


default search action
ACM Computing Surveys, Volume 53
Volume 53, Number 1, Januar 2021
- Juhee Bae
, Tove Helldin, Maria Riveiro, Slawomir Nowaczyk
, Mohamed-Rafik Bouguelia
, Göran Falkman
:
Interactive Clustering: A Comprehensive Review. 1:1-1:39 - Xinxin Fan
, Ling Liu, Rui Zhang, Quanliang Jing, Jingping Bi:
Decentralized Trust Management: Risk Analysis and Trust Aggregation. 2:1-2:33 - Ruben Mayer
, Hans-Arno Jacobsen:
Scalable Deep Learning on Distributed Infrastructures: Challenges, Techniques, and Tools. 3:1-3:37 - Junjie Chen
, Jibesh Patra
, Michael Pradel
, Yingfei Xiong, Hongyu Zhang
, Dan Hao
, Lu Zhang:
A Survey of Compiler Testing. 4:1-4:36 - Allison Randal:
The Ideal Versus the Real: Revisiting the History of Virtual Machines and Containers. 5:1-5:31 - Nuno Paulino
, João Canas Ferreira
, João M. P. Cardoso
:
Improving Performance and Energy Consumption in Embedded Systems via Binary Acceleration: A Survey. 6:1-6:36 - Gerasimos Razis
, Ioannis Anagnostopoulos, Sherali Zeadally:
Modeling Influence with Semantics in Social Networks: A Survey. 7:1-7:38 - Mohammad Etemad, Alptekin Küpçü
:
Generic Dynamic Data Outsourcing Framework for Integrity Verification. 8:1-8:32 - John Kolb
, Moustafa AbdelBaky, Randy H. Katz, David E. Culler:
Core Concepts, Challenges, and Future Directions in Blockchain: A Centralized Tutorial. 9:1-9:39 - Muhammad Hafizhuddin Hilman
, Maria Alejandra Rodriguez
, Rajkumar Buyya
:
Multiple Workflows Scheduling in Multi-tenant Distributed Systems: A Taxonomy and Future Directions. 10:1-10:39 - Dong Liu
, Yue Li
, Jianping Lin, Houqiang Li, Feng Wu:
Deep Learning-Based Video Coding: A Review and a Case Study. 11:1-11:35 - Dilek Küçük
, Fazli Can
:
Stance Detection: A Survey. 12:1-12:37 - Yuri D. V. Yasuda
, Luiz Eduardo Galvão Martins, Fabio A. M. Cappabianco:
Autonomous Visual Navigation for Mobile Robots: A Systematic Literature Review. 13:1-13:34 - Shweta Suran
, Vishwajeet Pattanaik
, Dirk Draheim:
Frameworks for Collective Intelligence: A Systematic Literature Review. 14:1-14:36 - Vijini Mallawaarachchi
, Lakmal Meegahapola
, Roshan Madhushanka, Eranga Heshan, Dulani Meedeniya
, Sampath Jayarathna:
Change Detection and Notification of Web Pages: A Survey. 15:1-15:35 - Marcos Augusto M. Vieira
, Matheus S. Castanho, Racyus D. G. Pacífico, Elerson Rubens da Silva Santos, Eduardo P. M. Câmara Júnior, Luiz Filipe M. Vieira
:
Fast Packet Processing with eBPF and XDP: Concepts, Code, Challenges, and Applications. 16:1-16:36 - Ofir Landau, Rami Puzis, Nir Nissim
:
Mind Your Mind: EEG-Based Brain-Computer Interfaces and Their Security in Cyber Space. 17:1-17:38 - Laphou Lao
, Zecheng Li, Songlin Hou
, Bin Xiao
, Songtao Guo, Yuanyuan Yang:
A Survey of IoT Applications in Blockchain Systems: Architecture, Consensus, and Traffic Modeling. 18:1-18:32 - Hadi Brais
, Rajshekar Kalayappan, Preeti Ranjan Panda:
A Survey of Cache Simulators. 19:1-19:32 - Nektaria Kaloudi
, Jingyue Li:
The AI-Based Cyber Threat Landscape: A Survey. 20:1-20:34 - Chu Luo
, Jorge Gonçalves
, Eduardo Velloso, Vassilis Kostakos:
A Survey of Context Simulation for Testing Mobile Context-Aware Applications. 21:1-21:39 - Nevin Cini
, Gulay Yalcin:
A Methodology for Comparing the Reliability of GPU-Based and CPU-Based HPCs. 22:1-22:33
Volume 53, Number 2, March 2021
- Sartaj Sahni, Albert Y. Zomaya
:
In Memoriam Eliezer Dekel (1948-2020). 23:1-23:2 - Stijn Heldens
, Pieter Hijma, Ben van Werkhoven, Jason Maassen, Adam S. Z. Belloum, Rob van Nieuwpoort
:
The Landscape of Exascale Research: A Data-Driven Literature Analysis. 23:1-23:43 - Sunny Rai
, Shampa Chakraverty:
A Survey on Computational Metaphor Processing. 24:1-24:37 - João B. F. Sequeiros
, Francisco T. Chimuco
, Musa G. Samaila
, Mário M. Freire
, Pedro R. M. Inácio:
Attack and System Modeling Applied to IoT, Cloud, and Mobile Ecosystems: Embedding Security by Design. 25:1-25:32 - Peijin Cong, Guo Xu, Tongquan Wei
, Keqin Li:
A Survey of Profit Optimization Techniques for Cloud Providers. 26:1-26:35 - Erikson Júlio De Aguiar
, Bruno S. Faiçal
, Bhaskar Krishnamachari, Jó Ueyama
:
A Survey of Blockchain-Based Strategies for Healthcare. 27:1-27:27 - Jian Wu
, Victor S. Sheng, Jing Zhang, Hua Li, Tetiana Dadakova, Christine Leon Swisher, Zhiming Cui, Pengpeng Zhao:
Multi-Label Active Learning Algorithms for Image Classification: Overview and Future Promise. 28:1-28:35 - Jesús Guillermo Falcón-Cardona
, Carlos A. Coello Coello:
Indicator-based Multi-objective Evolutionary Algorithms: A Comprehensive Survey. 29:1-29:35 - Joost Verbraeken, Matthijs Wolting, Jonathan Katzy, Jeroen Kloppenburg, Tim Verbelen
, Jan S. Rellermeyer
:
A Survey on Distributed Machine Learning. 30:1-30:33 - George Papadakis
, Dimitrios Skoutas
, Emmanouil Thanos, Themis Palpanas:
Blocking and Filtering Techniques for Entity Resolution: A Survey. 31:1-31:42 - Erdem Sahin
, Elena Stoykova
, Jani Mäkinen
, Atanas P. Gotchev
:
Computer-Generated Holograms for 3D Imaging: A Survey. 32:1-32:35 - Stefano Cherubin
, Giovanni Agosta:
Tools for Reduced Precision Computation: A Survey. 33:1-33:35 - Behrouz Zolfaghari
, Gautam Srivastava
, Swapnoneel Roy, Hamid R. Nemati, Fatemeh Afghah, Takeshi Koshiba, Abolfazl Razi, Khodakhast Bibak
, Pinaki Mitra, Brijesh Kumar Rai:
Content Delivery Networks: State of the Art, Trends, and Future Roadmap. 34:1-34:34 - Iqbal Alam
, Kashif Sharif
, Fan Li, Zohaib Latif
, Md. Monjurul Karim
, Sujit Biswas
, Boubakr Nour
, Yu Wang
:
A Survey of Network Virtualization Techniques for Internet of Things Using SDN and NFV. 35:1-35:40 - Angela Bonifati
, Irena Holubová
, Arnau Prat-Pérez, Sherif Sakr:
Graph Generators: State of the Art and Open Challenges. 36:1-36:30 - Ying Lu
, Lingkun Luo, Di Huang, Yunhong Wang, Liming Chen:
Knowledge Transfer in Vision Recognition: A Survey. 37:1-37:35 - Peijin Cong, Junlong Zhou, Liying Li, Kun Cao, Tongquan Wei
, Keqin Li:
A Survey of Hierarchical Energy Optimization for Mobile Edge Computing: A Perspective from End Devices to the Cloud. 38:1-38:44 - Alan Valejo
, Vinícius Ferreira, Renato Fabbri, Maria Cristina Ferreira de Oliveira
, Alneu de Andrade Lopes:
A Critical Survey of the Multilevel Method in Complex Networks. 39:1-39:35 - Jakapan Suaboot
, Adil Fahad, Zahir Tari
, John C. Grundy
, Abdun Naser Mahmood, Abdulmohsen Almalawi, Albert Y. Zomaya
, Khalil Drira:
A Taxonomy of Supervised Learning for IDSs in SCADA Environments. 40:1-40:37 - Guangjie Li
, Hui Liu, Ally S. Nyamawe
:
A Survey on Renamings of Software Entities. 41:1-41:38 - Niclas Kannengießer
, Sebastian Lins, Tobias Dehling
, Ali Sunyaev
:
Trade-offs between Distributed Ledger Technology Characteristics. 42:1-42:37 - Herodotos Herodotou
, Yuxing Chen
, Jiaheng Lu
:
A Survey on Automatic Parameter Tuning for Big Data Processing Systems. 43:1-43:37 - Santiago Figueroa
, Javier Añorga, Saioa Arrizabalaga:
A Survey of IIoT Protocols: A Measure of Vulnerability Risk Analysis Based on CVSS. 44:1-44:53 - Federico Sierra-Arriaga, Rodrigo Branco
, Ben Lee:
Security Issues and Challenges for Virtualization Technologies. 45:1-45:37
Volume 53, Number 3, May 2021
- Xuezhi Zeng
, Saurabh Kumar Garg
, Mutaz Barika
, Albert Y. Zomaya
, Lizhe Wang, Massimo Villari, Dan Chen, Rajiv Ranjan:
SLA Management for Big Data Analytical Applications in Clouds: A Taxonomy Study. 46:1-46:40 - Charulata Patil
, Manasi Patwardhan:
Visual Question Generation: The State of the Art. 47:1-47:22 - Ricardo Macedo
, João Paulo
, José Pereira
, Alysson Bessani
:
A Survey and Classification of Software-Defined Storage Systems. 48:1-48:38 - A'aeshah Alhakamy
, Mihran Tuceryan:
Real-time Illumination and Visual Coherence for Photorealistic Augmented/Mixed Reality. 49:1-49:34 - Xunyun Liu
, Rajkumar Buyya
:
Resource Management and Scheduling in Distributed Stream Processing Systems: A Taxonomy, Review, and Future Directions. 50:1-50:41 - Phillip Stanley-Marbell
, Armin Alaghi, Michael Carbin, Eva Darulova
, Lara Dolecek, Andreas Gerstlauer, Ghayoor Gillani, Djordje Jevdjic, Thierry Moreau, Mattia Cacciotti, Alexandros Daglis, Natalie D. Enright Jerger
, Babak Falsafi, Sasa Misailovic, Adrian Sampson
, Damien Zufferey:
Exploiting Errors for Efficiency: A Survey from Circuits to Applications. 51:1-51:39 - M. Elgin Akpinar
, Yeliz Yesilada
, Selim Temizer:
The Effect of Context on Small Screen and Wearable Device Users' Performance - A Systematic Review. 52:1-52:44 - J. Stanley Warford
, David Vega, Scott M. Staley:
A Calculational Deductive System for Linear Temporal Logic. 53:1-53:38 - Rangan Das, Sagnik Sen
, Ujjwal Maulik:
A Survey on Fuzzy Deep Neural Networks. 54:1-54:25 - Azzedine Boukerche
, Lining Zheng, Omar Alfandi
:
Outlier Detection: Methods, Models, and Classification. 55:1-55:37 - Olivier Beaumont
, Louis-Claude Canon, Lionel Eyraud-Dubois, Giorgio Lucarelli
, Loris Marchal, Clément Mommessin, Bertrand Simon, Denis Trystram
:
Scheduling on Two Types of Resources: A Survey. 56:1-56:36 - Bardh Prenkaj
, Paola Velardi
, Giovanni Stilo, Damiano Distante
, Stefano Faralli:
A Survey of Machine Learning Approaches for Student Dropout Prediction in Online Courses. 57:1-57:34 - Leila Ismail
, Huned Materwala
:
Computing Server Power Modeling in a Data Center: Survey, Taxonomy, and Performance Evaluation. 58:1-58:34 - Thomas Welsh
, Elhadj Benkhelifa:
On Resilience in Cloud Computing: A Survey of Techniques across the Cloud Domain. 59:1-59:36 - Saeed Anwar
, Salman H. Khan, Nick Barnes
:
A Deep Journey into Super-resolution: A Survey. 60:1-60:34 - Bert-Jan Butijn
, Damian A. Tamburri
, Willem-Jan van den Heuvel:
Blockchains: A Systematic Multivocal Literature Review. 61:1-61:37 - Triet Huynh Minh Le
, Hao Chen, Muhammad Ali Babar:
Deep Learning for Source Code Modeling and Generation: Models, Applications, and Challenges. 62:1-62:38 - Yaqing Wang
, Quanming Yao
, James T. Kwok, Lionel M. Ni:
Generalizing from a Few Examples: A Survey on Few-shot Learning. 63:1-63:34 - Sebastian Zepf
, Javier Hernandez, Alexander Schmitt, Wolfgang Minker, Rosalind W. Picard:
Driver Emotion Recognition for Intelligent Vehicles: A Survey. 64:1-64:30 - Farah Aït-Salaht
, Frédéric Desprez, Adrien Lebre:
An Overview of Service Placement Problem in Fog and Edge Computing. 65:1-65:35 - Alexandru Constantin Serban, Erik Poll, Joost Visser
:
Adversarial Examples on Object Recognition: A Comprehensive Survey. 66:1-66:38 - Huashan Chen, Marcus Pendleton, Laurent Njilla, Shouhuai Xu
:
A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defenses. 67:1-67:43
Volume 53, Number 4, July 2021
- Bin Guo
, Yasan Ding, Lina Yao, Yunji Liang, Zhiwen Yu
:
The Future of False Information Detection on Social Media: New Perspectives and Trends. 68:1-68:36 - Patrick Emami
, Panos M. Pardalos, Lily Elefteriadou
, Sanjay Ranka
:
Machine Learning Methods for Data Association in Multi-Object Tracking. 69:1-69:34 - Alexander Wood
, Kayvan Najarian, Delaram Kahrobaei
:
Homomorphic Encryption for Machine Learning in Medicine and Bioinformatics. 70:1-70:35 - Kan Ngamakeur
, Sira Yongchareon
, Jian Yu
, Saeed Ur Rehman
:
A Survey on Device-free Indoor Localization and Tracking in the Multi-resident Environment. 71:1-71:29 - Isra Mohamed Ali
, Maurantonio Caprolu
, Roberto Di Pietro
:
Foundations, Properties, and Security Applications of Puzzles: A Survey. 72:1-72:38 - Xincai Fei, Fangming Liu
, Qixia Zhang
, Hai Jin, Hongxin Hu:
Paving the Way for NFV Acceleration: A Taxonomy, Survey and Future Directions. 73:1-73:42 - Michael Feldmann, Christian Scheideler, Stefan Schmid
:
Survey on Algorithms for Self-stabilizing Overlay Networks. 74:1-74:24 - Ruocheng Guo
, Lu Cheng, Jundong Li
, P. Richard Hahn, Huan Liu:
A Survey of Learning Causality with Data: Problems and Methods. 75:1-75:37 - Angeliki Kritikakou
, Rafail Psiakis, Francky Catthoor, Olivier Sentieys:
Binary Tree Classification of Rigid Error Detection and Correction Techniques. 76:1-76:38 - Jorge Calvo-Zaragoza
, Jan Hajic Jr.
, Alexander Pacha
:
Understanding Optical Music Recognition. 77:1-77:35 - Salvador Lucas
:
Context-sensitive Rewriting. 78:1-78:36 - Jon Pérez-Cerrolaza
, Roman Obermaisser, Jaume Abella
, Francisco J. Cazorla, Kim Grüttner, Irune Agirre, Hamidreza Ahmadian, Imanol Allende
:
Multi-core Devices for Safety-critical Systems: A Survey. 79:1-79:38 - Azzedine Boukerche
, Victor Soto:
Computation Offloading and Retrieval for Vehicular Edge Computing: Algorithms, Models, and Classification. 80:1-80:35 - Pascal Weisenburger
, Johannes Wirth
, Guido Salvaneschi
:
A Survey of Multitier Programming. 81:1-81:35 - Bin Qian, Jie Su
, Zhenyu Wen
, Devki Nandan Jha, Yinhao Li, Yu Guan
, Deepak Puthal, Philip James
, Renyu Yang, Albert Y. Zomaya
, Omer F. Rana
, Lizhe Wang, Maciej Koutny, Rajiv Ranjan:
Orchestrating the Development Lifecycle of Machine Learning-based IoT Applications: A Taxonomy and Survey. 82:1-82:47 - Yinghui Zhang
, Robert H. Deng
, Shengmin Xu, Jianfei Sun, Qi Li, Dong Zheng:
Attribute-based Encryption for Cloud Computing Access Control: A Survey. 83:1-83:41 - Yanjiao Chen
, Baolin Zheng, Zihan Zhang, Qian Wang
, Chao Shen
, Qian Zhang
:
Deep Learning on Mobile and Embedded Devices: State-of-the-art, Challenges, and Future Directions. 84:1-84:37 - Saad Khan
, Simon Parkinson
, Liam Grant, Na Liu
, Stephen McGuire
:
Biometric Systems Utilising Health Data from Wearable Devices: Applications and Future Challenges in Computer Security. 85:1-85:29 - Tomohiro Harada
, Enrique Alba:
Parallel Genetic Algorithms: A Useful Survey. 86:1-86:39 - Adrián Pekár
, Jozef Mocnej, Winston K. G. Seah
, Iveta Zolotová
:
Application Domain-Based Overview of IoT Network Traffic Characteristics. 87:1-87:33 - Md. Redowan Mahmud
, Kotagiri Ramamohanarao, Rajkumar Buyya
:
Application Management in Fog Computing Environments: A Taxonomy, Review and Future Directions. 88:1-88:43 - Pratima Sharma
, Rajni Jindal
, Dutta Borah Malaya:
Blockchain Technology for Cloud Storage: A Systematic Literature Review. 89:1-89:32 - Gexiang Zhang
, Zeyi Shang
, Sergey Verlan
, Miguel Ángel Martínez-del-Amor
, Chengxun Yuan, Luis Valencia-Cabrera
, Mario J. Pérez-Jiménez:
An Overview of Hardware Implementation of Membrane Computing Models. 90:1-90:38
Volume 53, Number 5, September 2021
- Juan Antonio Álvarez-García
, Bozidara Cvetkovic, Mitja Lustrek:
A Survey on Energy Expenditure Estimation Using Wearable Devices. 91:1-91:35 - Noura Aljeri
, Azzedine Boukerche:
Mobility Management in 5G-enabled Vehicular Networks: Models, Protocols, and Classification. 92:1-92:35 - Mariam Khader, Ghazi Al-Naymat
:
Density-based Algorithms for Big Data Clustering Using MapReduce Framework: A Comprehensive Study. 93:1-93:38 - Roniel S. de Sousa
, Azzedine Boukerche, Antonio A. F. Loureiro:
Vehicle Trajectory Similarity: Models, Methods, and Applications. 94:1-94:32 - Ramon Canal
, Carles Hernández, Rafael Tornero
, Alessandro Cilardo, Giuseppe Massari, Federico Reghenzani
, William Fornaciari
, Marina Zapater, David Atienza, Ariel Oleksiak
, Wojciech Piatek, Jaume Abella
:
Predictive Reliability and Fault Management in Exascale Systems: State of the Art and Perspectives. 95:1-95:32 - Miralem Mehic
, Marcin Niemiec
, Stefan Rass
, Jiajun Ma, Momtchil Peev
, Alejandro Aguado, Vicente Martín, Stefan Schauer, Andreas Poppe, Christoph Pacher
, Miroslav Voznák:
Quantum Key Distribution: A Networking Perspective. 96:1-96:41 - Zeyad A. Al-Odat
, Mazhar Ali, Assad Abbas
, Samee U. Khan
:
Secure Hash Algorithms and the Corresponding FPGA Optimization Techniques. 97:1-97:36 - Sagar Uprety
, Dimitris Gkoumas
, Dawei Song:
A Survey of Quantum Theory Inspired Approaches to Information Retrieval. 98:1-98:39 - Raj Dabre, Chenhui Chu, Anoop Kunchukuttan:
A Survey of Multilingual Neural Machine Translation. 99:1-99:38 - Weiwei Lin, Fang Shi, Wentai Wu
, Keqin Li, Guangxin Wu, Al-Alas Mohammed:
A Taxonomy and Survey of Power Models and Power Modeling for Cloud Servers. 100:1-100:41 - Deya Chatterjee, Shrisha Rao:
Computational Sustainability: A Socio-technical Perspective. 101:1-101:29 - Maram Bani Younes
, Azzedine Boukerche:
Traffic Efficiency Applications over Downtown Roads: A New Challenge for Intelligent Connected Vehicles. 102:1-102:30 - Maria Alejandra Cornejo-Lupa, Regina P. Ticona-Herrera
, Yudith Cardinale, Dennis Barrios-Aranibar:
A Survey of Ontologies for Simultaneous Localization and Mapping in Mobile Robots. 103:1-103:26 - Kai Bu
, Avery Laird, Yutian Yang, Linfeng Cheng, Jiaqing Luo, Yingjiu Li, Kui Ren:
Unveiling the Mystery of Internet Packet Forwarding: A Survey of Network Path Validation. 104:1-104:34 - Yashar Deldjoo
, Markus Schedl, Paolo Cremonesi, Gabriella Pasi:
Recommender Systems Leveraging Multimedia Content. 106:1-106:38 - Jingwen Wang, Xuyang Jing, Zheng Yan
, Yulong Fu, Witold Pedrycz, Laurence T. Yang:
A Survey on Trust Evaluation Based on Machine Learning. 107:1-107:36 - Hao Wang, Dit-Yan Yeung:
A Survey on Bayesian Deep Learning. 108:1-108:37 - Xinyi Zhou, Reza Zafarani:
A Survey of Fake News: Fundamental Theories, Detection Methods, and Opportunities. 109:1-109:40 - Ali Davoudian, Mengchi Liu
:
Big Data Systems: A Software Engineering Perspective. 110:1-110:39 - Kui Yu, Xianjie Guo
, Lin Liu
, Jiuyong Li
, Hao Wang, Zhaolong Ling, Xindong Wu:
Causality-based Feature Selection: Methods and Evaluations. 111:1-111:36 - Furkan Alaca, Paul C. van Oorschot:
Comparative Analysis and Framework Evaluating Web Single Sign-on Systems. 112:1-112:34
Volume 53, Number 6, November 2021
Invited Tutorial
- Peter J. Denning
:
Working Set Analytics. 113:1-113:36 - Albert Y. Zomaya
:
In Memoriam Sherif Sakr (1979-2020). 113e:1
- Aditya Singh Rathore
, Zhengxiong Li, Weijin Zhu, Zhanpeng Jin
, Wenyao Xu:
A Survey on Heart Biometrics. 114:1-114:38 - Sara Nieves Matheu
, José Luis Hernández-Ramos
, Antonio F. Skarmeta, Gianmarco Baldini:
A Survey of Cybersecurity Certification for the Internet of Things. 115:1-115:36 - Jide S. Edu
, Jose M. Such, Guillermo Suarez-Tangil:
Smart Home Personal Assistants: A Security and Privacy Review. 116:1-116:36 - C. Marimuthu
, K. Chandrasekaran, Sridhar Chimalakonda:
Energy Diagnosis of Android Applications: A Thematic Taxonomy and Survey. 117:1-117:36 - Pamela Zave
, Jennifer Rexford
:
Patterns and Interactions in Network Security. 118:1-118:37 - Santhosh Kelathodi Kumaran
, Debi Prosad Dogra, Partha Pratim Roy:
Anomaly Detection in Road Traffic Using Visual Surveillance: A Survey. 119:1-119:26 - Elakkiya Ellavarason
, Richard M. Guest, Farzin Deravi, Raul Sánchez-Reillo, Barbara Corsetti:
Touch-dynamics based Behavioural Biometrics on Mobile Devices - A Review from a Usability and Performance Perspective. 120:1-120:36 - Marco Zimmerling
, Luca Mottola, Silvia Santini:
Synchronous Transmissions in Low-Power Wireless: A Survey of Communication Protocols and Network Services. 121:1-121:39 - Nazar Waheed
, Xiangjian He, Muhammad Ikram
, Muhammad Usman, Saad Sajid Hashmi
, Muhammad Usman:
Security and Privacy in IoT Using Machine Learning and Blockchain: Threats and Countermeasures. 122:1-122:37 - Riemer van Rozen
:
Languages of Games and Play: A Systematic Mapping Study. 123:1-123:37 - Michele Coscia
, Andres Gomez-Lievano
, James McNerney, Frank Neffke:
The Node Vector Distance Problem in Complex Networks. 124:1-124:27 - Giulio Ermanno Pibiri
, Rossano Venturini:
Techniques for Inverted Index Compression. 125:1-125:36 - Junyang Qiu, Jun Zhang
, Wei Luo
, Lei Pan
, Surya Nepal
, Yang Xiang
:
A Survey of Android Malware Detection with Deep Neural Models. 126:1-126:36 - Vassilis Christophides, Vasilis Efthymiou
, Themis Palpanas, George Papadakis
, Kostas Stefanidis
:
An Overview of End-to-End Entity Resolution for Big Data. 127:1-127:42 - Furkan Turan
, Ingrid Verbauwhede
:
Trust in FPGA-accelerated Cloud Computing. 128:1-128:28 - Ruba Skaik
, Diana Inkpen:
Using Social Media for Mental Health Surveillance: A Review. 129:1-129:31 - Sarah Masud Preum
, Sirajum Munir, Meiyi Ma
, Mohammad Samin Yasar, David J. Stone, Ronald D. Williams, Homa Alemzadeh
, John A. Stankovic:
A Review of Cognitive Assistants for Healthcare: Trends, Prospects, and Future Directions. 130:1-130:37 - Maggi Bansal
, Inderveer Chana, Siobhán Clarke:
A Survey on IoT Big Data: Current Status, 13 V's Challenges, and Future Directions. 131:1-131:59 - Suzanne Tolmeijer
, Markus Kneer
, Cristina Sarasua, Markus Christen, Abraham Bernstein:
Implementations in Machine Ethics: A Survey. 132:1-132:38 - Liehuang Zhu, Md. Monjurul Karim
, Kashif Sharif
, Chang Xu
, Fan Li, Xiaojiang Du, Mohsen Guizani
:
SDN Controllers: A Comprehensive Analysis and Performance Evaluation Study. 133:1-133:40 - Azzedine Boukerche, Peng Sun
:
Design of Algorithms and Protocols for Underwater Acoustic Wireless Sensor Networks. 134:1-134:34

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.