acm transactions on internet of things

Have you ever wondered about the impact of social media controversy? Have you ever imagined how swarms of devices can attest to their own integrity in a lightweight manner? Have you ever thought about the future of multimedia computing, communications, and applications? In this post, we’ll talk about three interesting research papers in the field of computer science and discuss their findings in depth.

Quantifying Controversy on Social Media

Social media has revolutionized the way people communicate and share their opinions. However, it has also given rise to controversial topics that may cause harm to individuals or communities. The paper titled Quantifying Controversy on Social Media, published in the ACM Transactions on Social, explores how the degree of controversy can be measured and analyzed on social media platforms.

Quantifying Controversy on Social Media Cover Image

Abstract

The paper presents a novel approach to quantify the degree of controversy by analyzing reactions to a post. The authors create a controversy score that considers the frequency, intensity, and polarity of reactions. The score is highly correlated with manual annotations of controversial posts by human evaluators. The paper also presents a case study of controversial topics related to the US presidential election, showing how the approach can identify different levels of controversy between topics and candidates. The research has implications for the detection and management of controversial content on social media platforms.

Introduction

The authors start by defining controversy as “an intense disagreement or dispute, typically public, over an issue or a topic.” They argue that controversy is an important concept to study since it can affect public opinion, political discourse, and social cohesion. However, measuring controversy is not straightforward, as it depends on subjective interpretations that vary across individuals and cultures. The paper proposes a computational approach to quantify controversy that overcomes some of these limitations.

Content

The paper’s main contribution is the creation of a controversy score that takes into account the number, sentiment, and strength of reactions to a post. The authors first collect a dataset of tweets related to the US presidential election, along with manual annotations of their controversy level. They then use machine learning algorithms to extract the sentiment and intensity of each tweet, as well as the number of retweets and likes. They combine these features into a single controversy score using a regression model.

The authors show that the controversy score is highly correlated with the manual annotations, achieving an accuracy of 84%, compared to a baseline of 58% using only the number of likes. They also analyze the correlation between the score and other factors, such as the political leaning of the source, the novelty of the topic, and the geographic location of the users. They find that controversial tweets tend to come from sources with high political polarization, are more novel and surprising, and are more likely to be retweeted and liked by users from different locations.

The paper concludes that the controversy score can be used to monitor and analyze controversial content on social media platforms, which can help mitigate the negative effects of controversy on individuals and societies. The authors suggest several directions for future research, including the extension of the approach to other languages and cultures, the investigation of the temporal aspects of controversy, and the exploration of the impact of social network structures on the diffusion of controversial content.

Conclusion

In conclusion, the paper presents a new approach to quantify controversy on social media platforms that takes into account the frequency, intensity, and sentiment of reactions to a post. The approach achieves a high degree of accuracy in predicting manual annotations of controversial content and can be used to monitor and analyze controversial topics related to politics, social issues, or other domains. The research has implications for the design of social media platforms, as well as the development of algorithms and tools for content moderation and management.

WISE: A Lightweight Intelligent Swarm Attestation Scheme for the Internet of Things

The Internet of Things (IoT) is a rapidly growing field that connects multiple devices to the internet and enables them to share data and perform tasks. However, the security and privacy of IoT devices are often compromised, leading to security breaches and data leaks. The paper titled WISE: A Lightweight Intelligent Swarm Attestation Scheme for the Internet of Things, published in the ACM Journal on Emerging Technologies in Computing Systems, proposes a new approach to attest to the integrity of IoT devices using swarming techniques.

WISE: A Lightweight Intelligent Swarm Attestation Scheme for the Internet of Things Cover Image

Abstract

The paper presents a novel scheme to attest to the integrity of IoT devices by swarming them together and using their collective properties to generate a proof-of-integrity. The approach is lightweight, scalable, and resilient to attacks, as it relies on multiple devices behaving consistently and cooperatively. The authors show the effectiveness of the approach in several scenarios, such as detecting compromised devices and preventing malware propagation. The research has implications for the design and implementation of secure IoT systems that can attest to their own integrity.

Introduction

The authors start by emphasizing the importance of attesting to the integrity of IoT devices, since they are often deployed in critical infrastructures and sensitive applications. However, traditional attestation schemes, such as digital signatures or remote attestation, are not well-suited for the IoT context, due to their high computation and communication overhead. The paper proposes a new scheme that leverages the properties of a swarm of devices to provide a lightweight and scalable attestation mechanism.

Content

The paper’s main contribution is the design and implementation of WISE (Wireless Intelligent Swarm attEstation), a scheme that swarms a group of IoT devices together and uses their combined properties to attest to their integrity. The devices communicate with each other using wireless protocols and exchange information about their software, hardware, and network properties. The swarm generates a proof-of-integrity by comparing the expected and the observed values of these properties, ensuring that none of the devices has been compromised or tampered with. The authors test WISE in several scenarios, including detecting rogue devices, preventing malware propagation, and revoking the access of compromised devices.

The authors show that WISE is lightweight and scalable, as it does not require additional hardware or storage resources, and can be deployed in a distributed and decentralized manner. They also demonstrate that WISE is resilient to attacks, as it requires multiple devices to behave consistently and cooperatively. The authors discuss the limitations and challenges of the approach, such as the need for a large number of devices to form a reliable swarm, the overhead of wireless communication, and the need for a trusted initialization step.

The paper concludes that WISE is a promising scheme for attesting to the integrity of IoT devices using swarming techniques, and has several advantages compared to traditional attestation schemes. The authors suggest several directions for future research, including the investigation of the impact of different swarm properties, the optimization of the communication and computation overhead, and the integration of WISE with other security and privacy mechanisms for IoT devices.

Conclusion

In conclusion, the paper presents a new approach to attest to the integrity of IoT devices by swarming them together and using their collective properties to generate a proof-of-integrity. The approach is lightweight, scalable, and resilient to attacks, and can be used in several scenarios to detect compromised devices or prevent malware propagation. The research has implications for the design and implementation of secure and trustworthy IoT systems, which can attest to their own integrity without relying on centralized or expensive mechanisms.

ACM Transactions on Multimedia Computing, Communications and Applications

Multimedia computing, communications, and applications have become an essential part of our daily lives, from video streaming and social media to augmented and virtual reality. The ACM Transactions on Multimedia Computing, Communications and Applications is a prestigious journal that publishes innovative and high-quality research in this area, covering a wide range of topics, such as multimedia analysis, processing, coding, and retrieval, as well as multimedia applications and systems.

ACM Transactions on Multimedia Computing, Communications and Applications Cover Image

Abstract

The journal publishes original research papers, surveys, and reports that explore the latest trends and advancements in multimedia computing, communications, and applications. The journal covers a broad range of topics, from basic research in multimedia systems and algorithms to innovative applications in areas such as education, entertainment, healthcare, and transportation. The research presented in the journal has practical implications for industry, academia, and society, and contributes to the development of a vibrant and interdisciplinary research community.

Introduction

The journal provides a platform for researchers, practitioners, and educators to share their insights and expertise in multimedia computing, communications, and applications. The journal aims to foster innovation, collaboration, and exchange of ideas in this rapidly evolving field, and to promote the dissemination of high-quality research that can have a positive impact on the economy, society, and environment. The journal also provides opportunities for researchers at different stages of their careers to showcase their work, gain visibility, and receive feedback from their peers.

Content

The journal publishes papers that cover a wide range of topics in multimedia computing, communications, and applications, including but not limited to:

  • Multimedia systems and architectures
  • Multimedia algorithms and standards
  • Multimedia databases and retrieval
  • Multimedia interfaces and interaction
  • Multimedia networking and communication
  • Multimedia content analysis and processing
  • Multimedia applications and services

The journal also publishes special issues on emerging topics and challenges in the field, such as multimedia big data, multimedia social computing, or multimedia security and privacy. The journal is committed to the highest standards of quality and rigor, and employs a rigorous review process that ensures the validity, relevance, and originality of the published research.

Conclusion

In conclusion, the ACM Transactions on Multimedia Computing, Communications and Applications is a prestigious journal that publishes innovative and high-quality research in multimedia computing, communications, and applications. The journal covers a wide range of topics in this area, and provides a platform for researchers, practitioners, and educators to share their insights and expertise. The research presented in the journal has practical implications for industry, academia, and society, and contributes to the development of a vibrant and interdisciplinary research community.

Source image : www.journalsindexed.com

Source image : dl.acm.org

Source image : dl.acm.org

Leave a Reply

Your email address will not be published. Required fields are marked *