


default search action
ACM Computing Surveys, Volume 50
Volume 50, Number 1, April 2017
- Tao Li

, Ning Xie
, Chunqiu Zeng, Wubai Zhou, Li Zheng, Yexi Jiang, Yimin Yang, Hsin-Yu Ha, Wei Xue, Yue Huang, Shu-Ching Chen
, Jainendra K. Navlakha, S. Sitharama Iyengar
:
Data-Driven Techniques in Disaster Information Management. 1:1-1:45 - Marcello La Rosa

, Wil M. P. van der Aalst
, Marlon Dumas
, Fredrik Milani
:
Business Process Variability Modeling: A Survey. 2:1-2:45 - Marwa Salayma, Ahmed Yassin Al-Dubai

, Imed Romdhani, Youssef Nasser
:
Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence. 3:1-3:38 - Sayantan Nath, Sonali Agarwal

, G. N. Pandey:
Evaluation of Knowledge Gaps in Mathematical Applications of Thermal Image Processing Techniques for Fire Prevention. 4:1-4:43 - Ting Su

, Ke Wu, Weikai Miao, Geguang Pu, Jifeng He, Yuting Chen, Zhendong Su
:
A Survey on Data-Flow Testing. 5:1-5:35 - Arnab Kumar Biswas

, Dipak Ghosal, Shishir Nagaraja:
A Survey of Timing Channels and Countermeasures. 6:1-6:39 - Frank Dylla, Jae Hee Lee

, Till Mossakowski
, Thomas Schneider
, André van Delden, Jasper van de Ven
, Diedrich Wolter:
A Survey of Qualitative Spatial and Temporal Calculi: Algebraic and Computational Properties. 7:1-7:39 - Ramachandra Raghavendra

, Christoph Busch
:
Presentation Attack Detection Methods for Face Recognition Systems: A Comprehensive Survey. 8:1-8:37 - Britta Meixner

:
Hypervideos and Interactive Multimedia Presentations. 9:1-9:34 - Admela Jukan

, Xavier Masip-Bruin
, Nina Amla:
Smart Computing and Sensing Technologies for Animal Welfare: A Systematic Review. 10:1-10:27 - Lianhua Chi, Xingquan Zhu

:
Hashing Techniques: A Survey and Taxonomy. 11:1-11:36 - Milena Tsvetkova

, Taha Yasseri
, Eric T. Meyer, John Brian Pickering
, Vegard Engen
, Paul Walland, Marika Lüders
, Asbjørn Følstad, George Bravos:
Understanding Human-Machine Networks: A Cross-Disciplinary Survey. 12:1-12:35 - Stefano Calzavara

, Riccardo Focardi
, Marco Squarcina, Mauro Tempesta:
Surviving the Web: A Journey into Web Session Security. 13:1-13:34 - Rabih Bashroush

, Muhammad Garba, Rick Rabiser
, Iris Groher
, Goetz Botterweck
:
CASE Tool Support for Variability Management in Software Product Lines. 14:1-14:45 - Amparo Soler-Domínguez

, Angel A. Juan
, Renatas Kizys
:
A Survey on Financial Applications of Metaheuristics. 15:1-15:23 - Nathan Burow

, Scott A. Carr, Joseph Nash, Per Larsen, Michael Franz, Stefan Brunthaler
, Mathias Payer
:
Control-Flow Integrity: Precision, Security, and Performance. 16:1-16:33
Volume 50, Number 2, June 2017
- Faiz Ul Muram

, Huy Tran, Uwe Zdun:
Systematic Review of Software Behavioral Model Consistency Checking. 17:1-17:39 - Quinten David Soetens

, Romain Robbes, Serge Demeyer
:
Changes as First-Class Citizens: A Research Perspective on Modern Software Tooling. 18:1-18:38 - Joan Boyar

, Lene M. Favrholdt
, Christian Kudahl, Kim S. Larsen
, Jesper W. Mikkelsen:
Online Algorithms with Advice: A Survey. 19:1-19:34 - Anastasia Ioannidou

, Elisavet Chatzilari
, Spiros Nikolopoulos
, Ioannis Kompatsiaris:
Deep Learning Advances in Computer Vision with 3D Data: A Survey. 20:1-20:38 - Ahmed Hussein

, Mohamed Medhat Gaber
, Eyad Elyan
, Chrisina Jayne
:
Imitation Learning: A Survey of Learning Methods. 21:1-21:35 - Joachim Gudmundsson

, Michael Horton
:
Spatio-Temporal Analysis of Team Sports. 22:1-22:34 - Heitor Murilo Gomes

, Jean Paul Barddal
, Fabrício Enembreck
, Albert Bifet
:
A Survey on Ensemble Learning for Data Stream Classification. 23:1-23:36 - Amit Kumar Singh

, Piotr Dziurzanski
, Hashan Roshantha Mendis, Leandro Soares Indrusiak
:
A Survey and Comparative Study of Hard and Soft Real-Time Dynamic Resource Allocation Strategies for Multi-/Many-Core Systems. 24:1-24:40 - Ali Yadollahi

, Ameneh Gholipour Shahraki, Osmar R. Zaïane:
Current State of Text Sentiment Analysis from Opinion to Emotion Mining. 25:1-25:33 - Denis Weerasiri, Moshe Chai Barukh

, Boualem Benatallah
, Quan Z. Sheng
, Rajiv Ranjan
:
A Taxonomy and Survey of Cloud Resource Orchestration Techniques. 26:1-26:41 - Sparsh Mittal

:
A Survey of Techniques for Cache Partitioning in Multicore Processors. 27:1-27:39 - Hanjiang Luo

, Kaishun Wu
, Rukhsana Ruby, Feng Hong
, Zhongwen Guo, Lionel M. Ni:
Simulation and Experimentation Platforms for Underwater Acoustic Sensor Networks: Advancements and Challenges. 28:1-28:44 - Rafaqut Kazmi

, Dayang N. A. Jawawi, Radziah Mohamad, Imran Ghani:
Effective Regression Test Case Selection: A Systematic Literature Review. 29:1-29:32 - Cuong T. Do, Nguyen Hoang Tran

, Choong Seon Hong
, Charles A. Kamhoua, Kevin A. Kwiat, Erik Blasch, Shaolei Ren
, Niki Pissinou, Sundaraja Sitharama Iyengar
:
Game Theory for Cyber Security and Privacy. 30:1-30:37 - Mohamed Amine Kafi, Jalel Ben-Othman

, Nadjib Badache:
A Survey on Reliability Protocols in Wireless Sensor Networks. 31:1-31:47
Volume 50, Number 3, October 2017
- Charith Perera

, Yongrui Qin, Júlio Cezar Estrella, Stephan Reiff-Marganiec
, Athanasios V. Vasilakos
:
Fog Computing for Sustainable Smart Cities: A Survey. 32:1-32:43 - Baligh M. Al-Helali, Sabri A. Mahmoud:

Arabic Online Handwriting Recognition (AOHR): A Survey. 33:1-33:35 - Kok-Lim Alvin Yau

, Junaid Qadir
, Hooi Ling Khoo, Mee Hong Ling, Peter Komisarczuk:
A Survey on Reinforcement Learning Models and Algorithms for Traffic Signal Control. 34:1-34:38 - Cheol-Ho Hong, Ivor T. A. Spence, Dimitrios S. Nikolopoulos

:
GPU Virtualization and Scheduling Methods: A Comprehensive Survey. 35:1-35:37 - Muhammad Murad Khan

, Roliana Ibrahim, Imran Ghani:
Cross Domain Recommender Systems: A Systematic Literature Review. 36:1-36:34 - Kenneth O'Brien, Ilia Pietri

, Ravi Reddy
, Alexey L. Lastovetsky
, Rizos Sakellariou
:
A Survey of Power and Energy Predictive Models in HPC Systems and Applications. 37:1-37:38 - Astrid Rheinländer

, Ulf Leser, Goetz Graefe:
Optimization of Complex Dataflows with User-Defined Functions. 38:1-38:39 - Ahmad Abdollahzadeh Barforoush, Hossein Shirazi

, Hojjat Emami
:
A New Classification Framework to Evaluate the Entity Profiling on the Web: Past, Present and Future. 39:1-39:39 - Geong Sen Poh, Ji-Jian Chin

, Wei-Chuen Yau, Kim-Kwang Raymond Choo
, Moesfa Soeheila Mohamad:
Searchable Symmetric Encryption: Designs and Challenges. 40:1-40:37 - Yanfang Ye, Tao Li

, Donald A. Adjeroh, S. Sitharama Iyengar
:
A Survey on Malware Detection Using Data Mining Techniques. 41:1-41:40 - Jeroen J. A. Keiren, Peter Fontana, Rance Cleaveland:

Corrections to "A Menagerie of Timed Automata". 42:1-42:8 - Longbing Cao

:
Data Science: A Comprehensive Overview. 43:1-43:42 - Alessandro Acquisti

, Idris Adjerid
, Rebecca Balebako, Laura Brandimarte, Lorrie Faith Cranor
, Saranga Komanduri, Pedro Giovanni Leon, Norman M. Sadeh, Florian Schaub, Manya Sleeper, Yang Wang, Shomir Wilson:
Nudges for Privacy and Security: Understanding and Assisting Users' Choices Online. 44:1-44:41 - Tao Li

, Chunqiu Zeng, Yexi Jiang, Wubai Zhou, Liang Tang, Zheng Liu, Yue Huang:
Data-Driven Techniques in Computing System Management. 45:1-45:43 - Pat Morin

, Wolfgang Mulzer, Tommy Reddad:
Encoding Arguments. 46:1-46:36
Volume 50, Number 4, November 2017
- Tim Storer

:
Bridging the Chasm: A Survey of Software Engineering Practice in Scientific Programming. 47:1-47:32 - Jones Granatyr

, Nardine Osman
, João Miguel Dias, Maria Augusta Silveira Netto Nunes
, Judith Masthoff, Fabrício Enembreck
, Otto Robert Lessing, Carles Sierra, Ana Paiva, Edson Emílio Scalabrin:
The Need for Affective Trust Applied to Trust and Reputation Models. 48:1-48:36 - Kiranbir Kaur

, Sandeep Sharma
, Karanjeet Singh Kahlon:
Interoperability and Portability Approaches in Inter-Connected Clouds: A Review. 49:1-49:40 - Georgia Psychou

, Dimitrios Rodopoulos, Mohamed M. Sabry, Tobias Gemmeke
, David Atienza, Tobias G. Noll, Francky Catthoor:
Classification of Resilience Techniques Against Functional Errors at Higher Abstraction Layers of Digital Systems. 50:1-50:38 - Laure Soulier

, Lynda Tamine:
On the Collaboration Support in Information Retrieval. 51:1-51:34 - Andreas Schoknecht

, Tom Thaler, Peter Fettke, Andreas Oberweis, Ralf Laue:
Similarity of Business Process Models - A State-of-the-Art Analysis. 52:1-52:33 - Michael Stein

, Mathias Fischer, Immanuel Schweizer, Max Mühlhäuser:
A Classification of Locality in Network Research. 53:1-53:37 - Tanmoy Chakraborty

, Ayushi Dalmia, Animesh Mukherjee, Niloy Ganguly
:
Metrics for Community Analysis: A Survey. 54:1-54:37 - Nguyen Khoi Tran

, Quan Z. Sheng
, Muhammad Ali Babar, Lina Yao:
Searching the Web of Things: State of the Art, Challenges, and Solutions. 55:1-55:34 - Seyed Mohammad Ghaffarian

, Hamid Reza Shahriari
:
Software Vulnerability Analysis and Discovery Using Machine-Learning and Data-Mining Techniques: A Survey. 56:1-56:36 - Zaid Bin Tariq

, Dost Muhammad Cheema, Muhammad Zahir Kamran, Ijaz Haider Naqvi:
Non-GPS Positioning Systems: A Survey. 57:1-57:34 - Yangdong Deng, Yufei Ni

, Zonghui Li, Shuai Mu, Wenjun Zhang:
Toward Real-Time Ray Tracing: A Survey on Hardware Acceleration and Microarchitecture Techniques. 58:1-58:41 - Kwangwon Sun, Sukyoung Ryu

:
Analysis of JavaScript Programs: Challenges and Research Trends. 59:1-59:34 - Rafael Caballero

, Adrián Riesco
, Josep Silva
:
A Survey of Algorithmic Debugging. 60:1-60:35 - Padma Jayaraman

, Ranjani Parthasarathi:
A Survey on Post-Silicon Functional Validation for Multicore Architectures. 61:1-61:30
Volume 50, Number 5, November 2017
- Azzedine Boukerche

, Abdul Jabbar Siddiqui
, Abdelhamid Mammeri:
Automated Vehicle Detection and Classification: Models, Methods, and Techniques. 62:1-62:39 - Changtao Zhong

, Nishanth Sastry
:
Systems Applications of Social Networks. 63:1-63:42 - Radim Baca

, Michal Krátký
, Irena Holubová
, Martin Necaský
, Tomás Skopal
, Martin Svoboda, Sherif Sakr
:
Structural XML Query Processing. 64:1-64:41 - Pallavi Bagga, Rahul Hans

:
Mobile Agents System Security: A Systematic Survey. 65:1-65:45 - Esben Andreasen, Liang Gong, Anders Møller

, Michael Pradel
, Marija Selakovic, Koushik Sen, Cristian-Alexandru Staicu:
A Survey of Dynamic Analysis and Test Generation for JavaScript. 66:1-66:36 - Niall Murray, Oluwakemi Adewunmi Ademoye, Gheorghita Ghinea

, Gabriel-Miro Muntean
:
A Tutorial for Olfaction-Based Multisensorial Media Application Design and Evaluation. 67:1-67:30 - Renzo Angles, Marcelo Arenas, Pablo Barceló

, Aidan Hogan, Juan L. Reutter
, Domagoj Vrgoc:
Foundations of Modern Query Languages for Graph Databases. 68:1-68:40 - Dorien Herremans

, Ching-Hua Chuan, Elaine Chew
:
A Functional Taxonomy of Music Generation Systems. 69:1-69:30 - Oscar Pulido-Prieto

, Ulises Juárez-Martínez
:
A Survey of Naturalistic Programming Technologies. 70:1-70:35 - Elias Alevizos

, Anastasios Skarlatidis, Alexander Artikis, Georgios Paliouras:
Probabilistic Complex Event Recognition: A Survey. 71:1-71:31 - Francisco Martinez-Gil

, Miguel Lozano
, Ignacio García-Fernández
, Fernando Fernández
:
Modeling, Evaluation, and Scale on Artificial Pedestrians: A Literature Review. 72:1-72:35 - Aditya Joshi

, Pushpak Bhattacharyya, Mark James Carman
:
Automatic Sarcasm Detection: A Survey. 73:1-73:22 - Pablo González

, Alberto Castaño
, Nitesh V. Chawla
, Juan José del Coz
:
A Review on Quantification Learning. 74:1-74:40 - Jordi Mongay Batalla

, Athanasios V. Vasilakos
, Mariusz Gajewski
:
Secure Smart Homes: Opportunities and Challenges. 75:1-75:32 - Frank S. de Boer, Vlad Serbanescu, Reiner Hähnle

, Ludovic Henrio
, Justine Rochas, Crystal Chang Din
, Einar Broch Johnsen
, Marjan Sirjani, Ehsan Khamespanah, Kiko Fernandez-Reyes
, Albert Mingkun Yang:
A Survey of Active Object Languages. 76:1-76:39 - Stefan Laube

, Rainer Böhme:
Strategic Aspects of Cyber Risk Information Sharing. 77:1-77:36
Volume 50, Number 6, January 2018
- Eduardo Felipe Zambom Santana

, Ana Paula Chaves
, Marco Aurélio Gerosa, Fabio Kon
, Dejan S. Milojicic
:
Software Platforms for Smart Cities: Concepts, Requirements, Challenges, and a Unified Reference Architecture. 78:1-78:37 - Onur Tunali

, Mustafa Altun
:
A Survey of Fault-Tolerance Algorithms for Reconfigurable Nano-Crossbar Arrays. 79:1-79:35 - Irina Tal

, Gabriel-Miro Muntean
:
Towards Reasoning Vehicles: A Survey of Fuzzy Logic-Based Solutions in Vehicular Networks. 80:1-80:37 - Xuanhua Shi

, Zhigao Zheng, Yongluan Zhou
, Hai Jin, Ligang He, Bo Liu, Qiang-Sheng Hua:
Graph Processing on GPUs: A Survey. 81:1-81:35 - Alan Burns

, Robert I. Davis:
A Survey of Research into Mixed Criticality Systems. 82:1-82:37 - Paulo Martins

, Leonel Sousa
, Artur Mariano:
A Survey on Fully Homomorphic Encryption: An Engineering Perspective. 83:1-83:33 - Alejandro Torreño

, Eva Onaindia, Antonín Komenda, Michal Stolba:
Cooperative Multi-Agent Planning: A Survey. 84:1-84:32 - Pranjul Yadav

, Michael S. Steinbach
, Vipin Kumar, György J. Simon:
Mining Electronic Health Records (EHRs): A Survey. 85:1-85:40 - Tempestt J. Neal

, Kalaivani Sundararajan
, Aneez Fatima, Yiming Yan, Yingfei Xiang
, Damon L. Woodard:
Surveying Stylometry Techniques and Applications. 86:1-86:36 - Artem Voronkov

, Leonardo H. Iwaya
, Leonardo A. Martucci, Stefan Lindskog:
Systematic Literature Review on Usability of Firewall Configuration. 87:1-87:35 - Elif Bilge Kavun

, Hristina Mihajloska, Tolga Yalçin
:
A Survey on Authenticated Encryption-ASIC Designer's Perspective. 88:1-88:21 - Sebastian Werner

, Javier Navaridas
, Mikel Luján:
A Survey on Optical Network-on-Chip Architectures. 89:1-89:37 - Danial Hooshyar

, Moslem Yousefi, Heuiseok Lim
:
Data-Driven Approaches to Game Player Modeling: A Systematic Literature Review. 90:1-90:19 - Yaser Mansouri

, Adel Nadjaran Toosi
, Rajkumar Buyya
:
Data Storage Management in Cloud Environments: Taxonomy, Survey, and Future Directions. 91:1-91:51 - Prakash Shrestha

, Nitesh Saxena:
An Offensive and Defensive Exposition of Wearable Computing. 92:1-92:39 - Niels van Berkel

, Denzil Ferreira, Vassilis Kostakos
:
The Experience Sampling Method on Mobile Devices. 93:1-93:40 - Jundong Li

, Kewei Cheng, Suhang Wang
, Fred Morstatter, Robert P. Trevino, Jiliang Tang, Huan Liu:
Feature Selection: A Data Perspective. 94:1-94:45 - Viivi Uurtio

, João M. Monteiro, Jaz S. Kandola, John Shawe-Taylor
, Delmiro Fernandez-Reyes, Juho Rousu
:
A Tutorial on Canonical Correlation Methods. 95:1-95:33 - Richard Skarbez

, Frederick P. Brooks Jr., Mary C. Whitton
:
A Survey of Presence and Related Concepts. 96:1-96:39 - Suining He

, Kang G. Shin:
Geomagnetism for Smartphone-Based Indoor Localization: Challenges, Advances, and Comparisons. 97:1-97:37 - Jhonny Mertz

, Ingrid Nunes
:
Understanding Application-Level Caching in Web Applications: A Comprehensive Introduction and Survey of State-of-the-Art Approaches. 98:1-98:34

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














