


default search action
ACM Computing Surveys, Volume 44
Volume 44, Number 1, January 2012
- Claudio Carpineto, Giovanni Romano

:
A Survey of Automatic Query Expansion in Information Retrieval. 1:1-1:50 - David Zhang

, Wangmeng Zuo, Feng Yue:
A Comparative Study of Palmprint Recognition Algorithms. 2:1-2:37 - Hanne Riis Nielson

, Flemming Nielson
, Henrik Pilegaard:
Flow Logic for Process Calculi. 3:1-3:39 - Songbo Song, Hassnaa Moustafa, Hossam Afifi:

A Survey on Personalized TV and NGN Services through Context-Awareness. 4:1-4:18 - Robert Wójcik

, Andrzej Jajszczyk
:
Flow Oriented Approaches to QoS Assurance. 5:1-5:37
Volume 44, Number 2, February 2012
- Manuel Egele, Theodoor Scholte, Engin Kirda, Christopher Kruegel:

A survey on automated dynamic malware-analysis techniques and tools. 6:1-6:42 - Kevin Crowston

, Kangning Wei, James Howison
, Andrea Wiggins
:
Free/Libre open-source software development: What we know and what we do not know. 7:1-7:35 - Pedro Antunes

, Valeria Herskovic, Sergio F. Ochoa, José A. Pino:
Structuring dimensions for collaborative systems evaluation. 8:1-8:28 - Godwin Caruana

, Maozhen Li:
A survey of emerging approaches to spam filtering. 9:1-9:27
Volume 44, Number 3, June 2012
- Jan Midtgaard

:
Control-flow analysis of functional programs. 10:1-10:33 - Hossain Shahriar

, Mohammad Zulkernine:
Mitigating program security vulnerabilities: Approaches and challenges. 11:1-11:46 - Josep Silva

:
A vocabulary of program slicing-based techniques. 12:1-12:41 - Joonho Kong, Sung Woo Chung, Kevin Skadron

:
Recent thermal management techniques for microprocessors. 13:1-13:42 - Syed M. S. Islam

, Mohammed Bennamoun
, Robyn A. Owens, Rowan Davies:
A review of recent advances in 3D ear- and expression-invariant face biometrics. 14:1-14:34 - Gianpaolo Cugola, Alessandro Margara:

Processing flows of information: From data stream to complex event processing. 15:1-15:62 - John Hatcliff, Gary T. Leavens, K. Rustan M. Leino, Peter Müller, Matthew J. Parkinson:

Behavioral interface specification languages. 16:1-16:58 - Yves Younan, Wouter Joosen, Frank Piessens:

Runtime countermeasures for code injection attacks against C and C++ programs. 17:1-17:28
Volume 44, Number 4, August 2012
- Lukasz Budzisz, Johan Garcia, Anna Brunström, Ramon Ferrús

:
A taxonomy and survey of SCTP research. 18:1-18:36 - Robert Biddle, Sonia Chiasson, Paul C. van Oorschot

:
Graphical passwords: Learning from the first twelve years. 19:1-19:41 - Wilson Wong, Wei Liu

, Mohammed Bennamoun
:
Ontology learning from text: A look back and into the future. 20:1-20:36 - Huaiyu Liu, Mic Bowman, Francis Chang:

Survey of state melding in virtual worlds. 21:1-21:25 - Pedro Gonnet

:
A review of error estimation in adaptive quadrature. 22:1-22:36 - Cigdem Sengul

, Aline Carneiro Viana
, Artur Ziviani
:
A survey of adaptive services to cope with dynamics in wireless self-organizing networks. 23:1-23:35 - Paolo Bellavista

, Antonio Corradi
, Mario Fanelli, Luca Foschini
:
A survey of context data distribution for mobile ubiquitous systems. 24:1-24:45 - Meng Wang, Bingbing Ni, Xian-Sheng Hua, Tat-Seng Chua:

Assistive tagging: A survey of multimedia tagging with human-computer joint exploration. 25:1-25:24 - Luca Cittadini, Giuseppe Di Battista

, Massimo Rimondini
:
On the stability of interdomain routing. 26:1-26:40

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














