


default search action
ACM Computing Surveys, Volume 45
Volume 45, Number 1, November 2012
- Dong Zhou, Mark Truran, Tim J. Brailsford, Vincent Wade, Helen Ashman

:
Translation techniques in cross-language information retrieval. 1:1-1:44 - Simona Bernardi

, José Merseguer
, Dorina C. Petriu
:
Dependability modeling and analysis of software systems specified with UML. 2:1-2:48 - Sasikanth Avancha, Amit S. Baxi, David Kotz

:
Privacy in mobile technology for personal healthcare. 3:1-3:54 - Sergey Zhuravlev, Juan Carlos Saez

, Sergey Blagodurov, Alexandra Fedorova, Manuel Prieto
:
Survey of scheduling techniques for addressing shared resources in multicore processors. 4:1-4:28 - Anisa Al-Hafeedh, Maxime Crochemore

, Lucian Ilie
, Evguenia Kopylova, William F. Smyth, German Tischler, Munina Yusufu:
A comparison of index-based lempel-Ziv LZ77 factorization algorithms. 5:1-5:17 - Boris Danev, Davide Zanetti, Srdjan Capkun:

On physical-layer identification of wireless devices. 6:1-6:29 - Yi Zhi Zhao, Chunyan Miao

, Maode Ma, Jing-Bing Zhang, Cyril Leung:
A survey and projection on medium access control protocols for wireless sensor networks. 7:1-7:37 - Glenn I. Hawe, Graham Coates, Duncan T. Wilson

, Roger S. Crouch:
Agent-based simulation for large-scale emergency response: A survey of usage and implementation. 8:1-8:51 - R. Annie Uthra, S. V. Kasmir Raja:

QoS routing in wireless sensor networks - a survey. 9:1-9:12 - João Mendes-Moreira

, Carlos Soares
, Alípio Mário Jorge
, Jorge Freire de Sousa
:
Ensemble approaches for regression: A survey. 10:1-10:40 - Mark Harman

, S. Afshin Mansouri
, Yuanyuan Zhang:
Search-based software engineering: Trends, techniques and applications. 11:1-11:61 - Philippe Esling, Carlos Agón:

Time-series data mining. 12:1-12:34
Volume 45, Number 2, February 2013
- Simone Faro

, Thierry Lecroq
:
The exact online string matching problem: A review of the most recent results. 13:1-13:42 - Angeliki Kritikakou

, Francky Catthoor, Vasilios I. Kelefouras
, Costas E. Goutis:
A systematic approach to classify design-time global scheduling techniques. 14:1-14:30 - Marco Attene, Marcel Campen

, Leif Kobbelt
:
Polygon mesh repairing: An application perspective. 15:1-15:33 - Susan Lomax, Sunil Vadera:

A survey of cost-sensitive decision tree induction algorithms. 16:1-16:35 - Michael Pearce, Sherali Zeadally, Ray Hunt:

Virtualization: Issues, security threats, and solutions. 17:1-17:39 - María Elena Acevedo-Mosqueda

, Cornelio Yáñez-Márquez
, Marco Antonio Acevedo-Mosqueda
:
Bidirectional associative memories: Different approaches. 18:1-18:30 - Carl Mooney

, John F. Roddick
:
Sequential pattern mining - approaches and algorithms. 19:1-19:39 - Timo Koskela, Otso Kassinen, Erkki Harjula, Mika Ylianttila

:
P2P group management systems: A conceptual analysis. 20:1-20:25 - Mehdi Saeedi

, Igor L. Markov:
Synthesis and optimization of reversible circuits - a survey. 21:1-21:34 - Ayman Abaza, Arun Ross, Christina Hebert, Mary Ann F. Harrison, Mark S. Nixon

:
A survey on ear biometrics. 22:1-22:35 - Mohammad Tanvir Parvez, Sabri A. Mahmoud:

Offline arabic handwritten text recognition: A Survey. 23:1-23:35 - Jukka Suomela

:
Survey of local algorithms. 24:1-24:40
Volume 45, Number 3, June 2013
- Mohammad Hossein Manshaei, Quanyan Zhu, Tansu Alpcan

, Tamer Basar, Jean-Pierre Hubaux:
Game theory meets network security and privacy. 25:1-25:39 - James Stanier, Des Watson:

Intermediate representations in imperative compilers: A survey. 26:1-26:27 - Seyed Amir Hoseinitabatabaei

, Alexander Gluhak, Rahim Tafazolli
:
A survey on smartphone-based systems for opportunistic user context recognition. 27:1-27:51 - Christian Colombo

, Gordon J. Pace
:
Recovery within long-running transactions. 28:1-28:35 - Omer Zilberberg, Shlomo Weiss, Sivan Toledo:

Phase-change memory: An architectural perspective. 29:1-29:33 - João V. P. Gomes, Pedro R. M. Inácio

, Manuela Pereira
, Mário M. Freire
, Paulo P. Monteiro
:
Detection and classification of peer-to-peer traffic: A survey. 30:1-30:40 - Floarea Serban, Joaquin Vanschoren

, Jörg-Uwe Kietz, Abraham Bernstein
:
A survey of intelligent assistants for data analysis. 31:1-31:35 - Wei Zang, Ann Gordon-Ross:

A survey on cache tuning from a power/energy perspective. 32:1-32:49 - Tom Bostoen, Sape J. Mullender, Yolande Berbers:

Power-reduction techniques for data-center storage systems. 33:1-33:38 - John David N. Dionisio

, William G. Burns III, Richard Gilbert:
3D Virtual worlds and the metaverse: Current status and future possibilities. 34:1-34:38 - Matej Crepinsek, Shih-Hsi Liu, Marjan Mernik:

Exploration and exploitation in evolutionary algorithms: A survey. 35:1-35:33 - Leandro Silva Galvão de Carvalho

, Edjair de Souza Mota
:
Survey on application-layer mechanisms for speech quality adaptation in VoIP. 36:1-36:31 - Xavier Grehant, Isabelle M. Demeure, Sverre Jarp:

A survey of task mapping on production grids. 37:1-37:25 - Abbas Eslami Kiasari, Axel Jantsch

, Zhonghai Lu
:
Mathematical formalisms for performance evaluation of networks-on-chip. 38:1-38:41 - Andrew Newell, Jing Dong, Cristina Nita-Rotaru:

On the practicality of cryptographic defences against pollution attacks in wireless network coding. 39:1-39:26 - Gábor Pék, Levente Buttyán, Boldizsár Bencsáth:

A survey of security issues in hardware virtualization. 40:1-40:34
Volume 45, Number 4, August 2013
- Lilian Bossuet, Michael Grand, Lubos Gaspar, Viktor Fischer, Guy Gogniat

:
Architectures of flexible symmetric key crypto engines - a survey: From hardware coprocessor to multi-crypto-processor system on chip. 41:1-41:32 - Christine Parent, Stefano Spaccapietra, Chiara Renso

, Gennady L. Andrienko
, Natalia V. Andrienko
, Vania Bogorny, Maria Luisa Damiani, Aris Gkoulalas-Divanis, José Antônio Fernandes de Macêdo, Nikos Pelekis, Yannis Theodoridis
, Zhixian Yan:
Semantic trajectories modeling and analysis. 42:1-42:32 - Jierui Xie, Stephen Kelley, Boleslaw K. Szymanski

:
Overlapping community detection in networks: The state-of-the-art and comparative study. 43:1-43:35 - Jiajun Liu, Zi Huang

, Hongyun Cai, Heng Tao Shen, Chong-Wah Ngo
, Wei Wang:
Near-duplicate video retrieval: Current research and future trends. 44:1-44:23 - Rafael Rodríguez-Gómez

, Gabriel Maciá-Fernández
, Pedro García-Teodoro:
Survey and taxonomy of botnet research through life-cycle. 45:1-45:33 - Anirban Basu

, Simon Fleming, James Stanier, Stephen Naicken, Ian Wakeman
, Vijay K. Gurbani:
The state of peer-to-peer network simulators. 46:1-46:25 - Wanita Sherchan, Surya Nepal

, Cécile Paris:
A survey of trust in social networks. 47:1-47:33 - Rajshekar Kalayappan, Smruti R. Sarangi:

A survey of checker architectures. 48:1-48:34 - Jian Chang, Krishna K. Venkatasubramanian, Andrew G. West

, Insup Lee:
Analyzing and defending against web-based malware. 49:1-49:35 - Anne Benoit

, Ümit V. Çatalyürek
, Yves Robert
, Erik Saule
:
A survey of pipelined workflow scheduling: Models and algorithms. 50:1-50:36 - Arnaud Hubaux, Thein Than Tun, Patrick Heymans:

Separation of concerns in feature diagram languages: A systematic survey. 51:1-51:23 - Engineer Bainomugisha, Andoni Lombide Carreton, Tom Van Cutsem

, Stijn Mostinckx, Wolfgang De Meuter:
A survey on reactive programming. 52:1-52:34 - Kelly Androutsopoulos

, David Clark
, Mark Harman
, Jens Krinke
, Laurence Tratt:
State-based model slicing: A survey. 53:1-53:36 - Daniel Lázaro Iglesias, Joan Manuel Marquès, Josep Jorba

, Xavier Vilajosana
:
Decentralized resource discovery mechanisms for distributed computing in peer-to-peer environments. 54:1-54:40 - Levi Shaul, Doron Tauber:

Critical success factors in enterprise resource planning systems: Review of the last decade. 55:1-55:39

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














