default search action
ACM Computing Surveys, Volume 45
Volume 45, Number 1, November 2012
- Dong Zhou, Mark Truran, Tim J. Brailsford, Vincent Wade, Helen Ashman:
Translation techniques in cross-language information retrieval. 1:1-1:44 - Simona Bernardi, José Merseguer, Dorina C. Petriu:
Dependability modeling and analysis of software systems specified with UML. 2:1-2:48 - Sasikanth Avancha, Amit S. Baxi, David Kotz:
Privacy in mobile technology for personal healthcare. 3:1-3:54 - Sergey Zhuravlev, Juan Carlos Saez, Sergey Blagodurov, Alexandra Fedorova, Manuel Prieto:
Survey of scheduling techniques for addressing shared resources in multicore processors. 4:1-4:28 - Anisa Al-Hafeedh, Maxime Crochemore, Lucian Ilie, Evguenia Kopylova, William F. Smyth, German Tischler, Munina Yusufu:
A comparison of index-based lempel-Ziv LZ77 factorization algorithms. 5:1-5:17 - Boris Danev, Davide Zanetti, Srdjan Capkun:
On physical-layer identification of wireless devices. 6:1-6:29 - Yi Zhi Zhao, Chunyan Miao, Maode Ma, Jing-Bing Zhang, Cyril Leung:
A survey and projection on medium access control protocols for wireless sensor networks. 7:1-7:37 - Glenn I. Hawe, Graham Coates, Duncan T. Wilson, Roger S. Crouch:
Agent-based simulation for large-scale emergency response: A survey of usage and implementation. 8:1-8:51 - R. Annie Uthra, S. V. Kasmir Raja:
QoS routing in wireless sensor networks - a survey. 9:1-9:12 - João Mendes-Moreira, Carlos Soares, Alípio Mário Jorge, Jorge Freire de Sousa:
Ensemble approaches for regression: A survey. 10:1-10:40 - Mark Harman, S. Afshin Mansouri, Yuanyuan Zhang:
Search-based software engineering: Trends, techniques and applications. 11:1-11:61 - Philippe Esling, Carlos Agón:
Time-series data mining. 12:1-12:34
Volume 45, Number 2, February 2013
- Simone Faro, Thierry Lecroq:
The exact online string matching problem: A review of the most recent results. 13:1-13:42 - Angeliki Kritikakou, Francky Catthoor, Vasilios I. Kelefouras, Costas E. Goutis:
A systematic approach to classify design-time global scheduling techniques. 14:1-14:30 - Marco Attene, Marcel Campen, Leif Kobbelt:
Polygon mesh repairing: An application perspective. 15:1-15:33 - Susan Lomax, Sunil Vadera:
A survey of cost-sensitive decision tree induction algorithms. 16:1-16:35 - Michael Pearce, Sherali Zeadally, Ray Hunt:
Virtualization: Issues, security threats, and solutions. 17:1-17:39 - María Elena Acevedo-Mosqueda, Cornelio Yáñez-Márquez, Marco Antonio Acevedo-Mosqueda:
Bidirectional associative memories: Different approaches. 18:1-18:30 - Carl Mooney, John F. Roddick:
Sequential pattern mining - approaches and algorithms. 19:1-19:39 - Timo Koskela, Otso Kassinen, Erkki Harjula, Mika Ylianttila:
P2P group management systems: A conceptual analysis. 20:1-20:25 - Mehdi Saeedi, Igor L. Markov:
Synthesis and optimization of reversible circuits - a survey. 21:1-21:34 - Ayman Abaza, Arun Ross, Christina Hebert, Mary Ann F. Harrison, Mark S. Nixon:
A survey on ear biometrics. 22:1-22:35 - Mohammad Tanvir Parvez, Sabri A. Mahmoud:
Offline arabic handwritten text recognition: A Survey. 23:1-23:35 - Jukka Suomela:
Survey of local algorithms. 24:1-24:40
Volume 45, Number 3, June 2013
- Mohammad Hossein Manshaei, Quanyan Zhu, Tansu Alpcan, Tamer Basar, Jean-Pierre Hubaux:
Game theory meets network security and privacy. 25:1-25:39 - James Stanier, Des Watson:
Intermediate representations in imperative compilers: A survey. 26:1-26:27 - Seyed Amir Hoseinitabatabaei, Alexander Gluhak, Rahim Tafazolli:
A survey on smartphone-based systems for opportunistic user context recognition. 27:1-27:51 - Christian Colombo, Gordon J. Pace:
Recovery within long-running transactions. 28:1-28:35 - Omer Zilberberg, Shlomo Weiss, Sivan Toledo:
Phase-change memory: An architectural perspective. 29:1-29:33 - João V. P. Gomes, Pedro R. M. Inácio, Manuela Pereira, Mário M. Freire, Paulo P. Monteiro:
Detection and classification of peer-to-peer traffic: A survey. 30:1-30:40 - Floarea Serban, Joaquin Vanschoren, Jörg-Uwe Kietz, Abraham Bernstein:
A survey of intelligent assistants for data analysis. 31:1-31:35 - Wei Zang, Ann Gordon-Ross:
A survey on cache tuning from a power/energy perspective. 32:1-32:49 - Tom Bostoen, Sape J. Mullender, Yolande Berbers:
Power-reduction techniques for data-center storage systems. 33:1-33:38 - John David N. Dionisio, William G. Burns III, Richard Gilbert:
3D Virtual worlds and the metaverse: Current status and future possibilities. 34:1-34:38 - Matej Crepinsek, Shih-Hsi Liu, Marjan Mernik:
Exploration and exploitation in evolutionary algorithms: A survey. 35:1-35:33 - Leandro Silva Galvão de Carvalho, Edjair de Souza Mota:
Survey on application-layer mechanisms for speech quality adaptation in VoIP. 36:1-36:31 - Xavier Grehant, Isabelle M. Demeure, Sverre Jarp:
A survey of task mapping on production grids. 37:1-37:25 - Abbas Eslami Kiasari, Axel Jantsch, Zhonghai Lu:
Mathematical formalisms for performance evaluation of networks-on-chip. 38:1-38:41 - Andrew Newell, Jing Dong, Cristina Nita-Rotaru:
On the practicality of cryptographic defences against pollution attacks in wireless network coding. 39:1-39:26 - Gábor Pék, Levente Buttyán, Boldizsár Bencsáth:
A survey of security issues in hardware virtualization. 40:1-40:34
Volume 45, Number 4, August 2013
- Lilian Bossuet, Michael Grand, Lubos Gaspar, Viktor Fischer, Guy Gogniat:
Architectures of flexible symmetric key crypto engines - a survey: From hardware coprocessor to multi-crypto-processor system on chip. 41:1-41:32 - Christine Parent, Stefano Spaccapietra, Chiara Renso, Gennady L. Andrienko, Natalia V. Andrienko, Vania Bogorny, Maria Luisa Damiani, Aris Gkoulalas-Divanis, José Antônio Fernandes de Macêdo, Nikos Pelekis, Yannis Theodoridis, Zhixian Yan:
Semantic trajectories modeling and analysis. 42:1-42:32 - Jierui Xie, Stephen Kelley, Boleslaw K. Szymanski:
Overlapping community detection in networks: The state-of-the-art and comparative study. 43:1-43:35 - Jiajun Liu, Zi Huang, Hongyun Cai, Heng Tao Shen, Chong-Wah Ngo, Wei Wang:
Near-duplicate video retrieval: Current research and future trends. 44:1-44:23 - Rafael Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro García-Teodoro:
Survey and taxonomy of botnet research through life-cycle. 45:1-45:33 - Anirban Basu, Simon Fleming, James Stanier, Stephen Naicken, Ian Wakeman, Vijay K. Gurbani:
The state of peer-to-peer network simulators. 46:1-46:25 - Wanita Sherchan, Surya Nepal, Cécile Paris:
A survey of trust in social networks. 47:1-47:33 - Rajshekar Kalayappan, Smruti R. Sarangi:
A survey of checker architectures. 48:1-48:34 - Jian Chang, Krishna K. Venkatasubramanian, Andrew G. West, Insup Lee:
Analyzing and defending against web-based malware. 49:1-49:35 - Anne Benoit, Ümit V. Çatalyürek, Yves Robert, Erik Saule:
A survey of pipelined workflow scheduling: Models and algorithms. 50:1-50:36 - Arnaud Hubaux, Thein Than Tun, Patrick Heymans:
Separation of concerns in feature diagram languages: A systematic survey. 51:1-51:23 - Engineer Bainomugisha, Andoni Lombide Carreton, Tom Van Cutsem, Stijn Mostinckx, Wolfgang De Meuter:
A survey on reactive programming. 52:1-52:34 - Kelly Androutsopoulos, David Clark, Mark Harman, Jens Krinke, Laurence Tratt:
State-based model slicing: A survey. 53:1-53:36 - Daniel Lázaro Iglesias, Joan Manuel Marquès, Josep Jorba, Xavier Vilajosana:
Decentralized resource discovery mechanisms for distributed computing in peer-to-peer environments. 54:1-54:40 - Levi Shaul, Doron Tauber:
Critical success factors in enterprise resource planning systems: Review of the last decade. 55:1-55:39
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.