default search action
ACM Computing Surveys, Volume 48
Volume 48, Number 1, September 2015
- Guozhu Meng, Yang Liu, Jie Zhang, Alexander Pokluda, Raouf Boutaba:
Collaborative Security: A Survey and Taxonomy. 1:1-1:42 - Claudio A. Ardagna, Rasool Asal, Ernesto Damiani, Quang Hieu Vu:
From Security to Assurance in the Cloud: A Survey. 2:1-2:50 - Stefan Mitsch, André Platzer, Werner Retschitzegger, Wieland Schwinger:
Logic-Based Modeling Approaches for Qualitative and Hybrid Reasoning in Dynamic Spatial Systems. 3:1-3:40 - Olumuyiwa Ibidunmoye, Francisco Hernández-Rodriguez, Erik Elmroth:
Performance Anomaly Detection and Bottleneck Identification. 4:1-4:35 - Bisan Alsalibi, Ibrahim Venkat, K. G. Subramanian, Syaheerah Lebai Lutfi, Philippe De Wilde:
The Impact of Bio-Inspired Approaches Toward the Advancement of Face Recognition. 5:1-5:33 - Muhammad Naveed, Erman Ayday, Ellen Wright Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang:
Privacy in the Genomic Era. 6:1-6:44 - Bin Guo, Zhu Wang, Zhiwen Yu, Yu Wang, Neil Y. Yen, Runhe Huang, Xingshe Zhou:
Mobile Crowd Sensing and Computing: The Review of an Emerging Human-Powered Sensing Paradigm. 7:1-7:31 - Patricia Ruiz, Pascal Bouvry:
Survey on Broadcast Algorithms for Mobile Ad Hoc Networks. 8:1-8:35 - Hyejeong Hong, Jaeil Lim, Hyunyul Lim, Sungho Kang:
Lifetime Reliability Enhancement of Microprocessors: Mitigating the Impact of Negative Bias Temperature Instability. 9:1-9:25 - Erick Bauman, Gbadebo Ayoade, Zhiqiang Lin:
A Survey on Hypervisor-Based Monitoring: Approaches, Applications, and Evolutions. 10:1-10:33 - Zoltán Ádám Mann:
Allocation of Virtual Machines in Cloud Data Centers - A Survey of Problem Models and Optimization Algorithms. 11:1-11:34 - Aleksandar Milenkoski, Marco Vieira, Samuel Kounev, Alberto Avritzer, Bryan D. Payne:
Evaluating Computer Intrusion Detection Systems: A Survey of Common Practices. 12:1-12:41 - Bingdong Li, Jinlong Li, Ke Tang, Xin Yao:
Many-Objective Evolutionary Algorithms: A Survey. 13:1-13:35 - Klaus Schoeffmann, Marco A. Hudelist, Jochen Huber:
Video Interaction Tools: A Survey of Recent Work. 14:1-14:34 - Matthew Edwards, Awais Rashid, Paul Rayson:
A Systematic Survey of Online Data Mining Technology Intended for Law Enforcement. 15:1-15:54 - Benoit Baudry, Martin Monperrus:
The Multiple Facets of Software Diversity: Recent Developments in Year 2000 and Beyond. 16:1-16:26
Volume 48, Number 2, November 2015
- Yunji Chen, Shijin Zhang, Qi Guo, Ling Li, Ruiyang Wu, Tianshi Chen:
Deterministic Replay: A Survey. 17:1-17:47 - Claus Ballegaard Nielsen, Peter Gorm Larsen, John S. Fitzgerald, Jim Woodcock, Jan Peleska:
Systems of Systems Engineering: Basic Concepts, Model-Based Techniques, and Research Directions. 18:1-18:41 - Brijesh Dongol, John Derrick:
Verifying Linearisability: A Comparative Survey. 19:1-19:43 - Naveed Ul Hassan, Aqsa Naeem, Muhammad Adeel Pasha, Tariq Jadoon, Chau Yuen:
Indoor Positioning Using Visible LED Lights: A Survey. 20:1-20:32 - Eduardo Velloso, Dominik Schmidt, Jason Alexander, Hans Gellersen, Andreas Bulling:
The Feet in Human-Computer Interaction: A Survey of Foot-Based Interaction. 21:1-21:35 - Tarandeep Kaur, Inderveer Chana:
Energy Efficiency Techniques in Cloud Computing: A Survey and Taxonomy. 22:1-22:46 - Mingming Guo, Xinyu Jin, Niki Pissinou, Sebastián A. Zanlongo, Bogdan Carbunar, S. Sitharama Iyengar:
In-Network Trajectory Privacy Preservation. 23:1-23:29 - Vittorio P. Illiano, Emil C. Lupu:
Detecting Malicious Data Injections in Wireless Sensor Networks: A Survey. 24:1-24:33 - Robert Ryan McCune, Tim Weninger, Greg Madey:
Thinking Like a Vertex: A Survey of Vertex-Centric Frameworks for Large-Scale Distributed Graph Processing. 25:1-25:39 - Jeroen Delvaux, Roel Peeters, Dawu Gu, Ingrid Verbauwhede:
A Survey on Lightweight Entity Authentication with Strong PUFs. 26:1-26:42 - Jones Granatyr, Vanderson Botelho, Otto Robert Lessing, Edson Emílio Scalabrin, Jean-Paul A. Barthès, Fabrício Enembreck:
Trust and Reputation Models for Multiagent Systems. 27:1-27:42 - Jin-Hee Cho, Kevin S. Chan, Sibel Adali:
A Survey on Trust Modeling. 28:1-28:40 - Mukesh Kumar Saini, Abdulhameed Alelaiwi, Abdulmotaleb El-Saddik:
How Close are We to Realizing a Pragmatic VANET Solution? A Meta-Survey. 29:1-29:40 - Roy Shilkrot, Jochen Huber, Jürgen Steimle, Suranga Nanayakkara, Pattie Maes:
Digital Digits: A Comprehensive Survey of Finger Augmentation Devices. 30:1-30:29 - Ramon Hugo de Souza, Mário Antônio Ribeiro Dantas:
Mapping QoE through QoS in an Approach to DDB Architectures: Research Analysis and Conceptualization. 31:1-31:41 - Giovani Gracioli, Ahmed Alhammad, Renato Mancuso, Antônio Augusto Fröhlich, Rodolfo Pellizzoni:
A Survey on Cache Management Mechanisms for Real-Time Embedded Systems. 32:1-32:36
Volume 48, Number 3, February 2016
- Angel Lagares Lemos, Florian Daniel, Boualem Benatallah:
Web Service Composition: A Survey of Techniques and Tools. 33:1-33:41 - Asma Benmansour, Abdelhamid Bouchachia, Mohammed Feham:
Multioccupant Activity Recognition in Pervasive Smart Home Environments. 34:1-34:36 - Eleni Koutrouli, Aphrodite Tsalgatidou:
Reputation Systems Evaluation Survey. 35:1-35:28 - Simone Brienza, Sena Efsun Cebeci, Seyed Saeid Masoumzadeh, Helmut Hlavacs, Öznur Özkasap, Giuseppe Anastasi:
A Survey on Energy Efficiency in P2P Systems: File Distribution, Content Streaming, and Epidemics. 36:1-36:37 - Ryan Heartfield, George Loukas:
A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks. 37:1-37:39 - Andrea Hess, Karin Anna Hummel, Wilfried N. Gansterer, Günter Haring:
Data-driven Human Mobility Modeling: A Survey and Engineering Guidance for Mobile Networking. 38:1-38:39 - Mohammad Ashraful Hoque, Matti Siekkinen, Kashif Nizam Khan, Yu Xiao, Sasu Tarkoma:
Modeling, Profiling, and Debugging the Energy Consumption of Mobile Devices. 39:1-39:40 - John Narayan, Sandeep K. Shukla, T. Charles Clancy:
A Survey of Automatic Protocol Reverse Engineering Tools. 40:1-40:26 - Elaheh Momeni, Claire Cardie, Nicholas Diakopoulos:
A Survey on Assessment and Ranking Methodologies for User-Generated Content on the Web. 41:1-41:49 - Sukhpal Singh, Inderveer Chana:
QoS-Aware Autonomic Resource Management in Cloud Computing: A Systematic Review. 42:1-42:46 - Funmilade Faniyi, Rami Bahsoon:
A Systematic Review of Service Level Management in the Cloud. 43:1-43:27 - Roberto Natella, Domenico Cotroneo, Henrique Madeira:
Assessing Dependability with Software Fault Injection: A Survey. 44:1-44:55 - Sparsh Mittal:
A Survey of Techniques for Architecting and Managing Asymmetric Multicore Processors. 45:1-45:38 - Daniele Sgandurra, Emil C. Lupu:
Evolution of Attacks, Threat Models, and Solutions for Virtualized Systems. 46:1-46:38 - Gildas Avoine, Antonin Beaujeant, Julio C. Hernandez-Castro, Louis Demay, Philippe Teuwen:
A Survey of Security and Privacy Issues in ePassport Protocols. 47:1-47:37 - Maria Carla Calzarossa, Luisa Massari, Daniele Tessera:
Workload Characterization: A Survey Revisited. 48:1-48:43
Volume 48, Number 4, May 2016
- Yi Ren, Ling Liu, Qi Zhang, Qingbo Wu, Jianbo Guan, Jinzhu Kong, Huadong Dai, Lisong Shao:
Shared-Memory Optimizations for Inter-Virtual-Machine Communication. 49:1-49:42 - Barsha Mitra, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
A Survey of Role Mining. 50:1-50:37 - Claudio M. de Farias, Wei Li, Flávia Coimbra Delicato, Luci Pirmez, Albert Y. Zomaya, Paulo F. Pires, José Neuman de Souza:
A Systematic Review of Shared Sensor Networks. 51:1-51:50 - Marco Crocco, Marco Cristani, Andrea Trucco, Vittorio Murino:
Audio Surveillance: A Systematic Review. 52:1-52:46 - Halgurd S. Maghdid, Ihsan Alshahib Lami, Kayhan Zrar Ghafoor, Jaime Lloret Mauri:
Seamless Outdoors-Indoors Localization Solutions on Smartphones: Implementation and Challenges. 53:1-53:34 - Sparsh Mittal:
A Survey of Architectural Techniques for Managing Process Variation. 54:1-54:29 - Bernd Carsten Stahl, Job Timmermans, Brent Daniel Mittelstadt:
The Ethics of Computing: A Survey of the Computing-Oriented Literature. 55:1-55:38 - Niall Murray, Brian Lee, Yuansong Qiao, Gabriel-Miro Muntean:
Olfaction-Enhanced Multimedia: A Survey of Application Domains, Displays, and Research Challenges. 56:1-56:34 - Niklas Palaghias, Seyed Amir Hoseinitabatabaei, Michele Nati, Alexander Gluhak, Klaus Moessner:
A Survey on Mobile Social Signal Processing. 57:1-57:52 - David C. Harrison, Winston K. G. Seah, Ramesh Kumar Rayudu:
Rare Event Detection and Propagation in Wireless Sensor Networks. 58:1-58:22 - Sebastian Werner, Javier Navaridas, Mikel Luján:
A Survey on Design Approaches to Circumvent Permanent Faults in Networks-on-Chip. 59:1-59:36 - Liang Hu, Xilong Che, Si-Qing Zheng:
A Closer Look at GPGPU. 60:1-60:20 - Marco Platania, Daniel Obenshain, Thomas Tantillo, Yair Amir, Neeraj Suri:
On Choosing Server- or Client-Side Solutions for BFT. 61:1-61:30 - Sparsh Mittal:
A Survey of Techniques for Approximate Computing. 62:1-62:33 - Edans Flavius de Oliveira Sandes, Azzedine Boukerche, Alba Cristina Magalhaes Alves de Melo:
Parallel Optimal Pairwise Biological Sequence Comparison: Algorithms, Platforms, and Classification. 63:1-63:36 - Desmond Allan Schmidt, Kenneth Radke, Seyit Ahmet Çamtepe, Ernest Foo, Michal Ren:
A Survey and Analysis of the GNSS Spoofing Threat and Countermeasures. 64:1-64:36 - Juan Caballero, Zhiqiang Lin:
Type Inference on Executables. 65:1-65:35
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.