred to as Dark Silicon. Several promising architectures have been proposed to enhance the static power and energy efficiency in FPGAs. The main approach in the majority of suggested architectures includes applying power gating to unused logic and routing resources and/or designing power-efficient logic and routing elements such as Reconfigurable Hard Logics as an alternative for conventional Look-up Tables. This study represents a survey on evolution of SRAM-based FPGA architectures toward the era of dark silicon.

      PubDate: 2018-06-19T10:33:58Z
       
  • Revisiting Processor Allocation and Application Mapping in Future CMPs in
           Dark Silicon Era
    • Abstract: Publication date: Available online 19 June 2018
      Source:Advances in Computers
      Author(s): Mohaddeseh Hoveida, Fatemeh Aghaaliakbari, Majid Jalili, Ramin Bashizade, Mohammad Arjomand, Hamid Sarbazi-Azad
      With technology advances and the emergence of new fabrication and VLSI technologies, current and future chip multiprocessors (CMPs) are expected to have tens to hundreds of processing elements and Gigabytes of on-chip caches, which are connected by a high bandwidth network-on-chip (NoC). Unfortunately, due to limited power budget of a computing system, specially for its processing element(s), it is impossible to keep all cores, caches, and network elements working at highest voltage level—that would resulted in dark silicon computing era, where by employing system-level or architecture-level techniques, one can keep a great portion of a CMP elements OFF (or in dim mode) to meet the power budget of the system while the system still delivers a high-performance computation. In this work, we first describe the importance of NoC design and management in delivering high-performance computation in a dark silicon-based CMP platform—we propose a novel highly scalable NoC architecture and its required management policies in order to support turning some routers/links/buffers OFF while guaranteeing that it delivers the bandwidth needs of the running application(s). Then, by employing the introduced NoC architecture, we propose to revisit the processor allocation strategy and application-to-core mapping algorithm in order to make maximum use of the provided NoC bandwidth and capability while meeting the power and performance goals of the hardware platform and application, respectively. Our extensive simulation results of a 64-core CMP model show that the proposed algorithms are able to improve the system performance by 10%–50% when running multithreaded applications.

      PubDate: 2018-06-19T10:33:58Z
       
  • Dynamic Power Management for Dark Silicon Multicore Processors☆☆Parts
           of this chapter describe the author's prior work in publications [1–3].
           Consequently, some of the text and the figures in this chapter are adapted
           from these prior publications.
    • Authors: Siddharth Garg
      Abstract: Publication date: Available online 23 May 2018
      Source:Advances in Computers
      Author(s): Siddharth Garg
      Multicore processors in the dark silicon era will be over-provisioned with multiple cores of different types and will have to satisfy stringent power constraints while maximizing performance. As such, a critical research problem is that of developing new, effective, and scalable run-time dynamic power management techniques and algorithms to effectively make use of the over-provisioned but power-constrained computational resources on a chip. This chapter surveys the state of the art on this subject and dives in-depth into three specific dynamic power management solutions for multicore processors in the dark silicon era.

      PubDate: 2018-05-29T23:37:32Z
      DOI: 10.1016/bs.adcom.2018.03.016
       
  • Advances in Using Agile and Lean Processes for Software Development
    • Authors: Pilar Rodríguez; Mika Mäntylä; Markku Oivo; Lucy Ellen Lwakatare; Pertti Seppänen; Pasi Kuvaja
      Abstract: Publication date: Available online 16 May 2018
      Source:Advances in Computers
      Author(s): Pilar Rodríguez, Mika Mäntylä, Markku Oivo, Lucy Ellen Lwakatare, Pertti Seppänen, Pasi Kuvaja
      Software development processes have evolved according to market needs. Fast changing conditions that characterize current software markets have favored methods advocating speed and flexibility. Agile and Lean software development are in the forefront of these methods. This chapter presents a unified view of Agile software development, Lean software development, and most recent advances toward rapid releases. First, we introduce the area and explain the reasons why the software development industry begun to move into this direction in the late 1990s. Section 2 characterizes the research trends on Agile software development. This section helps understand the relevance of Agile software development in the research literature. Section 3 provides a walk through the roots of Agile and Lean thinking, as they originally emerged in manufacturing. Section 4 develops into Agile and Lean for software development. Main characteristics and most popular methods and practices of Agile and Lean software development are developed in this section. Section 5 centers on rapid releases, continuous delivery, and continuous deployment, the latest advances in the area to get speed. The concepts of DevOps, as a means to take full (end-to-end) advantage of Agile and Lean, and Lean start-up, as an approach to foster innovation, are the focus of the two following Sections 6 and 7. Finally, Section 8 focuses on two important aspects of Agile and Lean software development: (1) metrics to guide decision making and (2) technical debt as a mechanism to gain business advantage. To wrap up the chapter, we peer into future directions in the area.

      PubDate: 2018-05-29T23:37:32Z
      DOI: 10.1016/bs.adcom.2018.03.014
       
  • Blockchain Technology: Supply Chain Insights from ERP
    • Authors: Arnab Banerjee
      Abstract: Publication date: Available online 11 May 2018
      Source:Advances in Computers
      Author(s): Arnab Banerjee
      The chapter provides a high level understanding of how ERP system alongside Blockchain technology will be a powerful tool to improve supply chain operations. The chapter details out how the two technologies will complement each other in every aspect of supply chain functions bringing in transparency, efficiency, and cost reduction. The chapter considers every aspects of supply chain for an ERP enabled organizations and details out use cases for master data, engineering design, sales process, procurement process, demand and supply planning process, manufacturing process, and logistics management processes. The chapter provides use case details and high level understanding of technology for product provenance and how it can bring in supply chain transparency using blockchain. The chapter illustrates theoretical and conceptual model for use of open and permissioned blockchain in different supply chain applications with real life practical use cases as is being developed and deployed in various industries and business functions. The chapter also emphasizes the use of blockchain in distribution industry and how it can solve pertinent problems as it exists today in the distribution supply chain. The chapter ends with an outlook of blockchain how it will shape the future to come and challenges which lies there within.

      PubDate: 2018-05-29T23:37:32Z
      DOI: 10.1016/bs.adcom.2018.03.007
       
  • Blockchain for a Trust Network Among Intelligent Vehicles
    • Authors: Shiho Kim
      Abstract: Publication date: Available online 11 May 2018
      Source:Advances in Computers
      Author(s): Shiho Kim
      The intelligent vehicle communication network is prone to cyberthreats, which are difficult to solve using traditional centralized security approaches. Blockchain is an immutable peer-to-peer distributed database containing cryptographically secured information. Blockchain shows successful use cases in financial applications, smart contact, protecting digital copyright of media contents. It extends to all industries including the secure IoT devices, embedded systems, etc. The superior feature of blockchain is its decentralized, immutable, auditable database that secures transactions by protecting privacy. In this chapter, we contemplate the environment of the intelligent vehicle communication network and issues regarding methods of building a blockchain-based trust network among intelligent vehicles. We present the use cases of blockchain in intelligent vehicles in the phase of ongoing research or that under development from automotive industries and academic institutes. We also deliberate the challenging issue of blockchain for intelligent vehicles.

      PubDate: 2018-05-29T23:37:32Z
      DOI: 10.1016/bs.adcom.2018.03.010
       
  • Multiobjectivism in Dark Silicon Age
    • Authors: Amin Rezaei; Masoud Daneshtalab; Hai Zhou
      Abstract: Publication date: Available online 10 May 2018
      Source:Advances in Computers
      Author(s): Amin Rezaei, Masoud Daneshtalab, Hai Zhou
      MCSoCs, with their scalability and parallel computation power, provide an ideal implementation base for modern embedded systems. However, chip designers are facing a design challenge wherein shrinking component sizes though have improved density but started stressing energy budget. This phenomenon, that is called utilization wall, has revolutionized the semiconductor industry by shifting the main purpose of chip design from a performance-driven approach to a complex multiobjective one. The area of the chip which cannot be powered is known as dark silicon. In this chapter, we address the multiobjectivism in dark silicon age. First, we overview state-of-the-art works in a categorized manner. Second, we introduce a NoC-based MCSoC architecture, named shift sprinting, in order to increase overall reliability as well as gain high performance. Third, we explain an application mapping approach, called round rotary mapping, for HWNoC-based MCSoC in order to first balance the usage of wireless links by avoiding congestion over wireless routers and second spread temperature across the whole chip by utilizing dark silicon. Finally, we conclude the chapter by providing a future outlook of dark silicon research trend.

      PubDate: 2018-05-29T23:37:32Z
      DOI: 10.1016/bs.adcom.2018.03.012
       
  • Privacy Requirements in Cybersecurity Applications of Blockchain
    • Authors: Louise Axon; Michael Goldsmith; Sadie Creese
      Abstract: Publication date: Available online 10 May 2018
      Source:Advances in Computers
      Author(s): Louise Axon, Michael Goldsmith, Sadie Creese
      Blockchain has promise as an approach to developing systems for a number of applications within cybersecurity. In Blockchain-based systems, data and authority can be distributed, and transparent and reliable transaction ledgers created. Some of the key advantages of Blockchain for cybersecurity applications are in conflict with privacy properties, yet many of the potential applications have complex requirements for privacy. Privacy-enabling approaches for Blockchain have been introduced, such as private Blockchains, and methods for enabling parties to act pseudonymously, but it is as yet unclear which approaches are suitable in which applications. We explore a set of proposed uses of Blockchain within cybersecurity and consider their requirements for privacy. We compare these requirements with the privacy provision of Blockchain and explore the trade-off between security and privacy, reflecting on the effect of using privacy-enabling approaches on the security advantages that Blockchain can offer.

      PubDate: 2018-05-29T23:37:32Z
      DOI: 10.1016/bs.adcom.2018.03.004
       
  • Mutation Testing Advances: An Analysis and Survey
    • Authors: Mike Papadakis; Marinos Kintis; Jie Zhang; Yue Jia; Yves Le Traon; Mark Harman
      Abstract: Publication date: Available online 7 May 2018
      Source:Advances in Computers
      Author(s): Mike Papadakis, Marinos Kintis, Jie Zhang, Yue Jia, Yves Le Traon, Mark Harman
      Mutation testing realizes the idea of using artificial defects to support testing activities. Mutation is typically used as a way to evaluate the adequacy of test suites, to guide the generation of test cases, and to support experimentation. Mutation has reached a maturity phase and gradually gains popularity both in academia and in industry. This chapter presents a survey of recent advances, over the past decade, related to the fundamental problems of mutation testing and sets out the challenges and open problems for the future development of the method. It also collects advices on best practices related to the use of mutation in empirical studies of software testing. Thus, giving the reader a “mini-handbook”-style roadmap for the application of mutation testing as experimental methodology.

      PubDate: 2018-05-29T23:37:32Z
      DOI: 10.1016/bs.adcom.2018.03.015
       
  • Blockchain for Business: Next-Generation Enterprise Artificial
           Intelligence Systems
    • Authors: Melanie Swan
      Abstract: Publication date: Available online 4 May 2018
      Source:Advances in Computers
      Author(s): Melanie Swan
      This chapter discusses Blockchain distributed ledgers in the context of public and private Blockchains, enterprise Blockchain deployments, and the role of Blockchains in next-generation artificial intelligence systems, notably deep learning Blockchains. Blockchain technology is a software protocol for the secure transfer of unique instances of value (e.g., money, property, contracts, and identity credentials) via the Internet without requiring a third-party intermediary such as a bank or government. Public Blockchains such as Bitcoin and Ethereum are trustless (human counterparties and intermediaries do not need to be trusted, just the software) and permissionless (open use), whereas private Blockchains are trusted and permissioned. Enterprise Blockchains are private (trusted, not trustless) immutable decentralized ledgers, with varying methods of reaching consensus (validating and recording transactions). Four enterprise systems are examined: R3’s Corda, Ethereum Quorum, Hyperledger Fabric, and Ripple. New business analytics and data science methods are needed such as next-generation artificial intelligence solutions in the form of deep learning algorithms together with Blockchains. The hidden benefit of Blockchain for data analytics is its role in creating “clean data”: validated, trustable, interoperable, and standardized data. Business Blockchains may develop across industry supply chains with shared business logic and processes, and shared financial ledgers. Payment channels and smart contract asset pledging may allow net settlement across supply chains and reduce debt and working capital obligations. Specific use cases are considered in global automotive supply chains, healthcare, digital identity credentialing, higher education, digital collectibles (CryptoKitties), and asset tokens (Primalbase).

      PubDate: 2018-05-29T23:37:32Z
      DOI: 10.1016/bs.adcom.2018.03.013
       
  • Applications of Blockchain in the Financial Sector and a Peer-to-Peer
           Global Barter Web
    • Authors: Kazuki Ikeda; Md-Nafiz Hamid
      Abstract: Publication date: Available online 2 May 2018
      Source:Advances in Computers
      Author(s): Kazuki Ikeda, Md-Nafiz Hamid
      Recent advances in Blockchain technology has opened up a vast array of decentralized and distributed systems. The most significant contribution of this technology is it gets rid of the third-party functioning as a mediator in systems that requires trust for any kind of transaction. From this perspective, transaction of money is fundamentally an authorized third-party mediating trade of goods or services. In this chapter, we first review the conventional applications of Blockchain and next propose a novel economic system in which such value-added items are exchanged without using money and without going through a third party. In the long history of economics from ancient times, the monetized economy system today has a very short record, and it is essentially based on the existence of trustworthy central banks, governments, and organizations. However in line with the recent growing sense of decentralized systems and in keeping with unstable international affairs including the recent money crisis, it is meaningful to consider alternative economic system which can exist without going through any third party. To address this issue is one of the purposes of this chapter.

      PubDate: 2018-05-29T23:37:32Z
      DOI: 10.1016/bs.adcom.2018.03.008
       
  • The Use of Blockchains: Application-Driven Analysis of Applicability
    • Authors: Bruno Rodrigues; Thomas Bocek; Burkhard Stiller
      Abstract: Publication date: Available online 2 May 2018
      Source:Advances in Computers
      Author(s): Bruno Rodrigues, Thomas Bocek, Burkhard Stiller
      Bitcoin paved the way for a highly successful FinTech (Financial Technology) application on the basis of a newer technology termed blockchain. As this technology has evolved very recently beyond the financial market, gaining more public attention, other promising blockchain applications areas and use cases are emerging. However, it is still not a straightforward in which application areas and use cases blockchains do provide an advantage beyond distributed databases and decentralized systems. Through a decentralized and immutable data storage blockchains enable the enforcement and verification of exchange assets, while disrupting potentially existing business models by promoting the disintermediation of processes involving multiple stakeholders. While having no mediator or a third party controlling the operation, less operational costs and a higher business agility are targeted at. However, the adoption of blockchains requires not only overcoming its technical challenges, but it also implies to reach the ability to understand and handle the impact on existing business models, processes, and legal compliances. This chapter will overview the main blockchain application areas by providing examples and by discussing from the technical perspective on how and under which conditions the use of blockchains can be useful for a successful use case.

      PubDate: 2018-05-29T23:37:32Z
      DOI: 10.1016/bs.adcom.2018.03.011
       
  • Security and Privacy of Blockchain and Quantum Computation
    • Authors: Kazuki Ikeda
      Abstract: Publication date: Available online 2 May 2018
      Source:Advances in Computers
      Author(s): Kazuki Ikeda
      Security and privacy are vital to the modern blockchain technology since it can exist without an authorized third party, which means that there may not be a trusted responsible person or organization in charge of systems. In this chapter we make a survey on this issue about blockchain systems. Security of the current systems is based on the computational hardness assumptions and many of the standard cryptography systems are known to be vulnerable against the advent of full-fledged quantum computers. On the other hand, it is possible to make a blockchain more secure by virtue of quantum information technology. In this chapter we give a pedagogical introduction to quantum information theory and quantum computation so that readers can follow advanced researches on application of quantum technology to the blockchain industry. We also explain a novel information system which accommodates quantum states in a peer-to-peer way. It would improve the level of privacy and security by the laws of physics, which is never achievable from nonquantum information theoretic viewpoints.

      PubDate: 2018-05-29T23:37:32Z
      DOI: 10.1016/bs.adcom.2018.03.003
       
  • Blockchain Technology Use Cases in Healthcare
    • Authors: Peng Zhang; Douglas C. Schmidt; Jules White; Gunther Lenz
      Abstract: Publication date: Available online 30 April 2018
      Source:Advances in Computers
      Author(s): Peng Zhang, Douglas C. Schmidt, Jules White, Gunther Lenz
      Blockchain technology alleviates the reliance on a centralized authority to certify information integrity and ownership, as well as mediate transactions and exchange of digital assets, while enabling secure and pseudoanonymous transactions along with agreements directly between interacting parties. It possesses key properties, such as immutability, decentralization, and transparency, which potentially address pressing issues in healthcare, such as incomplete records at point of care and difficult access to patients’ own health information. An efficient and effective healthcare system requires interoperability, which allows software apps and technology platforms to communicate securely and seamlessly, exchange data, and use the exchanged data across health organizations and app vendors. Unfortunately, healthcare today suffers from siloed and fragmented data, delayed communications, and disparate workflow tools caused by the lack of interoperability. Blockchain offers the opportunity to enable access to longitudinal, complete, and tamper-aware medical records that are stored in fragmented systems in a secure and pseudoanonymous fashion. This chapter focuses on the applicability of Blockchain technology in healthcare by (1) identifying potential Blockchain use cases in healthcare, (2) providing a case study that implements Blockchain technology, and (3) evaluating design considerations when applying this technology in healthcare.

      PubDate: 2018-05-29T23:37:32Z
      DOI: 10.1016/bs.adcom.2018.03.006
       
  • Dark Silicon and the History of Computing
    • Authors: Pejman Lotfi-Kamran; Hamid Sarbazi-Azad
      Abstract: Publication date: Available online 27 April 2018
      Source:Advances in Computers
      Author(s): Pejman Lotfi-Kamran, Hamid Sarbazi-Azad
      For many years, computer designers benefitted from Moore's law and Dennard scaling to significantly improve the speed of single-core processors. The failure of Dennard scaling pushed the computer industry toward homogenous multicore processors for the performance improvement to continue without significant increase in power consumption. Unfortunately, even homogeneous multicore processors cannot offer the level of energy efficiency required to operate all the cores at the same time in today's and especially tomorrow's technologies. As a result of lack of energy efficiency, not all the cores in a multicore processor can be functional at the same time. This phenomenon is referred to as dark silicon. In this chapter, we go over the history of computing and review some of the major changes in microprocessors. Specifically, we articulate why dark silicon is inevitable and how the performance of processors can significantly be improved in the age of dark silicon.

      PubDate: 2018-05-29T23:37:32Z
      DOI: 10.1016/bs.adcom.2018.03.001
       
  • Topology Specialization for Networks-on-Chip in the Dark Silicon Era
    • Authors: Mehdi Modarressi; Hamid Sarbazi-Azad
      Abstract: Publication date: Available online 27 April 2018
      Source:Advances in Computers
      Author(s): Mehdi Modarressi, Hamid Sarbazi-Azad
      Following Moore's law, the number of transistors on chip has grown exponentially for decades. This growing transistor count, coupled with recent architecture and compiler advances, has resulted in an unprecedented exponential performance increase of computers. With the end of Dennard scaling, however, the power required to operate all transistors at the full performance level simultaneously grows across the technology generations. Consequently, chips will keep an increasing fraction of transistors power gated or dark to remain within the power envelope. The power-gated part of the chip, known as dark silicon, is expected to comprise a significant portion of the die real estate in new technology generations. In addition to power limitations, the limited and nonscalable off-chip bandwidth is the second source of dark silicon. The key challenge to improving performance in the dark silicon era, consequently, is how to efficiently leverage transistors when they cannot all be powered at the same time. Core specialization shows promise in addressing this challenge by improving the performance and energy efficiency of applications. This method leverages the dark silicon to build many diverse power-efficient accelerators and each application only activates a subset of cores that best match its processing requirements. In this chapter, we propose a network-on-chip specialization method that leverages dark routers of a partially active many-core chip to customize the topology for active cores, effectively reducing the power consumption and latency of communication.

      PubDate: 2018-05-29T23:37:32Z
      DOI: 10.1016/bs.adcom.2018.03.009
       
  • Dark Silicon Aware Resource Management for Many-Core Systems
    • Authors: Heba Khdr; Santiago Pagani; Muhammad Shafique; Jörg Henkel
      Abstract: Publication date: Available online 23 April 2018
      Source:Advances in Computers
      Author(s): Heba Khdr, Santiago Pagani, Muhammad Shafique, Jörg Henkel
      As Dennard's scaling stops mainly due to supply voltage limits, power densities rapidly increase on the chip. Hence, a significant amount of on-chip resources needs to stay dark, i.e., power-gated, in order to avoid thermal emergencies. This phenomenon is known in the literature as dark silicon. Conventional resource management techniques allocate the cores of the chip to the applications, without considering the dark silicon phenomenon. In this chapter, we discuss a dark silicon aware resource management technique that aims at maximizing the overall system performance under a temperature constraint. To achieve its goal, this technique determines the number of active (power-on) cores that should be allocated to each application and the voltage and frequency level of these cores. Additionally, it takes into account the instruction-level parallelism (ILP) and the thread-level parallelism (TLP) of the applications during its decision-making process. Moreover, the presented technique selects the positioning of dark cores such that they facilitate dissipating the generated heat on the active cores. That, in turn, reduces the temperature of the active cores and might allow to increase their voltage and frequency levels leading to further performance improvement. The evaluation of this technique shows its ability to improve the performance with an average of 34% compared to a state-of-the-art technique of thermal-aware performance maximization.

      PubDate: 2018-04-25T12:13:07Z
      DOI: 10.1016/bs.adcom.2018.03.002
       
  • Data Warehouse Testing
    • Authors: Hajar Homayouni; Sudipto Ghosh; Indrakshi Ray
      Abstract: Publication date: Available online 1 March 2018
      Source:Advances in Computers
      Author(s): Hajar Homayouni, Sudipto Ghosh, Indrakshi Ray
      Enterprises use data warehouses to accumulate data from multiple sources for data analysis and research. Since organizational decisions are often made based on the data stored in a data warehouse, all its components must be rigorously tested. Researchers have proposed a number of approaches and tools to test and evaluate different components of data warehouse systems. In this chapter, we present a comprehensive survey of data warehouse testing techniques. We define a classification framework that can categorize the existing testing approaches. We also discuss open problems and propose research directions.

      PubDate: 2018-04-25T12:13:07Z
      DOI: 10.1016/bs.adcom.2017.12.005
       
  • Event-Based Concurrency: Applications, Abstractions, and Analyses
    • Authors: Aditya Kanade
      Abstract: Publication date: Available online 26 February 2018
      Source:Advances in Computers
      Author(s): Aditya Kanade
      Due to the increased emphasis on responsiveness, event-based design has become mainstream in software development. Software applications are required to maintain responsiveness even while performing multiple tasks simultaneously. This has resulted in the adoption of a combination of thread and event-based concurrency in modern software such as smartphone applications. In this chapter, we present the fundamental programming and semantic concepts in the combined concurrency model of threads and events. The paradigm of event-based concurrency cuts across programming languages and application frameworks. We give a flavor of event-driven programming in a few languages and application frameworks. The mix of threads and events complicates reasoning about correctness of applications under all possible interleavings. We discuss advances in the core concurrency analysis techniques for event-driven applications with focus on happens-before analysis, race detection, and model checking. We also survey other analysis techniques and related programming abstractions.

      PubDate: 2018-02-26T18:04:22Z
      DOI: 10.1016/bs.adcom.2017.12.006
       
  • NoSQL Security
    • Authors: Neha Gupta; Rashmi Agrawal
      Abstract: Publication date: Available online 26 February 2018
      Source:Advances in Computers
      Author(s): Neha Gupta, Rashmi Agrawal
      The increased demand of Big Data and Cloud Computing technologies has forced the organizations to move from relational databases to nonrelational databases like NoSQL. A NoSQL database, also referred as non-SQL or nonrelational or not only SQL database, is scalable, distributed, and highly reliable and has been designed to support the requirements of modern web-based applications. However, security remains a very challenging issue even in NoSQL database as security challenges that were inherent in the previous databases have not spared even NoSQL. The key for ensuring adequate security of the NoSQL database system is a detailed consideration of security issues for the NoSQL database solution and implementation of corresponding security mechanisms. The aim of this chapter is to discuss security issues inherent in NoSQL databases and further explore it to find the best security mechanism for this environment. In this chapter, we will deliberate upon various security threats of NoSQL databases, security architecture of NoSQL databases, and the steps that can be taken to secure the NoSQL database. A comparative study of Relational & NoSQL database is also given to provide a better understanding of the databases, their relative advantages, and the security pitfalls. The technology/technical terms used in this book chapter are explained wherever they appear and at the “Glossary” section. At the end of the chapter, references are included for further reading for the benefit of advanced readers.

      PubDate: 2018-02-26T18:04:22Z
      DOI: 10.1016/bs.adcom.2018.01.003
       
  • Model-Based Test Cases Reuse and Optimization
    • Authors: Mohamed Mussa; Ferhat Khendek
      Abstract: Publication date: Available online 22 February 2018
      Source:Advances in Computers
      Author(s): Mohamed Mussa, Ferhat Khendek
      Several test generation techniques have been proposed in the literature. These techniques target separately specific levels of testing without relating them to each other in order to avoid redundancy and enable reuse and optimization. In this chapter, we look into connecting different levels of testing. We propose a model-based testing framework that enables reusability and optimization across different levels of testing. Test cases at one level are reused to generate test cases of subsequent levels of testing. Furthermore, test cases at one level are optimized by relating them to test cases of preceding testing levels and removed if they are found redundant.

      PubDate: 2018-02-26T18:04:22Z
      DOI: 10.1016/bs.adcom.2018.01.001
       
  • Advances in Techniques for Test Prioritization
    • Authors: Hadi Hemmati
      Abstract: Publication date: Available online 14 February 2018
      Source:Advances in Computers
      Author(s): Hadi Hemmati
      With the increasing size of software systems and the continuous changes that are committed to the software's codebase, regression testing has become very expensive for real-world software applications. Test case prioritization is a classic solution in this context. Test case prioritization is the process of ranking existing test cases for execution with the goal of finding defects sooner. It is useful when the testing budget is limited and one needs to limit their test execution cost, by only running top n test cases, according to the testing budget. There are many heuristics and algorithms to rank test cases. In this chapter, we will see some of the most common test case prioritization techniques from software testing literature as well as trends and advances in this domain.

      PubDate: 2018-02-26T18:04:22Z
      DOI: 10.1016/bs.adcom.2017.12.004
       
  • Mobile Application Quality Assurance
    • Authors: Konstantin Holl; Frank Elberzhager
      Abstract: Publication date: Available online 13 February 2018
      Source:Advances in Computers
      Author(s): Konstantin Holl, Frank Elberzhager
      Mobile applications have become highly pervasive in recent years. Their quality is essential since application failures can lead to serious consequences, such as damage of corporate reputation or financial loss. The goal of this work is to identify and expose approaches that address the issue of quality assurance for mobile applications. In order to drive our systematic mapping study, we derived eight research questions based on the stated goal. Ultimately, we systematically identified 311 articles based on 4607 captured records. We created clustered views to answer the research questions and used existing surveys to complement our overview of current challenges. The results show an overall upward trend of publications since 2003. Hot topics include automation of GUI tests and assurance of nonfunctional qualities. Aspects of future research could be the integration of review techniques into existing approaches and focusing more strongly on defects addressing the specific characteristics of mobile applications.

      PubDate: 2018-02-26T18:04:22Z
      DOI: 10.1016/bs.adcom.2017.12.001
       
  • Advances in Combinatorial Testing
    • Authors: Rachel Tzoref-Brill
      Abstract: Publication date: Available online 12 February 2018
      Source:Advances in Computers
      Author(s): Rachel Tzoref-Brill
      Since their introduction into software testing in the mid-1980s, combinatorial methods for test design gathered popularity as a testing best practice and as a prominent software testing research area. This chapter reviews recent advances in combinatorial testing, with special focus on the research since 2011. It provides a brief background on the theory behind combinatorial testing and on its use in practice. Requirements from industry usage have led to advances in various areas examined in this chapter, including constraints handling in combinatorial algorithms, support for the combinatorial modeling process, and studies on metrics to support the effectiveness of combinatorial testing. We also highlight recent case studies describing novel use cases for test and field quality improvement in the context of system test, and for optimization of test data. Finally, we examine recent developments in advanced topics such as utilization of existing tests, test case prioritization, fault localization, and evolution of combinatorial models.

      PubDate: 2018-02-26T18:04:22Z
      DOI: 10.1016/bs.adcom.2017.12.002
       
  • A Taxonomy of Software Integrity Protection Techniques
    • Authors: Mohsen Ahmadvand; Alexander Pretschner; Florian Kelbert
      Abstract: Publication date: Available online 12 February 2018
      Source:Advances in Computers
      Author(s): Mohsen Ahmadvand, Alexander Pretschner, Florian Kelbert
      Tampering with software by man-at-the-end (MATE) attackers is an attack that can lead to security circumvention, privacy violation, reputation damage, and revenue loss. In this model, adversaries are end users who have full control over software as well as its execution environment. This full control enables them to tamper with programs to their benefit and to the detriment of software vendors or other end users. Software integrity protection research seeks for means to mitigate those attacks. Since the seminal work of Aucsmith, a great deal of research effort has been devoted to fight MATE attacks, and many protection schemes were designed by both academia and industry. Advances in trusted hardware, such as TPM and Intel SGX, have also enabled researchers to utilize such technologies for additional protection. Despite the introduction of various protection schemes, there is no comprehensive comparison study that points out advantages and disadvantages of different schemes. Constraints of different schemes and their applicability in various industrial settings have not been studied. More importantly, except for some partial classifications, to the best of our knowledge, there is no taxonomy of integrity protection techniques. These limitations have left practitioners in doubt about effectiveness and applicability of such schemes to their infrastructure. In this work, we propose a taxonomy that captures protection processes by encompassing system, defense and attack perspectives. Later, we carry out a survey and map reviewed papers on our taxonomy. Finally, we correlate different dimensions of the taxonomy and discuss observations along with research gaps in the field.

      PubDate: 2018-02-26T18:04:22Z
      DOI: 10.1016/bs.adcom.2017.12.007
       
  • Advances in Applications of Object Constraint Language for Software
           Engineering
    • Authors: Atif A. Jilani; Muhammad Z. Iqbal; Muhammad U. Khan; Muhammad Usman
      Abstract: Publication date: Available online 7 February 2018
      Source:Advances in Computers
      Author(s): Atif A. Jilani, Muhammad Z. Iqbal, Muhammad U. Khan, Muhammad Usman
      Object Constraint Language (OCL) is a standard language defined by Object Management Group for specifying constraints on models. Since its introduction as part of Unified Modeling Language, OCL has received significant attention by researchers with works in the literature ranging from temporal extensions of OCL to automated test generation by solving OCL constraints. In this chapter, we provide a survey of the various works discussed in literature related to OCL with the aim of highlighting the advances made in the field. We classify the literature into five broad categories and provide summaries for various works in the literature. The chapter also provides insights and highlights the potentials areas of further research in the field.

      PubDate: 2018-02-26T18:04:22Z
      DOI: 10.1016/bs.adcom.2017.12.003
       
  • Emerging Software Testing Technologies
    • Authors: Francesca Lonetti; Eda Marchetti
      Abstract: Publication date: Available online 5 January 2018
      Source:Advances in Computers
      Author(s): Francesca Lonetti, Eda Marchetti
      Software testing encompasses a variety of activities along the software development process and may consume a large part of the effort required for producing software. It represents a key aspect to assess the adequate functional and nonfunctional software behavior aiming to prevent and remedy malfunctions. The increasing complexity and heterogeneity of software poses many challenges to the development of testing strategies and tools. In this chapter, we provide a comprehensive overview of emerging software testing technologies. Beyond the basic concepts of software testing, we address prominent test case generation approaches and focus on more relevant challenges of testing activity as well as its role in recent development processes. An emphasis is also given to testing solutions tailored to the specific needs of emerging application domains.

      PubDate: 2018-02-05T09:02:43Z
      DOI: 10.1016/bs.adcom.2017.11.003
       
  • Advances in Software Model Checking
    • Authors: Junaid H. Siddiqui; Affan Rauf; Maryam A. Ghafoor
      Abstract: Publication date: Available online 29 December 2017
      Source:Advances in Computers
      Author(s): Junaid H. Siddiqui, Affan Rauf, Maryam A. Ghafoor
      Society is becoming increasingly dependent on software which results in an increasing cost of software malfunction. At the same time, software is getting increasingly complex and testing and verification are becoming harder and harder. Software model checking is a set of techniques to automatically check properties in a model of the software. The properties can be written in specialized languages or be embedded in software in the form of exceptions or assertions. The model can be explicitly provided in a specification language, can be derived from the software system, or the software system itself can be used as a model. Software model checkers check the given properties in a large number of states of the model. If a model checker is able to verify a property on all model states, it is proven that the property holds and the model checker works like a theorem prover. If a model checker is unable to verify a property on all model states, the model checker is still an efficient automated testing technique. This chapter discusses advances in software model checking and focuses on techniques that use the software as its model and embedded exceptions or assertions as the properties to be verified. Such techniques are most likely to be widespread in the software industry in the coming decade due to their minimal overhead on the programmer and due to recent advances in research making these techniques scale.

      PubDate: 2018-02-05T09:02:43Z
      DOI: 10.1016/bs.adcom.2017.11.001
       
  • Model-Based Testing for Internet of Things Systems
    • Authors: Abbas Ahmad; Fabrice Bouquet; Elizabeta Fourneret; Bruno Legeard
      Abstract: Publication date: Available online 23 December 2017
      Source:Advances in Computers
      Author(s): Abbas Ahmad, Fabrice Bouquet, Elizabeta Fourneret, Bruno Legeard
      The Internet of Things (IoT) is nowadays globally a mean of innovation and transformation for many companies. Applications extend to a large number of domains, such as smart cities, smart homes, and health care. The Gartner Group estimates an increase up to 21 billion connected things by 2020. The large span of “things” introduces problematic aspects, such as interoperability due to the heterogeneity of communication protocols and the lack of a globally accepted standard. The large span of usages introduces problems regarding secure deployments and scalability of the network over large-scale infrastructures. This chapter describes the challenges for the IoT testing, includes state-of-the-art testing of IoT systems using models, and presents a model-based testing as a service approach to respond to its challenges through demonstrations with real use cases involving two of the most accepted standards worldwide: FIWARE and oneM2M.

      PubDate: 2017-12-26T15:04:33Z
      DOI: 10.1016/bs.adcom.2017.11.002
       
  • Optimizing the Symbolic Execution of Evolving Rhapsody Statecharts
    • Authors: Amal Khalil; Juergen Dingel
      Abstract: Publication date: Available online 6 December 2017
      Source:Advances in Computers
      Author(s): Amal Khalil, Juergen Dingel
      Model-driven engineering (MDE) is an iterative and incremental software development process. Supporting the analysis and the verification of software systems developed following the MDE paradigm requires to adopt incrementality when carrying out these crucial tasks in a more optimized way. Communicating state machines are one of the various formalisms used in MDE tools to model and describe the behavior of distributed, concurrent, and real-time reactive systems (e.g., automotive and avionics systems). Modeling the overall behavior of such systems is carried out in a modular way and on different levels of abstraction (i.e., it starts with modeling the behavior of the individual objects in the system first then modeling the interaction between these objects). Similarly, analyzing and verifying the correctness of the developed models to ensure their quality and their integrity is performed on two main levels. The intralevel is used to analyze the correctness of the individual models in isolation of the others, while the interlevel is used to analyze the overall interoperability of those that are communicating with each other. One way to facilitate the analysis of the overall behavior of a system of communicating state machines is to build the global state space (also known as the global reachability tree) of the system. This process is very expensive and in some cases it may suffer from the state explosion problem. Symbolic execution is a technique that can be used to construct an abstract and a bounded version of the system global state space that is known as a symbolic execution tree (SET), yet the size of the generated trees can be very large especially with big and complex systems that are composed of multiple objects. As the system evolves, one way to avoid regenerating the entire SET and repeating any SET-based analyses that have been already conducted is to utilize the previous SET and its analysis results in optimizing the process of generating the SET of the system after the change. In this chapter, we propose two optimization techniques to direct the successive runs of the symbolic execution technique toward the impacted parts of an evolving state machine model using memoization (MSE) and dependency analysis (DSE), respectively. The evaluation results of both techniques showed significant reduction in some cases compared with the standard symbolic execution technique.

      PubDate: 2017-12-12T10:06:41Z
      DOI: 10.1016/bs.adcom.2017.09.003
       
  • A Tutorial on Software Obfuscation
    • Authors: Sebastian Banescu; Alexander Pretschner
      Abstract: Publication date: Available online 15 November 2017
      Source:Advances in Computers
      Author(s): Sebastian Banescu, Alexander Pretschner
      Protecting a digital asset once it leaves the cyber trust boundary of its creator is a challenging security problem. The creator is an entity which can range from a single person to an entire organization. The trust boundary of an entity is represented by all the (virtual or physical) machines controlled by that entity. Digital assets range from media content to code and include items such as: music, movies, computer games, and premium software features. The business model of the creator implies sending digital assets to end-users—such that they can be consumed—in exchange for some form of compensation. A security threat in this context is represented by malicious end-users, who attack the confidentiality or integrity of digital assets, in detriment to digital asset creators and/or other end-users. Software obfuscation transformations have been proposed to protect digital assets against malicious end-users, also called Man-At-The-End (MATE) attackers. Obfuscation transforms a program into a functionally equivalent program which is harder for MATE to attack. However, obfuscation can be use both for benign and malicious purposes. Malware developers rely on obfuscation techniques to circumvent detection mechanisms and to prevent malware analysts from understanding the logic implemented by the malware. This chapter presents a tutorial of the most popular existing software obfuscation transformations and mentions published attacks against each transformation. We present a snapshot of the field of software obfuscation and indicate possible directions, which require more research.

      PubDate: 2017-12-12T10:06:41Z
      DOI: 10.1016/bs.adcom.2017.09.004
       
  • NoSQL Polyglot Persistence
    • Authors: Ganesh Chandra Deka
      Abstract: Publication date: Available online 6 November 2017
      Source:Advances in Computers
      Author(s): Ganesh Chandra Deka
      Polyglot persistence facilitates use of most suitable database technology based on the requirement of an application. There are lots of use cases as well as huge potential for Polyglot Persistence in e-Commerce web portals, Search Engines, and Healthcare Information Ecosystem applications. But, designing and implementation of an application in a Polyglot environment is not a straightforward task, since adding more data storage technologies increases complexity in programming. Further knowledge of multiple programming languages, maintainability of the Polyglot application, and tool support for Polyglot persistence are the challenges of Polyglot Persistence. This chapter discusses the various aspects of Polyglot persistence with a focus on NoSQL database.

      PubDate: 2017-11-08T15:53:39Z
      DOI: 10.1016/bs.adcom.2017.08.003
       
  • NoSQL Hands On
    • Authors: Rebika Rai; Prashant Chettri
      Abstract: Publication date: Available online 19 October 2017
      Source:Advances in Computers
      Author(s): Rebika Rai, Prashant Chettri
      With the expansion of huge and complex real-time data that is wandering across the internet today, the dimensions of data transmitted are escalating exponentially with each passing years. This makes working with standard database systems or on personal computers difficult because of its inability to handle outsized, unstructured, and complicated data. Various institutes store and use massive amounts of data which are further utilized for generating reports to guarantee stability regarding the services they propose. However, the challenge is how to analyze, capture, share, store, transfer, visualize, query, update, and finally manipulate an impressive volume of data that have to be delivered through the internet to reach its destination intact maintaining its information privacy. Almost all the applications developed using any programming languages require some external component to store and access data. The components for the same could be a local network, a cloud file, or even a database. While sources like the network and cloud file systems store the unstructured data, the structured data are usually stored in a typical relational database management system (RDBMS). Usually it is a time-consuming process to define, structure, distribute, and access data from RDBMS through SQL and hence, an alternative was developed for this called the NoSQL (“Non SQL,” “Nonrelational,” or “Not only SQL”) database. NoSQL encompasses a wide variety of different database technologies that were developed in response to the demands presented in building modern applications wherein developers are working with applications that create massive volumes of new, rapidly changing data types structured, semistructured, unstructured, and polymorphic data. Applications that once served a finite audience are now delivered as services that must be always-on, accessible from many different devices, and scaled globally to millions of users. Organizations are now turning to scale-out architectures using open source software, commodity servers, and cloud computing instead of large monolithic servers and storage infrastructure. There are several categories of NoSQL databases. Each of these categories has its own specific attributes and limitations. There is not a single solution which is better than all the others; however, there are some databases that are better to solve specific problems. This chapter provides NoSQL hands on and attention has been paid to various types of NoSQL databases such as MongoDB, CloudDB, OrientDB, Cloudant, Neo4j, Redis, Aerospike, InfluxDB, and MariaDB, focusing on the details such as installation steps, setting environment, and various operations performed on various types of NoSQL databases.

      PubDate: 2017-10-25T10:02:04Z
      DOI: 10.1016/bs.adcom.2017.08.004
       
  • The Hadoop Ecosystem Technologies and Tools
    • Authors: Pethuru Raj Chelliah
      Abstract: Publication date: Available online 16 October 2017
      Source:Advances in Computers
      Author(s): Pethuru Raj Chelliah
      There are several interesting and inspiring trends and transitions succulently happening in the business as well as IT spaces. One noteworthy factor and fact is that there are fresh data sources emerging and pouring out a lot of usable and reusable data. With the number of different, distributed, and decentralized data sources is consistently on the rise, the resulting data scope, size, structure, schema, and speed are greatly changing and challenging too. The other dominant and prominent aspects include polyglot microservices are solidifying deeply as the new building and deployment/execution block in the software world toward the much-needed accelerated software design, development, deployment, and delivery. The device ecosystem expands frenetically with the arrival of trendy and handy, slim and sleek, disappearing and disposable gadgets, gizmos thereby ubiquitous (anywhere, anytime, and any device) access, and usage of web-scale information, content, and services get fructified. Finally, all sorts of casually found and cheap articles in our everyday environments (homes, hotels, hospitals, etc.) are being systematically digitized and service enabled in order to exhibit a kind of real-world smartness and sagacity in their individual as well as collective actions and reactions. Thus trillions of digitized objects, billions of connected devices, and millions of polyglot software services are bound to interact insightfully with one another over locally as well as with remote ones over any networks purposefully. And hence the amount of transactional, operational, analytical, commercial, social, personal, and professional data created through a growing array of interactions and collaborations is growing very rapidly. Now if the data getting collected, processed, and stocked are not subjected to deeper, deft, and decisive investigations, then the tactically as well as strategically sound knowledge (the beneficial patterns, tips, techniques, associations, alerts, risk factors, fresh opportunities, possibilities, etc.) hidden inside the data heaps goes unused literally. For collecting, stocking, and processing such a large amount of multistructured data, the traditional databases, analytics platforms, the ETL tools, etc., are found insufficient. Hence the Apache Hadoop ecosystem technologies and tools are being touted as the best way forward to squeeze out the right and relevant knowledge. In this chapter, you can find the details about the emerging technologies and platforms for spearheading the big data movement.

      PubDate: 2017-10-18T04:25:22Z
      DOI: 10.1016/bs.adcom.2017.09.002
       
  • Comparative Study of Different In-Memory (No/New) SQL Databases
    • Authors: Krishnarajanagar Srinivasa; Srinidhi Hiriyannaiah
      Abstract: Publication date: Available online 6 October 2017
      Source:Advances in Computers
      Author(s): Krishnarajanagar G. Srinivasa, Srinidhi Hiriyannaiah
      With the advancement and changes in the hardware, availability of data, collection of data at a faster rate, emerging applications; database systems have been evolving over the last few decades. The application areas where the databases are used have moved over from relational data to graph-based data and stream data. The expanding cloud computing services that use internet and require big data has come upfront due to data-intensive computing problems. Social media companies such as Amazon, Facebook, Google use the world wide web as a large distributed data repository. This large data repository on the web cannot be processed with traditional RDBMS systems. In-memory databases play a key role in the upcoming years for processing data that is huge in volume with wide variety of data formats. In this chapter, an overview around in-memory databases with advanced processing, techniques, case studies are presented.

      PubDate: 2017-10-11T00:35:09Z
       
  • NoSQL Web Crawler Application
    • Authors: Ganesh Chandra Deka
      Abstract: Publication date: Available online 21 September 2017
      Source:Advances in Computers
      Author(s): Ganesh Chandra Deka
      With the advent of Web technology, the Web is full of unstructured data called Big Data. However, these data are not easy to collect, access, and process at large scale. Web Crawling is an optimization problem. Site-specific crawling of various social media platforms, e-Commerce websites, Blogs, News websites, and Forums is a requirement for various business organizations to answer a search quarry from webpages. Indexing of huge number of webpage requires a cluster with several petabytes of usable disk. Since the NoSQL databases are highly scalable, use of NoSQL database for storing the Crawler data is increasing along with the growing popularity of NoSQL databases. This chapter discusses about the application of NoSQL database in Web Crawler application to store the data collected by the Web Crawler.

      PubDate: 2017-09-25T17:25:36Z
      DOI: 10.1016/bs.adcom.2017.08.001
       
  • Biological Big Data Analytics
    • Authors: Mohammad Samadi Gharajeh
      Abstract: Publication date: Available online 12 September 2017
      Source:Advances in Computers
      Author(s): Mohammad Samadi Gharajeh
      Big data analytics uses efficient analytic techniques to discover hidden patterns, correlations, and other insights from big data. It brings significant cost advantages, enhances the performance of decision making, and creates new products to meet customers’ needs. This method has various applications in plants, bioinformatics, healthcare, etc. It can be improved with various techniques such as machine learning, intelligent tools, and network analysis. This chapter describes applications of big data analytics in biological systems. These applications can be conducted in systems biology by using cloud-based databases (e.g., NoSQL). The chapter explains the improvement of big data technology in plants community with machine learning. Furthermore, it presents various tools to apply big data analytics in bioinformatics systems. Medical signal and genomics are two major fields in healthcare environments that would be improved by this type of analytical method. Finally, the chapter discusses on several use cases of healthcare information system.

      PubDate: 2017-09-13T01:52:15Z
      DOI: 10.1016/bs.adcom.2017.08.002
       
 
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
 
Home (Search)
Subjects A-Z
Publishers A-Z
Customise
APIs
Your IP address: 54.166.233.99
 
About JournalTOCs
API
Help
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-