


default search action
ACM Computing Surveys, Volume 48
Volume 48, Number 1, September 2015
- Guozhu Meng, Yang Liu

, Jie Zhang, Alexander Pokluda, Raouf Boutaba:
Collaborative Security: A Survey and Taxonomy. 1:1-1:42 - Claudio A. Ardagna

, Rasool Asal
, Ernesto Damiani
, Quang Hieu Vu:
From Security to Assurance in the Cloud: A Survey. 2:1-2:50 - Stefan Mitsch, André Platzer

, Werner Retschitzegger
, Wieland Schwinger:
Logic-Based Modeling Approaches for Qualitative and Hybrid Reasoning in Dynamic Spatial Systems. 3:1-3:40 - Olumuyiwa Ibidunmoye, Francisco Hernández-Rodriguez, Erik Elmroth:

Performance Anomaly Detection and Bottleneck Identification. 4:1-4:35 - Bisan Alsalibi

, Ibrahim Venkat, K. G. Subramanian, Syaheerah Lebai Lutfi, Philippe De Wilde
:
The Impact of Bio-Inspired Approaches Toward the Advancement of Face Recognition. 5:1-5:33 - Muhammad Naveed, Erman Ayday, Ellen Wright Clayton, Jacques Fellay

, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin
, XiaoFeng Wang:
Privacy in the Genomic Era. 6:1-6:44 - Bin Guo

, Zhu Wang
, Zhiwen Yu
, Yu Wang
, Neil Y. Yen, Runhe Huang, Xingshe Zhou:
Mobile Crowd Sensing and Computing: The Review of an Emerging Human-Powered Sensing Paradigm. 7:1-7:31 - Patricia Ruiz

, Pascal Bouvry
:
Survey on Broadcast Algorithms for Mobile Ad Hoc Networks. 8:1-8:35 - Hyejeong Hong, Jaeil Lim, Hyunyul Lim, Sungho Kang:

Lifetime Reliability Enhancement of Microprocessors: Mitigating the Impact of Negative Bias Temperature Instability. 9:1-9:25 - Erick Bauman, Gbadebo Ayoade, Zhiqiang Lin:

A Survey on Hypervisor-Based Monitoring: Approaches, Applications, and Evolutions. 10:1-10:33 - Zoltán Ádám Mann:

Allocation of Virtual Machines in Cloud Data Centers - A Survey of Problem Models and Optimization Algorithms. 11:1-11:34 - Aleksandar Milenkoski, Marco Vieira

, Samuel Kounev, Alberto Avritzer, Bryan D. Payne:
Evaluating Computer Intrusion Detection Systems: A Survey of Common Practices. 12:1-12:41 - Bingdong Li, Jinlong Li, Ke Tang, Xin Yao

:
Many-Objective Evolutionary Algorithms: A Survey. 13:1-13:35 - Klaus Schoeffmann, Marco A. Hudelist, Jochen Huber:

Video Interaction Tools: A Survey of Recent Work. 14:1-14:34 - Matthew Edwards

, Awais Rashid
, Paul Rayson
:
A Systematic Survey of Online Data Mining Technology Intended for Law Enforcement. 15:1-15:54 - Benoit Baudry, Martin Monperrus

:
The Multiple Facets of Software Diversity: Recent Developments in Year 2000 and Beyond. 16:1-16:26
Volume 48, Number 2, November 2015
- Yunji Chen

, Shijin Zhang, Qi Guo, Ling Li, Ruiyang Wu, Tianshi Chen:
Deterministic Replay: A Survey. 17:1-17:47 - Claus Ballegaard Nielsen, Peter Gorm Larsen

, John S. Fitzgerald
, Jim Woodcock
, Jan Peleska:
Systems of Systems Engineering: Basic Concepts, Model-Based Techniques, and Research Directions. 18:1-18:41 - Brijesh Dongol

, John Derrick
:
Verifying Linearisability: A Comparative Survey. 19:1-19:43 - Naveed Ul Hassan, Aqsa Naeem

, Muhammad Adeel Pasha, Tariq Jadoon
, Chau Yuen:
Indoor Positioning Using Visible LED Lights: A Survey. 20:1-20:32 - Eduardo Velloso

, Dominik Schmidt, Jason Alexander
, Hans Gellersen
, Andreas Bulling
:
The Feet in Human-Computer Interaction: A Survey of Foot-Based Interaction. 21:1-21:35 - Tarandeep Kaur, Inderveer Chana:

Energy Efficiency Techniques in Cloud Computing: A Survey and Taxonomy. 22:1-22:46 - Mingming Guo, Xinyu Jin, Niki Pissinou, Sebastián A. Zanlongo, Bogdan Carbunar, S. Sitharama Iyengar

:
In-Network Trajectory Privacy Preservation. 23:1-23:29 - Vittorio P. Illiano, Emil C. Lupu

:
Detecting Malicious Data Injections in Wireless Sensor Networks: A Survey. 24:1-24:33 - Robert Ryan McCune, Tim Weninger, Greg Madey:

Thinking Like a Vertex: A Survey of Vertex-Centric Frameworks for Large-Scale Distributed Graph Processing. 25:1-25:39 - Jeroen Delvaux

, Roel Peeters
, Dawu Gu, Ingrid Verbauwhede
:
A Survey on Lightweight Entity Authentication with Strong PUFs. 26:1-26:42 - Jones Granatyr, Vanderson Botelho, Otto Robert Lessing, Edson Emílio Scalabrin, Jean-Paul A. Barthès, Fabrício Enembreck

:
Trust and Reputation Models for Multiagent Systems. 27:1-27:42 - Jin-Hee Cho, Kevin S. Chan, Sibel Adali:

A Survey on Trust Modeling. 28:1-28:40 - Mukesh Kumar Saini, Abdulhameed Alelaiwi, Abdulmotaleb El-Saddik

:
How Close are We to Realizing a Pragmatic VANET Solution? A Meta-Survey. 29:1-29:40 - Roy Shilkrot, Jochen Huber, Jürgen Steimle

, Suranga Nanayakkara
, Pattie Maes:
Digital Digits: A Comprehensive Survey of Finger Augmentation Devices. 30:1-30:29 - Ramon Hugo de Souza

, Mário Antônio Ribeiro Dantas
:
Mapping QoE through QoS in an Approach to DDB Architectures: Research Analysis and Conceptualization. 31:1-31:41 - Giovani Gracioli, Ahmed Alhammad, Renato Mancuso

, Antônio Augusto Fröhlich
, Rodolfo Pellizzoni:
A Survey on Cache Management Mechanisms for Real-Time Embedded Systems. 32:1-32:36
Volume 48, Number 3, February 2016
- Angel Lagares Lemos

, Florian Daniel
, Boualem Benatallah
:
Web Service Composition: A Survey of Techniques and Tools. 33:1-33:41 - Asma Benmansour, Abdelhamid Bouchachia, Mohammed Feham:

Multioccupant Activity Recognition in Pervasive Smart Home Environments. 34:1-34:36 - Eleni Koutrouli, Aphrodite Tsalgatidou:

Reputation Systems Evaluation Survey. 35:1-35:28 - Simone Brienza, Sena Efsun Cebeci

, Seyed Saeid Masoumzadeh, Helmut Hlavacs, Öznur Özkasap
, Giuseppe Anastasi:
A Survey on Energy Efficiency in P2P Systems: File Distribution, Content Streaming, and Epidemics. 36:1-36:37 - Ryan Heartfield, George Loukas

:
A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks. 37:1-37:39 - Andrea Hess

, Karin Anna Hummel
, Wilfried N. Gansterer
, Günter Haring:
Data-driven Human Mobility Modeling: A Survey and Engineering Guidance for Mobile Networking. 38:1-38:39 - Mohammad Ashraful Hoque, Matti Siekkinen

, Kashif Nizam Khan, Yu Xiao
, Sasu Tarkoma
:
Modeling, Profiling, and Debugging the Energy Consumption of Mobile Devices. 39:1-39:40 - John Narayan, Sandeep K. Shukla, T. Charles Clancy:

A Survey of Automatic Protocol Reverse Engineering Tools. 40:1-40:26 - Elaheh Momeni

, Claire Cardie, Nicholas Diakopoulos:
A Survey on Assessment and Ranking Methodologies for User-Generated Content on the Web. 41:1-41:49 - Sukhpal Singh

, Inderveer Chana:
QoS-Aware Autonomic Resource Management in Cloud Computing: A Systematic Review. 42:1-42:46 - Funmilade Faniyi, Rami Bahsoon:

A Systematic Review of Service Level Management in the Cloud. 43:1-43:27 - Roberto Natella

, Domenico Cotroneo, Henrique Madeira
:
Assessing Dependability with Software Fault Injection: A Survey. 44:1-44:55 - Sparsh Mittal

:
A Survey of Techniques for Architecting and Managing Asymmetric Multicore Processors. 45:1-45:38 - Daniele Sgandurra, Emil C. Lupu

:
Evolution of Attacks, Threat Models, and Solutions for Virtualized Systems. 46:1-46:38 - Gildas Avoine, Antonin Beaujeant, Julio C. Hernandez-Castro

, Louis Demay, Philippe Teuwen:
A Survey of Security and Privacy Issues in ePassport Protocols. 47:1-47:37 - Maria Carla Calzarossa

, Luisa Massari
, Daniele Tessera
:
Workload Characterization: A Survey Revisited. 48:1-48:43
Volume 48, Number 4, May 2016
- Yi Ren, Ling Liu, Qi Zhang, Qingbo Wu, Jianbo Guan, Jinzhu Kong, Huadong Dai, Lisong Shao:

Shared-Memory Optimizations for Inter-Virtual-Machine Communication. 49:1-49:42 - Barsha Mitra, Shamik Sural

, Jaideep Vaidya, Vijayalakshmi Atluri
:
A Survey of Role Mining. 50:1-50:37 - Claudio M. de Farias, Wei Li, Flávia Coimbra Delicato, Luci Pirmez, Albert Y. Zomaya

, Paulo F. Pires, José Neuman de Souza
:
A Systematic Review of Shared Sensor Networks. 51:1-51:50 - Marco Crocco, Marco Cristani, Andrea Trucco, Vittorio Murino

:
Audio Surveillance: A Systematic Review. 52:1-52:46 - Halgurd Sarhang Maghdid

, Ihsan Alshahib Lami, Kayhan Zrar Ghafoor
, Jaime Lloret Mauri:
Seamless Outdoors-Indoors Localization Solutions on Smartphones: Implementation and Challenges. 53:1-53:34 - Sparsh Mittal

:
A Survey of Architectural Techniques for Managing Process Variation. 54:1-54:29 - Bernd Carsten Stahl

, Job Timmermans, Brent Daniel Mittelstadt:
The Ethics of Computing: A Survey of the Computing-Oriented Literature. 55:1-55:38 - Niall Murray, Brian Lee

, Yuansong Qiao
, Gabriel-Miro Muntean
:
Olfaction-Enhanced Multimedia: A Survey of Application Domains, Displays, and Research Challenges. 56:1-56:34 - Niklas Palaghias, Seyed Amir Hoseinitabatabaei, Michele Nati

, Alexander Gluhak, Klaus Moessner
:
A Survey on Mobile Social Signal Processing. 57:1-57:52 - David C. Harrison, Winston K. G. Seah

, Ramesh Kumar Rayudu
:
Rare Event Detection and Propagation in Wireless Sensor Networks. 58:1-58:22 - Sebastian Werner, Javier Navaridas

, Mikel Luján:
A Survey on Design Approaches to Circumvent Permanent Faults in Networks-on-Chip. 59:1-59:36 - Liang Hu, Xilong Che

, Si-Qing Zheng:
A Closer Look at GPGPU. 60:1-60:20 - Marco Platania, Daniel Obenshain, Thomas Tantillo, Yair Amir, Neeraj Suri

:
On Choosing Server- or Client-Side Solutions for BFT. 61:1-61:30 - Sparsh Mittal

:
A Survey of Techniques for Approximate Computing. 62:1-62:33 - Edans Flavius de Oliveira Sandes, Azzedine Boukerche, Alba Cristina Magalhaes Alves de Melo

:
Parallel Optimal Pairwise Biological Sequence Comparison: Algorithms, Platforms, and Classification. 63:1-63:36 - Desmond Allan Schmidt, Kenneth Radke, Seyit Ahmet Çamtepe

, Ernest Foo
, Michal Ren:
A Survey and Analysis of the GNSS Spoofing Threat and Countermeasures. 64:1-64:36 - Juan Caballero, Zhiqiang Lin:

Type Inference on Executables. 65:1-65:35

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














