default search action
ACM Computing Surveys, Volume 52
Volume 52, Number 1, February 2019
- Sulav Malla, Ken Christensen:
A Survey on Power Management Techniques for Oversubscription of Multi-Tenant Data Centers. 1:1-1:31 - Jianyu Wang, Jianli Pan, Flavio Esposito, Prasad Calyam, Zhicheng Yang, Prasant Mohapatra:
Edge Cloud Offloading Algorithms: Issues, Methods, and Perspectives. 2:1-2:23 - Vaibhavi Kalgutkar, Ratinder Kaur, Hugo Gonzalez, Natalia Stakhanova, Alina Matyukhina:
Code Authorship Attribution: Methods and Challenges. 3:1-3:36 - Walter Didimo, Giuseppe Liotta, Fabrizio Montecchiani:
A Survey on Graph Drawing Beyond Planarity. 4:1-4:37 - Shuai Zhang, Lina Yao, Aixin Sun, Yi Tay:
Deep Learning Based Recommender System: A Survey and New Perspectives. 5:1-5:38 - Matheus R. F. Mendonça, Artur Ziviani, André da Motta Salles Barreto:
Graph-Based Skill Acquisition For Reinforcement Learning. 6:1-6:26 - Jing Zhang, Wanqing Li, Philip Ogunbona, Dong Xu:
Recent Advances in Transfer Learning for Cross-Dataset Visual Recognition: A Problem-Oriented Perspective. 7:1-7:38 - Minxian Xu, Rajkumar Buyya:
Brownout Approach for Adaptive Management of Resources and Applications in Cloud Computing Systems: A Taxonomy and Future Directions. 8:1-8:27 - Ping Xiao, Hannu Toivonen, Oskar Gross, Amílcar Cardoso, João Correia, Penousal Machado, Pedro Martins, Hugo Gonçalo Oliveira, Rahul Sharma, Alexandre Miguel Pinto, Alberto Díaz, Virginia Francisco, Pablo Gervás, Raquel Hervás, Carlos León, Jamie Forth, Matthew Purver, Geraint A. Wiggins, Dragana Miljkovic, Vid Podpecan, Senja Pollak, Jan Kralj, Martin Znidarsic, Marko Bohanec, Nada Lavrac, Tanja Urbancic, Frank van der Velde, Stuart Adam Battersby:
Conceptual Representations for Computational Concept Creation. 9:1-9:33 - Yongjun Hong, Uiwon Hwang, Jaeyoon Yoo, Sungroh Yoon:
How Generative Adversarial Networks and Their Variants Work: An Overview. 10:1-10:43 - Azzedine Boukerche, Shichao Guan, Robson E. De Grande:
Sustainable Offloading in Mobile Cloud Computing: Algorithmic Design and Implementation. 11:1-11:37 - Rajendra Patil, Chirag Modi:
An Exhaustive Survey on Security Concerns and Solutions at Different Components of Virtualization. 12:1-12:38 - Junyu Xuan, Jie Lu, Guangquan Zhang:
A Survey on Bayesian Nonparametric Learning. 13:1-13:36 - Francisco J. Cazorla, Leonidas Kosmidis, Enrico Mezzetti, Carles Hernández, Jaume Abella, Tullio Vardanega:
Probabilistic Worst-Case Timing Analysis: Taxonomy and Comprehensive Survey. 14:1-14:35 - Karam Abdulahhad, Catherine Berrut, Jean-Pierre Chevallet, Gabriella Pasi:
Modeling Information Retrieval by Formal Logic: A Survey. 15:1-15:37 - Graham Cormode, Hossein Jowhari:
Lp Samplers and Their Applications: A Survey. 16:1-16:31 - Thiago Henrique Silva, Aline Carneiro Viana, Fabrício Benevenuto, Leandro Villas, Juliana F. S. Salles, Antonio A. F. Loureiro, Daniele Quercia:
Urban Computing Leveraging Location-Based Social Network Data: A Survey. 17:1-17:39 - Federico Reghenzani, Giuseppe Massari, William Fornaciari:
The Real-Time Linux Kernel: A Survey on PREEMPT_RT. 18:1-18:36 - Usama Ahmed, Imran Raza, Syed Asad Hussain:
Trust Evaluation in Cross-Cloud Federation: Survey and Requirement Analysis. 19:1-19:37 - Annushree Bablani, Damodar Reddy Edla, Diwakar Tripathi, Ramalingaswamy Cheruku:
Survey on Brain-Computer Interface: An Emerging Computational Intelligence Paradigm. 20:1-20:32 - Parnika Bhat, Kamlesh Dutta:
A Survey on Various Threats and Current State of Security in Android Platform. 21:1-21:35 - Ranran Bian, Yun Sing Koh, Gillian Dobbie, Anna Divoli:
Identifying Top-k Nodes in Social Networks: A Survey. 22:1-22:33
Volume 52, Number 2, May 2019
- Sai Manoj Pudukotai Dinakarrao, Axel Jantsch, Muhammad Shafique:
Computer-aided Arrhythmia Diagnosis with Bio-signal Processing: A Survey of Trends and Techniques. 23:1-23:37 - Djamel Djenouri, Roufaida Laidi, Youcef Djenouri, Ilangko Balasingham:
Machine Learning for Smart Building Applications: Review and Taxonomy. 24:1-24:36 - Mihai Gabriel Constantin, Miriam Redi, Gloria Zen, Bogdan Ionescu:
Computational Understanding of Visual Interestingness Beyond Semantics: Literature Survey and Analysis of Covariates. 25:1-25:37 - Miqing Li, Xin Yao:
Quality Evaluation of Solution Sets in Multiobjective Optimisation: A Survey. 26:1-26:38 - Isil Öz, Sanem Arslan:
A Survey on Multithreading Alternatives for Soft Error Fault Tolerance. 27:1-27:38 - Rochak Swami, Mayank Dave, Virender Ranga:
Software-defined Networking-based DDoS Defense Mechanisms. 28:1-28:36 - Yara Rizk, Mariette Awad, Edward W. Tunstel:
Cooperative Heterogeneous Multi-Robot Systems: A Survey. 29:1-29:31 - Ivan Homoliak, Flavio Toffalini, Juan Guarnizo, Yuval Elovici, Martín Ochoa:
Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures. 30:1-30:40 - Thiago Rateke, Karla A. Justen, Vito F. Chiarella, Antonio Carlos Sobieranski, Eros Comunello, Aldo von Wangenheim:
Passive Vision Region-Based Road Detection: A Literature Review. 31:1-31:34 - Wei Wang, Longbing Cao:
Negative Sequence Analysis: A Review. 32:1-32:39 - Athira M. Nambiar, Alexandre Bernardino, Jacinto C. Nascimento:
Gait-based Person Re-identification: A Survey. 33:1-33:34 - Azzedine Boukerche, Qi Zhang:
Countermeasures against Worm Spreading: A New Challenge for Vehicular Networks. 34:1-34:25 - Milad Afzalan, Farrokh Jazizadeh:
Indoor Positioning Based on Visible Light Communication: A Performance-based Survey of Real-world Prototypes. 35:1-35:36 - Henriette Röger, Ruben Mayer:
A Comprehensive Survey on Parallelization and Elasticity in Stream Processing. 36:1-36:37 - Chadni Islam, Muhammad Ali Babar, Surya Nepal:
A Multi-Vocal Review of Security Orchestration. 37:1-37:45 - Ayman Taha, Ali S. Hadi:
Anomaly Detection Methods for Categorical Data: A Review. 38:1-38:35 - Aditya Sundararajan, Arif I. Sarwat, Alexander Perez-Pons:
A Survey on Modality Characteristics, Performance Evaluation Metrics, and Security for Traditional and Wearable Biometric Systems. 39:1-39:36 - Erwei Wang, James J. Davis, Ruizhe Zhao, Ho-Cheung Ng, Xinyu Niu, Wayne Luk, Peter Y. K. Cheung, George A. Constantinides:
Deep Neural Network Approximation for Custom Hardware: Where We've Been, Where We're Going. 40:1-40:39 - Hadi Habibzadeh, Cem Kaptan, Tolga Soyata, Burak Kantarci, Azzedine Boukerche:
Smart City System Design: A Comprehensive Study of the Application and Data Planes. 41:1-41:38 - Hameedah Sultan, Anjali Chauhan, Smruti R. Sarangi:
A Survey of Chip-level Thermal Simulators. 42:1-42:35 - Mustansar Fiaz, Arif Mahmood, Sajid Javed, Soon Ki Jung:
Handcrafted and Deep Trackers: Recent Visual Object Tracking Approaches and Trends. 43:1-43:44
Volume 52, Number 3, July 2019
- Elisa Mannes, Carlos Maziero:
Naming Content on the Network Layer: A Security Analysis of the Information-Centric Network Model. 44:1-44:28 - Tommi Gröndahl, N. Asokan:
Text Analysis in Adversarial Settings: Does Deception Leave a Stylistic Trace? 45:1-45:36 - Yongsen Ma, Gang Zhou, Shuangquan Wang:
WiFi Sensing with Channel State Information: A Survey. 46:1-46:36 - João Felipe Pimentel, Juliana Freire, Leonardo Murta, Vanessa Braganholo:
A Survey on Collecting, Managing, and Analyzing Provenance from Scripts. 47:1-47:38 - Lucian José Gonçales, Kleinner Farias, Toacy Cavalcante de Oliveira, Murillo Scholl:
Comparison of Software Design Models: An Extended Systematic Mapping Study. 48:1-48:41 - Matthias Wenzl, Georg Merzdovnik, Johanna Ullrich, Edgar R. Weippl:
From Hack to Elaborate Technique - A Survey on Binary Rewriting. 49:1-49:37 - Katerina El Raheb, Marina Stergiou, Akrivi Katifori, Yannis E. Ioannidis:
Dance Interactive Learning Systems: A Study on Interaction Workflow and Teaching Approaches. 50:1-50:37 - Rui Zhang, Rui Xue, Ling Liu:
Security and Privacy on Blockchain. 51:1-51:34 - Mohammad Bakhshalipour, Seyedali Tabaeiaghdaei, Pejman Lotfi-Kamran, Hamid Sarbazi-Azad:
Evaluation of Hardware Data Prefetchers on Server Processors. 52:1-52:29 - Lorena González-Manzano, José María de Fuentes, Arturo Ribagorda:
Leveraging User-related Internet of Things for Continuous Authentication: A Survey. 53:1-53:38 - Muhammad Usman, Mian Ahmad Jan, Xiangjian He, Jinjun Chen:
A Survey on Big Multimedia Data Processing and Management in Smart Cities. 54:1-54:29 - Jiaheng Lu, Irena Holubová:
Multi-model Databases: A New Journey to Handle the Variety of Data. 55:1-55:38 - Claire Maiza, Hamza Rihani, Juan Maria Rivas, Joël Goossens, Sebastian Altmeyer, Robert I. Davis:
A Survey of Timing Verification Techniques for Multi-Core Real-Time Systems. 56:1-56:38 - Hu Xiong, Yan Wu, Zhenyu Lu:
A Survey of Group Key Agreement Protocols with Constant Rounds. 57:1-57:32 - Estêvão B. Saleme, Alexandra Covaci, Gebremariam Mesfin, Celso A. S. Santos, Gheorghita Ghinea:
Mulsemedia DIY: A Survey of Devices and a Tutorial for Building Your Own Mulsemedia Environment. 58:1-58:29 - Tessema M. Mengistu, Dunren Che:
Survey and Taxonomy of Volunteer Computing. 59:1-59:35 - Samia Oukemeni, Helena Rifà-Pous, Joan Manuel Marquès Puig:
Privacy Analysis on Microblogging Online Social Networks: A Survey. 60:1-60:36 - Stephan Winter, Martin Tomko, Maria Vasardani, Kai-Florian Richter, Kourosh Khoshelham, Mohsen Kalantari:
Infrastructure-Independent Indoor Localization and Navigation. 61:1-61:24 - Roberto Castañeda Lozano, Christian Schulte:
Survey on Combinatorial Register Allocation and Instruction Scheduling. 62:1-62:50 - S. Chandrakala, S. L. Jayalakshmi:
Environmental Audio Scene and Sound Event Recognition for Autonomous Surveillance: A Survey and Comparative Studies. 63:1-63:34 - Fuqiang Gu, Xuke Hu, Milad Ramezani, Debaditya Acharya, Kourosh Khoshelham, Shahrokh Valaee, Jianga Shang:
Indoor Localization Improved by Spatial Context - A Survey. 64:1-64:35
Volume 52, Number 4, September 2019
- Tal Ben-Nun, Torsten Hoefler:
Demystifying Parallel and Distributed Deep Learning: An In-depth Concurrency Analysis. 65:1-65:43 - Xiaofeng Liao, Zhiming Zhao:
Unsupervised Approaches for Textual Semantic Annotation, A Survey. 66:1-66:45 - Parminder Kaur, Husanbir Singh Pannu, Avleen Kaur Malhi:
Comprehensive Study of Continuous Orthogonal Moments - A Systematic Review. 67:1-67:30 - Mainak Adhikari, Tarachand Amgoth, Satish Narayana Srirama:
A Survey on Scheduling Strategies for Workflows in Cloud Environment and Emerging Trends. 68:1-68:36 - Rob van Glabbeek, Peter Höfner:
Progress, Justness, and Fairness. 69:1-69:38 - Melinda McDaniel, Veda C. Storey:
Evaluating Domain Ontologies: Clarification, Classification, and Challenges. 70:1-70:44 - Ching-Ling Fan, Wen-Chih Lo, Yu-Tung Pai, Cheng-Hsin Hsu:
A Survey on 360° Video Streaming: Acquisition, Transmission, and Display. 71:1-71:36 - Madalena G. Ribeiro, Abel João Padrão Gomes:
Recoloring Algorithms for Colorblind People: A Survey. 72 - Swarnendu Ghosh, Nibaran Das, Ishita Das, Ujjwal Maulik:
Understanding Deep Learning Techniques for Image Segmentation. 73:1-73:35 - Z. Berkay Celik, Earlence Fernandes, Eric Pauley, Gang Tan, Patrick D. McDaniel:
Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities. 74:1-74:30 - Wojciech Widel, Maxime Audinot, Barbara Fila, Sophie Pinchinat:
Beyond 2014: Formal Methods for Attack Tree-based Security Modeling. 75:1-75:36 - Saeed Rashidi, Majid Jalili, Hamid Sarbazi-Azad:
A Survey on PCM Lifetime Enhancement Schemes. 76:1-76:38 - Joanna Bergström, Kasper Hornbæk:
Human-Computer Interaction on the Skin. 77:1-77:14 - Davide Maiorca, Battista Biggio, Giorgio Giacinto:
Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks. 78:1-78:36 - Harsurinder Kaur, Husanbir Singh Pannu, Avleen Kaur Malhi:
A Systematic Review on Imbalanced Data Challenges in Machine Learning: Applications and Solutions. 79:1-79:36 - Patricia Arias Cabarcos, Christian Krupitzer, Christian Becker:
A Survey on Adaptive Authentication. 80:1-80:30 - Stefanos Georgiou, Stamatia Rizou, Diomidis Spinellis:
Software Development Lifecycle for Energy Efficiency: Techniques and Tools. 81:1-81:33 - Jeffrey Pawlick, Edward Colbert, Quanyan Zhu:
A Game-theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy. 82:1-82:28 - Sam Fletcher, Md Zahidul Islam:
Decision Tree Classification with Differential Privacy: A Survey. 83:1-83:33 - Sara Kardani-Moghaddam, Rajkumar Buyya, Kotagiri Ramamohanarao:
Performance-Aware Management of Cloud Resources: A Taxonomy and Future Directions. 84:1-84:37 - Alistair Moffat:
Huffman Coding. 85:1-85:35 - Maria De Marsico, Alessio Mecca:
A Survey on Gait Recognition via Wearable Sensors. 86:1-86:39
Volume 52, Number 5, October 2019
- Mashael Yousef Almoqbel, Songhua Xu:
Computational Mining of Social Media to Curb Terrorism. 87:1-87:25 - Ori Or-Meir, Nir Nissim, Yuval Elovici, Lior Rokach:
Dynamic Malware Analysis in the Modern Era - A State of the Art Survey. 88:1-88:48 - Vincent Labatut, Xavier Bost:
Extraction and Analysis of Fictional Character Networks: A Survey. 89:1-89:40 - Zeineb Rejiba, Xavier Masip-Bruin, Eva Marín-Tordera:
A Survey on Mobility-Induced Service Migration in the Fog, Edge, and Related Computing Paradigms. 90:1-90:33 - Farha Jahan, Weiqing Sun, Quamar Niyaz, Mansoor Alam:
Security Modeling of Autonomous Systems: A Survey. 91:1-91:34 - Weiqing Min, Shuqiang Jiang, Linhu Liu, Yong Rui, Ramesh C. Jain:
A Survey on Food Computing. 92:1-92:36 - Antonia Bertolino, Guglielmo De Angelis, Micael Gallego, Boni García, Francisco Gortázar, Francesca Lonetti, Eda Marchetti:
A Systematic Review on Cloud Testing. 93:1-93:42 - Thang Le Duc, Rafael A. García Leiva, Paolo Casari, Per-Olov Östberg:
Machine Learning Methods for Reliable Resource Provisioning in Edge-Cloud Computing: A Survey. 94:1-94:39 - Mutaz Barika, Saurabh Kumar Garg, Albert Y. Zomaya, Lizhe Wang, Aad van Moorsel, Rajiv Ranjan:
Orchestrating Big Data Analysis Workflows in the Cloud: Research Challenges, Survey, and Future Directions. 95:1-95:41 - Rodrigo Gonçalves, Carina Friedrich Dorneles:
Automated Expertise Retrieval: A Taxonomy-Based Survey and Open Issues. 96:1-96:30 - Cheol-Ho Hong, Blesson Varghese:
Resource Management in Fog/Edge Computing: A Survey on Architectures, Infrastructure, and Algorithms. 97:1-97:37 - Ka-Chun Wong, Jiao Zhang, Shankai Yan, Xiangtao Li, Qiuzhen Lin, Sam Kwong, Cheng Liang:
DNA Sequencing Technologies: Sequencing Data Protocols and Bioinformatics Tools. 98:1-98:30 - Hong-Ning Dai, Raymond Chi-Wing Wong, Hao Wang, Zibin Zheng, Athanasios V. Vasilakos:
Big Data Analytics for Large-scale Wireless Networks: Challenges and Opportunities. 99:1-99:36 - Matt Luckcuck, Marie Farrell, Louise A. Dennis, Clare Dixon, Michael Fisher:
Formal Specification and Verification of Autonomous Robotic Systems: A Survey. 100:1-100:41 - Mike Maksimov, Sahar Kokaly, Marsha Chechik:
A Survey of Tool-supported Assurance Case Assessment Techniques. 101:1-101:34 - Paulo Henrique Pisani, Abir Mhenni, Romain Giot, Estelle Cherrier, Norman Poh, André Carlos Ponce de Leon Ferreira de Carvalho, Christophe Rosenberger, Najoua Essoukri Ben Amara:
Adaptive Biometric Systems: Review and Perspectives. 102:1-102:38 - Michalis Mountantonakis, Yannis Tzitzikas:
Large-scale Semantic Integration of Linked Data: A Survey. 103:1-103:40 - Hrishav Bakul Barua, Kartick Chandra Mondal:
A Comprehensive Survey on Cloud Data Mining (CDM) Frameworks and Algorithms. 104:1-104:62 - Ioannis Mademlis, Nikos Nikolaidis, Anastasios Tefas, Ioannis Pitas, Tilman Wagner, Alberto Messina:
Autonomous UAV Cinematography: A Tutorial and a Formalized Shot-Type Taxonomy. 105:1-105:33 - Vivekraj V. K, Debashis Sen, Balasubramanian Raman:
Video Skimming: Taxonomy and Comprehensive Survey. 106:1-106:38 - Ana Carolina Lorena, Luís Paulo F. Garcia, Jens Lehmann, Marcílio Carlos Pereira de Souto, Tin Kam Ho:
How Complex Is Your Classification Problem?: A Survey on Measuring Classification Complexity. 107:1-107:34
Volume 52, Number 6, January 2020
- Caesar Wu, Rajkumar Buyya, Kotagiri Ramamohanarao:
Cloud Pricing Models: Taxonomy, Survey, and Interdisciplinary Challenges. 108:1-108:36 - Galal M. BinMakhashen, Sabri A. Mahmoud:
Document Layout Analysis: A Comprehensive Survey. 109:1-109:36 - Jaybie A. de Guzman, Kanchana Thilakarathna, Aruna Seneviratne:
Security and Privacy Approaches in Mixed Reality: A Literature Survey. 110:1-110:37 - Muhammad Usman, Mian Ahmad Jan, Xiangjian He, Jinjun Chen:
A Survey on Representation Learning Efforts in Cybersecurity Domain. 111:1-111:28 - Tomás Foltýnek, Norman Meuschke, Bela Gipp:
Academic Plagiarism Detection: A Systematic Literature Review. 112:1-112:42 - Yannis Lilis, Anthony Savidis:
A Survey of Metaprogramming Languages. 113:1-113:39 - Anh Cat Le Ngo, Raphael C.-W. Phan:
Seeing the Invisible: Survey of Video Motion Magnification and Small Motion Analysis. 114:1-114:20 - Nayyer Aafaq, Ajmal Mian, Wei Liu, Syed Zulqarnain Gilani, Mubarak Shah:
Video Description: A Survey of Methods, Datasets, and Evaluation Metrics. 115:1-115:37 - Madhushree Basavarajaiah, Priyanka Sharma:
Survey of Compressed Domain Video Summarization Techniques. 116:1-116:29 - Mario Gleirscher, Simon Foster, Jim Woodcock:
New Opportunities for Integrated Formal Methods. 117:1-117:36 - Leibo Liu, Jianfeng Zhu, Zhaoshi Li, Yanan Lu, Yangdong Deng, Jie Han, Shouyi Yin, Shaojun Wei:
A Survey of Coarse-Grained Reconfigurable Architecture and Design: Taxonomy, Challenges, and Applications. 118:1-118:39 - Aditya Joshi, Sarvnaz Karimi, Ross Sparks, Cécile Paris, C. Raina MacIntyre:
Survey of Text-based Epidemic Intelligence: A Computational Linguistics Perspective. 119:1-119:19 - Qingyi Zhu, Seng W. Loke, Rolando Trujillo-Rasua, Frank Jiang, Yong Xiang:
Applications of Distributed Ledger Technologies to the Internet of Things: A Survey. 120:1-120:34 - Junzhi Li, Ying Tan:
A Comprehensive Review of the Fireworks Algorithm. 121:1-121:28 - Mathias Humbert, Benjamin Trubert, Kévin Huguenin:
A Survey on Interdependent Privacy. 122:1-122:40 - Meng Zhu, Alf Inge Wang:
Model-driven Game Development: A Literature Review. 123:1-123:32 - Bharat Manral, Gaurav Somani, Kim-Kwang Raymond Choo, Mauro Conti, Manoj Singh Gaur:
A Systematic Survey on Cloud Forensics Challenges, Solutions, and Future Directions. 124:1-124:38 - Ju Ren, Deyu Zhang, Shiwen He, Yaoxue Zhang, Tao Li:
A Survey on End-Edge-Cloud Orchestrated Network Computing Paradigms: Transparent Computing, Mobile Edge Computing, Fog Computing, and Cloudlet. 125:1-125:36 - Amir Afianian, Salman Niksefat, Babak Sadeghiyan, David Baptiste:
Malware Dynamic Analysis Evasion Techniques: A Survey. 126:1-126:28 - Leonardo A. F. Leite, Carla Rocha, Fabio Kon, Dejan S. Milojicic, Paulo Meirelles:
A Survey of DevOps Concepts and Challenges. 127:1-127:35 - Robert A. Bridges, Tarrah R. Glass-Vanderlan, Michael D. Iannacone, Maria S. Vincent, Qian (Guenevere) Chen:
A Survey of Intrusion Detection Systems Leveraging Host Data. 128:1-128:35 - Menasha Thilakaratne, Katrina Falkner, Thushari Atapattu:
A Systematic Review on Literature-based Discovery: General Overview, Methodology, & Statistical Analysis. 129:1-129:34 - Mukesh Kumar Saini, Neeraj Goel:
How Smart Are Smart Classrooms? A Review of Smart Classroom Technologies. 130:1-130:28 - Mikhail Drobyshevskiy, Denis Turdakov:
Random Graph Modeling: A Survey of the Concepts. 131:1-131:36
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.