default search action
Search dblp for Publications
export results for "toc:db/journals/csur/csur45.bht:"
@article{DBLP:journals/csur/AbazaRHHN13, author = {Ayman Abaza and Arun Ross and Christina Hebert and Mary Ann F. Harrison and Mark S. Nixon}, title = {A survey on ear biometrics}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {2}, pages = {22:1--22:35}, year = {2013}, url = {https://doi.org/10.1145/2431211.2431221}, doi = {10.1145/2431211.2431221}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/AbazaRHHN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/Acevedo-MosquedaYA13, author = {Mar{\'{\i}}a Elena Acevedo{-}Mosqueda and Cornelio Y{\'{a}}{\~{n}}ez{-}M{\'{a}}rquez and Marco Antonio Acevedo{-}Mosqueda}, title = {Bidirectional associative memories: Different approaches}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {2}, pages = {18:1--18:30}, year = {2013}, url = {https://doi.org/10.1145/2431211.2431217}, doi = {10.1145/2431211.2431217}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/Acevedo-MosquedaYA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/AndroutsopoulosCHKT13, author = {Kelly Androutsopoulos and David Clark and Mark Harman and Jens Krinke and Laurence Tratt}, title = {State-based model slicing: {A} survey}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {4}, pages = {53:1--53:36}, year = {2013}, url = {https://doi.org/10.1145/2501654.2501667}, doi = {10.1145/2501654.2501667}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/AndroutsopoulosCHKT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/AtteneCK13, author = {Marco Attene and Marcel Campen and Leif Kobbelt}, title = {Polygon mesh repairing: An application perspective}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {2}, pages = {15:1--15:33}, year = {2013}, url = {https://doi.org/10.1145/2431211.2431214}, doi = {10.1145/2431211.2431214}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/AtteneCK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/BainomugishaCCMM13, author = {Engineer Bainomugisha and Andoni Lombide Carreton and Tom Van Cutsem and Stijn Mostinckx and Wolfgang De Meuter}, title = {A survey on reactive programming}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {4}, pages = {52:1--52:34}, year = {2013}, url = {https://doi.org/10.1145/2501654.2501666}, doi = {10.1145/2501654.2501666}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/BainomugishaCCMM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/BasuFSNWG13, author = {Anirban Basu and Simon Fleming and James Stanier and Stephen Naicken and Ian Wakeman and Vijay K. Gurbani}, title = {The state of peer-to-peer network simulators}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {4}, pages = {46:1--46:25}, year = {2013}, url = {https://doi.org/10.1145/2501654.2501660}, doi = {10.1145/2501654.2501660}, timestamp = {Fri, 09 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/BasuFSNWG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/BenoitCRS13, author = {Anne Benoit and {\"{U}}mit V. {\c{C}}ataly{\"{u}}rek and Yves Robert and Erik Saule}, title = {A survey of pipelined workflow scheduling: Models and algorithms}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {4}, pages = {50:1--50:36}, year = {2013}, url = {https://doi.org/10.1145/2501654.2501664}, doi = {10.1145/2501654.2501664}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/BenoitCRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/BossuetGGFG13, author = {Lilian Bossuet and Michael Grand and Lubos Gaspar and Viktor Fischer and Guy Gogniat}, title = {Architectures of flexible symmetric key crypto engines - a survey: From hardware coprocessor to multi-crypto-processor system on chip}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {4}, pages = {41:1--41:32}, year = {2013}, url = {https://doi.org/10.1145/2501654.2501655}, doi = {10.1145/2501654.2501655}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/BossuetGGFG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/BostoenMB13, author = {Tom Bostoen and Sape J. Mullender and Yolande Berbers}, title = {Power-reduction techniques for data-center storage systems}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {3}, pages = {33:1--33:38}, year = {2013}, url = {https://doi.org/10.1145/2480741.2480750}, doi = {10.1145/2480741.2480750}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/BostoenMB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/CarvalhoM13, author = {Leandro Silva Galv{\~{a}}o de Carvalho and Edjair de Souza Mota}, title = {Survey on application-layer mechanisms for speech quality adaptation in VoIP}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {3}, pages = {36:1--36:31}, year = {2013}, url = {https://doi.org/10.1145/2480741.2480753}, doi = {10.1145/2480741.2480753}, timestamp = {Mon, 19 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/CarvalhoM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/ChangVWL13, author = {Jian Chang and Krishna K. Venkatasubramanian and Andrew G. West and Insup Lee}, title = {Analyzing and defending against web-based malware}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {4}, pages = {49:1--49:35}, year = {2013}, url = {https://doi.org/10.1145/2501654.2501663}, doi = {10.1145/2501654.2501663}, timestamp = {Thu, 26 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/ChangVWL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/ColomboP13, author = {Christian Colombo and Gordon J. Pace}, title = {Recovery within long-running transactions}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {3}, pages = {28:1--28:35}, year = {2013}, url = {https://doi.org/10.1145/2480741.2480745}, doi = {10.1145/2480741.2480745}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/ColomboP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/CrepinsekLM13, author = {Matej Crepinsek and Shih{-}Hsi Liu and Marjan Mernik}, title = {Exploration and exploitation in evolutionary algorithms: {A} survey}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {3}, pages = {35:1--35:33}, year = {2013}, url = {https://doi.org/10.1145/2480741.2480752}, doi = {10.1145/2480741.2480752}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/CrepinsekLM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/DionisioBG13, author = {John David N. Dionisio and William G. Burns III and Richard Gilbert}, title = {3D Virtual worlds and the metaverse: Current status and future possibilities}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {3}, pages = {34:1--34:38}, year = {2013}, url = {https://doi.org/10.1145/2480741.2480751}, doi = {10.1145/2480741.2480751}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/DionisioBG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/FaroL13, author = {Simone Faro and Thierry Lecroq}, title = {The exact online string matching problem: {A} review of the most recent results}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {2}, pages = {13:1--13:42}, year = {2013}, url = {https://doi.org/10.1145/2431211.2431212}, doi = {10.1145/2431211.2431212}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/FaroL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/GomesIPFM13, author = {Jo{\~{a}}o V. P. Gomes and Pedro R. M. In{\'{a}}cio and Manuela Pereira and M{\'{a}}rio M. Freire and Paulo P. Monteiro}, title = {Detection and classification of peer-to-peer traffic: {A} survey}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {3}, pages = {30:1--30:40}, year = {2013}, url = {https://doi.org/10.1145/2480741.2480747}, doi = {10.1145/2480741.2480747}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/GomesIPFM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/GrehantDJ13, author = {Xavier Grehant and Isabelle M. Demeure and Sverre Jarp}, title = {A survey of task mapping on production grids}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {3}, pages = {37:1--37:25}, year = {2013}, url = {https://doi.org/10.1145/2480741.2480754}, doi = {10.1145/2480741.2480754}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/GrehantDJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/HoseinitabatabaeiGT13, author = {Seyed Amir Hoseinitabatabaei and Alexander Gluhak and Rahim Tafazolli}, title = {A survey on smartphone-based systems for opportunistic user context recognition}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {3}, pages = {27:1--27:51}, year = {2013}, url = {https://doi.org/10.1145/2480741.2480744}, doi = {10.1145/2480741.2480744}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/HoseinitabatabaeiGT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/HubauxTH13, author = {Arnaud Hubaux and Thein Than Tun and Patrick Heymans}, title = {Separation of concerns in feature diagram languages: {A} systematic survey}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {4}, pages = {51:1--51:23}, year = {2013}, url = {https://doi.org/10.1145/2501654.2501665}, doi = {10.1145/2501654.2501665}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/HubauxTH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/IglesiasMJV13, author = {Daniel L{\'{a}}zaro Iglesias and Joan Manuel Marqu{\`{e}}s and Josep Jorba and Xavier Vilajosana}, title = {Decentralized resource discovery mechanisms for distributed computing in peer-to-peer environments}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {4}, pages = {54:1--54:40}, year = {2013}, url = {https://doi.org/10.1145/2501654.2501668}, doi = {10.1145/2501654.2501668}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/IglesiasMJV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/KalayappanS13, author = {Rajshekar Kalayappan and Smruti R. Sarangi}, title = {A survey of checker architectures}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {4}, pages = {48:1--48:34}, year = {2013}, url = {https://doi.org/10.1145/2501654.2501662}, doi = {10.1145/2501654.2501662}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/KalayappanS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/KiasariJL13, author = {Abbas Eslami Kiasari and Axel Jantsch and Zhonghai Lu}, title = {Mathematical formalisms for performance evaluation of networks-on-chip}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {3}, pages = {38:1--38:41}, year = {2013}, url = {https://doi.org/10.1145/2480741.2480755}, doi = {10.1145/2480741.2480755}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/KiasariJL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/KoskelaKHY13, author = {Timo Koskela and Otso Kassinen and Erkki Harjula and Mika Ylianttila}, title = {{P2P} group management systems: {A} conceptual analysis}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {2}, pages = {20:1--20:25}, year = {2013}, url = {https://doi.org/10.1145/2431211.2431219}, doi = {10.1145/2431211.2431219}, timestamp = {Fri, 13 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/KoskelaKHY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/KritikakouCKG13, author = {Angeliki Kritikakou and Francky Catthoor and Vasilios I. Kelefouras and Costas E. Goutis}, title = {A systematic approach to classify design-time global scheduling techniques}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {2}, pages = {14:1--14:30}, year = {2013}, url = {https://doi.org/10.1145/2431211.2431213}, doi = {10.1145/2431211.2431213}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/KritikakouCKG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/LiuHCSNW13, author = {Jiajun Liu and Zi Huang and Hongyun Cai and Heng Tao Shen and Chong{-}Wah Ngo and Wei Wang}, title = {Near-duplicate video retrieval: Current research and future trends}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {4}, pages = {44:1--44:23}, year = {2013}, url = {https://doi.org/10.1145/2501654.2501658}, doi = {10.1145/2501654.2501658}, timestamp = {Wed, 28 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/LiuHCSNW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/LomaxV13, author = {Susan Lomax and Sunil Vadera}, title = {A survey of cost-sensitive decision tree induction algorithms}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {2}, pages = {16:1--16:35}, year = {2013}, url = {https://doi.org/10.1145/2431211.2431215}, doi = {10.1145/2431211.2431215}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/LomaxV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/ManshaeiZABH13, author = {Mohammad Hossein Manshaei and Quanyan Zhu and Tansu Alpcan and Tamer Basar and Jean{-}Pierre Hubaux}, title = {Game theory meets network security and privacy}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {3}, pages = {25:1--25:39}, year = {2013}, url = {https://doi.org/10.1145/2480741.2480742}, doi = {10.1145/2480741.2480742}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/ManshaeiZABH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/MooneyR13, author = {Carl Mooney and John F. Roddick}, title = {Sequential pattern mining - approaches and algorithms}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {2}, pages = {19:1--19:39}, year = {2013}, url = {https://doi.org/10.1145/2431211.2431218}, doi = {10.1145/2431211.2431218}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/MooneyR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/NewellDN13, author = {Andrew Newell and Jing Dong and Cristina Nita{-}Rotaru}, title = {On the practicality of cryptographic defences against pollution attacks in wireless network coding}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {3}, pages = {39:1--39:26}, year = {2013}, url = {https://doi.org/10.1145/2480741.2480756}, doi = {10.1145/2480741.2480756}, timestamp = {Thu, 06 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/NewellDN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/ParentSRAABDGMPTY13, author = {Christine Parent and Stefano Spaccapietra and Chiara Renso and Gennady L. Andrienko and Natalia V. Andrienko and Vania Bogorny and Maria Luisa Damiani and Aris Gkoulalas{-}Divanis and Jos{\'{e}} Ant{\^{o}}nio Fernandes de Mac{\^{e}}do and Nikos Pelekis and Yannis Theodoridis and Zhixian Yan}, title = {Semantic trajectories modeling and analysis}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {4}, pages = {42:1--42:32}, year = {2013}, url = {https://doi.org/10.1145/2501654.2501656}, doi = {10.1145/2501654.2501656}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/ParentSRAABDGMPTY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/ParvezM13, author = {Mohammad Tanvir Parvez and Sabri A. Mahmoud}, title = {Offline arabic handwritten text recognition: {A} Survey}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {2}, pages = {23:1--23:35}, year = {2013}, url = {https://doi.org/10.1145/2431211.2431222}, doi = {10.1145/2431211.2431222}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/ParvezM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/PearceZH13, author = {Michael Pearce and Sherali Zeadally and Ray Hunt}, title = {Virtualization: Issues, security threats, and solutions}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {2}, pages = {17:1--17:39}, year = {2013}, url = {https://doi.org/10.1145/2431211.2431216}, doi = {10.1145/2431211.2431216}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/PearceZH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/PekBB13, author = {G{\'{a}}bor P{\'{e}}k and Levente Butty{\'{a}}n and Boldizs{\'{a}}r Bencs{\'{a}}th}, title = {A survey of security issues in hardware virtualization}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {3}, pages = {40:1--40:34}, year = {2013}, url = {https://doi.org/10.1145/2480741.2480757}, doi = {10.1145/2480741.2480757}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/PekBB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/Rodriguez-GomezMG13, author = {Rafael Rodr{\'{\i}}guez{-}G{\'{o}}mez and Gabriel Maci{\'{a}}{-}Fern{\'{a}}ndez and Pedro Garc{\'{\i}}a{-}Teodoro}, title = {Survey and taxonomy of botnet research through life-cycle}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {4}, pages = {45:1--45:33}, year = {2013}, url = {https://doi.org/10.1145/2501654.2501659}, doi = {10.1145/2501654.2501659}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/Rodriguez-GomezMG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/SaeediM13, author = {Mehdi Saeedi and Igor L. Markov}, title = {Synthesis and optimization of reversible circuits - a survey}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {2}, pages = {21:1--21:34}, year = {2013}, url = {https://doi.org/10.1145/2431211.2431220}, doi = {10.1145/2431211.2431220}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/SaeediM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/SerbanVKB13, author = {Floarea Serban and Joaquin Vanschoren and J{\"{o}}rg{-}Uwe Kietz and Abraham Bernstein}, title = {A survey of intelligent assistants for data analysis}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {3}, pages = {31:1--31:35}, year = {2013}, url = {https://doi.org/10.1145/2480741.2480748}, doi = {10.1145/2480741.2480748}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/SerbanVKB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/ShaulT13, author = {Levi Shaul and Doron Tauber}, title = {Critical success factors in enterprise resource planning systems: Review of the last decade}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {4}, pages = {55:1--55:39}, year = {2013}, url = {https://doi.org/10.1145/2501654.2501669}, doi = {10.1145/2501654.2501669}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/ShaulT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/SherchanNP13, author = {Wanita Sherchan and Surya Nepal and C{\'{e}}cile Paris}, title = {A survey of trust in social networks}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {4}, pages = {47:1--47:33}, year = {2013}, url = {https://doi.org/10.1145/2501654.2501661}, doi = {10.1145/2501654.2501661}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/SherchanNP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/StanierW13, author = {James Stanier and Des Watson}, title = {Intermediate representations in imperative compilers: {A} survey}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {3}, pages = {26:1--26:27}, year = {2013}, url = {https://doi.org/10.1145/2480741.2480743}, doi = {10.1145/2480741.2480743}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/StanierW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/Suomela13, author = {Jukka Suomela}, title = {Survey of local algorithms}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {2}, pages = {24:1--24:40}, year = {2013}, url = {https://doi.org/10.1145/2431211.2431223}, doi = {10.1145/2431211.2431223}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/Suomela13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/XieKS13, author = {Jierui Xie and Stephen Kelley and Boleslaw K. Szymanski}, title = {Overlapping community detection in networks: The state-of-the-art and comparative study}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {4}, pages = {43:1--43:35}, year = {2013}, url = {https://doi.org/10.1145/2501654.2501657}, doi = {10.1145/2501654.2501657}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/XieKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/ZangG13, author = {Wei Zang and Ann Gordon{-}Ross}, title = {A survey on cache tuning from a power/energy perspective}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {3}, pages = {32:1--32:49}, year = {2013}, url = {https://doi.org/10.1145/2480741.2480749}, doi = {10.1145/2480741.2480749}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/ZangG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/ZilberbergWT13, author = {Omer Zilberberg and Shlomo Weiss and Sivan Toledo}, title = {Phase-change memory: An architectural perspective}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {3}, pages = {29:1--29:33}, year = {2013}, url = {https://doi.org/10.1145/2480741.2480746}, doi = {10.1145/2480741.2480746}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/ZilberbergWT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/Al-HafeedhCIKSTY12, author = {Anisa Al{-}Hafeedh and Maxime Crochemore and Lucian Ilie and Evguenia Kopylova and William F. Smyth and German Tischler and Munina Yusufu}, title = {A comparison of index-based lempel-Ziv {LZ77} factorization algorithms}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {1}, pages = {5:1--5:17}, year = {2012}, url = {https://doi.org/10.1145/2379776.2379781}, doi = {10.1145/2379776.2379781}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/Al-HafeedhCIKSTY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/AvanchaBK12, author = {Sasikanth Avancha and Amit S. Baxi and David Kotz}, title = {Privacy in mobile technology for personal healthcare}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {1}, pages = {3:1--3:54}, year = {2012}, url = {https://doi.org/10.1145/2379776.2379779}, doi = {10.1145/2379776.2379779}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/AvanchaBK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/BernardiMP12, author = {Simona Bernardi and Jos{\'{e}} Merseguer and Dorina C. Petriu}, title = {Dependability modeling and analysis of software systems specified with {UML}}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {1}, pages = {2:1--2:48}, year = {2012}, url = {https://doi.org/10.1145/2379776.2379778}, doi = {10.1145/2379776.2379778}, timestamp = {Mon, 12 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/BernardiMP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/DanevZC12, author = {Boris Danev and Davide Zanetti and Srdjan Capkun}, title = {On physical-layer identification of wireless devices}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {1}, pages = {6:1--6:29}, year = {2012}, url = {https://doi.org/10.1145/2379776.2379782}, doi = {10.1145/2379776.2379782}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/DanevZC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/EslingA12, author = {Philippe Esling and Carlos Ag{\'{o}}n}, title = {Time-series data mining}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {1}, pages = {12:1--12:34}, year = {2012}, url = {https://doi.org/10.1145/2379776.2379788}, doi = {10.1145/2379776.2379788}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/EslingA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/HarmanMZ12, author = {Mark Harman and S. Afshin Mansouri and Yuanyuan Zhang}, title = {Search-based software engineering: Trends, techniques and applications}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {1}, pages = {11:1--11:61}, year = {2012}, url = {https://doi.org/10.1145/2379776.2379787}, doi = {10.1145/2379776.2379787}, timestamp = {Wed, 21 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/HarmanMZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/HaweCWC12, author = {Glenn I. Hawe and Graham Coates and Duncan T. Wilson and Roger S. Crouch}, title = {Agent-based simulation for large-scale emergency response: {A} survey of usage and implementation}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {1}, pages = {8:1--8:51}, year = {2012}, url = {https://doi.org/10.1145/2379776.2379784}, doi = {10.1145/2379776.2379784}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/HaweCWC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/Mendes-MoreiraSJS12, author = {Jo{\~{a}}o Mendes{-}Moreira and Carlos Soares and Al{\'{\i}}pio M{\'{a}}rio Jorge and Jorge Freire de Sousa}, title = {Ensemble approaches for regression: {A} survey}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {1}, pages = {10:1--10:40}, year = {2012}, url = {https://doi.org/10.1145/2379776.2379786}, doi = {10.1145/2379776.2379786}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/Mendes-MoreiraSJS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/UthraR12, author = {R. Annie Uthra and S. V. Kasmir Raja}, title = {QoS routing in wireless sensor networks - a survey}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {1}, pages = {9:1--9:12}, year = {2012}, url = {https://doi.org/10.1145/2379776.2379785}, doi = {10.1145/2379776.2379785}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/UthraR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/ZhaoMMZL12, author = {Yi Zhi Zhao and Chunyan Miao and Maode Ma and Jing{-}Bing Zhang and Cyril Leung}, title = {A survey and projection on medium access control protocols for wireless sensor networks}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {1}, pages = {7:1--7:37}, year = {2012}, url = {https://doi.org/10.1145/2379776.2379783}, doi = {10.1145/2379776.2379783}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/ZhaoMMZL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/ZhouTBWA12, author = {Dong Zhou and Mark Truran and Tim J. Brailsford and Vincent Wade and Helen Ashman}, title = {Translation techniques in cross-language information retrieval}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {1}, pages = {1:1--1:44}, year = {2012}, url = {https://doi.org/10.1145/2379776.2379777}, doi = {10.1145/2379776.2379777}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/ZhouTBWA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/ZhuravlevSBFP12, author = {Sergey Zhuravlev and Juan Carlos Saez and Sergey Blagodurov and Alexandra Fedorova and Manuel Prieto}, title = {Survey of scheduling techniques for addressing shared resources in multicore processors}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {1}, pages = {4:1--4:28}, year = {2012}, url = {https://doi.org/10.1145/2379776.2379780}, doi = {10.1145/2379776.2379780}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/ZhuravlevSBFP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.