Nothing Special   »   [go: up one dir, main page]

skip to main content
Volume 48, Issue 4May 2016
Editor:
  • Sartaj Sahni
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:0360-0300
EISSN:1557-7341
Reflects downloads up to 15 Feb 2025Bibliometrics
Skip Table Of Content Section
tutorial
Shared-Memory Optimizations for Inter-Virtual-Machine Communication
Article No.: 49, Pages 1–42https://doi.org/10.1145/2847562

Virtual machines (VMs) and virtualization are one of the core computing technologies today. Inter-VM communication is not only prevalent but also one of the leading costs for data-intensive systems and applications in most data centers and cloud ...

survey
A Survey of Role Mining
Article No.: 50, Pages 1–37https://doi.org/10.1145/2871148

Role-Based Access Control (RBAC) is the most widely used model for advanced access control deployed in diverse enterprises of all sizes. RBAC critically depends on defining roles, which are a functional intermediate between users and permissions. Thus, ...

survey
A Systematic Review of Shared Sensor Networks
Article No.: 51, Pages 1–50https://doi.org/10.1145/2851510

While Wireless Sensor Networks (WSNs) have been traditionally tasked with single applications, in recent years we have witnessed the emergence of Shared Sensor Networks (SSNs) as integrated cyber-physical system infrastructures for a multitude of ...

survey
Audio Surveillance: A Systematic Review
Article No.: 52, Pages 1–46https://doi.org/10.1145/2871183

Despite surveillance systems becoming increasingly ubiquitous in our living environment, automated surveillance, currently based on video sensory modality and machine intelligence, lacks most of the time the robustness and reliability required in ...

survey
Seamless Outdoors-Indoors Localization Solutions on Smartphones: Implementation and Challenges
Article No.: 53, Pages 1–34https://doi.org/10.1145/2871166

The demand for more sophisticated Location-Based Services (LBS) in terms of applications variety and accuracy is tripling every year since the emergence of the smartphone a few years ago. Equally, smartphone manufacturers are mounting several wireless ...

survey
Public Access
A Survey of Architectural Techniques for Managing Process Variation
Article No.: 54, Pages 1–29https://doi.org/10.1145/2871167

Process variation—deviation in parameters from their nominal specifications—threatens to slow down and even pause technological scaling, and mitigation of it is the way to continue the benefits of chip miniaturization. In this article, we present a ...

survey
Open Access
The Ethics of Computing: A Survey of the Computing-Oriented Literature
Article No.: 55, Pages 1–38https://doi.org/10.1145/2871196

Computing technologies and artifacts are increasingly integrated into most aspects of our professional, social, and private lives. One consequence of this growing ubiquity of computing is that it can have significant ethical implications that computing ...

tutorial
Olfaction-Enhanced Multimedia: A Survey of Application Domains, Displays, and Research Challenges
Article No.: 56, Pages 1–34https://doi.org/10.1145/2816454

Recently, the concept of olfaction-enhanced multimedia applications has gained traction as a step toward further enhancing user quality of experience. The next generation of rich media services will be immersive and multisensory, with olfaction playing ...

survey
A Survey on Mobile Social Signal Processing
Article No.: 57, Pages 1–52https://doi.org/10.1145/2893487

Understanding human behavior in an automatic but nonintrusive manner is an important area for various applications. This requires the collaboration of information technology with human sciences to transfer existing knowledge of human behavior into self-...

survey
Rare Event Detection and Propagation in Wireless Sensor Networks
Article No.: 58, Pages 1–22https://doi.org/10.1145/2885508

Rarely occurring events present unique challenges to energy constrained systems designed for long term sensing of their occurrence or effect. Unlike periodic sampling or query based sensing systems, longevity cannot be achieved simply by adjusting the ...

survey
Open Access
A Survey on Design Approaches to Circumvent Permanent Faults in Networks-on-Chip
Article No.: 59, Pages 1–36https://doi.org/10.1145/2886781

Increasing fault rates in current and future technology nodes coupled with on-chip components in the hundreds calls for robust and fault-tolerant Network-on-Chip (NoC) designs. Given the central role of NoCs in today’s many-core chips, permanent faults ...

tutorial
Open Access
A Closer Look at GPGPU
Article No.: 60, Pages 1–20https://doi.org/10.1145/2873053

The lack of detailed white box illustration leaves a gap in the field of GPGPU (General-Purpose Computing on the Graphic Processing Unit), thus hindering users and researchers from exploring hardware potential while improving application performance. ...

survey
Public Access
On Choosing Server- or Client-Side Solutions for BFT
Article No.: 61, Pages 1–30https://doi.org/10.1145/2886780

Byzantine Fault Tolerant (BFT) protocols have the ability to work correctly even when up to a threshold f of system servers are compromised. This makes them appealing for the construction of critical systems connected to the Internet, which are ...

survey
Public Access
A Survey of Techniques for Approximate Computing
Article No.: 62, Pages 1–33https://doi.org/10.1145/2893356

Approximate computing trades off computation quality with effort expended, and as rising performance demands confront plateauing resource budgets, approximate computing has become not merely attractive, but even imperative. In this article, we present a ...

survey
Parallel Optimal Pairwise Biological Sequence Comparison: Algorithms, Platforms, and Classification
Article No.: 63, Pages 1–36https://doi.org/10.1145/2893488

Many bioinformatics applications, such as the optimal pairwise biological sequence comparison, demand a great quantity of computing resource, thus are excellent candidates to run in high-performance computing (HPC) platforms. In the last two decades, a ...

survey
A Survey and Analysis of the GNSS Spoofing Threat and Countermeasures
Article No.: 64, Pages 1–31https://doi.org/10.1145/2897166

Detection and prevention of global navigation satellite system (GNSS) “spoofing” attacks, or the broadcast of false global navigation satellite system services, has recently attracted much research interest. This survey aims to fill three gaps in the ...

survey
Public Access
Type Inference on Executables
Article No.: 65, Pages 1–35https://doi.org/10.1145/2896499

In many applications, source code and debugging symbols of a target program are not available, and the only thing that we can access is the program executable. A fundamental challenge with executables is that, during compilation, critical information ...

Subjects

Comments

Please enable JavaScript to view thecomments powered by Disqus.