


Остановите войну!
for scientists:


default search action
ACM Computing Surveys, Volume 48
Volume 48, Number 1, September 2015
- Guozhu Meng, Yang Liu
, Jie Zhang, Alexander Pokluda, Raouf Boutaba:
Collaborative Security: A Survey and Taxonomy. 1:1-1:42 - Claudio A. Ardagna
, Rasool Asal, Ernesto Damiani
, Quang Hieu Vu:
From Security to Assurance in the Cloud: A Survey. 2:1-2:50 - Stefan Mitsch, André Platzer
, Werner Retschitzegger, Wieland Schwinger:
Logic-Based Modeling Approaches for Qualitative and Hybrid Reasoning in Dynamic Spatial Systems. 3:1-3:40 - Olumuyiwa Ibidunmoye, Francisco Hernández-Rodriguez, Erik Elmroth:
Performance Anomaly Detection and Bottleneck Identification. 4:1-4:35 - Bisan Alsalibi, Ibrahim Venkat, K. G. Subramanian, Syaheerah Lebai Lutfi, Philippe De Wilde
:
The Impact of Bio-Inspired Approaches Toward the Advancement of Face Recognition. 5:1-5:33 - Muhammad Naveed, Erman Ayday, Ellen Wright Clayton, Jacques Fellay
, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang:
Privacy in the Genomic Era. 6:1-6:44 - Bin Guo
, Zhu Wang, Zhiwen Yu
, Yu Wang
, Neil Y. Yen, Runhe Huang, Xingshe Zhou:
Mobile Crowd Sensing and Computing: The Review of an Emerging Human-Powered Sensing Paradigm. 7:1-7:31 - Patricia Ruiz
, Pascal Bouvry
:
Survey on Broadcast Algorithms for Mobile Ad Hoc Networks. 8:1-8:35 - Hyejeong Hong, Jaeil Lim, Hyunyul Lim, Sungho Kang:
Lifetime Reliability Enhancement of Microprocessors: Mitigating the Impact of Negative Bias Temperature Instability. 9:1-9:25 - Erick Bauman, Gbadebo Ayoade, Zhiqiang Lin:
A Survey on Hypervisor-Based Monitoring: Approaches, Applications, and Evolutions. 10:1-10:33 - Zoltán Ádám Mann:
Allocation of Virtual Machines in Cloud Data Centers - A Survey of Problem Models and Optimization Algorithms. 11:1-11:34 - Aleksandar Milenkoski, Marco Vieira
, Samuel Kounev, Alberto Avritzer, Bryan D. Payne:
Evaluating Computer Intrusion Detection Systems: A Survey of Common Practices. 12:1-12:41 - Bingdong Li, Jinlong Li, Ke Tang, Xin Yao
:
Many-Objective Evolutionary Algorithms: A Survey. 13:1-13:35 - Klaus Schoeffmann, Marco A. Hudelist, Jochen Huber:
Video Interaction Tools: A Survey of Recent Work. 14:1-14:34 - Matthew Edwards
, Awais Rashid
, Paul Rayson
:
A Systematic Survey of Online Data Mining Technology Intended for Law Enforcement. 15:1-15:54 - Benoit Baudry, Martin Monperrus
:
The Multiple Facets of Software Diversity: Recent Developments in Year 2000 and Beyond. 16:1-16:26
Volume 48, Number 2, November 2015
- Yunji Chen
, Shijin Zhang, Qi Guo, Ling Li, Ruiyang Wu, Tianshi Chen:
Deterministic Replay: A Survey. 17:1-17:47 - Claus Ballegaard Nielsen, Peter Gorm Larsen
, John S. Fitzgerald
, Jim Woodcock
, Jan Peleska:
Systems of Systems Engineering: Basic Concepts, Model-Based Techniques, and Research Directions. 18:1-18:41 - Brijesh Dongol
, John Derrick
:
Verifying Linearisability: A Comparative Survey. 19:1-19:43 - Naveed Ul Hassan, Aqsa Naeem, Muhammad Adeel Pasha, Tariq Jadoon
, Chau Yuen:
Indoor Positioning Using Visible LED Lights: A Survey. 20:1-20:32 - Eduardo Velloso
, Dominik Schmidt, Jason Alexander
, Hans Gellersen
, Andreas Bulling
:
The Feet in Human-Computer Interaction: A Survey of Foot-Based Interaction. 21:1-21:35 - Tarandeep Kaur, Inderveer Chana:
Energy Efficiency Techniques in Cloud Computing: A Survey and Taxonomy. 22:1-22:46 - Mingming Guo, Xinyu Jin, Niki Pissinou, Sebastián A. Zanlongo, Bogdan Carbunar, S. Sitharama Iyengar:
In-Network Trajectory Privacy Preservation. 23:1-23:29 - Vittorio P. Illiano, Emil C. Lupu
:
Detecting Malicious Data Injections in Wireless Sensor Networks: A Survey. 24:1-24:33 - Robert Ryan McCune, Tim Weninger, Greg Madey:
Thinking Like a Vertex: A Survey of Vertex-Centric Frameworks for Large-Scale Distributed Graph Processing. 25:1-25:39 - Jeroen Delvaux
, Roel Peeters
, Dawu Gu, Ingrid Verbauwhede
:
A Survey on Lightweight Entity Authentication with Strong PUFs. 26:1-26:42 - Jones Granatyr, Vanderson Botelho, Otto Robert Lessing, Edson Emílio Scalabrin, Jean-Paul A. Barthès, Fabrício Enembreck
:
Trust and Reputation Models for Multiagent Systems. 27:1-27:42 - Jin-Hee Cho, Kevin S. Chan, Sibel Adali:
A Survey on Trust Modeling. 28:1-28:40 - Mukesh Kumar Saini, Abdulhameed Alelaiwi, Abdulmotaleb El-Saddik:
How Close are We to Realizing a Pragmatic VANET Solution? A Meta-Survey. 29:1-29:40 - Roy Shilkrot, Jochen Huber, Jürgen Steimle, Suranga Nanayakkara
, Pattie Maes:
Digital Digits: A Comprehensive Survey of Finger Augmentation Devices. 30:1-30:29 - Ramon Hugo de Souza
, Mário Antônio Ribeiro Dantas
:
Mapping QoE through QoS in an Approach to DDB Architectures: Research Analysis and Conceptualization. 31:1-31:41 - Giovani Gracioli, Ahmed Alhammad, Renato Mancuso
, Antônio Augusto Fröhlich
, Rodolfo Pellizzoni:
A Survey on Cache Management Mechanisms for Real-Time Embedded Systems. 32:1-32:36
Volume 48, Number 3, February 2016
- Angel Lagares Lemos
, Florian Daniel
, Boualem Benatallah
:
Web Service Composition: A Survey of Techniques and Tools. 33:1-33:41 - Asma Benmansour, Abdelhamid Bouchachia, Mohammed Feham:
Multioccupant Activity Recognition in Pervasive Smart Home Environments. 34:1-34:36 - Eleni Koutrouli, Aphrodite Tsalgatidou:
Reputation Systems Evaluation Survey. 35:1-35:28 - Simone Brienza, Sena Efsun Cebeci
, Seyed Saeid Masoumzadeh, Helmut Hlavacs, Öznur Özkasap
, Giuseppe Anastasi:
A Survey on Energy Efficiency in P2P Systems: File Distribution, Content Streaming, and Epidemics. 36:1-36:37 - Ryan Heartfield, George Loukas
:
A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks. 37:1-37:39 - Andrea Hess
, Karin Anna Hummel
, Wilfried N. Gansterer, Günter Haring:
Data-driven Human Mobility Modeling: A Survey and Engineering Guidance for Mobile Networking. 38:1-38:39 - Mohammad Ashraful Hoque, Matti Siekkinen
, Kashif Nizam Khan, Yu Xiao
, Sasu Tarkoma
:
Modeling, Profiling, and Debugging the Energy Consumption of Mobile Devices. 39:1-39:40 - John Narayan, Sandeep K. Shukla, T. Charles Clancy:
A Survey of Automatic Protocol Reverse Engineering Tools. 40:1-40:26 - Elaheh Momeni, Claire Cardie, Nicholas Diakopoulos:
A Survey on Assessment and Ranking Methodologies for User-Generated Content on the Web. 41:1-41:49 - Sukhpal Singh
, Inderveer Chana:
QoS-Aware Autonomic Resource Management in Cloud Computing: A Systematic Review. 42:1-42:46 - Funmilade Faniyi, Rami Bahsoon:
A Systematic Review of Service Level Management in the Cloud. 43:1-43:27 - Roberto Natella
, Domenico Cotroneo, Henrique Madeira
:
Assessing Dependability with Software Fault Injection: A Survey. 44:1-44:55 - Sparsh Mittal
:
A Survey of Techniques for Architecting and Managing Asymmetric Multicore Processors. 45:1-45:38 - Daniele Sgandurra, Emil C. Lupu
:
Evolution of Attacks, Threat Models, and Solutions for Virtualized Systems. 46:1-46:38 - Gildas Avoine, Antonin Beaujeant, Julio C. Hernandez-Castro, Louis Demay, Philippe Teuwen:
A Survey of Security and Privacy Issues in ePassport Protocols. 47:1-47:37 - Maria Carla Calzarossa
, Luisa Massari
, Daniele Tessera:
Workload Characterization: A Survey Revisited. 48:1-48:43
Volume 48, Number 4, May 2016
- Yi Ren, Ling Liu, Qi Zhang, Qingbo Wu, Jianbo Guan, Jinzhu Kong, Huadong Dai, Lisong Shao:
Shared-Memory Optimizations for Inter-Virtual-Machine Communication. 49:1-49:42 - Barsha Mitra, Shamik Sural
, Jaideep Vaidya, Vijayalakshmi Atluri
:
A Survey of Role Mining. 50:1-50:37 - Claudio M. de Farias, Wei Li, Flávia Coimbra Delicato, Luci Pirmez, Albert Y. Zomaya
, Paulo F. Pires, José Neuman de Souza
:
A Systematic Review of Shared Sensor Networks. 51:1-51:50 - Marco Crocco, Marco Cristani, Andrea Trucco, Vittorio Murino
:
Audio Surveillance: A Systematic Review. 52:1-52:46 - Halgurd S. Maghdid
, Ihsan Alshahib Lami, Kayhan Zrar Ghafoor
, Jaime Lloret Mauri:
Seamless Outdoors-Indoors Localization Solutions on Smartphones: Implementation and Challenges. 53:1-53:34 - Sparsh Mittal
:
A Survey of Architectural Techniques for Managing Process Variation. 54:1-54:29 - Bernd Carsten Stahl
, Job Timmermans, Brent Daniel Mittelstadt:
The Ethics of Computing: A Survey of the Computing-Oriented Literature. 55:1-55:38 - Niall Murray, Brian Lee
, Yuansong Qiao
, Gabriel-Miro Muntean
:
Olfaction-Enhanced Multimedia: A Survey of Application Domains, Displays, and Research Challenges. 56:1-56:34 - Niklas Palaghias, Seyed Amir Hoseinitabatabaei, Michele Nati
, Alexander Gluhak, Klaus Moessner
:
A Survey on Mobile Social Signal Processing. 57:1-57:52 - David C. Harrison, Winston K. G. Seah
, Ramesh Kumar Rayudu
:
Rare Event Detection and Propagation in Wireless Sensor Networks. 58:1-58:22 - Sebastian Werner, Javier Navaridas
, Mikel Luján:
A Survey on Design Approaches to Circumvent Permanent Faults in Networks-on-Chip. 59:1-59:36 - Liang Hu, Xilong Che, Si-Qing Zheng:
A Closer Look at GPGPU. 60:1-60:20 - Marco Platania, Daniel Obenshain, Thomas Tantillo, Yair Amir, Neeraj Suri
:
On Choosing Server- or Client-Side Solutions for BFT. 61:1-61:30 - Sparsh Mittal
:
A Survey of Techniques for Approximate Computing. 62:1-62:33 - Edans Flavius de Oliveira Sandes, Azzedine Boukerche, Alba Cristina Magalhaes Alves de Melo
:
Parallel Optimal Pairwise Biological Sequence Comparison: Algorithms, Platforms, and Classification. 63:1-63:36 - Desmond Allan Schmidt, Kenneth Radke, Seyit Ahmet Çamtepe
, Ernest Foo
, Michal Ren:
A Survey and Analysis of the GNSS Spoofing Threat and Countermeasures. 64:1-64:36 - Juan Caballero, Zhiqiang Lin:
Type Inference on Executables. 65:1-65:35

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.