![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
ACM Computing Surveys, Volume 43
Volume 43, Number 1, November 2010
- Mario Cannataro
, Pietro Hiram Guzzi, Pierangelo Veltri
:
Protein-to-protein interactions: Technologies, databases, and algorithms. 1:1-1:36 - Sarah M. Diesburg
, An-I Andy Wang
:
A survey of confidential data storage and deletion methods. 2:1-2:37 - Nizar R. Mabroukeh, Christie I. Ezeife:
A taxonomy of sequential pattern mining algorithms. 3:1-3:41 - Hafedh Mili, Guy Tremblay, Guitta Bou Jaoude, Eric Lefebvre, Lamia Elabed, Ghizlane El-Boussaidi:
Business process modeling languages: Sorting through the alphabet soup. 4:1-4:56 - Jinu Kurian, Kamil Saraç:
A survey on the design, applications, and enhancements of application-layer overlay networks. 5:1-5:34
Volume 43, Number 2, January 2011
- Pimwadee Chaovalit
, Aryya Gangopadhyay, George Karabatis, Zhiyuan Chen
:
Discrete wavelet transform-based time series analysis and mining. 6:1-6:37 - Aline Carneiro Viana, Stephane Maag, Fatiha Zaïdi:
One step forward: Linking wireless self-organizing network validation techniques with formal testing approaches. 7:1-7:36 - Guido Urdaneta, Guillaume Pierre, Maarten van Steen
:
A survey of DHT security techniques. 8:1-8:49 - Felix C. Freiling, Rachid Guerraoui
, Petr Kuznetsov:
The failure detector abstraction. 9:1-9:40 - Simon Parsons, Juan A. Rodríguez-Aguilar
, Mark Klein:
Auctions and bidding: A guide for computer scientists. 10:1-10:59 - Changhai Nie, Hareton Leung
:
A survey of combinatorial testing. 11:1-11:29 - Wei Jie
, Junaid Arshad, Richard O. Sinnott
, Paul Townend, Zhou Lei:
A review of grid authentication and authorization technologies and support for federated access control. 12:1-12:26
Volume 43, Number 3, April 2011
- Clémence Magnien, Matthieu Latapy, Jean-Loup Guillaume
:
Impact of random failures and attacks on Poisson and power-law random networks. 13:1-13:31 - Patricia Beatty, Ian Reay, Scott Dick, James Miller:
Consumer trust in e-commerce web sites: A meta-study. 14:1-14:46 - Kathleen McGill, Stephen Taylor:
Robot algorithms for localization of multiple emission sources. 15:1-15:25 - J. K. Aggarwal, Michael S. Ryoo:
Human activity analysis: A review. 16:1-16:43 - Sarvnaz Karimi
, Falk Scholer
, Andrew Turpin:
Machine transliteration survey. 17:1-17:46 - Roland Ducournau:
Implementing statically typed object-oriented programming languages. 18:1-18:48 - Luca Mottola
, Gian Pietro Picco:
Programming wireless sensor networks: Fundamental concepts and state of the art. 19:1-19:51 - Steffen van Bakel
:
Strict intersection types for the Lambda Calculus. 20:1-20:49 - Amy J. Ko, Robin Abraham
, Laura Beckwith, Alan F. Blackwell, Margaret M. Burnett, Martin Erwig
, Christopher Scaffidi, Joseph Lawrance, Henry Lieberman, Brad A. Myers, Mary Beth Rosson, Gregg Rothermel, Mary Shaw
, Susan Wiedenbeck:
The state of the art in end-user software engineering. 21:1-21:44 - Elias P. Duarte Jr., Roverli Pereira Ziwich, Luiz Carlos Pessoa Albini
:
A survey of comparison-based system-level diagnosis. 22:1-22:56 - Yuhui Deng
:
What is the future of disk drives, death or rebirth? 23:1-23:27
Volume 43, Number 4, October 2011
- Laurie McLeod, Stephen G. MacDonell:
Factors that affect software systems development project outcomes: A survey of research. 24:1-24:56 - Alsayed Algergawy
, Marco Mesiti, Richi Nayak
, Gunter Saake:
XML data clustering: An overview. 25:1-25:41 - Anderson Rocha, Walter J. Scheirer, Terrance E. Boult, Siome Goldenstein:
Vision of the unseen: Current trends and challenges in digital image and video forensics. 26:1-26:42 - Sergio Damas
, Oscar Cordón
, Óscar Ibáñez
, José Santamaría
, Inmaculada Alemán
, Miguel Botella, Fernando Navarro
:
Forensic identification by computer-aided craniofacial superimposition: A survey. 27:1-27:27 - Manuel Wimmer, Andrea Schauerhuber, Gerti Kappel, Werner Retschitzegger, Wieland Schwinger, Elisabeth Kapsammer:
A survey on UML-based aspect-oriented design modeling. 28:1-28:33 - Ferdous Ahmed Sohel
, Gour C. Karmakar, Laurence S. Dooley, Mohammed Bennamoun
:
Geometric distortion measurement for shape coding: A contemporary review. 29:1-29:22 - Torsten Anders
, Eduardo Reck Miranda:
Constraint programming systems for modeling music theories and composition. 30:1-30:38 - Matthew Parris, Carthik A. Sharma, Ronald F. DeMara
:
Progress in autonomous fault recovery of field programmable gate arrays. 31:1-31:30 - Bang Wang:
Coverage problems in sensor networks: A survey. 32:1-32:53 - Davide Falessi, Giovanni Cantone, Rick Kazman, Philippe Kruchten
:
Decision-making techniques for software architecture design: A comparative survey. 33:1-33:28 - Tomás Skopal
, Benjamin Bustos
:
On nonmetric similarity search problems in complex domains. 34:1-34:50 - Robert I. Davis, Alan Burns:
A survey of hard real-time scheduling for multiprocessor systems. 35:1-35:44 - Fariba Sadri:
Ambient intelligence: A survey. 36:1-36:66
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.