Journal: ACM Computing Surveys

Volume 45, Issue 4

41 -- 0Lilian Bossuet, Michael Grand, Lubos Gaspar, Viktor Fischer, Guy Gogniat. Architectures of flexible symmetric key crypto engines - a survey: From hardware coprocessor to multi-crypto-processor system on chip
42 -- 0Christine Parent, Stefano Spaccapietra, Chiara Renso, Gennady L. Andrienko, Natalia V. Andrienko, Vania Bogorny, Maria Luisa Damiani, Aris Gkoulalas-Divanis, José Antônio Fernandes de Macêdo, Nikos Pelekis, Yannis Theodoridis, Zhixian Yan. Semantic trajectories modeling and analysis
43 -- 0Jierui Xie, Stephen Kelley, Boleslaw K. Szymanski. Overlapping community detection in networks: The state-of-the-art and comparative study
44 -- 0Jiajun Liu, Zi Huang, HongYun Cai, Heng Tao Shen, Chong-Wah Ngo, Wei Wang. Near-duplicate video retrieval: Current research and future trends
45 -- 0Rafael Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro García Teodoro. Survey and taxonomy of botnet research through life-cycle
46 -- 0Anirban Basu, Simon Fleming, James Stanier, Stephen Naicken, Ian Wakeman, Vijay K. Gurbani. The state of peer-to-peer network simulators
47 -- 0Wanita Sherchan, Surya Nepal, Cécile Paris. A survey of trust in social networks
48 -- 0Rajshekar Kalayappan, Smruti R. Sarangi. A survey of checker architectures
49 -- 0Jian Chang, Krishna K. Venkatasubramanian, Andrew G. West, Insup Lee. Analyzing and defending against web-based malware
50 -- 0Anne Benoit, Ümit V. Çatalyürek, Yves Robert, Erik Saule. A survey of pipelined workflow scheduling: Models and algorithms
51 -- 0Arnaud Hubaux, Thein Than Tun, Patrick Heymans. Separation of concerns in feature diagram languages: A systematic survey
52 -- 0Engineer Bainomugisha, Andoni Lombide Carreton, Tom Van Cutsem, Stijn Mostinckx, Wolfgang De Meuter. A survey on reactive programming
53 -- 0Kelly Androutsopoulos, David Clark, Mark Harman, Jens Krinke, Laurence Tratt. State-based model slicing: A survey
54 -- 0Daniel Lázaro Iglesias, Joan Manuel Marquès, Josep Jorba, Xavier Vilajosana. Decentralized resource discovery mechanisms for distributed computing in peer-to-peer environments
55 -- 0Levi Shaul, Doron Tauber. Critical success factors in enterprise resource planning systems: Review of the last decade

Volume 45, Issue 3

25 -- 0Mohammad Hossein Manshaei, Quanyan Zhu, Tansu Alpcan, Tamer Basar, Jean-Pierre Hubaux. Game theory meets network security and privacy
26 -- 0James Stanier, Des Watson. Intermediate representations in imperative compilers: A survey
27 -- 0Seyed Amir Hoseinitabatabaei, Alexander Gluhak, Rahim Tafazolli. A survey on smartphone-based systems for opportunistic user context recognition
28 -- 0Christian Colombo, Gordon J. Pace. Recovery within long-running transactions
29 -- 0Omer Zilberberg, Shlomo Weiss, Sivan Toledo. Phase-change memory: An architectural perspective
30 -- 0João V. P. Gomes, Pedro R. M. Inácio, Manuela Pereira, Mário M. Freire, Paulo P. Monteiro. Detection and classification of peer-to-peer traffic: A survey
31 -- 0Floarea Serban, Joaquin Vanschoren, Jörg-Uwe Kietz, Abraham Bernstein. A survey of intelligent assistants for data analysis
32 -- 0Wei Zang, Ann Gordon-Ross. A survey on cache tuning from a power/energy perspective
33 -- 0Tom Bostoen, Sape J. Mullender, Yolande Berbers. Power-reduction techniques for data-center storage systems
34 -- 0John David N. Dionisio, William G. Burns III, Richard Gilbert. 3D Virtual worlds and the metaverse: Current status and future possibilities
35 -- 0Matej Crepinsek, Shih-Hsi Liu, Marjan Mernik. Exploration and exploitation in evolutionary algorithms: A survey
36 -- 0Leandro Silva Galvão De Carvalho, Edjair de Souza Mota. Survey on application-layer mechanisms for speech quality adaptation in VoIP
37 -- 0Xavier Grehant, Isabelle M. Demeure, Sverre Jarp. A survey of task mapping on production grids
38 -- 0Abbas Eslami Kiasari, Axel Jantsch, Zhonghai Lu. Mathematical formalisms for performance evaluation of networks-on-chip
39 -- 0Andrew Newell, Jing Dong, Cristina Nita-Rotaru. On the practicality of cryptographic defences against pollution attacks in wireless network coding
40 -- 0Gábor Pék, Levente Buttyán, Boldizsár Bencsáth. A survey of security issues in hardware virtualization

Volume 45, Issue 2

13 -- 0Simone Faro, Thierry Lecroq. The exact online string matching problem: A review of the most recent results
14 -- 0Angeliki Kritikakou, Francky Catthoor, Vasilios I. Kelefouras, Costas E. Goutis. A systematic approach to classify design-time global scheduling techniques
15 -- 0Marco Attene, Marcel Campen, Leif Kobbelt. Polygon mesh repairing: An application perspective
16 -- 0Susan Lomax, Sunil Vadera. A survey of cost-sensitive decision tree induction algorithms
17 -- 0Michael Pearce, Sherali Zeadally, Ray Hunt. Virtualization: Issues, security threats, and solutions
18 -- 0María Elena Acevedo-Mosqueda, Cornelio Yáñez-Márquez, Marco Antonio Acevedo-Mosqueda. Bidirectional associative memories: Different approaches
19 -- 0Carl Mooney, John F. Roddick. Sequential pattern mining - approaches and algorithms
20 -- 0Timo Koskela, Otso Kassinen, Erkki Harjula, Mika Ylianttila. P2P group management systems: A conceptual analysis
21 -- 0Mehdi Saeedi, Igor L. Markov. Synthesis and optimization of reversible circuits - a survey
22 -- 0Ayman Abaza, Arun Ross, Christina Hebert, Mary Ann F. Harrison, Mark S. Nixon. A survey on ear biometrics
23 -- 0Mohammad Tanvir Parvez, Sabri A. Mahmoud. Offline arabic handwritten text recognition: A Survey
24 -- 0Jukka Suomela. Survey of local algorithms

Volume 45, Issue 1

1 -- 0Dong Zhou, Mark Truran, Tim J. Brailsford, Vincent Wade, Helen Ashman. Translation techniques in cross-language information retrieval
2 -- 0Simona Bernardi, José Merseguer, Dorina C. Petriu. Dependability modeling and analysis of software systems specified with UML
3 -- 0Sasikanth Avancha, Amit Baxi, David Kotz. Privacy in mobile technology for personal healthcare
4 -- 0Sergey Zhuravlev, Juan Carlos Saez, Sergey Blagodurov, Alexandra Fedorova, Manuel Prieto. Survey of scheduling techniques for addressing shared resources in multicore processors
5 -- 0Anisa Al-Hafeedh, Maxime Crochemore, Lucian Ilie, Evguenia Kopylova, William F. Smyth, German Tischler, Munina Yusufu. A comparison of index-based lempel-Ziv LZ77 factorization algorithms
6 -- 0Boris Danev, Davide Zanetti, Srdjan Capkun. On physical-layer identification of wireless devices
7 -- 0Yi Zhi Zhao, Chunyan Miao, Maode Ma, Jing-Bing Zhang, Cyril Leung. A survey and projection on medium access control protocols for wireless sensor networks
8 -- 0Glenn I. Hawe, Graham Coates, Duncan T. Wilson, Roger S. Crouch. Agent-based simulation for large-scale emergency response: A survey of usage and implementation
9 -- 0R. Annie Uthra, S. V. Kasmir Raja. QoS routing in wireless sensor networks - a survey
10 -- 0João Mendes-Moreira, Carlos Soares, Alípio Mário Jorge, Jorge Freire de Sousa. Ensemble approaches for regression: A survey
11 -- 0Mark Harman, S. Afshin Mansouri, Yuanyuan Zhang. Search-based software engineering: Trends, techniques and applications
12 -- 0Philippe Esling, Carlos Agon. Time-series data mining