default search action
ACM Computing Surveys, Volume 49
Volume 49, Number 1, July 2016
- Junaid Shuja, Abdullah Gani, Kashif Bilal, Atta ur Rehman Khan, Sajjad Ahmad Madani, Samee U. Khan, Albert Y. Zomaya:
A Survey of Mobile Device Virtualization: Taxonomy and State of the Art. 1:1-1:36 - Muhammad Raisul Alam, Marc St-Hilaire, Thomas Kunz:
Computational Methods for Residential Energy Cost Optimization in Smart Grids: A Survey. 2:1-2:34 - Hans Hüttel, Ivan Lanese, Vasco T. Vasconcelos, Luís Caires, Marco Carbone, Pierre-Malo Deniélou, Dimitris Mostrous, Luca Padovani, António Ravara, Emilio Tuosto, Hugo Torres Vieira, Gianluigi Zavattaro:
Foundations of Session Types and Behavioural Contracts. 3:1-3:36 - Sebastian Schrittwieser, Stefan Katzenbeisser, Johannes Kinder, Georg Merzdovnik, Edgar R. Weippl:
Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis? 4:1-4:37 - Buke Ao, Yongcai Wang, Lu Yu, Richard R. Brooks, S. S. Iyengar:
On Precision Bound of Distributed Fault-Tolerant Sensor Fusion Algorithms. 5:1-5:23 - Junbin Liu, Sridha Sridharan, Clinton Fookes:
Recent Advances in Camera Planning for Large Area Surveillance: A Comprehensive Review. 6:1-6:37 - Suleman Khan, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Mustapha Aminu Bagiwa, Muhammad Shiraz, Samee U. Khan, Rajkumar Buyya, Albert Y. Zomaya:
Cloud Log Forensics: Foundations, State of the Art, and Future Directions. 7:1-7:42 - Dada Emmanuel Gbenga, Effirul Ikhwan Ramlan:
Understanding the Limitations of Particle Swarm Algorithm for Dynamic Optimization Tasks: A Survey Towards the Singularity of PSO for Swarm Robotic Applications. 8:1-8:25 - Xiang Zuo, Adriana Iamnitchi:
A Survey of Socially Aware Peer-to-Peer Systems. 9:1-9:28 - Wenjun Jiang, Guojun Wang, Md. Zakirul Alam Bhuiyan, Jie Wu:
Understanding Graph-Based Trust Evaluation in Online Social Networks: Methodologies and Challenges. 10:1-10:35 - Fabrício A. Silva, Azzedine Boukerche, Thais R. M. Braga Silva, Linnyer Beatrys Ruiz, Eduardo Cerqueira, Antonio A. F. Loureiro:
Vehicular Networks: A New Challenge for Content-Delivery-Based Applications. 11:1-11:29 - Ruogu Fang, Samira Pouyanfar, Yimin Yang, Shu-Ching Chen, S. S. Iyengar:
Computational Health Informatics in the Big Data Age: A Survey. 12:1-12:36 - Jun Tang, Yong Cui, Qi Li, Kui Ren, Jiangchuan Liu, Rajkumar Buyya:
Ensuring Security and Privacy Preservation for Cloud Data Services. 13:1-13:39 - Xirong Li, Tiberio Uricchio, Lamberto Ballan, Marco Bertini, Cees G. M. Snoek, Alberto Del Bimbo:
Socializing the Semantic Gap: A Comparative Survey on Image Tag Assignment, Refinement, and Retrieval. 14:1-14:39 - Nádia Félix Felipe da Silva, Luiz F. S. Coletta, Eduardo R. Hruschka:
A Survey and Comparative Study of Tweet Sentiment Analysis via Semi-Supervised Learning. 15:1-15:26 - Durgesh Samant, Umesh Bellur:
Handling Boot Storms in Virtualized Data Centers - A Survey. 16:1-16:36 - Kaveh Hassani, Won-Sook Lee:
Visualizing Natural Language Descriptions: A Survey. 17:1-17:34 - Ovidiu Dan, Brian D. Davison:
Measuring and Predicting Search Engine Users' Satisfaction. 18:1-18:35 - Paolo Viotti, Marko Vukolic:
Consistency in Non-Transactional Distributed Storage Systems. 19:1-19:34 - Junbin Liang, Jiannong Cao, Rui Liu, Tao Li:
Distributed Intelligent MEMS: A Survey and a Real-Time Programming Framework. 20:1-20:29 - Salman Khwaja, Mohammad R. Alshayeb:
Survey On Software Design-Pattern Specification Languages. 21:1-21:35
Volume 49, Number 2, November 2016
- Alvaro Estebanez, Diego R. Llanos, Arturo González-Escribano:
A Survey on Thread-Level Speculation Techniques. 22:1-22:39 - Brent Carrara, Carlisle Adams:
Out-of-Band Covert Channels - A Survey. 23:1-23:36 - Ruggero Donida Labati, Angelo Genovese, Enrique Muñoz Ballester, Vincenzo Piuri, Fabio Scotti, Gianluca Sforza:
Biometric Recognition in Automated Border Control: A Survey. 24:1-24:39 - Jiang Xiao, Zimu Zhou, Youwen Yi, Lionel M. Ni:
A Survey on Wireless Indoor Localization from the Device Perspective. 25:1-25:31 - Panagiotis C. Kokkinos, Dimitrios Kalogeras, Anna Levin, Emmanouel A. Varvarigos:
Survey: Live Migration and Disaster Recovery over Long-Distance Networks. 26:1-26:36 - Emanuel Onica, Pascal Felber, Hugues Mercier, Etienne Rivière:
Confidentiality-Preserving Publish/Subscribe: A Survey. 27:1-27:43 - Anastasia Giachanou, Fabio Crestani:
Like It or Not: A Survey of Twitter Sentiment Analysis Methods. 28:1-28:41 - Vini Kanvar, Uday P. Khedker:
Heap Abstractions for Static Analysis. 29:1-29:47 - Éfren Lopes Souza, Eduardo Freire Nakamura, Richard W. Pazzi:
Target Tracking for Sensor Networks: A Survey. 30:1-30:31 - Paula Branco, Luís Torgo, Rita P. Ribeiro:
A Survey of Predictive Modeling on Imbalanced Domains. 31:1-31:50 - Mashael AlSabah, Ian Goldberg:
Performance and Security Improvements for Tor: A Survey. 32:1-32:36 - Shadi Khalifa, Yehia Elshater, Kiran Sundaravarathan, Aparna Balachandra Bhat, Patrick Martin, Fahim T. Imam, Dan Rope, Mike McRoberts, Craig Statchuk:
The Six Pillars for Building Big Data Analytics Ecosystems. 33:1-33:36 - Gaurav Jaswal, Amit Kaul, Ravinder Nath:
Knuckle Print Biometrics and Fusion Schemes - Overview, Challenges, and Solutions. 34:1-34:46 - Sparsh Mittal:
A Survey of Recent Prefetching Techniques for Processor Caches. 35:1-35:35 - Christoph Kofler, Martha A. Larson, Alan Hanjalic:
User Intent in Multimedia Search: A Survey of the State of the Art and Future Challenges. 36:1-36:37 - Efthalia Karydi, Konstantinos G. Margaritis:
Parallel and Distributed Collaborative Filtering: A Survey. 37:1-37:41 - Meng Xu, Chengyu Song, Yang Ji, Ming-Wei Shih, Kangjie Lu, Cong Zheng, Ruian Duan, Yeongjin Jang, Byoungyoung Lee, Chenxiong Qian, Sangho Lee, Taesoo Kim:
Toward Engineering a Secure Android Ecosystem: A Survey of Existing Techniques. 38:1-38:47 - Emerson M. A. Xavier, Francisco Javier Ariza-López, Manuel Antonio Ureña-Cámara:
A Survey of Measures and Methods for Matching Geospatial Vector Datasets. 39:1-39:34 - Tahir Maqsood, Osman Khalid, Rizwana Irfan, Sajjad Ahmad Madani, Samee U. Khan:
Scalability Issues in Online Social Networks. 40:1-40:42
Volume 49, Number 3, December 2016
- Robert A. Bridges, Neena Imam, Tiffany M. Mintz:
Understanding GPU Power: A Survey of Profiling, Modeling, and Simulation Methods. 41:1-41:27 - Jiliang Tang, Yi Chang, Charu C. Aggarwal, Huan Liu:
A Survey of Signed Network Mining in Social Media. 42:1-42:37 - Jorge Blasco, Thomas M. Chen, Juan E. Tapiador, Pedro Peris-Lopez:
A Survey of Wearable Biometric Recognition Systems. 43:1-43:35 - Roman Trobec, Radivoje Vasiljevic, Milo Tomasevic, Veljko Milutinovic, Ramón Beivide, Mateo Valero:
Interconnection Networks in Petascale Computer Systems: A Survey. 44:1-44:24 - Jasmeet Singh, Vishal Gupta:
Text Stemming: Approaches, Applications, and Challenges. 45:1-45:46 - Riccardo Coppola, Maurizio Morisio:
Connected Car: Technologies, Issues, Future Trends. 46:1-46:36 - Keewon Cho, Wooheon Kang, Hyungjun Cho, Changwook Lee, Sungho Kang:
A Survey of Repair Analysis Algorithms for Memories. 47:1-47:41 - Mateus L. Ribeiro, Henrique Manoel Lederman, Simone Elias, Fátima de Lourdes dos Santos Nunes:
Techniques and Devices Used in Palpation Simulation with Haptic Feedback. 48:1-48:28 - Ilia Pietri, Rizos Sakellariou:
Mapping Virtual Machines onto Physical Machines in Cloud Computing: A Survey. 49:1-49:30 - Rui Shu, Peipei Wang, Sigmund Albert Gorski III, Benjamin Andow, Adwait Nadkarni, Luke Deshotels, Jason Gionta, William Enck, Xiaohui Gu:
A Study of Security Isolation Techniques. 50:1-50:37 - Rodrigo Vieira Steiner, Emil Lupu:
Attestation in Wireless Sensor Networks: A Survey. 51:1-51:31 - Pedro Henriques Abreu, Miriam Seoane Santos, Miguel Henriques Abreu, Bruno Andrade, Daniel Castro Silva:
Predicting Breast Cancer Recurrence Using Machine Learning Techniques: A Systematic Review. 52:1-52:40 - Jamshaid Sarwar Malik, Ahmed Hemani:
Gaussian Random Number Generation: A Survey on Hardware Architectures. 53:1-53:37 - Johann Brault-Baron:
Hypergraph Acyclicity Revisited. 54:1-54:26 - Bradley Reaves, Jasmine D. Bowers, Sigmund Albert Gorski III, Olabode Anise, Rahul Bobhate, Raymond Cho, Hiranava Das, Sharique Hussain, Hamza Karachiwala, Nolen Scaife, Byron Wright, Kevin R. B. Butler, William Enck, Patrick Traynor:
*droid: Assessment and Evaluation of Android Application Analysis Tools. 55:1-55:30 - Aldeida Aleti, Irene Moser:
A Systematic Literature Review of Adaptive Parameter Control Methods for Evolutionary Algorithms. 56:1-56:35 - Tuo Li, Jude Angelo Ambrose, Roshan G. Ragel, Sri Parameswaran:
Processor Design for Soft Errors: Challenges and State of the Art. 57:1-57:44 - Gabriel Martins Dias, Boris Bellalta, Simon Oechsner:
A Survey About Prediction-Based Data Reduction in Wireless Sensor Networks. 58:1-58:35 - Joseph Gardiner, Shishir Nagaraja:
On the Security of Machine Learning in Malware C&C Detection: A Survey. 59:1-59:39
Volume 49, Number 4, January 2017
- Gilles Bailly, Eric Lecolinet, Laurence Nigay:
Visual Menu Techniques. 60:1-60:41 - Sven Kiljan, Koen Simoens, Danny De Cock, Marko C. J. D. van Eekelen, Harald P. E. Vranken:
A Survey of Authentication and Communications Security in Online Banking. 61:1-61:35 - Marcus Pendleton, Richard Garcia-Lebron, Jin-Hee Cho, Shouhuai Xu:
A Survey on Systems Security Metrics. 62:1-62:35 - Ilche Georgievski, Marco Aiello:
Automated Planning for Ubiquitous Computing. 63:1-63:46 - Matthias Diener, Eduardo H. M. Cruz, Marco A. Z. Alves, Philippe O. A. Navaux, Israel Koren:
Affinity-Based Thread and Data Mapping in Shared Memory Systems. 64:1-64:38 - Daniel Servos, Sylvia L. Osborn:
Current Research and Open Problems in Attribute-Based Access Control. 65:1-65:45 - Chee Sun Liew, Malcolm P. Atkinson, Michelle Galea, Tan Fong Ang, Paul Martin, Jano I. van Hemert:
Scientific Workflows: Moving Across Paradigms. 66:1-66:39 - Maximilian Capraro, Dirk Riehle:
Inner Source Definition, Benefits, and Challenges. 67:1-67:36 - Mohammad Hanif Jhaveri, Orçun Çetin, Carlos Gañán, Tyler Moore, Michel van Eeten:
Abuse Reporting and the Fight Against Cybercrime. 68:1-68:27 - Víctor Martínez, Fernando Berzal, Juan Carlos Cubero Talavera:
A Survey of Link Prediction in Complex Networks. 69:1-69:33 - Chii Chang, Satish Narayana Srirama, Rajkumar Buyya:
Mobile Cloud Business Process Management System for the Internet of Things: A Survey. 70:1-70:42 - Peratham Wiriyathammabhum, Douglas Summers-Stay, Cornelia Fermüller, Yiannis Aloimonos:
Computer Vision and Natural Language Processing: Recent Approaches in Multimedia and Robotics. 71:1-71:44 - G. Pavai, T. V. Geetha:
A Survey on Crossover Operators. 72:1-72:43 - Azzedine Boukerche, Alexander Magnano, Noura Aljeri:
Mobile IP Handover for Vehicular Networks: Methods, Models, and Classifications. 73:1-73:34 - Young-joo Shin, Dongyoung Koo, Junbeom Hur:
A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems. 74:1-74:38 - Nour Aburaed, Faisal Shah Khan, Harish Bhaskar:
Advances in the Quantum Theoretical Approach to Image Processing Applications. 75:1-75:49 - Kimberly Tam, Ali Feizollah, Nor Badrul Anuar, Rosli Salleh, Lorenzo Cavallaro:
The Evolution of Android Malware and Android Analysis Techniques. 76:1-76:41
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.