Search dblp for Publications

export results for "toc:db/journals/csur/csur45.bht:"

 download as .bib file

@article{DBLP:journals/csur/AbazaRHHN13,
  author       = {Ayman Abaza and
                  Arun Ross and
                  Christina Hebert and
                  Mary Ann F. Harrison and
                  Mark S. Nixon},
  title        = {A survey on ear biometrics},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {2},
  pages        = {22:1--22:35},
  year         = {2013},
  url          = {https://doi.org/10.1145/2431211.2431221},
  doi          = {10.1145/2431211.2431221},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/AbazaRHHN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/Acevedo-MosquedaYA13,
  author       = {Mar{\'{\i}}a Elena Acevedo{-}Mosqueda and
                  Cornelio Y{\'{a}}{\~{n}}ez{-}M{\'{a}}rquez and
                  Marco Antonio Acevedo{-}Mosqueda},
  title        = {Bidirectional associative memories: Different approaches},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {2},
  pages        = {18:1--18:30},
  year         = {2013},
  url          = {https://doi.org/10.1145/2431211.2431217},
  doi          = {10.1145/2431211.2431217},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/Acevedo-MosquedaYA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/AndroutsopoulosCHKT13,
  author       = {Kelly Androutsopoulos and
                  David Clark and
                  Mark Harman and
                  Jens Krinke and
                  Laurence Tratt},
  title        = {State-based model slicing: {A} survey},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {4},
  pages        = {53:1--53:36},
  year         = {2013},
  url          = {https://doi.org/10.1145/2501654.2501667},
  doi          = {10.1145/2501654.2501667},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/AndroutsopoulosCHKT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/AtteneCK13,
  author       = {Marco Attene and
                  Marcel Campen and
                  Leif Kobbelt},
  title        = {Polygon mesh repairing: An application perspective},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {2},
  pages        = {15:1--15:33},
  year         = {2013},
  url          = {https://doi.org/10.1145/2431211.2431214},
  doi          = {10.1145/2431211.2431214},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/AtteneCK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/BainomugishaCCMM13,
  author       = {Engineer Bainomugisha and
                  Andoni Lombide Carreton and
                  Tom Van Cutsem and
                  Stijn Mostinckx and
                  Wolfgang De Meuter},
  title        = {A survey on reactive programming},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {4},
  pages        = {52:1--52:34},
  year         = {2013},
  url          = {https://doi.org/10.1145/2501654.2501666},
  doi          = {10.1145/2501654.2501666},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/BainomugishaCCMM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/BasuFSNWG13,
  author       = {Anirban Basu and
                  Simon Fleming and
                  James Stanier and
                  Stephen Naicken and
                  Ian Wakeman and
                  Vijay K. Gurbani},
  title        = {The state of peer-to-peer network simulators},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {4},
  pages        = {46:1--46:25},
  year         = {2013},
  url          = {https://doi.org/10.1145/2501654.2501660},
  doi          = {10.1145/2501654.2501660},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/BasuFSNWG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/BenoitCRS13,
  author       = {Anne Benoit and
                  {\"{U}}mit V. {\c{C}}ataly{\"{u}}rek and
                  Yves Robert and
                  Erik Saule},
  title        = {A survey of pipelined workflow scheduling: Models and algorithms},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {4},
  pages        = {50:1--50:36},
  year         = {2013},
  url          = {https://doi.org/10.1145/2501654.2501664},
  doi          = {10.1145/2501654.2501664},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/BenoitCRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/BossuetGGFG13,
  author       = {Lilian Bossuet and
                  Michael Grand and
                  Lubos Gaspar and
                  Viktor Fischer and
                  Guy Gogniat},
  title        = {Architectures of flexible symmetric key crypto engines - a survey:
                  From hardware coprocessor to multi-crypto-processor system on chip},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {4},
  pages        = {41:1--41:32},
  year         = {2013},
  url          = {https://doi.org/10.1145/2501654.2501655},
  doi          = {10.1145/2501654.2501655},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/BossuetGGFG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/BostoenMB13,
  author       = {Tom Bostoen and
                  Sape J. Mullender and
                  Yolande Berbers},
  title        = {Power-reduction techniques for data-center storage systems},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {3},
  pages        = {33:1--33:38},
  year         = {2013},
  url          = {https://doi.org/10.1145/2480741.2480750},
  doi          = {10.1145/2480741.2480750},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/BostoenMB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/CarvalhoM13,
  author       = {Leandro Silva Galv{\~{a}}o de Carvalho and
                  Edjair de Souza Mota},
  title        = {Survey on application-layer mechanisms for speech quality adaptation
                  in VoIP},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {3},
  pages        = {36:1--36:31},
  year         = {2013},
  url          = {https://doi.org/10.1145/2480741.2480753},
  doi          = {10.1145/2480741.2480753},
  timestamp    = {Mon, 19 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/CarvalhoM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/ChangVWL13,
  author       = {Jian Chang and
                  Krishna K. Venkatasubramanian and
                  Andrew G. West and
                  Insup Lee},
  title        = {Analyzing and defending against web-based malware},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {4},
  pages        = {49:1--49:35},
  year         = {2013},
  url          = {https://doi.org/10.1145/2501654.2501663},
  doi          = {10.1145/2501654.2501663},
  timestamp    = {Thu, 26 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/ChangVWL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/ColomboP13,
  author       = {Christian Colombo and
                  Gordon J. Pace},
  title        = {Recovery within long-running transactions},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {3},
  pages        = {28:1--28:35},
  year         = {2013},
  url          = {https://doi.org/10.1145/2480741.2480745},
  doi          = {10.1145/2480741.2480745},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/ColomboP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/CrepinsekLM13,
  author       = {Matej Crepinsek and
                  Shih{-}Hsi Liu and
                  Marjan Mernik},
  title        = {Exploration and exploitation in evolutionary algorithms: {A} survey},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {3},
  pages        = {35:1--35:33},
  year         = {2013},
  url          = {https://doi.org/10.1145/2480741.2480752},
  doi          = {10.1145/2480741.2480752},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/CrepinsekLM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/DionisioBG13,
  author       = {John David N. Dionisio and
                  William G. Burns III and
                  Richard Gilbert},
  title        = {3D Virtual worlds and the metaverse: Current status and future possibilities},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {3},
  pages        = {34:1--34:38},
  year         = {2013},
  url          = {https://doi.org/10.1145/2480741.2480751},
  doi          = {10.1145/2480741.2480751},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/DionisioBG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/FaroL13,
  author       = {Simone Faro and
                  Thierry Lecroq},
  title        = {The exact online string matching problem: {A} review of the most recent
                  results},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {2},
  pages        = {13:1--13:42},
  year         = {2013},
  url          = {https://doi.org/10.1145/2431211.2431212},
  doi          = {10.1145/2431211.2431212},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/FaroL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/GomesIPFM13,
  author       = {Jo{\~{a}}o V. P. Gomes and
                  Pedro R. M. In{\'{a}}cio and
                  Manuela Pereira and
                  M{\'{a}}rio M. Freire and
                  Paulo P. Monteiro},
  title        = {Detection and classification of peer-to-peer traffic: {A} survey},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {3},
  pages        = {30:1--30:40},
  year         = {2013},
  url          = {https://doi.org/10.1145/2480741.2480747},
  doi          = {10.1145/2480741.2480747},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/GomesIPFM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/GrehantDJ13,
  author       = {Xavier Grehant and
                  Isabelle M. Demeure and
                  Sverre Jarp},
  title        = {A survey of task mapping on production grids},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {3},
  pages        = {37:1--37:25},
  year         = {2013},
  url          = {https://doi.org/10.1145/2480741.2480754},
  doi          = {10.1145/2480741.2480754},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/GrehantDJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/HoseinitabatabaeiGT13,
  author       = {Seyed Amir Hoseinitabatabaei and
                  Alexander Gluhak and
                  Rahim Tafazolli},
  title        = {A survey on smartphone-based systems for opportunistic user context
                  recognition},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {3},
  pages        = {27:1--27:51},
  year         = {2013},
  url          = {https://doi.org/10.1145/2480741.2480744},
  doi          = {10.1145/2480741.2480744},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/HoseinitabatabaeiGT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/HubauxTH13,
  author       = {Arnaud Hubaux and
                  Thein Than Tun and
                  Patrick Heymans},
  title        = {Separation of concerns in feature diagram languages: {A} systematic
                  survey},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {4},
  pages        = {51:1--51:23},
  year         = {2013},
  url          = {https://doi.org/10.1145/2501654.2501665},
  doi          = {10.1145/2501654.2501665},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/HubauxTH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/IglesiasMJV13,
  author       = {Daniel L{\'{a}}zaro Iglesias and
                  Joan Manuel Marqu{\`{e}}s and
                  Josep Jorba and
                  Xavier Vilajosana},
  title        = {Decentralized resource discovery mechanisms for distributed computing
                  in peer-to-peer environments},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {4},
  pages        = {54:1--54:40},
  year         = {2013},
  url          = {https://doi.org/10.1145/2501654.2501668},
  doi          = {10.1145/2501654.2501668},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/IglesiasMJV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/KalayappanS13,
  author       = {Rajshekar Kalayappan and
                  Smruti R. Sarangi},
  title        = {A survey of checker architectures},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {4},
  pages        = {48:1--48:34},
  year         = {2013},
  url          = {https://doi.org/10.1145/2501654.2501662},
  doi          = {10.1145/2501654.2501662},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/KalayappanS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/KiasariJL13,
  author       = {Abbas Eslami Kiasari and
                  Axel Jantsch and
                  Zhonghai Lu},
  title        = {Mathematical formalisms for performance evaluation of networks-on-chip},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {3},
  pages        = {38:1--38:41},
  year         = {2013},
  url          = {https://doi.org/10.1145/2480741.2480755},
  doi          = {10.1145/2480741.2480755},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/KiasariJL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/KoskelaKHY13,
  author       = {Timo Koskela and
                  Otso Kassinen and
                  Erkki Harjula and
                  Mika Ylianttila},
  title        = {{P2P} group management systems: {A} conceptual analysis},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {2},
  pages        = {20:1--20:25},
  year         = {2013},
  url          = {https://doi.org/10.1145/2431211.2431219},
  doi          = {10.1145/2431211.2431219},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/KoskelaKHY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/KritikakouCKG13,
  author       = {Angeliki Kritikakou and
                  Francky Catthoor and
                  Vasilios I. Kelefouras and
                  Costas E. Goutis},
  title        = {A systematic approach to classify design-time global scheduling techniques},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {2},
  pages        = {14:1--14:30},
  year         = {2013},
  url          = {https://doi.org/10.1145/2431211.2431213},
  doi          = {10.1145/2431211.2431213},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/KritikakouCKG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/LiuHCSNW13,
  author       = {Jiajun Liu and
                  Zi Huang and
                  Hongyun Cai and
                  Heng Tao Shen and
                  Chong{-}Wah Ngo and
                  Wei Wang},
  title        = {Near-duplicate video retrieval: Current research and future trends},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {4},
  pages        = {44:1--44:23},
  year         = {2013},
  url          = {https://doi.org/10.1145/2501654.2501658},
  doi          = {10.1145/2501654.2501658},
  timestamp    = {Wed, 28 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/LiuHCSNW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/LomaxV13,
  author       = {Susan Lomax and
                  Sunil Vadera},
  title        = {A survey of cost-sensitive decision tree induction algorithms},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {2},
  pages        = {16:1--16:35},
  year         = {2013},
  url          = {https://doi.org/10.1145/2431211.2431215},
  doi          = {10.1145/2431211.2431215},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/LomaxV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/ManshaeiZABH13,
  author       = {Mohammad Hossein Manshaei and
                  Quanyan Zhu and
                  Tansu Alpcan and
                  Tamer Basar and
                  Jean{-}Pierre Hubaux},
  title        = {Game theory meets network security and privacy},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {3},
  pages        = {25:1--25:39},
  year         = {2013},
  url          = {https://doi.org/10.1145/2480741.2480742},
  doi          = {10.1145/2480741.2480742},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/ManshaeiZABH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/MooneyR13,
  author       = {Carl Mooney and
                  John F. Roddick},
  title        = {Sequential pattern mining - approaches and algorithms},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {2},
  pages        = {19:1--19:39},
  year         = {2013},
  url          = {https://doi.org/10.1145/2431211.2431218},
  doi          = {10.1145/2431211.2431218},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/MooneyR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/NewellDN13,
  author       = {Andrew Newell and
                  Jing Dong and
                  Cristina Nita{-}Rotaru},
  title        = {On the practicality of cryptographic defences against pollution attacks
                  in wireless network coding},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {3},
  pages        = {39:1--39:26},
  year         = {2013},
  url          = {https://doi.org/10.1145/2480741.2480756},
  doi          = {10.1145/2480741.2480756},
  timestamp    = {Thu, 06 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/NewellDN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/ParentSRAABDGMPTY13,
  author       = {Christine Parent and
                  Stefano Spaccapietra and
                  Chiara Renso and
                  Gennady L. Andrienko and
                  Natalia V. Andrienko and
                  Vania Bogorny and
                  Maria Luisa Damiani and
                  Aris Gkoulalas{-}Divanis and
                  Jos{\'{e}} Ant{\^{o}}nio Fernandes de Mac{\^{e}}do and
                  Nikos Pelekis and
                  Yannis Theodoridis and
                  Zhixian Yan},
  title        = {Semantic trajectories modeling and analysis},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {4},
  pages        = {42:1--42:32},
  year         = {2013},
  url          = {https://doi.org/10.1145/2501654.2501656},
  doi          = {10.1145/2501654.2501656},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/ParentSRAABDGMPTY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/ParvezM13,
  author       = {Mohammad Tanvir Parvez and
                  Sabri A. Mahmoud},
  title        = {Offline arabic handwritten text recognition: {A} Survey},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {2},
  pages        = {23:1--23:35},
  year         = {2013},
  url          = {https://doi.org/10.1145/2431211.2431222},
  doi          = {10.1145/2431211.2431222},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/ParvezM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/PearceZH13,
  author       = {Michael Pearce and
                  Sherali Zeadally and
                  Ray Hunt},
  title        = {Virtualization: Issues, security threats, and solutions},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {2},
  pages        = {17:1--17:39},
  year         = {2013},
  url          = {https://doi.org/10.1145/2431211.2431216},
  doi          = {10.1145/2431211.2431216},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/PearceZH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/PekBB13,
  author       = {G{\'{a}}bor P{\'{e}}k and
                  Levente Butty{\'{a}}n and
                  Boldizs{\'{a}}r Bencs{\'{a}}th},
  title        = {A survey of security issues in hardware virtualization},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {3},
  pages        = {40:1--40:34},
  year         = {2013},
  url          = {https://doi.org/10.1145/2480741.2480757},
  doi          = {10.1145/2480741.2480757},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/PekBB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/Rodriguez-GomezMG13,
  author       = {Rafael Rodr{\'{\i}}guez{-}G{\'{o}}mez and
                  Gabriel Maci{\'{a}}{-}Fern{\'{a}}ndez and
                  Pedro Garc{\'{\i}}a{-}Teodoro},
  title        = {Survey and taxonomy of botnet research through life-cycle},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {4},
  pages        = {45:1--45:33},
  year         = {2013},
  url          = {https://doi.org/10.1145/2501654.2501659},
  doi          = {10.1145/2501654.2501659},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/Rodriguez-GomezMG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/SaeediM13,
  author       = {Mehdi Saeedi and
                  Igor L. Markov},
  title        = {Synthesis and optimization of reversible circuits - a survey},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {2},
  pages        = {21:1--21:34},
  year         = {2013},
  url          = {https://doi.org/10.1145/2431211.2431220},
  doi          = {10.1145/2431211.2431220},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/SaeediM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/SerbanVKB13,
  author       = {Floarea Serban and
                  Joaquin Vanschoren and
                  J{\"{o}}rg{-}Uwe Kietz and
                  Abraham Bernstein},
  title        = {A survey of intelligent assistants for data analysis},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {3},
  pages        = {31:1--31:35},
  year         = {2013},
  url          = {https://doi.org/10.1145/2480741.2480748},
  doi          = {10.1145/2480741.2480748},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/SerbanVKB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/ShaulT13,
  author       = {Levi Shaul and
                  Doron Tauber},
  title        = {Critical success factors in enterprise resource planning systems:
                  Review of the last decade},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {4},
  pages        = {55:1--55:39},
  year         = {2013},
  url          = {https://doi.org/10.1145/2501654.2501669},
  doi          = {10.1145/2501654.2501669},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/ShaulT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/SherchanNP13,
  author       = {Wanita Sherchan and
                  Surya Nepal and
                  C{\'{e}}cile Paris},
  title        = {A survey of trust in social networks},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {4},
  pages        = {47:1--47:33},
  year         = {2013},
  url          = {https://doi.org/10.1145/2501654.2501661},
  doi          = {10.1145/2501654.2501661},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/SherchanNP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/StanierW13,
  author       = {James Stanier and
                  Des Watson},
  title        = {Intermediate representations in imperative compilers: {A} survey},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {3},
  pages        = {26:1--26:27},
  year         = {2013},
  url          = {https://doi.org/10.1145/2480741.2480743},
  doi          = {10.1145/2480741.2480743},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/StanierW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/Suomela13,
  author       = {Jukka Suomela},
  title        = {Survey of local algorithms},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {2},
  pages        = {24:1--24:40},
  year         = {2013},
  url          = {https://doi.org/10.1145/2431211.2431223},
  doi          = {10.1145/2431211.2431223},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/Suomela13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/XieKS13,
  author       = {Jierui Xie and
                  Stephen Kelley and
                  Boleslaw K. Szymanski},
  title        = {Overlapping community detection in networks: The state-of-the-art
                  and comparative study},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {4},
  pages        = {43:1--43:35},
  year         = {2013},
  url          = {https://doi.org/10.1145/2501654.2501657},
  doi          = {10.1145/2501654.2501657},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/XieKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/ZangG13,
  author       = {Wei Zang and
                  Ann Gordon{-}Ross},
  title        = {A survey on cache tuning from a power/energy perspective},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {3},
  pages        = {32:1--32:49},
  year         = {2013},
  url          = {https://doi.org/10.1145/2480741.2480749},
  doi          = {10.1145/2480741.2480749},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/ZangG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/ZilberbergWT13,
  author       = {Omer Zilberberg and
                  Shlomo Weiss and
                  Sivan Toledo},
  title        = {Phase-change memory: An architectural perspective},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {3},
  pages        = {29:1--29:33},
  year         = {2013},
  url          = {https://doi.org/10.1145/2480741.2480746},
  doi          = {10.1145/2480741.2480746},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/ZilberbergWT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/Al-HafeedhCIKSTY12,
  author       = {Anisa Al{-}Hafeedh and
                  Maxime Crochemore and
                  Lucian Ilie and
                  Evguenia Kopylova and
                  William F. Smyth and
                  German Tischler and
                  Munina Yusufu},
  title        = {A comparison of index-based lempel-Ziv {LZ77} factorization algorithms},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {1},
  pages        = {5:1--5:17},
  year         = {2012},
  url          = {https://doi.org/10.1145/2379776.2379781},
  doi          = {10.1145/2379776.2379781},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/Al-HafeedhCIKSTY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/AvanchaBK12,
  author       = {Sasikanth Avancha and
                  Amit S. Baxi and
                  David Kotz},
  title        = {Privacy in mobile technology for personal healthcare},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {1},
  pages        = {3:1--3:54},
  year         = {2012},
  url          = {https://doi.org/10.1145/2379776.2379779},
  doi          = {10.1145/2379776.2379779},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/AvanchaBK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/BernardiMP12,
  author       = {Simona Bernardi and
                  Jos{\'{e}} Merseguer and
                  Dorina C. Petriu},
  title        = {Dependability modeling and analysis of software systems specified
                  with {UML}},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {1},
  pages        = {2:1--2:48},
  year         = {2012},
  url          = {https://doi.org/10.1145/2379776.2379778},
  doi          = {10.1145/2379776.2379778},
  timestamp    = {Mon, 12 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/BernardiMP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/DanevZC12,
  author       = {Boris Danev and
                  Davide Zanetti and
                  Srdjan Capkun},
  title        = {On physical-layer identification of wireless devices},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {1},
  pages        = {6:1--6:29},
  year         = {2012},
  url          = {https://doi.org/10.1145/2379776.2379782},
  doi          = {10.1145/2379776.2379782},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/DanevZC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/EslingA12,
  author       = {Philippe Esling and
                  Carlos Ag{\'{o}}n},
  title        = {Time-series data mining},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {1},
  pages        = {12:1--12:34},
  year         = {2012},
  url          = {https://doi.org/10.1145/2379776.2379788},
  doi          = {10.1145/2379776.2379788},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/EslingA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/HarmanMZ12,
  author       = {Mark Harman and
                  S. Afshin Mansouri and
                  Yuanyuan Zhang},
  title        = {Search-based software engineering: Trends, techniques and applications},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {1},
  pages        = {11:1--11:61},
  year         = {2012},
  url          = {https://doi.org/10.1145/2379776.2379787},
  doi          = {10.1145/2379776.2379787},
  timestamp    = {Wed, 21 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/HarmanMZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/HaweCWC12,
  author       = {Glenn I. Hawe and
                  Graham Coates and
                  Duncan T. Wilson and
                  Roger S. Crouch},
  title        = {Agent-based simulation for large-scale emergency response: {A} survey
                  of usage and implementation},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {1},
  pages        = {8:1--8:51},
  year         = {2012},
  url          = {https://doi.org/10.1145/2379776.2379784},
  doi          = {10.1145/2379776.2379784},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/HaweCWC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/Mendes-MoreiraSJS12,
  author       = {Jo{\~{a}}o Mendes{-}Moreira and
                  Carlos Soares and
                  Al{\'{\i}}pio M{\'{a}}rio Jorge and
                  Jorge Freire de Sousa},
  title        = {Ensemble approaches for regression: {A} survey},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {1},
  pages        = {10:1--10:40},
  year         = {2012},
  url          = {https://doi.org/10.1145/2379776.2379786},
  doi          = {10.1145/2379776.2379786},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/Mendes-MoreiraSJS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/UthraR12,
  author       = {R. Annie Uthra and
                  S. V. Kasmir Raja},
  title        = {QoS routing in wireless sensor networks - a survey},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {1},
  pages        = {9:1--9:12},
  year         = {2012},
  url          = {https://doi.org/10.1145/2379776.2379785},
  doi          = {10.1145/2379776.2379785},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/UthraR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/ZhaoMMZL12,
  author       = {Yi Zhi Zhao and
                  Chunyan Miao and
                  Maode Ma and
                  Jing{-}Bing Zhang and
                  Cyril Leung},
  title        = {A survey and projection on medium access control protocols for wireless
                  sensor networks},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {1},
  pages        = {7:1--7:37},
  year         = {2012},
  url          = {https://doi.org/10.1145/2379776.2379783},
  doi          = {10.1145/2379776.2379783},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/ZhaoMMZL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/ZhouTBWA12,
  author       = {Dong Zhou and
                  Mark Truran and
                  Tim J. Brailsford and
                  Vincent Wade and
                  Helen Ashman},
  title        = {Translation techniques in cross-language information retrieval},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {1},
  pages        = {1:1--1:44},
  year         = {2012},
  url          = {https://doi.org/10.1145/2379776.2379777},
  doi          = {10.1145/2379776.2379777},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/ZhouTBWA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/ZhuravlevSBFP12,
  author       = {Sergey Zhuravlev and
                  Juan Carlos Saez and
                  Sergey Blagodurov and
                  Alexandra Fedorova and
                  Manuel Prieto},
  title        = {Survey of scheduling techniques for addressing shared resources in
                  multicore processors},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {1},
  pages        = {4:1--4:28},
  year         = {2012},
  url          = {https://doi.org/10.1145/2379776.2379780},
  doi          = {10.1145/2379776.2379780},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/ZhuravlevSBFP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics