default search action
ACM Computing Surveys, Volume 53
Volume 53, Number 1, Januar 2021
- Juhee Bae, Tove Helldin, Maria Riveiro, Slawomir Nowaczyk, Mohamed-Rafik Bouguelia, Göran Falkman:
Interactive Clustering: A Comprehensive Review. 1:1-1:39 - Xinxin Fan, Ling Liu, Rui Zhang, Quanliang Jing, Jingping Bi:
Decentralized Trust Management: Risk Analysis and Trust Aggregation. 2:1-2:33 - Ruben Mayer, Hans-Arno Jacobsen:
Scalable Deep Learning on Distributed Infrastructures: Challenges, Techniques, and Tools. 3:1-3:37 - Junjie Chen, Jibesh Patra, Michael Pradel, Yingfei Xiong, Hongyu Zhang, Dan Hao, Lu Zhang:
A Survey of Compiler Testing. 4:1-4:36 - Allison Randal:
The Ideal Versus the Real: Revisiting the History of Virtual Machines and Containers. 5:1-5:31 - Nuno Paulino, João Canas Ferreira, João M. P. Cardoso:
Improving Performance and Energy Consumption in Embedded Systems via Binary Acceleration: A Survey. 6:1-6:36 - Gerasimos Razis, Ioannis Anagnostopoulos, Sherali Zeadally:
Modeling Influence with Semantics in Social Networks: A Survey. 7:1-7:38 - Mohammad Etemad, Alptekin Küpçü:
Generic Dynamic Data Outsourcing Framework for Integrity Verification. 8:1-8:32 - John Kolb, Moustafa AbdelBaky, Randy H. Katz, David E. Culler:
Core Concepts, Challenges, and Future Directions in Blockchain: A Centralized Tutorial. 9:1-9:39 - Muhammad Hafizhuddin Hilman, Maria Alejandra Rodriguez, Rajkumar Buyya:
Multiple Workflows Scheduling in Multi-tenant Distributed Systems: A Taxonomy and Future Directions. 10:1-10:39 - Dong Liu, Yue Li, Jianping Lin, Houqiang Li, Feng Wu:
Deep Learning-Based Video Coding: A Review and a Case Study. 11:1-11:35 - Dilek Küçük, Fazli Can:
Stance Detection: A Survey. 12:1-12:37 - Yuri D. V. Yasuda, Luiz Eduardo Galvão Martins, Fabio A. M. Cappabianco:
Autonomous Visual Navigation for Mobile Robots: A Systematic Literature Review. 13:1-13:34 - Shweta Suran, Vishwajeet Pattanaik, Dirk Draheim:
Frameworks for Collective Intelligence: A Systematic Literature Review. 14:1-14:36 - Vijini Mallawaarachchi, Lakmal Meegahapola, Roshan Madhushanka, Eranga Heshan, Dulani Meedeniya, Sampath Jayarathna:
Change Detection and Notification of Web Pages: A Survey. 15:1-15:35 - Marcos Augusto M. Vieira, Matheus S. Castanho, Racyus D. G. Pacífico, Elerson Rubens da Silva Santos, Eduardo P. M. Câmara Júnior, Luiz Filipe M. Vieira:
Fast Packet Processing with eBPF and XDP: Concepts, Code, Challenges, and Applications. 16:1-16:36 - Ofir Landau, Rami Puzis, Nir Nissim:
Mind Your Mind: EEG-Based Brain-Computer Interfaces and Their Security in Cyber Space. 17:1-17:38 - Laphou Lao, Zecheng Li, Songlin Hou, Bin Xiao, Songtao Guo, Yuanyuan Yang:
A Survey of IoT Applications in Blockchain Systems: Architecture, Consensus, and Traffic Modeling. 18:1-18:32 - Hadi Brais, Rajshekar Kalayappan, Preeti Ranjan Panda:
A Survey of Cache Simulators. 19:1-19:32 - Nektaria Kaloudi, Jingyue Li:
The AI-Based Cyber Threat Landscape: A Survey. 20:1-20:34 - Chu Luo, Jorge Gonçalves, Eduardo Velloso, Vassilis Kostakos:
A Survey of Context Simulation for Testing Mobile Context-Aware Applications. 21:1-21:39 - Nevin Cini, Gulay Yalcin:
A Methodology for Comparing the Reliability of GPU-Based and CPU-Based HPCs. 22:1-22:33
Volume 53, Number 2, March 2021
- Sartaj Sahni, Albert Y. Zomaya:
In Memoriam Eliezer Dekel (1948-2020). 23:1-23:2 - Stijn Heldens, Pieter Hijma, Ben van Werkhoven, Jason Maassen, Adam S. Z. Belloum, Rob van Nieuwpoort:
The Landscape of Exascale Research: A Data-Driven Literature Analysis. 23:1-23:43 - Sunny Rai, Shampa Chakraverty:
A Survey on Computational Metaphor Processing. 24:1-24:37 - João B. F. Sequeiros, Francisco T. Chimuco, Musa G. Samaila, Mário M. Freire, Pedro R. M. Inácio:
Attack and System Modeling Applied to IoT, Cloud, and Mobile Ecosystems: Embedding Security by Design. 25:1-25:32 - Peijin Cong, Guo Xu, Tongquan Wei, Keqin Li:
A Survey of Profit Optimization Techniques for Cloud Providers. 26:1-26:35 - Erikson Júlio De Aguiar, Bruno S. Faiçal, Bhaskar Krishnamachari, Jó Ueyama:
A Survey of Blockchain-Based Strategies for Healthcare. 27:1-27:27 - Jian Wu, Victor S. Sheng, Jing Zhang, Hua Li, Tetiana Dadakova, Christine Leon Swisher, Zhiming Cui, Pengpeng Zhao:
Multi-Label Active Learning Algorithms for Image Classification: Overview and Future Promise. 28:1-28:35 - Jesús Guillermo Falcón-Cardona, Carlos A. Coello Coello:
Indicator-based Multi-objective Evolutionary Algorithms: A Comprehensive Survey. 29:1-29:35 - Joost Verbraeken, Matthijs Wolting, Jonathan Katzy, Jeroen Kloppenburg, Tim Verbelen, Jan S. Rellermeyer:
A Survey on Distributed Machine Learning. 30:1-30:33 - George Papadakis, Dimitrios Skoutas, Emmanouil Thanos, Themis Palpanas:
Blocking and Filtering Techniques for Entity Resolution: A Survey. 31:1-31:42 - Erdem Sahin, Elena Stoykova, Jani Mäkinen, Atanas P. Gotchev:
Computer-Generated Holograms for 3D Imaging: A Survey. 32:1-32:35 - Stefano Cherubin, Giovanni Agosta:
Tools for Reduced Precision Computation: A Survey. 33:1-33:35 - Behrouz Zolfaghari, Gautam Srivastava, Swapnoneel Roy, Hamid R. Nemati, Fatemeh Afghah, Takeshi Koshiba, Abolfazl Razi, Khodakhast Bibak, Pinaki Mitra, Brijesh Kumar Rai:
Content Delivery Networks: State of the Art, Trends, and Future Roadmap. 34:1-34:34 - Iqbal Alam, Kashif Sharif, Fan Li, Zohaib Latif, Md. Monjurul Karim, Sujit Biswas, Boubakr Nour, Yu Wang:
A Survey of Network Virtualization Techniques for Internet of Things Using SDN and NFV. 35:1-35:40 - Angela Bonifati, Irena Holubová, Arnau Prat-Pérez, Sherif Sakr:
Graph Generators: State of the Art and Open Challenges. 36:1-36:30 - Ying Lu, Lingkun Luo, Di Huang, Yunhong Wang, Liming Chen:
Knowledge Transfer in Vision Recognition: A Survey. 37:1-37:35 - Peijin Cong, Junlong Zhou, Liying Li, Kun Cao, Tongquan Wei, Keqin Li:
A Survey of Hierarchical Energy Optimization for Mobile Edge Computing: A Perspective from End Devices to the Cloud. 38:1-38:44 - Alan Valejo, Vinícius Ferreira, Renato Fabbri, Maria Cristina Ferreira de Oliveira, Alneu de Andrade Lopes:
A Critical Survey of the Multilevel Method in Complex Networks. 39:1-39:35 - Jakapan Suaboot, Adil Fahad, Zahir Tari, John C. Grundy, Abdun Naser Mahmood, Abdulmohsen Almalawi, Albert Y. Zomaya, Khalil Drira:
A Taxonomy of Supervised Learning for IDSs in SCADA Environments. 40:1-40:37 - Guangjie Li, Hui Liu, Ally S. Nyamawe:
A Survey on Renamings of Software Entities. 41:1-41:38 - Niclas Kannengießer, Sebastian Lins, Tobias Dehling, Ali Sunyaev:
Trade-offs between Distributed Ledger Technology Characteristics. 42:1-42:37 - Herodotos Herodotou, Yuxing Chen, Jiaheng Lu:
A Survey on Automatic Parameter Tuning for Big Data Processing Systems. 43:1-43:37 - Santiago Figueroa, Javier Añorga, Saioa Arrizabalaga:
A Survey of IIoT Protocols: A Measure of Vulnerability Risk Analysis Based on CVSS. 44:1-44:53 - Federico Sierra-Arriaga, Rodrigo Branco, Ben Lee:
Security Issues and Challenges for Virtualization Technologies. 45:1-45:37
Volume 53, Number 3, May 2021
- Xuezhi Zeng, Saurabh Kumar Garg, Mutaz Barika, Albert Y. Zomaya, Lizhe Wang, Massimo Villari, Dan Chen, Rajiv Ranjan:
SLA Management for Big Data Analytical Applications in Clouds: A Taxonomy Study. 46:1-46:40 - Charulata Patil, Manasi Patwardhan:
Visual Question Generation: The State of the Art. 47:1-47:22 - Ricardo Macedo, João Paulo, José Pereira, Alysson Bessani:
A Survey and Classification of Software-Defined Storage Systems. 48:1-48:38 - A'aeshah Alhakamy, Mihran Tuceryan:
Real-time Illumination and Visual Coherence for Photorealistic Augmented/Mixed Reality. 49:1-49:34 - Xunyun Liu, Rajkumar Buyya:
Resource Management and Scheduling in Distributed Stream Processing Systems: A Taxonomy, Review, and Future Directions. 50:1-50:41 - Phillip Stanley-Marbell, Armin Alaghi, Michael Carbin, Eva Darulova, Lara Dolecek, Andreas Gerstlauer, Ghayoor Gillani, Djordje Jevdjic, Thierry Moreau, Mattia Cacciotti, Alexandros Daglis, Natalie D. Enright Jerger, Babak Falsafi, Sasa Misailovic, Adrian Sampson, Damien Zufferey:
Exploiting Errors for Efficiency: A Survey from Circuits to Applications. 51:1-51:39 - M. Elgin Akpinar, Yeliz Yesilada, Selim Temizer:
The Effect of Context on Small Screen and Wearable Device Users' Performance - A Systematic Review. 52:1-52:44 - J. Stanley Warford, David Vega, Scott M. Staley:
A Calculational Deductive System for Linear Temporal Logic. 53:1-53:38 - Rangan Das, Sagnik Sen, Ujjwal Maulik:
A Survey on Fuzzy Deep Neural Networks. 54:1-54:25 - Azzedine Boukerche, Lining Zheng, Omar Alfandi:
Outlier Detection: Methods, Models, and Classification. 55:1-55:37 - Olivier Beaumont, Louis-Claude Canon, Lionel Eyraud-Dubois, Giorgio Lucarelli, Loris Marchal, Clément Mommessin, Bertrand Simon, Denis Trystram:
Scheduling on Two Types of Resources: A Survey. 56:1-56:36 - Bardh Prenkaj, Paola Velardi, Giovanni Stilo, Damiano Distante, Stefano Faralli:
A Survey of Machine Learning Approaches for Student Dropout Prediction in Online Courses. 57:1-57:34 - Leila Ismail, Huned Materwala:
Computing Server Power Modeling in a Data Center: Survey, Taxonomy, and Performance Evaluation. 58:1-58:34 - Thomas Welsh, Elhadj Benkhelifa:
On Resilience in Cloud Computing: A Survey of Techniques across the Cloud Domain. 59:1-59:36 - Saeed Anwar, Salman H. Khan, Nick Barnes:
A Deep Journey into Super-resolution: A Survey. 60:1-60:34 - Bert-Jan Butijn, Damian A. Tamburri, Willem-Jan van den Heuvel:
Blockchains: A Systematic Multivocal Literature Review. 61:1-61:37 - Triet Huynh Minh Le, Hao Chen, Muhammad Ali Babar:
Deep Learning for Source Code Modeling and Generation: Models, Applications, and Challenges. 62:1-62:38 - Yaqing Wang, Quanming Yao, James T. Kwok, Lionel M. Ni:
Generalizing from a Few Examples: A Survey on Few-shot Learning. 63:1-63:34 - Sebastian Zepf, Javier Hernandez, Alexander Schmitt, Wolfgang Minker, Rosalind W. Picard:
Driver Emotion Recognition for Intelligent Vehicles: A Survey. 64:1-64:30 - Farah Aït-Salaht, Frédéric Desprez, Adrien Lebre:
An Overview of Service Placement Problem in Fog and Edge Computing. 65:1-65:35 - Alexandru Constantin Serban, Erik Poll, Joost Visser:
Adversarial Examples on Object Recognition: A Comprehensive Survey. 66:1-66:38 - Huashan Chen, Marcus Pendleton, Laurent Njilla, Shouhuai Xu:
A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defenses. 67:1-67:43
Volume 53, Number 4, July 2021
- Bin Guo, Yasan Ding, Lina Yao, Yunji Liang, Zhiwen Yu:
The Future of False Information Detection on Social Media: New Perspectives and Trends. 68:1-68:36 - Patrick Emami, Panos M. Pardalos, Lily Elefteriadou, Sanjay Ranka:
Machine Learning Methods for Data Association in Multi-Object Tracking. 69:1-69:34 - Alexander Wood, Kayvan Najarian, Delaram Kahrobaei:
Homomorphic Encryption for Machine Learning in Medicine and Bioinformatics. 70:1-70:35 - Kan Ngamakeur, Sira Yongchareon, Jian Yu, Saeed Ur Rehman:
A Survey on Device-free Indoor Localization and Tracking in the Multi-resident Environment. 71:1-71:29 - Isra Mohamed Ali, Maurantonio Caprolu, Roberto Di Pietro:
Foundations, Properties, and Security Applications of Puzzles: A Survey. 72:1-72:38 - Xincai Fei, Fangming Liu, Qixia Zhang, Hai Jin, Hongxin Hu:
Paving the Way for NFV Acceleration: A Taxonomy, Survey and Future Directions. 73:1-73:42 - Michael Feldmann, Christian Scheideler, Stefan Schmid:
Survey on Algorithms for Self-stabilizing Overlay Networks. 74:1-74:24 - Ruocheng Guo, Lu Cheng, Jundong Li, P. Richard Hahn, Huan Liu:
A Survey of Learning Causality with Data: Problems and Methods. 75:1-75:37 - Angeliki Kritikakou, Rafail Psiakis, Francky Catthoor, Olivier Sentieys:
Binary Tree Classification of Rigid Error Detection and Correction Techniques. 76:1-76:38 - Jorge Calvo-Zaragoza, Jan Hajic Jr., Alexander Pacha:
Understanding Optical Music Recognition. 77:1-77:35 - Salvador Lucas:
Context-sensitive Rewriting. 78:1-78:36 - Jon Pérez-Cerrolaza, Roman Obermaisser, Jaume Abella, Francisco J. Cazorla, Kim Grüttner, Irune Agirre, Hamidreza Ahmadian, Imanol Allende:
Multi-core Devices for Safety-critical Systems: A Survey. 79:1-79:38 - Azzedine Boukerche, Victor Soto:
Computation Offloading and Retrieval for Vehicular Edge Computing: Algorithms, Models, and Classification. 80:1-80:35 - Pascal Weisenburger, Johannes Wirth, Guido Salvaneschi:
A Survey of Multitier Programming. 81:1-81:35 - Bin Qian, Jie Su, Zhenyu Wen, Devki Nandan Jha, Yinhao Li, Yu Guan, Deepak Puthal, Philip James, Renyu Yang, Albert Y. Zomaya, Omer F. Rana, Lizhe Wang, Maciej Koutny, Rajiv Ranjan:
Orchestrating the Development Lifecycle of Machine Learning-based IoT Applications: A Taxonomy and Survey. 82:1-82:47 - Yinghui Zhang, Robert H. Deng, Shengmin Xu, Jianfei Sun, Qi Li, Dong Zheng:
Attribute-based Encryption for Cloud Computing Access Control: A Survey. 83:1-83:41 - Yanjiao Chen, Baolin Zheng, Zihan Zhang, Qian Wang, Chao Shen, Qian Zhang:
Deep Learning on Mobile and Embedded Devices: State-of-the-art, Challenges, and Future Directions. 84:1-84:37 - Saad Khan, Simon Parkinson, Liam Grant, Na Liu, Stephen McGuire:
Biometric Systems Utilising Health Data from Wearable Devices: Applications and Future Challenges in Computer Security. 85:1-85:29 - Tomohiro Harada, Enrique Alba:
Parallel Genetic Algorithms: A Useful Survey. 86:1-86:39 - Adrián Pekár, Jozef Mocnej, Winston K. G. Seah, Iveta Zolotová:
Application Domain-Based Overview of IoT Network Traffic Characteristics. 87:1-87:33 - Md. Redowan Mahmud, Kotagiri Ramamohanarao, Rajkumar Buyya:
Application Management in Fog Computing Environments: A Taxonomy, Review and Future Directions. 88:1-88:43 - Pratima Sharma, Rajni Jindal, Dutta Borah Malaya:
Blockchain Technology for Cloud Storage: A Systematic Literature Review. 89:1-89:32 - Gexiang Zhang, Zeyi Shang, Sergey Verlan, Miguel Ángel Martínez-del-Amor, Chengxun Yuan, Luis Valencia-Cabrera, Mario J. Pérez-Jiménez:
An Overview of Hardware Implementation of Membrane Computing Models. 90:1-90:38
Volume 53, Number 5, September 2021
- Juan Antonio Álvarez-García, Bozidara Cvetkovic, Mitja Lustrek:
A Survey on Energy Expenditure Estimation Using Wearable Devices. 91:1-91:35 - Noura Aljeri, Azzedine Boukerche:
Mobility Management in 5G-enabled Vehicular Networks: Models, Protocols, and Classification. 92:1-92:35 - Mariam Khader, Ghazi Al-Naymat:
Density-based Algorithms for Big Data Clustering Using MapReduce Framework: A Comprehensive Study. 93:1-93:38 - Roniel S. de Sousa, Azzedine Boukerche, Antonio A. F. Loureiro:
Vehicle Trajectory Similarity: Models, Methods, and Applications. 94:1-94:32 - Ramon Canal, Carles Hernández, Rafael Tornero, Alessandro Cilardo, Giuseppe Massari, Federico Reghenzani, William Fornaciari, Marina Zapater, David Atienza, Ariel Oleksiak, Wojciech Piatek, Jaume Abella:
Predictive Reliability and Fault Management in Exascale Systems: State of the Art and Perspectives. 95:1-95:32 - Miralem Mehic, Marcin Niemiec, Stefan Rass, Jiajun Ma, Momtchil Peev, Alejandro Aguado, Vicente Martín, Stefan Schauer, Andreas Poppe, Christoph Pacher, Miroslav Voznák:
Quantum Key Distribution: A Networking Perspective. 96:1-96:41 - Zeyad A. Al-Odat, Mazhar Ali, Assad Abbas, Samee U. Khan:
Secure Hash Algorithms and the Corresponding FPGA Optimization Techniques. 97:1-97:36 - Sagar Uprety, Dimitris Gkoumas, Dawei Song:
A Survey of Quantum Theory Inspired Approaches to Information Retrieval. 98:1-98:39 - Raj Dabre, Chenhui Chu, Anoop Kunchukuttan:
A Survey of Multilingual Neural Machine Translation. 99:1-99:38 - Weiwei Lin, Fang Shi, Wentai Wu, Keqin Li, Guangxin Wu, Al-Alas Mohammed:
A Taxonomy and Survey of Power Models and Power Modeling for Cloud Servers. 100:1-100:41 - Deya Chatterjee, Shrisha Rao:
Computational Sustainability: A Socio-technical Perspective. 101:1-101:29 - Maram Bani Younes, Azzedine Boukerche:
Traffic Efficiency Applications over Downtown Roads: A New Challenge for Intelligent Connected Vehicles. 102:1-102:30 - Maria Alejandra Cornejo-Lupa, Regina P. Ticona-Herrera, Yudith Cardinale, Dennis Barrios-Aranibar:
A Survey of Ontologies for Simultaneous Localization and Mapping in Mobile Robots. 103:1-103:26 - Kai Bu, Avery Laird, Yutian Yang, Linfeng Cheng, Jiaqing Luo, Yingjiu Li, Kui Ren:
Unveiling the Mystery of Internet Packet Forwarding: A Survey of Network Path Validation. 104:1-104:34 - Yashar Deldjoo, Markus Schedl, Paolo Cremonesi, Gabriella Pasi:
Recommender Systems Leveraging Multimedia Content. 106:1-106:38 - Jingwen Wang, Xuyang Jing, Zheng Yan, Yulong Fu, Witold Pedrycz, Laurence T. Yang:
A Survey on Trust Evaluation Based on Machine Learning. 107:1-107:36 - Hao Wang, Dit-Yan Yeung:
A Survey on Bayesian Deep Learning. 108:1-108:37 - Xinyi Zhou, Reza Zafarani:
A Survey of Fake News: Fundamental Theories, Detection Methods, and Opportunities. 109:1-109:40 - Ali Davoudian, Mengchi Liu:
Big Data Systems: A Software Engineering Perspective. 110:1-110:39 - Kui Yu, Xianjie Guo, Lin Liu, Jiuyong Li, Hao Wang, Zhaolong Ling, Xindong Wu:
Causality-based Feature Selection: Methods and Evaluations. 111:1-111:36 - Furkan Alaca, Paul C. van Oorschot:
Comparative Analysis and Framework Evaluating Web Single Sign-on Systems. 112:1-112:34
Volume 53, Number 6, November 2021
Invited Tutorial
- Peter J. Denning:
Working Set Analytics. 113:1-113:36 - Albert Y. Zomaya:
In Memoriam Sherif Sakr (1979-2020). 113e:1
- Aditya Singh Rathore, Zhengxiong Li, Weijin Zhu, Zhanpeng Jin, Wenyao Xu:
A Survey on Heart Biometrics. 114:1-114:38 - Sara Nieves Matheu, José Luis Hernández Ramos, Antonio F. Skarmeta, Gianmarco Baldini:
A Survey of Cybersecurity Certification for the Internet of Things. 115:1-115:36 - Jide S. Edu, Jose M. Such, Guillermo Suarez-Tangil:
Smart Home Personal Assistants: A Security and Privacy Review. 116:1-116:36 - C. Marimuthu, K. Chandrasekaran, Sridhar Chimalakonda:
Energy Diagnosis of Android Applications: A Thematic Taxonomy and Survey. 117:1-117:36 - Pamela Zave, Jennifer Rexford:
Patterns and Interactions in Network Security. 118:1-118:37 - Santhosh Kelathodi Kumaran, Debi Prosad Dogra, Partha Pratim Roy:
Anomaly Detection in Road Traffic Using Visual Surveillance: A Survey. 119:1-119:26 - Elakkiya Ellavarason, Richard M. Guest, Farzin Deravi, Raul Sánchez-Reillo, Barbara Corsetti:
Touch-dynamics based Behavioural Biometrics on Mobile Devices - A Review from a Usability and Performance Perspective. 120:1-120:36 - Marco Zimmerling, Luca Mottola, Silvia Santini:
Synchronous Transmissions in Low-Power Wireless: A Survey of Communication Protocols and Network Services. 121:1-121:39 - Nazar Waheed, Xiangjian He, Muhammad Ikram, Muhammad Usman, Saad Sajid Hashmi, Muhammad Usman:
Security and Privacy in IoT Using Machine Learning and Blockchain: Threats and Countermeasures. 122:1-122:37 - Riemer van Rozen:
Languages of Games and Play: A Systematic Mapping Study. 123:1-123:37 - Michele Coscia, Andres Gomez-Lievano, James McNerney, Frank Neffke:
The Node Vector Distance Problem in Complex Networks. 124:1-124:27 - Giulio Ermanno Pibiri, Rossano Venturini:
Techniques for Inverted Index Compression. 125:1-125:36 - Junyang Qiu, Jun Zhang, Wei Luo, Lei Pan, Surya Nepal, Yang Xiang:
A Survey of Android Malware Detection with Deep Neural Models. 126:1-126:36 - Vassilis Christophides, Vasilis Efthymiou, Themis Palpanas, George Papadakis, Kostas Stefanidis:
An Overview of End-to-End Entity Resolution for Big Data. 127:1-127:42 - Furkan Turan, Ingrid Verbauwhede:
Trust in FPGA-accelerated Cloud Computing. 128:1-128:28 - Ruba Skaik, Diana Inkpen:
Using Social Media for Mental Health Surveillance: A Review. 129:1-129:31 - Sarah Masud Preum, Sirajum Munir, Meiyi Ma, Mohammad Samin Yasar, David J. Stone, Ronald D. Williams, Homa Alemzadeh, John A. Stankovic:
A Review of Cognitive Assistants for Healthcare: Trends, Prospects, and Future Directions. 130:1-130:37 - Maggi Bansal, Inderveer Chana, Siobhán Clarke:
A Survey on IoT Big Data: Current Status, 13 V's Challenges, and Future Directions. 131:1-131:59 - Suzanne Tolmeijer, Markus Kneer, Cristina Sarasua, Markus Christen, Abraham Bernstein:
Implementations in Machine Ethics: A Survey. 132:1-132:38 - Liehuang Zhu, Md. Monjurul Karim, Kashif Sharif, Chang Xu, Fan Li, Xiaojiang Du, Mohsen Guizani:
SDN Controllers: A Comprehensive Analysis and Performance Evaluation Study. 133:1-133:40 - Azzedine Boukerche, Peng Sun:
Design of Algorithms and Protocols for Underwater Acoustic Wireless Sensor Networks. 134:1-134:34
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.