


default search action
ACM Computing Surveys, Volume 47
Volume 47, Number 1, May 2014
- Yao-Yi Chiang, Stefan Leyk, Craig A. Knoblock:
A Survey of Digital Map Processing Techniques. 1:1-1:44 - Thomas Winkler, Bernhard Rinner:
Security and Privacy Protection in Visual Sensor Networks: A Survey. 2:1-2:42 - Yue Shi, Martha A. Larson, Alan Hanjalic
:
Collaborative Filtering beyond the User-Item Matrix: A Survey of the State of the Art and Future Challenges. 3:1-3:45 - Catherine Howard, Markus Stumptner
:
A Survey of Directed Entity-Relation-Based First-Order Probabilistic Languages. 4:1-4:40 - Concha Bielza
, Pedro Larrañaga
:
Discrete Bayesian Network Classifiers: A Survey. 5:1-5:43 - Thomas Thüm, Sven Apel
, Christian Kästner
, Ina Schaefer, Gunter Saake:
A Classification and Survey of Analysis Strategies for Software Product Lines. 6:1-6:45 - Adel Nadjaran Toosi
, Rodrigo N. Calheiros
, Rajkumar Buyya:
Interconnected Cloud Computing Environments: Challenges, Taxonomy, and Survey. 7:1-7:47 - Ming Ki Chong, Rene Mayrhofer
, Hans Gellersen
:
A Survey of User Interaction for Spontaneous Device Association. 8:1-8:40 - Pierre A. Akiki, Arosha K. Bandara
, Yijun Yu
:
Adaptive Model-Driven User Interface Development Systems. 9:1-9:33 - Charu C. Aggarwal, Karthik Subbian:
Evolutionary Network Analysis: A Survey. 10:1-10:36 - João Paulo
, José Pereira
:
A Survey and Classification of Storage Deduplication Systems. 11:1-11:30 - You-Chiun Wang:
Mobile Sensor Networks: System Hardware and Dispatch Software. 12:1-12:36 - Alessandra De Paola
, Marco Ortolani, Giuseppe Lo Re
, Giuseppe Anastasi, Sajal K. Das
:
Intelligent Management Systems for Energy Efficiency in Buildings: A Survey. 13:1-13:38 - Joanne Treurniet:
A Taxonomy and Survey of Microscopic Mobility Models from the Mobile Networking Domain. 14:1-14:32
Volume 47, Number 2, August 2014
- Ricardo Campos
, Gaël Dias, Alípio Mário Jorge
, Adam Jatowt
:
Survey of Temporal Information Retrieval and Related Applications. 15:1-15:41 - Roswitha Gostner, Bianca Baldacci, Melissa J. Morine, Corrado Priami:
Graphical Modeling Tools for Systems Biology. 16:1-16:21 - Alexander Thomasian:
Analysis of Fork/Join and Related Queueing Systems. 17:1-17:71 - Christoph Bösch
, Pieter H. Hartel
, Willem Jonker, Andreas Peter:
A Survey of Provably Secure Searchable Encryption. 18:1-18:51 - Sparsh Mittal
, Jeffrey S. Vetter:
A Survey of Methods for Analyzing and Improving GPU Energy Efficiency. 19:1-19:23 - Shahbaz Akhtar Abid, Mazliza Othman
, Nadir Shah:
A Survey on DHT-Based Routing for Large-Scale Mobile Ad Hoc Networks. 20:1-20:46 - Dong Qiu, Bixin Li, Shunhui Ji, Hareton K. N. Leung
:
Regression Testing of Web Service: A Systematic Mapping Study. 21:1-21:46 - Aron Laszka
, Márk Félegyházi, Levente Buttyán:
A Survey of Interdependent Information Security Games. 23:1-23:38 - Andrew Newell, Hongyi Yao, Alex Ryker, Tracey Ho, Cristina Nita-Rotaru:
Node-Capture Resilient Key Establishment in Sensor Networks: Design Space and New Protocols. 24:1-24:34 - Francesco Calabrese, Laura Ferrari, Vincent D. Blondel:
Urban Sensing Using Mobile Phone Network Data: A Survey of Research. 25:1-25:20 - Geoffray Bonnin, Dietmar Jannach:
Automated Generation of Music Playlists: Survey and Experiments. 26:1-26:35 - Nachikethas A. Jagadeesan, Bhaskar Krishnamachari:
Software-Defined Networking Paradigms in Wireless Networks: A Survey. 27:1-27:11 - Emanuela Marasco, Arun Ross:
A Survey on Antispoofing Schemes for Fingerprint Recognition Systems. 28:1-28:36 - Pujan Ziaie:
A Model for Context in the Design of Open Production Communities. 29:1-29:29 - Fanxin Kong, Xue Liu:
A Survey on Green-Energy-Aware Power Management for Datacenters. 30:1-30:38 - Andy Cockburn, Carl Gutwin, Joey Scarr, Sylvain Malacria:
Supporting Novice to Expert Transitions in User Interfaces. 31:1-31:36 - José Cáceres-Cruz, Pol Arias, Daniel Guimarans
, Daniel Riera
, Angel A. Juan
:
Rich Vehicle Routing Problem: Survey. 32:1-32:28 - Toni Mastelic
, Ariel Oleksiak
, Holger Claussen
, Ivona Brandic
, Jean-Marc Pierson
, Athanasios V. Vasilakos
:
Cloud Computing: Survey on Energy Efficiency. 33:1-33:36 - Xin Li
, S. S. Iyengar:
On Computing Mapping of 3D Objects: A Survey. 34:1-34:45 - Daniel Borrajo
, Anna Roubícková, Ivan Serina
:
Progress in Case-Based Planning. 35:1-35:39 - Xiaowei Zhou, Can Yang
, Hongyu Zhao
, Weichuan Yu
:
Low-Rank Modeling and Its Applications in Image Analysis. 36:1-36:33 - Felix Siegle, Tanya Vladimirova, Jørgen Ilstad, Omar Emam:
Mitigation of Radiation Effects in SRAM-Based FPGAs for Space Applications. 37:1-37:34
Volume 47, Number 3, February 2015
- Dimitrios Rodopoulos, Georgia Psychou, Mohamed M. Sabry, Francky Catthoor, Antonis Papanikolaou, Dimitrios Soudris, Tobias G. Noll, David Atienza:
Classification Framework for Analysis and Modeling of Physically Induced Reliability Violations. 38:1-38:33 - Muhammad Tayyab Chaudhry
, Teck Chaw Ling, Atif Manzoor, Syed Asad Hussain, JongWon Kim:
Thermal-Aware Scheduling in Green Data Centers. 39:1-39:48 - Johan Fabry
, Tom Dinkelaker, Jacques Noyé, Éric Tanter:
A Taxonomy of Domain-Specific Aspect Languages. 40:1-40:44 - Arpan Roy
, Santonu Sarkar
, Rajeshwari Ganesan, Geetika Goel:
Secure the Cloud: From the Perspective of a Service-Oriented Organization. 41:1-41:30 - Robbert van Renesse, Deniz Altinbuken:
Paxos Made Moderately Complex. 42:1-42:36 - Sidney K. D'Mello, Jacqueline M. Kory:
A Review and Meta-Analysis of Multimodal Affect Detection Systems. 43:1-43:36 - Adrien Maglo, Guillaume Lavoué, Florent Dupont
, Céline Hudelot:
3D Mesh Compression: Survey, Comparisons, and Emerging Trends. 44:1-44:41 - Yago Diez
, Ferran Roure
, Xavier Lladó
, Joaquim Salvi:
A Qualitative Review on 3D Coarse Registration Methods. 45:1-45:36 - Carmelo Ardito
, Paolo Buono
, Maria Francesca Costabile, Giuseppe Desolda
:
Interaction with Large Displays: A Survey. 46:1-46:38 - Veljko Pejovic, Mirco Musolesi
:
Anticipatory Mobile Computing: A Survey of the State of the Art and Research Challenges. 47:1-47:29 - Olga Zoidi, Eftychia Fotiadou, Nikos Nikolaidis
, Ioannis Pitas:
Graph-Based Label Propagation in Digital Media: A Review. 48:1-48:35 - Nidhi Tiwari, Santonu Sarkar
, Umesh Bellur
, Maria Indrawan
:
Classification Framework of MapReduce Scheduling Algorithms. 49:1-49:38 - Steffen Wendzel
, Sebastian Zander, Bernhard Fechner
, Christian Herdin:
Pattern-Based Survey and Categorization of Network Covert Channel Techniques. 50:1-50:26 - Ahmad Fadzil M. Hani, Irving Vitra Paputungan, Mohd Fadzil Hassan
:
Renegotiation in Service Level Agreement Management for a Cloud-Based System. 51:1-51:21 - Eva Gibaja
, Sebastián Ventura
:
A Tutorial on Multilabel Learning. 52:1-52:38 - Aggeliki Sgora, Dimitrios J. Vergados, Dimitrios D. Vergados:
A Survey of TDMA Scheduling Schemes in Wireless Multihop Networks. 53:1-53:39 - Zheng Yang, Chenshu Wu, Zimu Zhou, Xinglin Zhang, Xu Wang, Yunhao Liu:
Mobility Increases Localizability: A Survey on Wireless Indoor Localization using Inertial Sensors. 54:1-54:34
Volume 47, Number 4, July 2015
- Emmanouil Vasilomanolakis
, Shankar Karuppayah
, Max Mühlhäuser
, Mathias Fischer:
Taxonomy and Survey of Collaborative Intrusion Detection. 55:1-55:33 - Sarvnaz Karimi
, Chen Wang
, Alejandro Metke-Jimenez, Raj Gaire, Cécile Paris:
Text and Data Mining Techniques in Adverse Drug Reaction Detection. 56:1-56:39 - Shu Shi, Cheng-Hsin Hsu:
A Survey of Interactive Remote Rendering Systems. 57:1-57:29 - Sufatrio, Darell J. J. Tan, Tong-Wei Chua, Vrizlynn L. L. Thing:
Securing Android: A Survey, Taxonomy, and Challenges. 58:1-58:45 - Diarmuid Ó Coileáin, Donal O'Mahony
:
Accounting and Accountability in Content Distribution Architectures: A Survey. 59:1-59:35 - Bruno Rodrigues De Araújo, Daniel S. Lopes
, Pauline Jepp, Joaquim A. Jorge
, Brian Wyvill:
A Survey on Implicit Surface Polygonization. 60:1-60:39 - Anirban Mukhopadhyay
, Ujjwal Maulik
, Sanghamitra Bandyopadhyay:
A Survey of Multiobjective Evolutionary Clustering. 61:1-61:46 - Mattias De Wael, Stefan Marr
, Bruno De Fraine, Tom Van Cutsem, Wolfgang De Meuter
:
Partitioned Global Address Space Languages. 62:1-62:27 - Zhi-Hui Zhan
, Xiao Fang Liu
, Yue-Jiao Gong, Jun Zhang
, Henry Shu-Hung Chung, Yun Li
:
Cloud Computing Resource Scheduling and a Survey of Its Evolutionary Approaches. 63:1-63:33 - Fahimeh Alizadeh Moghaddam, Patricia Lago, Paola Grosso:
Energy-Efficient Networking Solutions in Cloud-Based Environments: A Systematic Literature Review. 64:1-64:32 - Mehdi Sookhak
, Abdullah Gani
, Hamid Talebian, Adnan Akhunzada
, Samee Ullah Khan
, Rajkumar Buyya, Albert Y. Zomaya
:
Remote Data Auditing in Cloud Computing Environments: A Survey, Taxonomy, and Open Issues. 65:1-65:34 - Andrzej Kamisinski, Piotr Cholda
, Andrzej Jajszczyk
:
Assessing the Structural Complexity of Computer and Communication Networks. 66:1-66:36 - Muhammad Imran
, Carlos Castillo
, Fernando Diaz
, Sarah Vieweg:
Processing Social Media Messages in Mass Emergency: A Survey. 67:1-67:38 - Wei Huang, Afshar Ganjali, Beom Heyn Kim
, Sukwon Oh, David Lie:
The State of Public Infrastructure-as-a-Service Cloud Security. 68:1-68:31 - Sparsh Mittal
, Jeffrey S. Vetter:
A Survey of CPU-GPU Heterogeneous Computing Techniques. 69:1-69:35 - Tianyin Xu, Yuanyuan Zhou:
Systems Approaches to Tackling Configuration Errors: A Survey. 70:1-70:41

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.