default search action
ACM Computing Surveys, Volume 50
Volume 50, Number 1, April 2017
- Tao Li
, Ning Xie
, Chunqiu Zeng, Wubai Zhou, Li Zheng, Yexi Jiang, Yimin Yang, Hsin-Yu Ha, Wei Xue, Yue Huang, Shu-Ching Chen
, Jainendra K. Navlakha, S. Sitharama Iyengar
:
Data-Driven Techniques in Disaster Information Management. 1:1-1:45 - Marcello La Rosa
, Wil M. P. van der Aalst
, Marlon Dumas
, Fredrik Milani
:
Business Process Variability Modeling: A Survey. 2:1-2:45 - Marwa Salayma, Ahmed Yassin Al-Dubai
, Imed Romdhani, Youssef Nasser
:
Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence. 3:1-3:38 - Sayantan Nath, Sonali Agarwal
, G. N. Pandey:
Evaluation of Knowledge Gaps in Mathematical Applications of Thermal Image Processing Techniques for Fire Prevention. 4:1-4:43 - Ting Su
, Ke Wu, Weikai Miao, Geguang Pu, Jifeng He, Yuting Chen, Zhendong Su
:
A Survey on Data-Flow Testing. 5:1-5:35 - Arnab Kumar Biswas
, Dipak Ghosal, Shishir Nagaraja:
A Survey of Timing Channels and Countermeasures. 6:1-6:39 - Frank Dylla, Jae Hee Lee
, Till Mossakowski
, Thomas Schneider
, André van Delden, Jasper van de Ven
, Diedrich Wolter:
A Survey of Qualitative Spatial and Temporal Calculi: Algebraic and Computational Properties. 7:1-7:39 - Ramachandra Raghavendra
, Christoph Busch
:
Presentation Attack Detection Methods for Face Recognition Systems: A Comprehensive Survey. 8:1-8:37 - Britta Meixner
:
Hypervideos and Interactive Multimedia Presentations. 9:1-9:34 - Admela Jukan
, Xavier Masip-Bruin
, Nina Amla:
Smart Computing and Sensing Technologies for Animal Welfare: A Systematic Review. 10:1-10:27 - Lianhua Chi, Xingquan Zhu
:
Hashing Techniques: A Survey and Taxonomy. 11:1-11:36 - Milena Tsvetkova
, Taha Yasseri
, Eric T. Meyer, John Brian Pickering
, Vegard Engen
, Paul Walland, Marika Lüders
, Asbjørn Følstad, George Bravos:
Understanding Human-Machine Networks: A Cross-Disciplinary Survey. 12:1-12:35 - Stefano Calzavara
, Riccardo Focardi
, Marco Squarcina, Mauro Tempesta:
Surviving the Web: A Journey into Web Session Security. 13:1-13:34 - Rabih Bashroush
, Muhammad Garba, Rick Rabiser
, Iris Groher
, Goetz Botterweck
:
CASE Tool Support for Variability Management in Software Product Lines. 14:1-14:45 - Amparo Soler-Domínguez
, Angel A. Juan
, Renatas Kizys
:
A Survey on Financial Applications of Metaheuristics. 15:1-15:23 - Nathan Burow
, Scott A. Carr, Joseph Nash, Per Larsen, Michael Franz, Stefan Brunthaler
, Mathias Payer
:
Control-Flow Integrity: Precision, Security, and Performance. 16:1-16:33
Volume 50, Number 2, June 2017
- Faiz Ul Muram
, Huy Tran, Uwe Zdun:
Systematic Review of Software Behavioral Model Consistency Checking. 17:1-17:39 - Quinten David Soetens
, Romain Robbes, Serge Demeyer
:
Changes as First-Class Citizens: A Research Perspective on Modern Software Tooling. 18:1-18:38 - Joan Boyar
, Lene M. Favrholdt
, Christian Kudahl, Kim S. Larsen
, Jesper W. Mikkelsen:
Online Algorithms with Advice: A Survey. 19:1-19:34 - Anastasia Ioannidou
, Elisavet Chatzilari
, Spiros Nikolopoulos
, Ioannis Kompatsiaris:
Deep Learning Advances in Computer Vision with 3D Data: A Survey. 20:1-20:38 - Ahmed Hussein
, Mohamed Medhat Gaber
, Eyad Elyan
, Chrisina Jayne
:
Imitation Learning: A Survey of Learning Methods. 21:1-21:35 - Joachim Gudmundsson
, Michael Horton
:
Spatio-Temporal Analysis of Team Sports. 22:1-22:34 - Heitor Murilo Gomes
, Jean Paul Barddal
, Fabrício Enembreck
, Albert Bifet
:
A Survey on Ensemble Learning for Data Stream Classification. 23:1-23:36 - Amit Kumar Singh
, Piotr Dziurzanski
, Hashan Roshantha Mendis, Leandro Soares Indrusiak
:
A Survey and Comparative Study of Hard and Soft Real-Time Dynamic Resource Allocation Strategies for Multi-/Many-Core Systems. 24:1-24:40 - Ali Yadollahi
, Ameneh Gholipour Shahraki, Osmar R. Zaïane:
Current State of Text Sentiment Analysis from Opinion to Emotion Mining. 25:1-25:33 - Denis Weerasiri, Moshe Chai Barukh
, Boualem Benatallah
, Quan Z. Sheng
, Rajiv Ranjan
:
A Taxonomy and Survey of Cloud Resource Orchestration Techniques. 26:1-26:41 - Sparsh Mittal
:
A Survey of Techniques for Cache Partitioning in Multicore Processors. 27:1-27:39 - Hanjiang Luo
, Kaishun Wu
, Rukhsana Ruby, Feng Hong, Zhongwen Guo, Lionel M. Ni:
Simulation and Experimentation Platforms for Underwater Acoustic Sensor Networks: Advancements and Challenges. 28:1-28:44 - Rafaqut Kazmi
, Dayang N. A. Jawawi, Radziah Mohamad, Imran Ghani:
Effective Regression Test Case Selection: A Systematic Literature Review. 29:1-29:32 - Cuong T. Do, Nguyen Hoang Tran
, Choong Seon Hong
, Charles A. Kamhoua, Kevin A. Kwiat, Erik Blasch, Shaolei Ren
, Niki Pissinou, Sundaraja Sitharama Iyengar
:
Game Theory for Cyber Security and Privacy. 30:1-30:37 - Mohamed Amine Kafi, Jalel Ben-Othman
, Nadjib Badache:
A Survey on Reliability Protocols in Wireless Sensor Networks. 31:1-31:47
Volume 50, Number 3, October 2017
- Charith Perera
, Yongrui Qin, Júlio Cezar Estrella, Stephan Reiff-Marganiec
, Athanasios V. Vasilakos
:
Fog Computing for Sustainable Smart Cities: A Survey. 32:1-32:43 - Baligh M. Al-Helali, Sabri A. Mahmoud:
Arabic Online Handwriting Recognition (AOHR): A Survey. 33:1-33:35 - Kok-Lim Alvin Yau
, Junaid Qadir
, Hooi Ling Khoo, Mee Hong Ling, Peter Komisarczuk:
A Survey on Reinforcement Learning Models and Algorithms for Traffic Signal Control. 34:1-34:38 - Cheol-Ho Hong, Ivor T. A. Spence, Dimitrios S. Nikolopoulos
:
GPU Virtualization and Scheduling Methods: A Comprehensive Survey. 35:1-35:37 - Muhammad Murad Khan
, Roliana Ibrahim, Imran Ghani:
Cross Domain Recommender Systems: A Systematic Literature Review. 36:1-36:34 - Kenneth O'Brien, Ilia Pietri
, Ravi Reddy
, Alexey L. Lastovetsky
, Rizos Sakellariou
:
A Survey of Power and Energy Predictive Models in HPC Systems and Applications. 37:1-37:38 - Astrid Rheinländer
, Ulf Leser, Goetz Graefe:
Optimization of Complex Dataflows with User-Defined Functions. 38:1-38:39 - Ahmad Abdollahzadeh Barforoush, Hossein Shirazi
, Hojjat Emami
:
A New Classification Framework to Evaluate the Entity Profiling on the Web: Past, Present and Future. 39:1-39:39 - Geong Sen Poh, Ji-Jian Chin
, Wei-Chuen Yau, Kim-Kwang Raymond Choo
, Moesfa Soeheila Mohamad:
Searchable Symmetric Encryption: Designs and Challenges. 40:1-40:37 - Yanfang Ye, Tao Li
, Donald A. Adjeroh, S. Sitharama Iyengar
:
A Survey on Malware Detection Using Data Mining Techniques. 41:1-41:40 - Jeroen J. A. Keiren, Peter Fontana, Rance Cleaveland:
Corrections to "A Menagerie of Timed Automata". 42:1-42:8 - Longbing Cao
:
Data Science: A Comprehensive Overview. 43:1-43:42 - Alessandro Acquisti
, Idris Adjerid
, Rebecca Balebako, Laura Brandimarte, Lorrie Faith Cranor
, Saranga Komanduri, Pedro Giovanni Leon, Norman M. Sadeh, Florian Schaub, Manya Sleeper, Yang Wang, Shomir Wilson:
Nudges for Privacy and Security: Understanding and Assisting Users' Choices Online. 44:1-44:41 - Tao Li
, Chunqiu Zeng, Yexi Jiang, Wubai Zhou, Liang Tang, Zheng Liu, Yue Huang:
Data-Driven Techniques in Computing System Management. 45:1-45:43 - Pat Morin
, Wolfgang Mulzer, Tommy Reddad:
Encoding Arguments. 46:1-46:36
Volume 50, Number 4, November 2017
- Tim Storer
:
Bridging the Chasm: A Survey of Software Engineering Practice in Scientific Programming. 47:1-47:32 - Jones Granatyr
, Nardine Osman
, João Miguel Dias, Maria Augusta Silveira Netto Nunes
, Judith Masthoff, Fabrício Enembreck
, Otto Robert Lessing, Carles Sierra, Ana Paiva, Edson Emílio Scalabrin:
The Need for Affective Trust Applied to Trust and Reputation Models. 48:1-48:36 - Kiranbir Kaur
, Sandeep Sharma
, Karanjeet Singh Kahlon:
Interoperability and Portability Approaches in Inter-Connected Clouds: A Review. 49:1-49:40 - Georgia Psychou
, Dimitrios Rodopoulos, Mohamed M. Sabry, Tobias Gemmeke
, David Atienza, Tobias G. Noll, Francky Catthoor:
Classification of Resilience Techniques Against Functional Errors at Higher Abstraction Layers of Digital Systems. 50:1-50:38 - Laure Soulier
, Lynda Tamine:
On the Collaboration Support in Information Retrieval. 51:1-51:34 - Andreas Schoknecht
, Tom Thaler, Peter Fettke, Andreas Oberweis, Ralf Laue:
Similarity of Business Process Models - A State-of-the-Art Analysis. 52:1-52:33 - Michael Stein
, Mathias Fischer, Immanuel Schweizer, Max Mühlhäuser:
A Classification of Locality in Network Research. 53:1-53:37 - Tanmoy Chakraborty
, Ayushi Dalmia, Animesh Mukherjee, Niloy Ganguly
:
Metrics for Community Analysis: A Survey. 54:1-54:37 - Nguyen Khoi Tran
, Quan Z. Sheng
, Muhammad Ali Babar, Lina Yao:
Searching the Web of Things: State of the Art, Challenges, and Solutions. 55:1-55:34 - Seyed Mohammad Ghaffarian
, Hamid Reza Shahriari
:
Software Vulnerability Analysis and Discovery Using Machine-Learning and Data-Mining Techniques: A Survey. 56:1-56:36 - Zaid Bin Tariq
, Dost Muhammad Cheema, Muhammad Zahir Kamran, Ijaz Haider Naqvi:
Non-GPS Positioning Systems: A Survey. 57:1-57:34 - Yangdong Deng, Yufei Ni
, Zonghui Li, Shuai Mu, Wenjun Zhang:
Toward Real-Time Ray Tracing: A Survey on Hardware Acceleration and Microarchitecture Techniques. 58:1-58:41 - Kwangwon Sun, Sukyoung Ryu
:
Analysis of JavaScript Programs: Challenges and Research Trends. 59:1-59:34 - Rafael Caballero
, Adrián Riesco
, Josep Silva
:
A Survey of Algorithmic Debugging. 60:1-60:35 - Padma Jayaraman
, Ranjani Parthasarathi:
A Survey on Post-Silicon Functional Validation for Multicore Architectures. 61:1-61:30
Volume 50, Number 5, November 2017
- Azzedine Boukerche
, Abdul Jabbar Siddiqui
, Abdelhamid Mammeri:
Automated Vehicle Detection and Classification: Models, Methods, and Techniques. 62:1-62:39 - Changtao Zhong
, Nishanth Sastry
:
Systems Applications of Social Networks. 63:1-63:42 - Radim Baca
, Michal Krátký
, Irena Holubová
, Martin Necaský
, Tomás Skopal
, Martin Svoboda, Sherif Sakr
:
Structural XML Query Processing. 64:1-64:41 - Pallavi Bagga, Rahul Hans
:
Mobile Agents System Security: A Systematic Survey. 65:1-65:45 - Esben Andreasen, Liang Gong, Anders Møller
, Michael Pradel
, Marija Selakovic, Koushik Sen, Cristian-Alexandru Staicu:
A Survey of Dynamic Analysis and Test Generation for JavaScript. 66:1-66:36 - Niall Murray, Oluwakemi Adewunmi Ademoye, Gheorghita Ghinea
, Gabriel-Miro Muntean
:
A Tutorial for Olfaction-Based Multisensorial Media Application Design and Evaluation. 67:1-67:30 - Renzo Angles, Marcelo Arenas, Pablo Barceló
, Aidan Hogan, Juan L. Reutter
, Domagoj Vrgoc:
Foundations of Modern Query Languages for Graph Databases. 68:1-68:40 - Dorien Herremans
, Ching-Hua Chuan, Elaine Chew
:
A Functional Taxonomy of Music Generation Systems. 69:1-69:30 - Oscar Pulido-Prieto
, Ulises Juárez-Martínez
:
A Survey of Naturalistic Programming Technologies. 70:1-70:35 - Elias Alevizos
, Anastasios Skarlatidis, Alexander Artikis, Georgios Paliouras:
Probabilistic Complex Event Recognition: A Survey. 71:1-71:31 - Francisco Martinez-Gil
, Miguel Lozano
, Ignacio García-Fernández
, Fernando Fernández
:
Modeling, Evaluation, and Scale on Artificial Pedestrians: A Literature Review. 72:1-72:35 - Aditya Joshi
, Pushpak Bhattacharyya, Mark James Carman
:
Automatic Sarcasm Detection: A Survey. 73:1-73:22 - Pablo González
, Alberto Castaño
, Nitesh V. Chawla
, Juan José del Coz:
A Review on Quantification Learning. 74:1-74:40 - Jordi Mongay Batalla
, Athanasios V. Vasilakos
, Mariusz Gajewski
:
Secure Smart Homes: Opportunities and Challenges. 75:1-75:32 - Frank S. de Boer, Vlad Serbanescu, Reiner Hähnle
, Ludovic Henrio
, Justine Rochas, Crystal Chang Din
, Einar Broch Johnsen
, Marjan Sirjani, Ehsan Khamespanah, Kiko Fernandez-Reyes
, Albert Mingkun Yang:
A Survey of Active Object Languages. 76:1-76:39 - Stefan Laube
, Rainer Böhme:
Strategic Aspects of Cyber Risk Information Sharing. 77:1-77:36
Volume 50, Number 6, January 2018
- Eduardo Felipe Zambom Santana
, Ana Paula Chaves
, Marco Aurélio Gerosa, Fabio Kon
, Dejan S. Milojicic
:
Software Platforms for Smart Cities: Concepts, Requirements, Challenges, and a Unified Reference Architecture. 78:1-78:37 - Onur Tunali
, Mustafa Altun
:
A Survey of Fault-Tolerance Algorithms for Reconfigurable Nano-Crossbar Arrays. 79:1-79:35 - Irina Tal
, Gabriel-Miro Muntean
:
Towards Reasoning Vehicles: A Survey of Fuzzy Logic-Based Solutions in Vehicular Networks. 80:1-80:37 - Xuanhua Shi
, Zhigao Zheng, Yongluan Zhou, Hai Jin, Ligang He, Bo Liu, Qiang-Sheng Hua:
Graph Processing on GPUs: A Survey. 81:1-81:35 - Alan Burns
, Robert I. Davis:
A Survey of Research into Mixed Criticality Systems. 82:1-82:37 - Paulo Martins
, Leonel Sousa
, Artur Mariano:
A Survey on Fully Homomorphic Encryption: An Engineering Perspective. 83:1-83:33 - Alejandro Torreño
, Eva Onaindia, Antonín Komenda, Michal Stolba:
Cooperative Multi-Agent Planning: A Survey. 84:1-84:32 - Pranjul Yadav
, Michael S. Steinbach
, Vipin Kumar, György J. Simon:
Mining Electronic Health Records (EHRs): A Survey. 85:1-85:40 - Tempestt J. Neal
, Kalaivani Sundararajan
, Aneez Fatima, Yiming Yan, Yingfei Xiang
, Damon L. Woodard:
Surveying Stylometry Techniques and Applications. 86:1-86:36 - Artem Voronkov
, Leonardo H. Iwaya
, Leonardo A. Martucci, Stefan Lindskog:
Systematic Literature Review on Usability of Firewall Configuration. 87:1-87:35 - Elif Bilge Kavun
, Hristina Mihajloska, Tolga Yalçin
:
A Survey on Authenticated Encryption-ASIC Designer's Perspective. 88:1-88:21 - Sebastian Werner
, Javier Navaridas
, Mikel Luján:
A Survey on Optical Network-on-Chip Architectures. 89:1-89:37 - Danial Hooshyar
, Moslem Yousefi, Heuiseok Lim
:
Data-Driven Approaches to Game Player Modeling: A Systematic Literature Review. 90:1-90:19 - Yaser Mansouri
, Adel Nadjaran Toosi
, Rajkumar Buyya
:
Data Storage Management in Cloud Environments: Taxonomy, Survey, and Future Directions. 91:1-91:51 - Prakash Shrestha
, Nitesh Saxena:
An Offensive and Defensive Exposition of Wearable Computing. 92:1-92:39 - Niels van Berkel
, Denzil Ferreira, Vassilis Kostakos
:
The Experience Sampling Method on Mobile Devices. 93:1-93:40 - Jundong Li
, Kewei Cheng, Suhang Wang
, Fred Morstatter, Robert P. Trevino, Jiliang Tang, Huan Liu:
Feature Selection: A Data Perspective. 94:1-94:45 - Viivi Uurtio
, João M. Monteiro, Jaz S. Kandola, John Shawe-Taylor
, Delmiro Fernandez-Reyes, Juho Rousu
:
A Tutorial on Canonical Correlation Methods. 95:1-95:33 - Richard Skarbez
, Frederick P. Brooks Jr., Mary C. Whitton
:
A Survey of Presence and Related Concepts. 96:1-96:39 - Suining He
, Kang G. Shin:
Geomagnetism for Smartphone-Based Indoor Localization: Challenges, Advances, and Comparisons. 97:1-97:37 - Jhonny Mertz
, Ingrid Nunes
:
Understanding Application-Level Caching in Web Applications: A Comprehensive Introduction and Survey of State-of-the-Art Approaches. 98:1-98:34
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.