Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/csur/csur48.bht:"
@article{DBLP:journals/csur/AvoineBHDT16, author = {Gildas Avoine and Antonin Beaujeant and Julio C. Hernandez{-}Castro and Louis Demay and Philippe Teuwen}, title = {A Survey of Security and Privacy Issues in ePassport Protocols}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {3}, pages = {47:1--47:37}, year = {2016}, url = {https://doi.org/10.1145/2825026}, doi = {10.1145/2825026}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/AvoineBHDT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/BenmansourBF16, author = {Asma Benmansour and Abdelhamid Bouchachia and Mohammed Feham}, title = {Multioccupant Activity Recognition in Pervasive Smart Home Environments}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {3}, pages = {34:1--34:36}, year = {2016}, url = {https://doi.org/10.1145/2835372}, doi = {10.1145/2835372}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/BenmansourBF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/BrienzaCMHOA16, author = {Simone Brienza and Sena Efsun Cebeci and Seyed Saeid Masoumzadeh and Helmut Hlavacs and {\"{O}}znur {\"{O}}zkasap and Giuseppe Anastasi}, title = {A Survey on Energy Efficiency in {P2P} Systems: File Distribution, Content Streaming, and Epidemics}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {3}, pages = {36:1--36:37}, year = {2016}, url = {https://doi.org/10.1145/2835374}, doi = {10.1145/2835374}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/BrienzaCMHOA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/CaballeroL16, author = {Juan Caballero and Zhiqiang Lin}, title = {Type Inference on Executables}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {4}, pages = {65:1--65:35}, year = {2016}, url = {https://doi.org/10.1145/2896499}, doi = {10.1145/2896499}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/CaballeroL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/CalzarossaMT16, author = {Maria Carla Calzarossa and Luisa Massari and Daniele Tessera}, title = {Workload Characterization: {A} Survey Revisited}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {3}, pages = {48:1--48:43}, year = {2016}, url = {https://doi.org/10.1145/2856127}, doi = {10.1145/2856127}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/CalzarossaMT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/CroccoCTM16, author = {Marco Crocco and Marco Cristani and Andrea Trucco and Vittorio Murino}, title = {Audio Surveillance: {A} Systematic Review}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {4}, pages = {52:1--52:46}, year = {2016}, url = {https://doi.org/10.1145/2871183}, doi = {10.1145/2871183}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/CroccoCTM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/FaniyiB16, author = {Funmilade Faniyi and Rami Bahsoon}, title = {A Systematic Review of Service Level Management in the Cloud}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {3}, pages = {43:1--43:27}, year = {2016}, url = {https://doi.org/10.1145/2843890}, doi = {10.1145/2843890}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/FaniyiB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/Farias0DPZPS16, author = {Claudio M. de Farias and Wei Li and Fl{\'{a}}via Coimbra Delicato and Luci Pirmez and Albert Y. Zomaya and Paulo F. Pires and Jos{\'{e}} Neuman de Souza}, title = {A Systematic Review of Shared Sensor Networks}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {4}, pages = {51:1--51:50}, year = {2016}, url = {https://doi.org/10.1145/2851510}, doi = {10.1145/2851510}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/Farias0DPZPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/HarrisonSR16, author = {David C. Harrison and Winston K. G. Seah and Ramesh Kumar Rayudu}, title = {Rare Event Detection and Propagation in Wireless Sensor Networks}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {4}, pages = {58:1--58:22}, year = {2016}, url = {https://doi.org/10.1145/2885508}, doi = {10.1145/2885508}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/HarrisonSR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/HeartfieldL16, author = {Ryan Heartfield and George Loukas}, title = {A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {3}, pages = {37:1--37:39}, year = {2016}, url = {https://doi.org/10.1145/2835375}, doi = {10.1145/2835375}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/HeartfieldL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/HessHGH16, author = {Andrea Hess and Karin Anna Hummel and Wilfried N. Gansterer and G{\"{u}}nter Haring}, title = {Data-driven Human Mobility Modeling: {A} Survey and Engineering Guidance for Mobile Networking}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {3}, pages = {38:1--38:39}, year = {2016}, url = {https://doi.org/10.1145/2840722}, doi = {10.1145/2840722}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/HessHGH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/HoqueSKXT16, author = {Mohammad Ashraful Hoque and Matti Siekkinen and Kashif Nizam Khan and Yu Xiao and Sasu Tarkoma}, title = {Modeling, Profiling, and Debugging the Energy Consumption of Mobile Devices}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {3}, pages = {39:1--39:40}, year = {2016}, url = {https://doi.org/10.1145/2840723}, doi = {10.1145/2840723}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/HoqueSKXT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/HuCZ16, author = {Liang Hu and Xilong Che and Si{-}Qing Zheng}, title = {A Closer Look at {GPGPU}}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {4}, pages = {60:1--60:20}, year = {2016}, url = {https://doi.org/10.1145/2873053}, doi = {10.1145/2873053}, timestamp = {Thu, 17 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/HuCZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/KoutrouliT16, author = {Eleni Koutrouli and Aphrodite Tsalgatidou}, title = {Reputation Systems Evaluation Survey}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {3}, pages = {35:1--35:28}, year = {2016}, url = {https://doi.org/10.1145/2835373}, doi = {10.1145/2835373}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/KoutrouliT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/LemosDB16, author = {Angel Lagares Lemos and Florian Daniel and Boualem Benatallah}, title = {Web Service Composition: {A} Survey of Techniques and Tools}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {3}, pages = {33:1--33:41}, year = {2016}, url = {https://doi.org/10.1145/2831270}, doi = {10.1145/2831270}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/LemosDB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/MaghdidLGM16, author = {Halgurd S. Maghdid and Ihsan Alshahib Lami and Kayhan Zrar Ghafoor and Jaime Lloret Mauri}, title = {Seamless Outdoors-Indoors Localization Solutions on Smartphones: Implementation and Challenges}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {4}, pages = {53:1--53:34}, year = {2016}, url = {https://doi.org/10.1145/2871166}, doi = {10.1145/2871166}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/MaghdidLGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/MitraSVA16, author = {Barsha Mitra and Shamik Sural and Jaideep Vaidya and Vijayalakshmi Atluri}, title = {A Survey of Role Mining}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {4}, pages = {50:1--50:37}, year = {2016}, url = {https://doi.org/10.1145/2871148}, doi = {10.1145/2871148}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/MitraSVA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/Mittal16, author = {Sparsh Mittal}, title = {A Survey of Techniques for Architecting and Managing Asymmetric Multicore Processors}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {3}, pages = {45:1--45:38}, year = {2016}, url = {https://doi.org/10.1145/2856125}, doi = {10.1145/2856125}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/Mittal16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/Mittal16a, author = {Sparsh Mittal}, title = {A Survey of Architectural Techniques for Managing Process Variation}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {4}, pages = {54:1--54:29}, year = {2016}, url = {https://doi.org/10.1145/2871167}, doi = {10.1145/2871167}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/Mittal16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/Mittal16b, author = {Sparsh Mittal}, title = {A Survey of Techniques for Approximate Computing}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {4}, pages = {62:1--62:33}, year = {2016}, url = {https://doi.org/10.1145/2893356}, doi = {10.1145/2893356}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/Mittal16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/MomeniCD16, author = {Elaheh Momeni and Claire Cardie and Nicholas Diakopoulos}, title = {A Survey on Assessment and Ranking Methodologies for User-Generated Content on the Web}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {3}, pages = {41:1--41:49}, year = {2016}, url = {https://doi.org/10.1145/2811282}, doi = {10.1145/2811282}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/MomeniCD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/MurrayLQM16, author = {Niall Murray and Brian Lee and Yuansong Qiao and Gabriel{-}Miro Muntean}, title = {Olfaction-Enhanced Multimedia: {A} Survey of Application Domains, Displays, and Research Challenges}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {4}, pages = {56:1--56:34}, year = {2016}, url = {https://doi.org/10.1145/2816454}, doi = {10.1145/2816454}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/MurrayLQM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/NarayanSC16, author = {John Narayan and Sandeep K. Shukla and T. Charles Clancy}, title = {A Survey of Automatic Protocol Reverse Engineering Tools}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {3}, pages = {40:1--40:26}, year = {2016}, url = {https://doi.org/10.1145/2840724}, doi = {10.1145/2840724}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/NarayanSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/NatellaCM16, author = {Roberto Natella and Domenico Cotroneo and Henrique Madeira}, title = {Assessing Dependability with Software Fault Injection: {A} Survey}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {3}, pages = {44:1--44:55}, year = {2016}, url = {https://doi.org/10.1145/2841425}, doi = {10.1145/2841425}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/NatellaCM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/PalaghiasHNGM16, author = {Niklas Palaghias and Seyed Amir Hoseinitabatabaei and Michele Nati and Alexander Gluhak and Klaus Moessner}, title = {A Survey on Mobile Social Signal Processing}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {4}, pages = {57:1--57:52}, year = {2016}, url = {https://doi.org/10.1145/2893487}, doi = {10.1145/2893487}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/PalaghiasHNGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/PlataniaOTAS16, author = {Marco Platania and Daniel Obenshain and Thomas Tantillo and Yair Amir and Neeraj Suri}, title = {On Choosing Server- or Client-Side Solutions for {BFT}}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {4}, pages = {61:1--61:30}, year = {2016}, url = {https://doi.org/10.1145/2886780}, doi = {10.1145/2886780}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/PlataniaOTAS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/RenLZWGKDS16, author = {Yi Ren and Ling Liu and Qi Zhang and Qingbo Wu and Jianbo Guan and Jinzhu Kong and Huadong Dai and Lisong Shao}, title = {Shared-Memory Optimizations for Inter-Virtual-Machine Communication}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {4}, pages = {49:1--49:42}, year = {2016}, url = {https://doi.org/10.1145/2847562}, doi = {10.1145/2847562}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/RenLZWGKDS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/SandesBM16, author = {Edans Flavius de Oliveira Sandes and Azzedine Boukerche and Alba Cristina Magalhaes Alves de Melo}, title = {Parallel Optimal Pairwise Biological Sequence Comparison: Algorithms, Platforms, and Classification}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {4}, pages = {63:1--63:36}, year = {2016}, url = {https://doi.org/10.1145/2893488}, doi = {10.1145/2893488}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/SandesBM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/SchmidtRCFR16, author = {Desmond Allan Schmidt and Kenneth Radke and Seyit Ahmet {\c{C}}amtepe and Ernest Foo and Michal Ren}, title = {A Survey and Analysis of the {GNSS} Spoofing Threat and Countermeasures}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {4}, pages = {64:1--64:36}, year = {2016}, url = {https://doi.org/10.1145/2897166}, doi = {10.1145/2897166}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/SchmidtRCFR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/SgandurraL16, author = {Daniele Sgandurra and Emil C. Lupu}, title = {Evolution of Attacks, Threat Models, and Solutions for Virtualized Systems}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {3}, pages = {46:1--46:38}, year = {2016}, url = {https://doi.org/10.1145/2856126}, doi = {10.1145/2856126}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/SgandurraL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/SinghC16, author = {Sukhpal Singh and Inderveer Chana}, title = {QoS-Aware Autonomic Resource Management in Cloud Computing: {A} Systematic Review}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {3}, pages = {42:1--42:46}, year = {2016}, url = {https://doi.org/10.1145/2843889}, doi = {10.1145/2843889}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/SinghC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/StahlTM16, author = {Bernd Carsten Stahl and Job Timmermans and Brent Daniel Mittelstadt}, title = {The Ethics of Computing: {A} Survey of the Computing-Oriented Literature}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {4}, pages = {55:1--55:38}, year = {2016}, url = {https://doi.org/10.1145/2871196}, doi = {10.1145/2871196}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/StahlTM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/WernerNL16, author = {Sebastian Werner and Javier Navaridas and Mikel Luj{\'{a}}n}, title = {A Survey on Design Approaches to Circumvent Permanent Faults in Networks-on-Chip}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {4}, pages = {59:1--59:36}, year = {2016}, url = {https://doi.org/10.1145/2886781}, doi = {10.1145/2886781}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/WernerNL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/0001ACFGHMW15, author = {Muhammad Naveed and Erman Ayday and Ellen Wright Clayton and Jacques Fellay and Carl A. Gunter and Jean{-}Pierre Hubaux and Bradley A. Malin and XiaoFeng Wang}, title = {Privacy in the Genomic Era}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {1}, pages = {6:1--6:44}, year = {2015}, url = {https://doi.org/10.1145/2767007}, doi = {10.1145/2767007}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/0001ACFGHMW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/AlsalibiVSLW15, author = {Bisan Alsalibi and Ibrahim Venkat and K. G. Subramanian and Syaheerah Lebai Lutfi and Philippe De Wilde}, title = {The Impact of Bio-Inspired Approaches Toward the Advancement of Face Recognition}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {1}, pages = {5:1--5:33}, year = {2015}, url = {https://doi.org/10.1145/2791121}, doi = {10.1145/2791121}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/AlsalibiVSLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/ArdagnaADV15, author = {Claudio A. Ardagna and Rasool Asal and Ernesto Damiani and Quang Hieu Vu}, title = {From Security to Assurance in the Cloud: {A} Survey}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {1}, pages = {2:1--2:50}, year = {2015}, url = {https://doi.org/10.1145/2767005}, doi = {10.1145/2767005}, timestamp = {Mon, 21 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/ArdagnaADV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/BaudryM15, author = {Benoit Baudry and Martin Monperrus}, title = {The Multiple Facets of Software Diversity: Recent Developments in Year 2000 and Beyond}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {1}, pages = {16:1--16:26}, year = {2015}, url = {https://doi.org/10.1145/2807593}, doi = {10.1145/2807593}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/BaudryM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/BaumanAL15, author = {Erick Bauman and Gbadebo Ayoade and Zhiqiang Lin}, title = {A Survey on Hypervisor-Based Monitoring: Approaches, Applications, and Evolutions}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {1}, pages = {10:1--10:33}, year = {2015}, url = {https://doi.org/10.1145/2775111}, doi = {10.1145/2775111}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/BaumanAL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/ChenZGLWC15, author = {Yunji Chen and Shijin Zhang and Qi Guo and Ling Li and Ruiyang Wu and Tianshi Chen}, title = {Deterministic Replay: {A} Survey}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {2}, pages = {17:1--17:47}, year = {2015}, url = {https://doi.org/10.1145/2790077}, doi = {10.1145/2790077}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/ChenZGLWC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/ChoCA15, author = {Jin{-}Hee Cho and Kevin S. Chan and Sibel Adali}, title = {A Survey on Trust Modeling}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {2}, pages = {28:1--28:40}, year = {2015}, url = {https://doi.org/10.1145/2815595}, doi = {10.1145/2815595}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/ChoCA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/DelvauxPGV15, author = {Jeroen Delvaux and Roel Peeters and Dawu Gu and Ingrid Verbauwhede}, title = {A Survey on Lightweight Entity Authentication with Strong PUFs}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {2}, pages = {26:1--26:42}, year = {2015}, url = {https://doi.org/10.1145/2818186}, doi = {10.1145/2818186}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/DelvauxPGV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/DongolD15, author = {Brijesh Dongol and John Derrick}, title = {Verifying Linearisability: {A} Comparative Survey}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {2}, pages = {19:1--19:43}, year = {2015}, url = {https://doi.org/10.1145/2796550}, doi = {10.1145/2796550}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/DongolD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/EdwardsRR15, author = {Matthew Edwards and Awais Rashid and Paul Rayson}, title = {A Systematic Survey of Online Data Mining Technology Intended for Law Enforcement}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {1}, pages = {15:1--15:54}, year = {2015}, url = {https://doi.org/10.1145/2811403}, doi = {10.1145/2811403}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/EdwardsRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/GracioliAMFP15, author = {Giovani Gracioli and Ahmed Alhammad and Renato Mancuso and Ant{\^{o}}nio Augusto Fr{\"{o}}hlich and Rodolfo Pellizzoni}, title = {A Survey on Cache Management Mechanisms for Real-Time Embedded Systems}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {2}, pages = {32:1--32:36}, year = {2015}, url = {https://doi.org/10.1145/2830555}, doi = {10.1145/2830555}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/GracioliAMFP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/GranatyrBLSBE15, author = {Jones Granatyr and Vanderson Botelho and Otto Robert Lessing and Edson Em{\'{\i}}lio Scalabrin and Jean{-}Paul A. Barth{\`{e}}s and Fabr{\'{\i}}cio Enembreck}, title = {Trust and Reputation Models for Multiagent Systems}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {2}, pages = {27:1--27:42}, year = {2015}, url = {https://doi.org/10.1145/2816826}, doi = {10.1145/2816826}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/GranatyrBLSBE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/GuoJPZCI15, author = {Mingming Guo and Xinyu Jin and Niki Pissinou and Sebasti{\'{a}}n A. Zanlongo and Bogdan Carbunar and S. Sitharama Iyengar}, title = {In-Network Trajectory Privacy Preservation}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {2}, pages = {23:1--23:29}, year = {2015}, url = {https://doi.org/10.1145/2818183}, doi = {10.1145/2818183}, timestamp = {Mon, 28 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/GuoJPZCI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/GuoWYWYHZ15, author = {Bin Guo and Zhu Wang and Zhiwen Yu and Yu Wang and Neil Y. Yen and Runhe Huang and Xingshe Zhou}, title = {Mobile Crowd Sensing and Computing: The Review of an Emerging Human-Powered Sensing Paradigm}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {1}, pages = {7:1--7:31}, year = {2015}, url = {https://doi.org/10.1145/2794400}, doi = {10.1145/2794400}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/GuoWYWYHZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/HassanNPJY15, author = {Naveed Ul Hassan and Aqsa Naeem and Muhammad Adeel Pasha and Tariq Jadoon and Chau Yuen}, title = {Indoor Positioning Using Visible {LED} Lights: {A} Survey}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {2}, pages = {20:1--20:32}, year = {2015}, url = {https://doi.org/10.1145/2835376}, doi = {10.1145/2835376}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/HassanNPJY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/HongLLK15, author = {Hyejeong Hong and Jaeil Lim and Hyunyul Lim and Sungho Kang}, title = {Lifetime Reliability Enhancement of Microprocessors: Mitigating the Impact of Negative Bias Temperature Instability}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {1}, pages = {9:1--9:25}, year = {2015}, url = {https://doi.org/10.1145/2785988}, doi = {10.1145/2785988}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/HongLLK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/IbidunmoyeHE15, author = {Olumuyiwa Ibidunmoye and Francisco Hern{\'{a}}ndez{-}Rodriguez and Erik Elmroth}, title = {Performance Anomaly Detection and Bottleneck Identification}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {1}, pages = {4:1--4:35}, year = {2015}, url = {https://doi.org/10.1145/2791120}, doi = {10.1145/2791120}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/IbidunmoyeHE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/IllianoL15, author = {Vittorio P. Illiano and Emil C. Lupu}, title = {Detecting Malicious Data Injections in Wireless Sensor Networks: {A} Survey}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {2}, pages = {24:1--24:33}, year = {2015}, url = {https://doi.org/10.1145/2818184}, doi = {10.1145/2818184}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/IllianoL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/KaurC15, author = {Tarandeep Kaur and Inderveer Chana}, title = {Energy Efficiency Techniques in Cloud Computing: {A} Survey and Taxonomy}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {2}, pages = {22:1--22:46}, year = {2015}, url = {https://doi.org/10.1145/2742488}, doi = {10.1145/2742488}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/KaurC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/LiLTY15, author = {Bingdong Li and Jinlong Li and Ke Tang and Xin Yao}, title = {Many-Objective Evolutionary Algorithms: {A} Survey}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {1}, pages = {13:1--13:35}, year = {2015}, url = {https://doi.org/10.1145/2792984}, doi = {10.1145/2792984}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/LiLTY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/Mann15, author = {Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann}, title = {Allocation of Virtual Machines in Cloud Data Centers - {A} Survey of Problem Models and Optimization Algorithms}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {1}, pages = {11:1--11:34}, year = {2015}, url = {https://doi.org/10.1145/2797211}, doi = {10.1145/2797211}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/Mann15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/McCuneWM15, author = {Robert Ryan McCune and Tim Weninger and Greg Madey}, title = {Thinking Like a Vertex: {A} Survey of Vertex-Centric Frameworks for Large-Scale Distributed Graph Processing}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {2}, pages = {25:1--25:39}, year = {2015}, url = {https://doi.org/10.1145/2818185}, doi = {10.1145/2818185}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/McCuneWM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/Meng0ZPB15, author = {Guozhu Meng and Yang Liu and Jie Zhang and Alexander Pokluda and Raouf Boutaba}, title = {Collaborative Security: {A} Survey and Taxonomy}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {1}, pages = {1:1--1:42}, year = {2015}, url = {https://doi.org/10.1145/2785733}, doi = {10.1145/2785733}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/Meng0ZPB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/MilenkoskiVKAP15, author = {Aleksandar Milenkoski and Marco Vieira and Samuel Kounev and Alberto Avritzer and Bryan D. Payne}, title = {Evaluating Computer Intrusion Detection Systems: {A} Survey of Common Practices}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {1}, pages = {12:1--12:41}, year = {2015}, url = {https://doi.org/10.1145/2808691}, doi = {10.1145/2808691}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/MilenkoskiVKAP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/MitschPRS15, author = {Stefan Mitsch and Andr{\'{e}} Platzer and Werner Retschitzegger and Wieland Schwinger}, title = {Logic-Based Modeling Approaches for Qualitative and Hybrid Reasoning in Dynamic Spatial Systems}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {1}, pages = {3:1--3:40}, year = {2015}, url = {https://doi.org/10.1145/2764901}, doi = {10.1145/2764901}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/MitschPRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/NielsenLFWP15, author = {Claus Ballegaard Nielsen and Peter Gorm Larsen and John S. Fitzgerald and Jim Woodcock and Jan Peleska}, title = {Systems of Systems Engineering: Basic Concepts, Model-Based Techniques, and Research Directions}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {2}, pages = {18:1--18:41}, year = {2015}, url = {https://doi.org/10.1145/2794381}, doi = {10.1145/2794381}, timestamp = {Fri, 17 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/NielsenLFWP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/RuizB15, author = {Patricia Ruiz and Pascal Bouvry}, title = {Survey on Broadcast Algorithms for Mobile Ad Hoc Networks}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {1}, pages = {8:1--8:35}, year = {2015}, url = {https://doi.org/10.1145/2786005}, doi = {10.1145/2786005}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/RuizB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/SainiAE15, author = {Mukesh Kumar Saini and Abdulhameed Alelaiwi and Abdulmotaleb El{-}Saddik}, title = {How Close are We to Realizing a Pragmatic {VANET} Solution? {A} Meta-Survey}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {2}, pages = {29:1--29:40}, year = {2015}, url = {https://doi.org/10.1145/2817552}, doi = {10.1145/2817552}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/SainiAE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/SchoeffmannHH15, author = {Klaus Schoeffmann and Marco A. Hudelist and Jochen Huber}, title = {Video Interaction Tools: {A} Survey of Recent Work}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {1}, pages = {14:1--14:34}, year = {2015}, url = {https://doi.org/10.1145/2808796}, doi = {10.1145/2808796}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/SchoeffmannHH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/ShilkrotHSNM15, author = {Roy Shilkrot and Jochen Huber and J{\"{u}}rgen Steimle and Suranga Nanayakkara and Pattie Maes}, title = {Digital Digits: {A} Comprehensive Survey of Finger Augmentation Devices}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {2}, pages = {30:1--30:29}, year = {2015}, url = {https://doi.org/10.1145/2828993}, doi = {10.1145/2828993}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/ShilkrotHSNM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/SouzaD15, author = {Ramon Hugo de Souza and M{\'{a}}rio Ant{\^{o}}nio Ribeiro Dantas}, title = {Mapping QoE through QoS in an Approach to {DDB} Architectures: Research Analysis and Conceptualization}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {2}, pages = {31:1--31:41}, year = {2015}, url = {https://doi.org/10.1145/2828994}, doi = {10.1145/2828994}, timestamp = {Wed, 11 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/SouzaD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/VellosoSAGB15, author = {Eduardo Velloso and Dominik Schmidt and Jason Alexander and Hans Gellersen and Andreas Bulling}, title = {The Feet in Human-Computer Interaction: {A} Survey of Foot-Based Interaction}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {2}, pages = {21:1--21:35}, year = {2015}, url = {https://doi.org/10.1145/2816455}, doi = {10.1145/2816455}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/VellosoSAGB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.