[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Volume 45, Issue 4August 2013
Reflects downloads up to 20 Jan 2025Bibliometrics
Skip Table Of Content Section
research-article
Architectures of flexible symmetric key crypto engines—a survey: From hardware coprocessor to multi-crypto-processor system on chip
Article No.: 41, Pages 1–32https://doi.org/10.1145/2501654.2501655

Throughput, flexibility, and security form the design trilogy of reconfigurable crypto engines; they must be carefully considered without reducing the major role of classical design constraints, such as surface, power consumption, dependability, and ...

research-article
Semantic trajectories modeling and analysis
Article No.: 42, Pages 1–32https://doi.org/10.1145/2501654.2501656

Focus on movement data has increased as a consequence of the larger availability of such data due to current GPS, GSM, RFID, and sensors techniques. In parallel, interest in movement has shifted from raw movement data analysis to more application-...

research-article
Overlapping community detection in networks: The state-of-the-art and comparative study
Article No.: 43, Pages 1–35https://doi.org/10.1145/2501654.2501657

This article reviews the state-of-the-art in overlapping community detection algorithms, quality measures, and benchmarks. A thorough comparison of different algorithms (a total of fourteen) is provided. In addition to community-level evaluation, we ...

research-article
Near-duplicate video retrieval: Current research and future trends
Article No.: 44, Pages 1–23https://doi.org/10.1145/2501654.2501658

The exponential growth of online videos, along with increasing user involvement in video-related activities, has been observed as a constant phenomenon during the last decade. User's time spent on video capturing, editing, uploading, searching, and ...

research-article
Survey and taxonomy of botnet research through life-cycle
Article No.: 45, Pages 1–33https://doi.org/10.1145/2501654.2501659

Of all current threats to cybersecurity, botnets are at the top of the list. In consequence, interest in this problem is increasing rapidly among the research community and the number of publications on the question has grown exponentially in recent ...

research-article
The state of peer-to-peer network simulators
Article No.: 46, Pages 1–25https://doi.org/10.1145/2501654.2501660

Networking research often relies on simulation in order to test and evaluate new ideas. An important requirement of this process is that results must be reproducible so that other researchers can replicate, validate, and extend existing work. We look at ...

research-article
A survey of trust in social networks
Article No.: 47, Pages 1–33https://doi.org/10.1145/2501654.2501661

Web-based social networks have become popular as a medium for disseminating information and connecting like-minded people. The public accessibility of such networks with the ability to share opinions, thoughts, information, and experience offers great ...

research-article
A survey of checker architectures
Article No.: 48, Pages 1–34https://doi.org/10.1145/2501654.2501662

Reliability is quickly becoming a primary design constraint for high-end processors because of the inherent limits of manufacturability, extreme miniaturization of transistors, and the growing complexity of large multicore chips. To achieve a high ...

research-article
Analyzing and defending against web-based malware
Article No.: 49, Pages 1–35https://doi.org/10.1145/2501654.2501663

Web-based malware is a growing threat to today's Internet security. Attacks of this type are prevalent and lead to serious security consequences. Millions of malicious URLs are used as distribution channels to propagate malware all over the Web. After ...

research-article
A survey of pipelined workflow scheduling: Models and algorithms
Article No.: 50, Pages 1–36https://doi.org/10.1145/2501654.2501664

A large class of applications need to execute the same workflow on different datasets of identical size. Efficient execution of such applications necessitates intelligent distribution of the application components and tasks on a parallel machine, and ...

research-article
Separation of concerns in feature diagram languages: A systematic survey
Article No.: 51, Pages 1–23https://doi.org/10.1145/2501654.2501665

The need for flexible customization of large feature-rich software systems, according to requirements of various stakeholders, has become an important problem in software development. Among the many software engineering approaches dealing with ...

research-article
A survey on reactive programming
Article No.: 52, Pages 1–34https://doi.org/10.1145/2501654.2501666

Reactive programming has recently gained popularity as a paradigm that is well-suited for developing event-driven and interactive applications. It facilitates the development of such applications by providing abstractions to express time-varying values ...

research-article
State-based model slicing: A survey
Article No.: 53, Pages 1–36https://doi.org/10.1145/2501654.2501667

Slicing is a technique, traditionally applied to programs, for extracting the parts of a program that affect the values computed at a statement of interest. In recent years authors have begun to consider slicing at model level. We present a detailed ...

research-article
Decentralized resource discovery mechanisms for distributed computing in peer-to-peer environments
Article No.: 54, Pages 1–40https://doi.org/10.1145/2501654.2501668

Resource discovery is an important part of distributed computing and resource sharing systems, like grids and utility computing. Because of the increasing importance of decentralized and peer-to-peer environments, characterized by high dynamism and ...

research-article
Critical success factors in enterprise resource planning systems: Review of the last decade
Article No.: 55, Pages 1–39https://doi.org/10.1145/2501654.2501669

Organizations perceive ERP as a vital tool for organizational competition as it integrates dispersed organizational systems and enables flawless transactions and production. This review examines studies investigating Critical Success Factors (CSFs) in ...

Subjects

Comments

Please enable JavaScript to view thecomments powered by Disqus.