default search action
ACM Computing Surveys, Volume 50
Volume 50, Number 1, April 2017
- Tao Li, Ning Xie, Chunqiu Zeng, Wubai Zhou, Li Zheng, Yexi Jiang, Yimin Yang, Hsin-Yu Ha, Wei Xue, Yue Huang, Shu-Ching Chen, Jainendra K. Navlakha, S. Sitharama Iyengar:
Data-Driven Techniques in Disaster Information Management. 1:1-1:45 - Marcello La Rosa, Wil M. P. van der Aalst, Marlon Dumas, Fredrik Milani:
Business Process Variability Modeling: A Survey. 2:1-2:45 - Marwa Salayma, Ahmed Yassin Al-Dubai, Imed Romdhani, Youssef Nasser:
Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence. 3:1-3:38 - Sayantan Nath, Sonali Agarwal, G. N. Pandey:
Evaluation of Knowledge Gaps in Mathematical Applications of Thermal Image Processing Techniques for Fire Prevention. 4:1-4:43 - Ting Su, Ke Wu, Weikai Miao, Geguang Pu, Jifeng He, Yuting Chen, Zhendong Su:
A Survey on Data-Flow Testing. 5:1-5:35 - Arnab Kumar Biswas, Dipak Ghosal, Shishir Nagaraja:
A Survey of Timing Channels and Countermeasures. 6:1-6:39 - Frank Dylla, Jae Hee Lee, Till Mossakowski, Thomas Schneider, André van Delden, Jasper van de Ven, Diedrich Wolter:
A Survey of Qualitative Spatial and Temporal Calculi: Algebraic and Computational Properties. 7:1-7:39 - Ramachandra Raghavendra, Christoph Busch:
Presentation Attack Detection Methods for Face Recognition Systems: A Comprehensive Survey. 8:1-8:37 - Britta Meixner:
Hypervideos and Interactive Multimedia Presentations. 9:1-9:34 - Admela Jukan, Xavier Masip-Bruin, Nina Amla:
Smart Computing and Sensing Technologies for Animal Welfare: A Systematic Review. 10:1-10:27 - Lianhua Chi, Xingquan Zhu:
Hashing Techniques: A Survey and Taxonomy. 11:1-11:36 - Milena Tsvetkova, Taha Yasseri, Eric T. Meyer, John Brian Pickering, Vegard Engen, Paul Walland, Marika Lüders, Asbjørn Følstad, George Bravos:
Understanding Human-Machine Networks: A Cross-Disciplinary Survey. 12:1-12:35 - Stefano Calzavara, Riccardo Focardi, Marco Squarcina, Mauro Tempesta:
Surviving the Web: A Journey into Web Session Security. 13:1-13:34 - Rabih Bashroush, Muhammad Garba, Rick Rabiser, Iris Groher, Goetz Botterweck:
CASE Tool Support for Variability Management in Software Product Lines. 14:1-14:45 - Amparo Soler-Domínguez, Angel A. Juan, Renatas Kizys:
A Survey on Financial Applications of Metaheuristics. 15:1-15:23 - Nathan Burow, Scott A. Carr, Joseph Nash, Per Larsen, Michael Franz, Stefan Brunthaler, Mathias Payer:
Control-Flow Integrity: Precision, Security, and Performance. 16:1-16:33
Volume 50, Number 2, June 2017
- Faiz Ul Muram, Huy Tran, Uwe Zdun:
Systematic Review of Software Behavioral Model Consistency Checking. 17:1-17:39 - Quinten David Soetens, Romain Robbes, Serge Demeyer:
Changes as First-Class Citizens: A Research Perspective on Modern Software Tooling. 18:1-18:38 - Joan Boyar, Lene M. Favrholdt, Christian Kudahl, Kim S. Larsen, Jesper W. Mikkelsen:
Online Algorithms with Advice: A Survey. 19:1-19:34 - Anastasia Ioannidou, Elisavet Chatzilari, Spiros Nikolopoulos, Ioannis Kompatsiaris:
Deep Learning Advances in Computer Vision with 3D Data: A Survey. 20:1-20:38 - Ahmed Hussein, Mohamed Medhat Gaber, Eyad Elyan, Chrisina Jayne:
Imitation Learning: A Survey of Learning Methods. 21:1-21:35 - Joachim Gudmundsson, Michael Horton:
Spatio-Temporal Analysis of Team Sports. 22:1-22:34 - Heitor Murilo Gomes, Jean Paul Barddal, Fabrício Enembreck, Albert Bifet:
A Survey on Ensemble Learning for Data Stream Classification. 23:1-23:36 - Amit Kumar Singh, Piotr Dziurzanski, Hashan Roshantha Mendis, Leandro Soares Indrusiak:
A Survey and Comparative Study of Hard and Soft Real-Time Dynamic Resource Allocation Strategies for Multi-/Many-Core Systems. 24:1-24:40 - Ali Yadollahi, Ameneh Gholipour Shahraki, Osmar R. Zaïane:
Current State of Text Sentiment Analysis from Opinion to Emotion Mining. 25:1-25:33 - Denis Weerasiri, Moshe Chai Barukh, Boualem Benatallah, Quan Z. Sheng, Rajiv Ranjan:
A Taxonomy and Survey of Cloud Resource Orchestration Techniques. 26:1-26:41 - Sparsh Mittal:
A Survey of Techniques for Cache Partitioning in Multicore Processors. 27:1-27:39 - Hanjiang Luo, Kaishun Wu, Rukhsana Ruby, Feng Hong, Zhongwen Guo, Lionel M. Ni:
Simulation and Experimentation Platforms for Underwater Acoustic Sensor Networks: Advancements and Challenges. 28:1-28:44 - Rafaqut Kazmi, Dayang N. A. Jawawi, Radziah Mohamad, Imran Ghani:
Effective Regression Test Case Selection: A Systematic Literature Review. 29:1-29:32 - Cuong T. Do, Nguyen Hoang Tran, Choong Seon Hong, Charles A. Kamhoua, Kevin A. Kwiat, Erik Blasch, Shaolei Ren, Niki Pissinou, Sundaraja Sitharama Iyengar:
Game Theory for Cyber Security and Privacy. 30:1-30:37 - Mohamed Amine Kafi, Jalel Ben-Othman, Nadjib Badache:
A Survey on Reliability Protocols in Wireless Sensor Networks. 31:1-31:47
Volume 50, Number 3, October 2017
- Charith Perera, Yongrui Qin, Júlio Cezar Estrella, Stephan Reiff-Marganiec, Athanasios V. Vasilakos:
Fog Computing for Sustainable Smart Cities: A Survey. 32:1-32:43 - Baligh M. Al-Helali, Sabri A. Mahmoud:
Arabic Online Handwriting Recognition (AOHR): A Survey. 33:1-33:35 - Kok-Lim Alvin Yau, Junaid Qadir, Hooi Ling Khoo, Mee Hong Ling, Peter Komisarczuk:
A Survey on Reinforcement Learning Models and Algorithms for Traffic Signal Control. 34:1-34:38 - Cheol-Ho Hong, Ivor T. A. Spence, Dimitrios S. Nikolopoulos:
GPU Virtualization and Scheduling Methods: A Comprehensive Survey. 35:1-35:37 - Muhammad Murad Khan, Roliana Ibrahim, Imran Ghani:
Cross Domain Recommender Systems: A Systematic Literature Review. 36:1-36:34 - Kenneth O'Brien, Ilia Pietri, Ravi Reddy, Alexey L. Lastovetsky, Rizos Sakellariou:
A Survey of Power and Energy Predictive Models in HPC Systems and Applications. 37:1-37:38 - Astrid Rheinländer, Ulf Leser, Goetz Graefe:
Optimization of Complex Dataflows with User-Defined Functions. 38:1-38:39 - Ahmad Abdollahzadeh Barforoush, Hossein Shirazi, Hojjat Emami:
A New Classification Framework to Evaluate the Entity Profiling on the Web: Past, Present and Future. 39:1-39:39 - Geong Sen Poh, Ji-Jian Chin, Wei-Chuen Yau, Kim-Kwang Raymond Choo, Moesfa Soeheila Mohamad:
Searchable Symmetric Encryption: Designs and Challenges. 40:1-40:37 - Yanfang Ye, Tao Li, Donald A. Adjeroh, S. Sitharama Iyengar:
A Survey on Malware Detection Using Data Mining Techniques. 41:1-41:40 - Jeroen J. A. Keiren, Peter Fontana, Rance Cleaveland:
Corrections to "A Menagerie of Timed Automata". 42:1-42:8 - Longbing Cao:
Data Science: A Comprehensive Overview. 43:1-43:42 - Alessandro Acquisti, Idris Adjerid, Rebecca Balebako, Laura Brandimarte, Lorrie Faith Cranor, Saranga Komanduri, Pedro Giovanni Leon, Norman M. Sadeh, Florian Schaub, Manya Sleeper, Yang Wang, Shomir Wilson:
Nudges for Privacy and Security: Understanding and Assisting Users' Choices Online. 44:1-44:41 - Tao Li, Chunqiu Zeng, Yexi Jiang, Wubai Zhou, Liang Tang, Zheng Liu, Yue Huang:
Data-Driven Techniques in Computing System Management. 45:1-45:43 - Pat Morin, Wolfgang Mulzer, Tommy Reddad:
Encoding Arguments. 46:1-46:36
Volume 50, Number 4, November 2017
- Tim Storer:
Bridging the Chasm: A Survey of Software Engineering Practice in Scientific Programming. 47:1-47:32 - Jones Granatyr, Nardine Osman, João Miguel Dias, Maria Augusta Silveira Netto Nunes, Judith Masthoff, Fabrício Enembreck, Otto Robert Lessing, Carles Sierra, Ana Paiva, Edson Emílio Scalabrin:
The Need for Affective Trust Applied to Trust and Reputation Models. 48:1-48:36 - Kiranbir Kaur, Sandeep Sharma, Karanjeet Singh Kahlon:
Interoperability and Portability Approaches in Inter-Connected Clouds: A Review. 49:1-49:40 - Georgia Psychou, Dimitrios Rodopoulos, Mohamed M. Sabry, Tobias Gemmeke, David Atienza, Tobias G. Noll, Francky Catthoor:
Classification of Resilience Techniques Against Functional Errors at Higher Abstraction Layers of Digital Systems. 50:1-50:38 - Laure Soulier, Lynda Tamine:
On the Collaboration Support in Information Retrieval. 51:1-51:34 - Andreas Schoknecht, Tom Thaler, Peter Fettke, Andreas Oberweis, Ralf Laue:
Similarity of Business Process Models - A State-of-the-Art Analysis. 52:1-52:33 - Michael Stein, Mathias Fischer, Immanuel Schweizer, Max Mühlhäuser:
A Classification of Locality in Network Research. 53:1-53:37 - Tanmoy Chakraborty, Ayushi Dalmia, Animesh Mukherjee, Niloy Ganguly:
Metrics for Community Analysis: A Survey. 54:1-54:37 - Nguyen Khoi Tran, Quan Z. Sheng, Muhammad Ali Babar, Lina Yao:
Searching the Web of Things: State of the Art, Challenges, and Solutions. 55:1-55:34 - Seyed Mohammad Ghaffarian, Hamid Reza Shahriari:
Software Vulnerability Analysis and Discovery Using Machine-Learning and Data-Mining Techniques: A Survey. 56:1-56:36 - Zaid Bin Tariq, Dost Muhammad Cheema, Muhammad Zahir Kamran, Ijaz Haider Naqvi:
Non-GPS Positioning Systems: A Survey. 57:1-57:34 - Yangdong Deng, Yufei Ni, Zonghui Li, Shuai Mu, Wenjun Zhang:
Toward Real-Time Ray Tracing: A Survey on Hardware Acceleration and Microarchitecture Techniques. 58:1-58:41 - Kwangwon Sun, Sukyoung Ryu:
Analysis of JavaScript Programs: Challenges and Research Trends. 59:1-59:34 - Rafael Caballero, Adrián Riesco, Josep Silva:
A Survey of Algorithmic Debugging. 60:1-60:35 - Padma Jayaraman, Ranjani Parthasarathi:
A Survey on Post-Silicon Functional Validation for Multicore Architectures. 61:1-61:30
Volume 50, Number 5, November 2017
- Azzedine Boukerche, Abdul Jabbar Siddiqui, Abdelhamid Mammeri:
Automated Vehicle Detection and Classification: Models, Methods, and Techniques. 62:1-62:39 - Changtao Zhong, Nishanth Sastry:
Systems Applications of Social Networks. 63:1-63:42 - Radim Baca, Michal Krátký, Irena Holubová, Martin Necaský, Tomás Skopal, Martin Svoboda, Sherif Sakr:
Structural XML Query Processing. 64:1-64:41 - Pallavi Bagga, Rahul Hans:
Mobile Agents System Security: A Systematic Survey. 65:1-65:45 - Esben Andreasen, Liang Gong, Anders Møller, Michael Pradel, Marija Selakovic, Koushik Sen, Cristian-Alexandru Staicu:
A Survey of Dynamic Analysis and Test Generation for JavaScript. 66:1-66:36 - Niall Murray, Oluwakemi Adewunmi Ademoye, Gheorghita Ghinea, Gabriel-Miro Muntean:
A Tutorial for Olfaction-Based Multisensorial Media Application Design and Evaluation. 67:1-67:30 - Renzo Angles, Marcelo Arenas, Pablo Barceló, Aidan Hogan, Juan L. Reutter, Domagoj Vrgoc:
Foundations of Modern Query Languages for Graph Databases. 68:1-68:40 - Dorien Herremans, Ching-Hua Chuan, Elaine Chew:
A Functional Taxonomy of Music Generation Systems. 69:1-69:30 - Oscar Pulido-Prieto, Ulises Juárez-Martínez:
A Survey of Naturalistic Programming Technologies. 70:1-70:35 - Elias Alevizos, Anastasios Skarlatidis, Alexander Artikis, Georgios Paliouras:
Probabilistic Complex Event Recognition: A Survey. 71:1-71:31 - Francisco Martinez-Gil, Miguel Lozano, Ignacio García-Fernández, Fernando Fernández:
Modeling, Evaluation, and Scale on Artificial Pedestrians: A Literature Review. 72:1-72:35 - Aditya Joshi, Pushpak Bhattacharyya, Mark James Carman:
Automatic Sarcasm Detection: A Survey. 73:1-73:22 - Pablo González, Alberto Castaño, Nitesh V. Chawla, Juan José del Coz:
A Review on Quantification Learning. 74:1-74:40 - Jordi Mongay Batalla, Athanasios V. Vasilakos, Mariusz Gajewski:
Secure Smart Homes: Opportunities and Challenges. 75:1-75:32 - Frank S. de Boer, Vlad Serbanescu, Reiner Hähnle, Ludovic Henrio, Justine Rochas, Crystal Chang Din, Einar Broch Johnsen, Marjan Sirjani, Ehsan Khamespanah, Kiko Fernandez-Reyes, Albert Mingkun Yang:
A Survey of Active Object Languages. 76:1-76:39 - Stefan Laube, Rainer Böhme:
Strategic Aspects of Cyber Risk Information Sharing. 77:1-77:36
Volume 50, Number 6, January 2018
- Eduardo Felipe Zambom Santana, Ana Paula Chaves, Marco Aurélio Gerosa, Fabio Kon, Dejan S. Milojicic:
Software Platforms for Smart Cities: Concepts, Requirements, Challenges, and a Unified Reference Architecture. 78:1-78:37 - Onur Tunali, Mustafa Altun:
A Survey of Fault-Tolerance Algorithms for Reconfigurable Nano-Crossbar Arrays. 79:1-79:35 - Irina Tal, Gabriel-Miro Muntean:
Towards Reasoning Vehicles: A Survey of Fuzzy Logic-Based Solutions in Vehicular Networks. 80:1-80:37 - Xuanhua Shi, Zhigao Zheng, Yongluan Zhou, Hai Jin, Ligang He, Bo Liu, Qiang-Sheng Hua:
Graph Processing on GPUs: A Survey. 81:1-81:35 - Alan Burns, Robert I. Davis:
A Survey of Research into Mixed Criticality Systems. 82:1-82:37 - Paulo Martins, Leonel Sousa, Artur Mariano:
A Survey on Fully Homomorphic Encryption: An Engineering Perspective. 83:1-83:33 - Alejandro Torreño, Eva Onaindia, Antonín Komenda, Michal Stolba:
Cooperative Multi-Agent Planning: A Survey. 84:1-84:32 - Pranjul Yadav, Michael S. Steinbach, Vipin Kumar, György J. Simon:
Mining Electronic Health Records (EHRs): A Survey. 85:1-85:40 - Tempestt J. Neal, Kalaivani Sundararajan, Aneez Fatima, Yiming Yan, Yingfei Xiang, Damon L. Woodard:
Surveying Stylometry Techniques and Applications. 86:1-86:36 - Artem Voronkov, Leonardo H. Iwaya, Leonardo A. Martucci, Stefan Lindskog:
Systematic Literature Review on Usability of Firewall Configuration. 87:1-87:35 - Elif Bilge Kavun, Hristina Mihajloska, Tolga Yalçin:
A Survey on Authenticated Encryption-ASIC Designer's Perspective. 88:1-88:21 - Sebastian Werner, Javier Navaridas, Mikel Luján:
A Survey on Optical Network-on-Chip Architectures. 89:1-89:37 - Danial Hooshyar, Moslem Yousefi, Heuiseok Lim:
Data-Driven Approaches to Game Player Modeling: A Systematic Literature Review. 90:1-90:19 - Yaser Mansouri, Adel Nadjaran Toosi, Rajkumar Buyya:
Data Storage Management in Cloud Environments: Taxonomy, Survey, and Future Directions. 91:1-91:51 - Prakash Shrestha, Nitesh Saxena:
An Offensive and Defensive Exposition of Wearable Computing. 92:1-92:39 - Niels van Berkel, Denzil Ferreira, Vassilis Kostakos:
The Experience Sampling Method on Mobile Devices. 93:1-93:40 - Jundong Li, Kewei Cheng, Suhang Wang, Fred Morstatter, Robert P. Trevino, Jiliang Tang, Huan Liu:
Feature Selection: A Data Perspective. 94:1-94:45 - Viivi Uurtio, João M. Monteiro, Jaz S. Kandola, John Shawe-Taylor, Delmiro Fernandez-Reyes, Juho Rousu:
A Tutorial on Canonical Correlation Methods. 95:1-95:33 - Richard Skarbez, Frederick P. Brooks Jr., Mary C. Whitton:
A Survey of Presence and Related Concepts. 96:1-96:39 - Suining He, Kang G. Shin:
Geomagnetism for Smartphone-Based Indoor Localization: Challenges, Advances, and Comparisons. 97:1-97:37 - Jhonny Mertz, Ingrid Nunes:
Understanding Application-Level Caching in Web Applications: A Comprehensive Introduction and Survey of State-of-the-Art Approaches. 98:1-98:34
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.