


default search action
ACM Computing Surveys, Volume 56
Volume 56, Number 1, January 2024
- Janice Klaiber
, Clemens van Dinther
:
Deep Learning for Variable Renewable Energy: A Systematic Review. 1:1-1:37 - Hélène Coullon
, Ludovic Henrio
, Frédéric Loulergue
, Simon Robillard
:
Component-based Distributed Software Reconfiguration:A Verification-oriented Survey. 2:1-2:37 - Mohamed Ahzam Amanullah
, Seng W. Loke
, Mohan Baruwal Chhetri
, Robin Doss
:
A Taxonomy and Analysis of Misbehaviour Detection in Cooperative Intelligent Transport Systems: A Systematic Review. 3:1-3:38 - Sabine Houy
, Philipp Schmid
, Alexandre Bartel
:
Security Aspects of Cryptocurrency Wallets - A Systematic Literature Review. 4:1-4:31 - Prasenjeet Roy
, Suman Kundu
:
Review on Query-focused Multi-document Summarization (QMDS) with Comparative Analysis. 5:1-5:38 - Jana Vatter
, Ruben Mayer
, Hans-Arno Jacobsen
:
The Evolution of Distributed Systems for Graph Neural Networks and Their Origin in Graph Processing and Deep Learning: A Survey. 6:1-6:37 - Shulei Ji
, Xinyu Yang
, Jing Luo
:
A Survey on Deep Learning for Symbolic Music Generation: Representations, Algorithms, Evaluations, and Challenges. 7:1-7:39 - Mario Brcic
, Roman V. Yampolskiy
:
Impossibility Results in AI: A Survey. 8:1-8:24 - Heng Xu
, Tianqing Zhu
, Lefeng Zhang
, Wanlei Zhou
, Philip S. Yu
:
Machine Unlearning: A Survey. 9:1-9:36 - Samaneh Zolfaghari
, Sumaiya Suravee
, Daniele Riboni
, Kristina Yordanova
:
Sensor-Based Locomotion Data Mining for Supporting the Diagnosis of Neurodegenerative Disorders: A Survey. 10:1-10:36 - Ce Zheng
, Wenhan Wu
, Chen Chen
, Taojiannan Yang
, Sijie Zhu
, Ju Shen
, Nasser Kehtarnavaz
, Mubarak Shah
:
Deep Learning-based Human Pose Estimation: A Survey. 11:1-11:37 - Bayzid Ashik Hossain
, Md. Saddam Hossain Mukta
, Md. Adnanul Islam
, Akib Zaman
, Rolf Schwitter
:
Natural Language-Based Conceptual Modelling Frameworks: State of the Art and Future Opportunities. 12:1-12:26 - Zhaolong Ning
, Hao Hu
, Xiaojie Wang
, Lei Guo
, Song Guo
, Guoyin Wang
, Xinbo Gao
:
Mobile Edge Computing and Machine Learning in the Internet of Unmanned Aerial Vehicles: A Survey. 13:1-13:31 - Chi-Wei Lien
, Sudip Vhaduri
:
Challenges and Opportunities of Biometric User Authentication in the Age of IoT: A Survey. 14:1-14:37 - Yaochen Liu
, Qiuchi Li
, Benyou Wang
, Yazhou Zhang
, Dawei Song
:
A Survey of Quantum-cognitively Inspired Sentiment Analysis Models. 15:1-15:37 - Alessandro Margara
, Gianpaolo Cugola
, Nicolò Felicioni
, Stefano Cilloni
:
A Model and Survey of Distributed Data-Intensive Systems. 16:1-16:69 - Zeinab Zabihi
, Amir-Masoud Eftekhari-Moghadam
, Mohammad Hossein Rezvani
:
Reinforcement Learning Methods for Computation Offloading: A Systematic Review. 17:1-17:41 - Ricardo Parizotto
, Bruno Loureiro Coelho
, Diego Cardoso Nunes
, Israat Haque
, Alberto Schaeffer-Filho
:
Offloading Machine Learning to Programmable Data Planes: A Systematic Survey. 18:1-18:34 - Zhe Fu
, Xi Niu
, Mary Lou Maher
:
Deep Learning Models for Serendipity Recommendations: A Survey and New Perspectives. 19:1-19:26 - Rui Xu
, Sheng Ma
, Yang Guo
, Dongsheng Li
:
A Survey of Design and Optimization for Systolic Array-based DNN Accelerators. 20:1-20:37 - Guoqing Xiao
, Chuanghui Yin
, Tao Zhou
, Xueqi Li
, Yuedan Chen
, Kenli Li
:
A Survey of Accelerating Parallel Sparse Linear Algebra. 21:1-21:38 - Diego Donoso
, Jose M. Saavedra
:
Survey on Sketch-to-photo Translation. 22:1-22:25 - Zhishu Shen
, Jiong Jin
, Cheng Tan
, Atsushi Tagami
, Shangguang Wang
, Qing Li
, Qiushi Zheng
, Jingling Yuan
:
A Survey of Next-generation Computing Technologies in Space-air-ground Integrated Networks. 23:1-23:40 - Alessia Antelmi
, Gennaro Cordasco
, Mirko Polato
, Vittorio Scarano
, Carmine Spagnuolo
, Dingqi Yang
:
A Survey on Hypergraph Representation Learning. 24:1-24:38 - Kisub Kim
, Sankalp Ghatpande
, Dongsun Kim
, Xin Zhou
, Kui Liu
, Tegawendé F. Bissyandé
, Jacques Klein
, Yves Le Traon
:
Big Code Search: A Bibliography. 25:1-25:49
Volume 56, Number 2, February 2024
- Afzal Badshah
, Anwar Ghani
, Ali Daud
, Ateeqa Jalal
, Muhammad Bilal
, Jon Crowcroft
:
Towards Smart Education through Internet of Things: A Survey. 26:1-26:33 - Maud Ehrmann
, Ahmed Hamdi
, Elvys Linhares Pontes
, Matteo Romanello
, Antoine Doucet
:
Named Entity Recognition and Classification in Historical Documents: A Survey. 27:1-27:47 - Marco Brohet
, Francesco Regazzoni
:
A Survey on Thwarting Memory Corruption in RISC-V. 28:1-28:29 - Alireza Alaei
, Vinh Bui
, David S. Doermann
, Umapada Pal
:
Document Image Quality Assessment: A Survey. 29:1-29:36 - Bonan Min
, Hayley Ross
, Elior Sulem
, Amir Pouran Ben Veyseh
, Thien Huu Nguyen
, Oscar Sainz
, Eneko Agirre
, Ilana Heintz
, Dan Roth
:
Recent Advances in Natural Language Processing via Large Pre-trained Language Models: A Survey. 30:1-30:40 - Maciej Besta
, Robert Gerstenberger
, Emanuel Peter
, Marc Fischer
, Michal Podstawski
, Claude Barthels
, Gustavo Alonso
, Torsten Hoefler
:
Demystifying Graph Databases: Analysis and Taxonomy of Data Organization, System Designs, and Graph Queries. 31:1-31:40 - Jan Pennekamp
, Roman Matzutt
, Christopher Klinkmüller
, Lennart Bader
, Martin Serror
, Eric Wagner
, Sidra Malik
, Maria Spiß
, Jessica Rahn
, Tan Gürpinar
, Eduard Vlad
, Sander J. J. Leemans
, Salil S. Kanhere
, Volker Stich
, Klaus Wehrle
:
An Interdisciplinary Survey on Information Flows in Supply Chains. 32:1-32:38 - Takuya Fujihashi
, Toshiaki Koike-Akino
, Takashi Watanabe
:
Soft Delivery: Survey on a New Paradigm for Wireless and Mobile Multimedia Streaming. 33:1-33:37 - Yaxiong Lei
, Shijing He
, Mohamed Khamis
, Juan Ye
:
An End-to-End Review of Gaze Estimation and its Interactive Applications on Handheld Mobile Devices. 34:1-34:38 - Oceane Destras
, Sébastien Le Beux
, Felipe Gohring de Magalhaes
, Gabriela Nicolescu
:
Survey on Activation Functions for Optical Neural Networks. 35:1-35:30 - Fatemeh Deldar
, Mahdi Abadi
:
Deep Learning for Zero-day Malware Detection and Classification: A Survey. 36:1-36:37 - Sahar Mehrpour
, Thomas D. LaToza
:
A Survey of Tool Support for Working with Design Decisions in Code. 37:1-37:37 - Satyaki Roy
, Nirnay Ghosh
, Nitish M. Uplavikar
, Preetam Ghosh
:
Towards a Unified Pandemic Management Architecture: Survey, Challenges, and Future Directions. 38:1-38:32 - Huiqiang Chen
, Tianqing Zhu
, Tao Zhang
, Wanlei Zhou
, Philip S. Yu
:
Privacy and Fairness in Federated Learning: On the Perspective of Tradeoff. 39:1-39:37 - Abdelouahab Amira
, Abdelouahid Derhab
, Elmouatez Billah Karbab
, Omar Nouali
:
A Survey of Malware Analysis Using Community Detection Algorithms. 40:1-40:29 - Nan Li
, Lianbo Ma
, Guo Yu
, Bing Xue
, Mengjie Zhang
, Yaochu Jin
:
Survey on Evolutionary Deep Learning: Principles, Algorithms, Applications, and Open Issues. 41:1-41:34 - Tara Ghasempouri
, Jaan Raik
, Cezar Reinbrecht
, Said Hamdioui
, Mottaqiallah Taouil
:
Survey on Architectural Attacks: A Unified Classification and Attack Model. 42:1-42:32 - Carlos Barrios
, Mohan Kumar
:
Service Caching and Computation Reuse Strategies at the Edge: A Survey. 43:1-43:38 - Rongxin Xu
, Qiujun Lan
, Shiva Raj Pokhrel
, Gang Li
:
A Knowledge Graph-Based Survey on Distributed Ledger Technology for IoT Verticals. 44:1-44:36 - Youssef Yamout
, Tashaffi Samin Yeasar
, Shahrear Iqbal
, Mohammad Zulkernine
:
Beyond Smart Homes: An In-Depth Analysis of Smart Aging Care System Security. 45:1-45:35 - Jean Luca Bez
, Suren Byna
, Shadi Ibrahim
:
I/O Access Patterns in HPC Applications: A 360-Degree Survey. 46:1-46:41 - Stefan Buchner
, Dirk Riehle
:
The Business Impact of Inner Source and How to Quantify It. 47:1-47:27 - Maryam Amini
, Razvan Stanica
, Catherine Rosenberg
:
Where Are the (Cellular) Data? 48:1-48:25 - Essam Soliman Debie, Kathryn Kasmarik
, Matt Garratt
:
Swarm Robotics: A Survey from a Multi-Tasking Perspective. 49:1-49:38 - Danfeng Sun
, Junjie Hu
, Huifeng Wu
, Jia Wu
, Jian Yang
, Quan Z. Sheng
, Schahram Dustdar
:
A Comprehensive Survey on Collaborative Data-access Enablers in the IIoT. 50:1-50:37 - Asma Ameur
, Sana Hamdi
, Sadok Ben Yahia
:
Sentiment Analysis for Hotel Reviews: A Systematic Literature Review. 51:1-51:38 - Benjamin Smith
, Anahita Khojandi
, Rama K. Vasudevan
:
Bias in Reinforcement Learning: A Review in Healthcare Applications. 52:1-52:17 - Ryan Schuerkamp
, Philippe J. Giabbanelli
:
Extensions of Fuzzy Cognitive Maps: A Systematic Review. 53:1-53:36
Volume 56, Number 3, March 2024
- Yulan Guo
, Hanyun Wang
, Longguang Wang
, Yinjie Lei
, Li Liu
, Mohammed Bennamoun
:
3D Face Recognition: Two Decades of Progress and Prospects. 54:1-54:39 - Benyou Wang
, Qianqian Xie
, Jiahuan Pei
, Zhihong Chen
, Prayag Tiwari
, Zhao Li
, Jie Fu
:
Pre-trained Language Models in Biomedical Domain: A Systematic Survey. 55:1-55:52 - Tianzhang He
, Rajkumar Buyya
:
A Taxonomy of Live Migration Management in Cloud Computing. 56:1-56:33 - Daniele Bringhenti, Guido Marchetto, Riccardo Sisto, Fulvio Valenza
:
Automation for Network Security Configuration: State of the Art and Research Trends. 57:1-57:37 - Domenico Amalfitano
, Stefano Faralli
, Jean Carlo Rossa Hauck
, Santiago Matalonga
, Damiano Distante
:
Artificial Intelligence Applied to Software Testing: A Tertiary Study. 58:1-58:38 - Rui Queiroz
, Tiago Cruz
, Jérôme Mendes
, Pedro Sousa
, Paulo Simões
:
Container-based Virtualization for Real-time Industrial Systems - A Systematic Review. 59:1-59:38 - Guoying Qiu
, Guoming Tang
, Chuandong Li
, Lailong Luo
, Deke Guo
, Yulong Shen
:
Differentiated Location Privacy Protection in Mobile Communication Services: A Survey from the Semantic Perception Perspective. 60:1-60:36 - Kheng Leong Tan
, Chi-Hung Chi
, Kwok-Yan Lam
:
Survey on Digital Sovereignty and Identity: From Digitization to Digitalization. 61:1-61:36 - Taraneh Ghandi
, Hamidreza Pourreza
, Hamidreza Mahyar
:
Deep Learning Approaches on Image Captioning: A Review. 62:1-62:39 - Haiqin Wu
, Boris Düdder
, Liangmin Wang
, Zhenfu Cao
, Jun Zhou
, Xia Feng
:
Survey on Secure Keyword Search over Outsourced Data: From Cloud to Blockchain-assisted Architecture. 63:1-63:40 - Hanqing Zhang
, Haolin Song
, Shaoyu Li
, Ming Zhou
, Dawei Song
:
A Survey of Controllable Text Generation Using Transformer-based Pre-trained Language Models. 64:1-64:37 - Oscar Castro
, Pierrick Bruneau
, Jean-Sébastien Sottet
, Dario Torregrossa
:
Landscape of High-Performance Python to Develop Data Science and Machine Learning Applications. 65:1-65:30 - Dulani Meedeniya
, Isuru Ariyarathne
, Meelan Bandara
, Roshinie Jayasundara
, Charith Perera
:
A Survey on Deep Learning Based Forest Environment Sound Classification at the Edge. 66:1-66:36 - Qi Jia
, Yizhu Liu
, Siyu Ren
, Kenny Q. Zhu
:
Taxonomy of Abstractive Dialogue Summarization: Scenarios, Approaches, and Future Directions. 67:1-67:38 - Asma Hamissi
, Amine Dhraief
:
A Survey on the Unmanned Aircraft System Traffic Management. 68:1-68:37 - Adán José García
, Julie Jacques
, Vincent Sobanski
, Clarisse Dhaenens
:
Metaheuristic Biclustering Algorithms: From State-of-the-art to Future Opportunities. 69:1-69:38 - Felix Gemeinhardt
, Antonio Garmendia
, Manuel Wimmer
, Benjamin Weder
, Frank Leymann
:
Quantum Combinatorial Optimization in the NISQ Era: A Systematic Mapping Study. 70:1-70:36 - Sanoop Mallissery
, Yu-Sung Wu
:
Demystify the Fuzzing Methods: A Comprehensive Survey. 71:1-71:38 - Arnav Arora
, Preslav Nakov
, Momchil Hardalov
, Sheikh Muhammad Sarwar
, Vibha Nayak
, Yoan Dinkov
, Dimitrina Zlatkova
, Kyle Dent
, Ameya Bhatawdekar
, Guillaume Bouchard
, Isabelle Augenstein
:
Detecting Harmful Content on Online Platforms: What Platforms Need vs. Where Research Efforts Go. 72:1-72:17 - Peter Christen
, David J. Hand
, Nishadi Kirielle
:
A Review of the F-Measure: Its History, Properties, Criticism, and Alternatives. 73:1-73:24 - Luís Fiolhais
, Leonel Sousa
:
Transient-Execution Attacks: A Computer Architect Perspective. 74:1-74:38 - Vincenzo Scotti
, Licia Sbattella
, Roberto Tedesco
:
A Primer on Seq2Seq Models for Generative Chatbots. 75:1-75:58 - Ayse Ünsal, Melek Önen
:
Information-Theoretic Approaches to Differential Privacy. 76:1-76:18 - Simone Maurizio La Cava
, Giulia Orrù
, Martin Drahanský
, Gian Luca Marcialis
, Fabio Roli
:
3D Face Reconstruction: The Road to Forensics. 77:1-77:38 - Xiaoyu Xia
, Sheik Mohammad Mostakim Fattah
, Muhammad Ali Babar
:
A Survey on UAV-Enabled Edge Computing: Resource Management Perspective. 78:1-78:36 - Mang Ye
, Xiuwen Fang
, Bo Du
, Pong C. Yuen
, Dacheng Tao
:
Heterogeneous Federated Learning: State-of-the-art and Research Challenges. 79:1-79:44 - Guoyang Xie, Yawen Huang, Jin-Bao Wang, Jiayi Lyu, Feng Zheng, Yefeng Zheng, Yaochu Jin:
Cross-modality Neuroimage Synthesis: A Survey. 80:1-80:28
Volume 56, Number 4, April 2024
- Ernest Davis
:
Benchmarks for Automated Commonsense Reasoning: A Survey. 81:1-81:41 - Marcel André Hoffmann
, Rainer Lasch
:
Tackling Industrial Downtimes with Artificial Intelligence in Data-Driven Maintenance. 82:1-82:33 - Jonas Auda
, Uwe Gruenefeld
, Sarah Faltaous
, Sven Mayer
, Stefan Schneegass
:
A Scoping Survey on Cross-reality Systems. 83:1-83:38 - Josu Díaz-de-Arcaya
, Ana I. Torre-Bastida
, Gorka Zárate
, Raúl Miñón
, Aitor Almeida
:
A Joint Study of the Challenges, Opportunities, and Roadmap of MLOps and AIOps: A Systematic Survey. 84:1-84:30 - Cristiano Patrício
, João C. Neves
, Luís F. Teixeira
:
Explainable Deep Learning Methods in Medical Image Classification: A Survey. 85:1-85:41 - Damien Wohwe Sambo
, Anna Förster
:
Wireless Underground Sensor Networks: A Comprehensive Survey and Tutorial. 86:1-86:44 - Yashar Deldjoo
, Fatemeh Nazary
, Arnau Ramisa
, Julian J. McAuley
, Giovanni Pellegrini
, Alejandro Bellogín
, Tommaso Di Noia
:
A Review of Modern Fashion Recommender Systems. 87:1-87:37 - Muhammad Okky Ibrohim
, Cristina Bosco
, Valerio Basile
:
Sentiment Analysis for the Natural Environment: A Systematic Review. 88:1-88:37 - Meng Qin
, Dit-Yan Yeung
:
Temporal Link Prediction: A Unified Framework, Taxonomy, and Review. 89:1-89:40 - Weihao Xia
, Jing-Hao Xue
:
A Survey on Deep Generative 3D-aware Image Synthesis. 90:1-90:34 - Chenhan Zhang
, Shui Yu
, Zhiyi Tian
, James J. Q. Yu
:
Generative Adversarial Networks: A Survey on Attack and Defense Perspective. 91:1-91:35 - Li Hu
, Anli Yan
, Hongyang Yan
, Jin Li
, Teng Huang
, Yingying Zhang
, Changyu Dong
, Chunsheng Yang
:
Defenses to Membership Inference Attacks: A Survey. 92:1-92:34 - Alexandra Kapp
, Julia Hansmeyer
, Helena Mihaljevic
:
Generative Models for Synthetic Urban Mobility Data: A Systematic Literature Review. 93:1-93:37 - Lingfeng Zhong
, Jia Wu
, Qian Li
, Hao Peng
, Xindong Wu
:
A Comprehensive Survey on Automatic Knowledge Graph Construction. 94:1-94:62 - Pedro Miguel Moás
, Carla Teixeira Lopes
:
Automatic Quality Assessment of Wikipedia Articles - A Systematic Literature Review. 95:1-95:37 - Edan Habler
, Ron Bitton
, Asaf Shabtai
:
Assessing Aircraft Security: A Comprehensive Survey and Methodology for Evaluation. 96:1-96:40 - Seyed Mojtaba Marvasti-Zadeh
, Devin Goodsman
, Nilanjan Ray
, Nadir Erbilgin
:
Early Detection of Bark Beetle Attack Using Remote Sensing and Machine Learning: A Review. 97:1-97:40 - Julio C. S. dos Anjos
, Kassiano J. Matteussi
, Fernanda C. Orlandi
, Jorge L. V. Barbosa
, Jorge Sá Silva
, Luiz F. Bittencourt
, Cláudio F. R. Geyer
:
A Survey on Collaborative Learning for Intelligent Autonomous Systems. 98:1-98:37 - Huawei Huang
, Qinnan Zhang
, Taotao Li
, Qinglin Yang
, Zhaokang Yin
, Junhao Wu
, Zehui Xiong
, Jianming Zhu
, Jiajing Wu
, Zibin Zheng
:
Economic Systems in the Metaverse: Basics, State of the Art, and Challenges. 99:1-99:33 - Ronnie Edson de Souza Santos
, Paul Ralph
, Arham Arshad
, Klaas-Jan Stol
:
Distributed Scrum: A Case Meta-analysis. 100:1-100:37 - Maria Rigaki
, Sebastián García
:
A Survey of Privacy Attacks in Machine Learning. 101:1-101:34 - Norman W. Paton
, Jiaoyan Chen
, Zhenyu Wu
:
Dataset Discovery and Exploration: A Survey. 102:1-102:37 - Zhipeng Su
, Yixiong Zhang
, Jianghong Shi
, Xiao-Ping Zhang
:
A Survey of Single Image Rain Removal Based on Deep Learning. 103:1-103:35 - Akond Rahman
, Dibyendu Brinto Bose
, Farhat Lamia Barsha
, Rahul Pandita
:
Defect Categorization in Compilers: A Multi-vocal Literature Review. 104:1-104:42 - Ling Yang
, Zhilong Zhang
, Yang Song
, Shenda Hong
, Runsheng Xu
, Yue Zhao
, Wentao Zhang
, Bin Cui
, Ming-Hsuan Yang
:
Diffusion Models: A Comprehensive Survey of Methods and Applications. 105:1-105:39 - Marvin Wyrich
, Justus Bogner
, Stefan Wagner
:
40 Years of Designing Code Comprehension Experiments: A Systematic Mapping Study. 106:1-106:42 - Thomas Heinis
, Roman Sokolovskii
, Jamie J. Alnasir
:
Survey of Information Encoding Techniques for DNA. 107:1-107:30
Volume 56, Number 5, May 2024
- Amin Hosseiny Marani
, Eric P. S. Baumer
:
A Review of Stability in Topic Modeling: Metrics for Assessing and Techniques for Improving Stability. 108:1-108:32 - Cigdem Beyan
, Alessandro Vinciarelli
, Alessio Del Bue
:
Co-Located Human-Human Interaction Analysis Using Nonverbal Cues: A Survey. 109:1-109:41 - Artur Becker
, Carla Maria Dal Sasso Freitas
:
Evaluation of XR Applications: A Tertiary Review. 110:1-110:35 - Wen Fei
, Hiroyuki Ohno
, Srinivas Sampalli
:
A Systematic Review of IoT Security: Research Potential, Challenges, and Future Directions. 111:1-111:40