default search action
ACM Computing Surveys, Volume 43
Volume 43, Number 1, November 2010
- Mario Cannataro, Pietro Hiram Guzzi, Pierangelo Veltri:
Protein-to-protein interactions: Technologies, databases, and algorithms. 1:1-1:36 - Sarah M. Diesburg, An-I Andy Wang:
A survey of confidential data storage and deletion methods. 2:1-2:37 - Nizar R. Mabroukeh, Christie I. Ezeife:
A taxonomy of sequential pattern mining algorithms. 3:1-3:41 - Hafedh Mili, Guy Tremblay, Guitta Bou Jaoude, Eric Lefebvre, Lamia Elabed, Ghizlane El-Boussaidi:
Business process modeling languages: Sorting through the alphabet soup. 4:1-4:56 - Jinu Kurian, Kamil Saraç:
A survey on the design, applications, and enhancements of application-layer overlay networks. 5:1-5:34
Volume 43, Number 2, January 2011
- Pimwadee Chaovalit, Aryya Gangopadhyay, George Karabatis, Zhiyuan Chen:
Discrete wavelet transform-based time series analysis and mining. 6:1-6:37 - Aline Carneiro Viana, Stephane Maag, Fatiha Zaïdi:
One step forward: Linking wireless self-organizing network validation techniques with formal testing approaches. 7:1-7:36 - Guido Urdaneta, Guillaume Pierre, Maarten van Steen:
A survey of DHT security techniques. 8:1-8:49 - Felix C. Freiling, Rachid Guerraoui, Petr Kuznetsov:
The failure detector abstraction. 9:1-9:40 - Simon Parsons, Juan A. Rodríguez-Aguilar, Mark Klein:
Auctions and bidding: A guide for computer scientists. 10:1-10:59 - Changhai Nie, Hareton Leung:
A survey of combinatorial testing. 11:1-11:29 - Wei Jie, Junaid Arshad, Richard O. Sinnott, Paul Townend, Zhou Lei:
A review of grid authentication and authorization technologies and support for federated access control. 12:1-12:26
Volume 43, Number 3, April 2011
- Clémence Magnien, Matthieu Latapy, Jean-Loup Guillaume:
Impact of random failures and attacks on Poisson and power-law random networks. 13:1-13:31 - Patricia Beatty, Ian Reay, Scott Dick, James Miller:
Consumer trust in e-commerce web sites: A meta-study. 14:1-14:46 - Kathleen McGill, Stephen Taylor:
Robot algorithms for localization of multiple emission sources. 15:1-15:25 - J. K. Aggarwal, Michael S. Ryoo:
Human activity analysis: A review. 16:1-16:43 - Sarvnaz Karimi, Falk Scholer, Andrew Turpin:
Machine transliteration survey. 17:1-17:46 - Roland Ducournau:
Implementing statically typed object-oriented programming languages. 18:1-18:48 - Luca Mottola, Gian Pietro Picco:
Programming wireless sensor networks: Fundamental concepts and state of the art. 19:1-19:51 - Steffen van Bakel:
Strict intersection types for the Lambda Calculus. 20:1-20:49 - Amy J. Ko, Robin Abraham, Laura Beckwith, Alan F. Blackwell, Margaret M. Burnett, Martin Erwig, Christopher Scaffidi, Joseph Lawrance, Henry Lieberman, Brad A. Myers, Mary Beth Rosson, Gregg Rothermel, Mary Shaw, Susan Wiedenbeck:
The state of the art in end-user software engineering. 21:1-21:44 - Elias P. Duarte Jr., Roverli Pereira Ziwich, Luiz Carlos Pessoa Albini:
A survey of comparison-based system-level diagnosis. 22:1-22:56 - Yuhui Deng:
What is the future of disk drives, death or rebirth? 23:1-23:27
Volume 43, Number 4, October 2011
- Laurie McLeod, Stephen G. MacDonell:
Factors that affect software systems development project outcomes: A survey of research. 24:1-24:56 - Alsayed Algergawy, Marco Mesiti, Richi Nayak, Gunter Saake:
XML data clustering: An overview. 25:1-25:41 - Anderson Rocha, Walter J. Scheirer, Terrance E. Boult, Siome Goldenstein:
Vision of the unseen: Current trends and challenges in digital image and video forensics. 26:1-26:42 - Sergio Damas, Oscar Cordón, Óscar Ibáñez, José Santamaría, Inmaculada Alemán, Miguel Botella, Fernando Navarro:
Forensic identification by computer-aided craniofacial superimposition: A survey. 27:1-27:27 - Manuel Wimmer, Andrea Schauerhuber, Gerti Kappel, Werner Retschitzegger, Wieland Schwinger, Elisabeth Kapsammer:
A survey on UML-based aspect-oriented design modeling. 28:1-28:33 - Ferdous Ahmed Sohel, Gour C. Karmakar, Laurence S. Dooley, Mohammed Bennamoun:
Geometric distortion measurement for shape coding: A contemporary review. 29:1-29:22 - Torsten Anders, Eduardo Reck Miranda:
Constraint programming systems for modeling music theories and composition. 30:1-30:38 - Matthew Parris, Carthik A. Sharma, Ronald F. DeMara:
Progress in autonomous fault recovery of field programmable gate arrays. 31:1-31:30 - Bang Wang:
Coverage problems in sensor networks: A survey. 32:1-32:53 - Davide Falessi, Giovanni Cantone, Rick Kazman, Philippe Kruchten:
Decision-making techniques for software architecture design: A comparative survey. 33:1-33:28 - Tomás Skopal, Benjamin Bustos:
On nonmetric similarity search problems in complex domains. 34:1-34:50 - Robert I. Davis, Alan Burns:
A survey of hard real-time scheduling for multiprocessor systems. 35:1-35:44 - Fariba Sadri:
Ambient intelligence: A survey. 36:1-36:66
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.