


default search action
ACM Computing Surveys, Volume 45
Volume 45, Number 1, November 2012
- Dong Zhou, Mark Truran, Tim J. Brailsford, Vincent Wade, Helen Ashman
:
Translation techniques in cross-language information retrieval. 1:1-1:44 - Simona Bernardi
, José Merseguer
, Dorina C. Petriu
:
Dependability modeling and analysis of software systems specified with UML. 2:1-2:48 - Sasikanth Avancha, Amit S. Baxi, David Kotz
:
Privacy in mobile technology for personal healthcare. 3:1-3:54 - Sergey Zhuravlev, Juan Carlos Saez
, Sergey Blagodurov, Alexandra Fedorova, Manuel Prieto
:
Survey of scheduling techniques for addressing shared resources in multicore processors. 4:1-4:28 - Anisa Al-Hafeedh, Maxime Crochemore
, Lucian Ilie
, Evguenia Kopylova, William F. Smyth, German Tischler, Munina Yusufu:
A comparison of index-based lempel-Ziv LZ77 factorization algorithms. 5:1-5:17 - Boris Danev, Davide Zanetti, Srdjan Capkun:
On physical-layer identification of wireless devices. 6:1-6:29 - Yi Zhi Zhao, Chunyan Miao
, Maode Ma, Jing-Bing Zhang, Cyril Leung:
A survey and projection on medium access control protocols for wireless sensor networks. 7:1-7:37 - Glenn I. Hawe, Graham Coates, Duncan T. Wilson, Roger S. Crouch:
Agent-based simulation for large-scale emergency response: A survey of usage and implementation. 8:1-8:51 - R. Annie Uthra, S. V. Kasmir Raja:
QoS routing in wireless sensor networks - a survey. 9:1-9:12 - João Mendes-Moreira
, Carlos Soares
, Alípio Mário Jorge
, Jorge Freire de Sousa
:
Ensemble approaches for regression: A survey. 10:1-10:40 - Mark Harman
, S. Afshin Mansouri
, Yuanyuan Zhang:
Search-based software engineering: Trends, techniques and applications. 11:1-11:61 - Philippe Esling, Carlos Agón:
Time-series data mining. 12:1-12:34
Volume 45, Number 2, February 2013
- Simone Faro
, Thierry Lecroq
:
The exact online string matching problem: A review of the most recent results. 13:1-13:42 - Angeliki Kritikakou
, Francky Catthoor, Vasilios I. Kelefouras
, Costas E. Goutis:
A systematic approach to classify design-time global scheduling techniques. 14:1-14:30 - Marco Attene, Marcel Campen
, Leif Kobbelt
:
Polygon mesh repairing: An application perspective. 15:1-15:33 - Susan Lomax, Sunil Vadera:
A survey of cost-sensitive decision tree induction algorithms. 16:1-16:35 - Michael Pearce, Sherali Zeadally, Ray Hunt:
Virtualization: Issues, security threats, and solutions. 17:1-17:39 - María Elena Acevedo-Mosqueda
, Cornelio Yáñez-Márquez
, Marco Antonio Acevedo-Mosqueda
:
Bidirectional associative memories: Different approaches. 18:1-18:30 - Carl Mooney
, John F. Roddick
:
Sequential pattern mining - approaches and algorithms. 19:1-19:39 - Timo Koskela, Otso Kassinen, Erkki Harjula, Mika Ylianttila
:
P2P group management systems: A conceptual analysis. 20:1-20:25 - Mehdi Saeedi
, Igor L. Markov:
Synthesis and optimization of reversible circuits - a survey. 21:1-21:34 - Ayman Abaza, Arun Ross, Christina Hebert, Mary Ann F. Harrison, Mark S. Nixon
:
A survey on ear biometrics. 22:1-22:35 - Mohammad Tanvir Parvez, Sabri A. Mahmoud:
Offline arabic handwritten text recognition: A Survey. 23:1-23:35 - Jukka Suomela
:
Survey of local algorithms. 24:1-24:40
Volume 45, Number 3, June 2013
- Mohammad Hossein Manshaei, Quanyan Zhu, Tansu Alpcan
, Tamer Basar, Jean-Pierre Hubaux:
Game theory meets network security and privacy. 25:1-25:39 - James Stanier, Des Watson:
Intermediate representations in imperative compilers: A survey. 26:1-26:27 - Seyed Amir Hoseinitabatabaei
, Alexander Gluhak, Rahim Tafazolli
:
A survey on smartphone-based systems for opportunistic user context recognition. 27:1-27:51 - Christian Colombo
, Gordon J. Pace
:
Recovery within long-running transactions. 28:1-28:35 - Omer Zilberberg, Shlomo Weiss, Sivan Toledo:
Phase-change memory: An architectural perspective. 29:1-29:33 - João V. P. Gomes, Pedro R. M. Inácio
, Manuela Pereira
, Mário M. Freire
, Paulo P. Monteiro
:
Detection and classification of peer-to-peer traffic: A survey. 30:1-30:40 - Floarea Serban, Joaquin Vanschoren
, Jörg-Uwe Kietz, Abraham Bernstein
:
A survey of intelligent assistants for data analysis. 31:1-31:35 - Wei Zang, Ann Gordon-Ross:
A survey on cache tuning from a power/energy perspective. 32:1-32:49 - Tom Bostoen, Sape J. Mullender, Yolande Berbers:
Power-reduction techniques for data-center storage systems. 33:1-33:38 - John David N. Dionisio
, William G. Burns III, Richard Gilbert:
3D Virtual worlds and the metaverse: Current status and future possibilities. 34:1-34:38 - Matej Crepinsek, Shih-Hsi Liu, Marjan Mernik:
Exploration and exploitation in evolutionary algorithms: A survey. 35:1-35:33 - Leandro Silva Galvão de Carvalho
, Edjair de Souza Mota
:
Survey on application-layer mechanisms for speech quality adaptation in VoIP. 36:1-36:31 - Xavier Grehant, Isabelle M. Demeure, Sverre Jarp:
A survey of task mapping on production grids. 37:1-37:25 - Abbas Eslami Kiasari, Axel Jantsch
, Zhonghai Lu
:
Mathematical formalisms for performance evaluation of networks-on-chip. 38:1-38:41 - Andrew Newell, Jing Dong, Cristina Nita-Rotaru:
On the practicality of cryptographic defences against pollution attacks in wireless network coding. 39:1-39:26 - Gábor Pék, Levente Buttyán, Boldizsár Bencsáth:
A survey of security issues in hardware virtualization. 40:1-40:34
Volume 45, Number 4, August 2013
- Lilian Bossuet, Michael Grand, Lubos Gaspar, Viktor Fischer, Guy Gogniat
:
Architectures of flexible symmetric key crypto engines - a survey: From hardware coprocessor to multi-crypto-processor system on chip. 41:1-41:32 - Christine Parent, Stefano Spaccapietra, Chiara Renso
, Gennady L. Andrienko
, Natalia V. Andrienko
, Vania Bogorny, Maria Luisa Damiani, Aris Gkoulalas-Divanis, José Antônio Fernandes de Macêdo, Nikos Pelekis, Yannis Theodoridis
, Zhixian Yan:
Semantic trajectories modeling and analysis. 42:1-42:32 - Jierui Xie, Stephen Kelley, Boleslaw K. Szymanski
:
Overlapping community detection in networks: The state-of-the-art and comparative study. 43:1-43:35 - Jiajun Liu, Zi Huang
, Hongyun Cai, Heng Tao Shen, Chong-Wah Ngo
, Wei Wang:
Near-duplicate video retrieval: Current research and future trends. 44:1-44:23 - Rafael Rodríguez-Gómez
, Gabriel Maciá-Fernández
, Pedro García-Teodoro:
Survey and taxonomy of botnet research through life-cycle. 45:1-45:33 - Anirban Basu
, Simon Fleming, James Stanier, Stephen Naicken, Ian Wakeman
, Vijay K. Gurbani:
The state of peer-to-peer network simulators. 46:1-46:25 - Wanita Sherchan, Surya Nepal
, Cécile Paris:
A survey of trust in social networks. 47:1-47:33 - Rajshekar Kalayappan, Smruti R. Sarangi:
A survey of checker architectures. 48:1-48:34 - Jian Chang, Krishna K. Venkatasubramanian, Andrew G. West
, Insup Lee:
Analyzing and defending against web-based malware. 49:1-49:35 - Anne Benoit
, Ümit V. Çatalyürek
, Yves Robert
, Erik Saule
:
A survey of pipelined workflow scheduling: Models and algorithms. 50:1-50:36 - Arnaud Hubaux, Thein Than Tun, Patrick Heymans:
Separation of concerns in feature diagram languages: A systematic survey. 51:1-51:23 - Engineer Bainomugisha, Andoni Lombide Carreton, Tom Van Cutsem
, Stijn Mostinckx, Wolfgang De Meuter:
A survey on reactive programming. 52:1-52:34 - Kelly Androutsopoulos, David Clark
, Mark Harman
, Jens Krinke
, Laurence Tratt:
State-based model slicing: A survey. 53:1-53:36 - Daniel Lázaro Iglesias, Joan Manuel Marquès, Josep Jorba
, Xavier Vilajosana
:
Decentralized resource discovery mechanisms for distributed computing in peer-to-peer environments. 54:1-54:40 - Levi Shaul, Doron Tauber:
Critical success factors in enterprise resource planning systems: Review of the last decade. 55:1-55:39

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.