


default search action
ACM Computing Surveys, Volume 51
Volume 51, Number 1, April 2018
- Filipe Betzel
, S. Karen Khatamifard, Harini Suresh, David J. Lilja, John Sartori, Ulya R. Karpuzcu:
Approximate Communication: Techniques for Reducing Communication Bottlenecks in Large-Scale Parallel Systems. 1:1-1:32 - Miriam Sturdee
, Jason Alexander
:
Analysis and Classification of Shape-Changing Interfaces for Design and Application-based Research. 2:1-2:32 - Szymon Wasik
, Maciej Antczak
, Jan Badura
, Artur Laskowski, Tomasz Sternal:
A Survey on Online Judge Systems and Their Applications. 3:1-3:34 - Tsong Yueh Chen
, Fei-Ching Kuo, Huai Liu
, Pak-Lok Poon
, Dave Towey
, T. H. Tse
, Zhi Quan Zhou
:
Metamorphic Testing: A Review of Challenges and Opportunities. 4:1-4:27 - Unaizah Obaidellah
, Mohammed Al Haek
, Peter C.-H. Cheng:
A Survey on the Usage of Eye-Tracking in Computer Programming. 5:1-5:58 - Federica Paci
, Anna Cinzia Squicciarini
, Nicola Zannone
:
Survey on Access Control for Community-Centered Collaborative Systems. 6:1-6:38 - Florian Daniel
, Pavel Kucherbaev, Cinzia Cappiello
, Boualem Benatallah
, Mohammad Allahbakhsh:
Quality Control in Crowdsourcing: A Survey of Quality Attributes, Assessment Techniques, and Assurance Actions. 7:1-7:40 - Marco A. S. Netto
, Rodrigo N. Calheiros
, Eduardo R. Rodrigues, Renato Luiz de Freitas Cunha
, Rajkumar Buyya
:
HPC Cloud for Scientific and Business Applications: Taxonomy, Vision, and Research Challenges. 8:1-8:29 - Eliahu Khalastchi
, Meir Kalech
:
On Fault Detection and Diagnosis in Robotic Systems. 9:1-9:24 - Samira Pouyanfar, Yimin Yang, Shu-Ching Chen
, Mei-Ling Shyu, S. S. Iyengar
:
Multimedia Big Data Analytics: A Survey. 10:1-10:34 - Dimitris Gritzalis
, Giulia Iseppi, Alexios Mylonas
, Vasilis Stavrou:
Exiting the Risk Assessment Maze: A Meta-Survey. 11:1-11:30 - Dalia Nashat, Ali A. Amer
:
A Comprehensive Taxonomy of Fragmentation and Allocation Techniques in Distributed Database Design. 12:1-12:25 - Bowen Zhou, Rajkumar Buyya
:
Augmentation Techniques for Mobile Cloud Computing: A Taxonomy, Survey, and Future Directions. 13:1-13:38 - Jeremy A. Marvel
, Roger Bostelman, Joe Falco:
Multi-Robot Assembly Strategies and Metrics. 14:1-14:32 - Michal Gaziel Yablowitz, David G. Schwartz
:
A Review and Assessment Framework for Mobile-Based Emergency Intervention Apps. 15:1-15:32 - Mohammed Ali Al-garadi
, Kasturi Dewi Varathan
, Sri Devi Ravana
, Ejaz Ahmed, Ghulam Mujtaba, Muhammad Usman Shahid Khan
, Samee U. Khan
:
Analysis of Online Social Network Connections for Identification of Influential Users: Survey and Open Research Issues. 16:1-16:37 - Martin Monperrus
:
Automatic Software Repair: A Bibliography. 17:1-17:24 - Zhijun Ding, Xiaolun Li, Changjun Jiang, Mengchu Zhou
:
Objectives and State-of-the-Art of Location-Based Social Network Recommender Systems. 18:1-18:28 - Rodolfo W. L. Coutinho
, Azzedine Boukerche, Luiz Filipe M. Vieira, Antonio A. F. Loureiro:
Underwater Wireless Sensor Networks: A New Challenge for Topology Control-Based Systems. 19:1-19:36 - Rodrigo Bruno
, Paulo Ferreira
:
A Study on Garbage Collection Algorithms for Big Data Environments. 20:1-20:35 - Adriana Draghici
, Maarten van Steen
:
A Survey of Techniques for Automatically Sensing the Behavior of a Crowd. 21:1-21:40 - Alexander Bergmayr
, Uwe Breitenbücher, Nicolas Ferry, Alessandro Rossini, Arnor Solberg, Manuel Wimmer, Gerti Kappel, Frank Leymann:
A Systematic Review of Cloud Modeling Languages. 22:1-22:38
Volume 51, Number 2, June 2018
- Francieli Zanon Boito
, Eduardo C. Inacio
, Jean Luca Bez
, Philippe O. A. Navaux, Mario A. R. Dantas
, Yves Denneulin:
A Checkpoint of Research on Parallel I/O for High-Performance Computing. 23:1-23:35 - Ivan Brugere, Brian Gallagher
, Tanya Y. Berger-Wolf:
Network Structure Inference, A Survey: Motivations, Methods, and Applications. 24:1-24:39 - Ligang Zhang
, Brijesh K. Verma
, Dian Tjondronegoro, Vinod Chandran:
Facial Expression Analysis under Partial Occlusion: A Survey. 25:1-25:49 - Mohamad Gebai
, Michel R. Dagenais
:
Survey and Analysis of Kernel and Userspace Tracers on Linux: Design, Implementation, and Overhead. 26:1-26:33 - Elisa Rojas
, Roberto Doriguzzi Corin
, Sergio Tamurejo, Andres Beato, Arne Schwabe, Kevin Phemius, Carmen Guerrero
:
Are We Ready to Drive Software-Defined Networks? A Comprehensive Survey on Management Tools and Techniques. 27:1-27:35 - Carolyn Lamb
, Daniel G. Brown, Charles L. A. Clarke:
Evaluating Computational Creativity: An Interdisciplinary Tutorial. 28:1-28:34 - Yasmin Fathy
, Payam M. Barnaghi, Rahim Tafazolli:
Large-Scale Indexing, Discovery, and Ranking for the Internet of Things (IoT). 29:1-29:53 - Willington Siabato
, Christophe Claramunt, Sergio Ilarri, Miguel-Ángel Manso-Callejo
:
A Survey of Modelling Trends in Temporal GIS. 30:1-30:41 - Zihao Shan
, Kui Ren, Marina Blanton
, Cong Wang:
Practical Secure Computation Outsourcing: A Survey. 31:1-31:40 - Arkaitz Zubiaga
, Ahmet Aker, Kalina Bontcheva
, Maria Liakata
, Rob Procter:
Detection and Resolution of Rumours in Social Media: A Survey. 32:1-32:36 - Miyuru Dayarathna
, Srinath Perera:
Recent Advancements in Event Processing. 33:1-33:36 - Wooi-King Soo
, Teck Chaw Ling, Aung Htein Maw, Su Thawda Win:
Survey on Load-Balancing Methods in 802.11 Infrastructure Mode Wireless Networks for Improving Quality of Service. 34:1-34:21 - Giulio Rossetti
, Rémy Cazabet
:
Community Discovery in Dynamic Networks: A Survey. 35:1-35:37 - Eran Toch
, Claudio Bettini
, Erez Shmueli, Laura Radaelli, Andrea Lanzi, Daniele Riboni, Bruno Lepri:
The Privacy Implications of Cyber Security Systems: A Technological Survey. 36:1-36:27 - Muhamad Risqi Utama Saputra
, Andrew Markham
, Niki Trigoni
:
Visual SLAM and Structure from Motion in Dynamic Environments: A Survey. 37:1-37:36 - Hadi Ghanbari
, Tero Vartiainen
, Mikko T. Siponen:
Omission of Quality Software Development Practices: A Systematic Literature Review. 38:1-38:27 - Chao Li, Yushu Xue, Jing Wang, Weigong Zhang, Tao Li:
Edge-Oriented Computing Paradigms: A Survey on Architecture Design and System Management. 39:1-39:34 - Ali Davoudian
, Liu Chen
, Mengchi Liu
:
A Survey on NoSQL Stores. 40:1-40:43 - Davi Silva Rodrigues
, Márcio Eduardo Delamaro, Cléber Gimenez Corrêa, Fátima L. S. Nunes:
Using Genetic Algorithms in Test Data Generation: A Critical Systematic Mapping. 41:1-41:23 - Rodolfo Stoffel Antunes
, Lucas Adams Seewald, Vinicius Facco Rodrigues
, Cristiano André da Costa
, Luiz Gonzaga Jr.
, Rodrigo da Rosa Righi, Andreas K. Maier, Björn M. Eskofier
, Malte Ollenschläger
, Farzad Naderi, Rebecca Fahrig, Sebastian Bauer, Sigrun Klein, Gelson Campanatti:
A Survey of Sensors in Healthcare Workflow Monitoring. 42:1-42:37 - Matteo Turilli
, Mark Santcroos, Shantenu Jha
:
A Comprehensive Perspective on Pilot-Job Systems. 43:1-43:32
Volume 51, Number 3, July 2018
- Tobias Brandt
, Marco Grawunder:
GeoStreams: A Survey. 44:1-44:37 - Vishnu Srinivasa Murthy Yarlagadda
, Shashidhar G. Koolagudi:
Content-Based Music Information Retrieval (CB-MIR) and Its Applications toward the Music Industry: A Review. 45:1-45:46 - Konstantia Barmpatsalou
, Tiago Cruz
, Edmundo Monteiro
, Paulo Simões
:
Current and Future Trends in Mobile Device Forensics: A Survey. 46:1-46:31 - Nasir Saeed
, Haewoon Nam, Mian Imtiaz Ul Haq, Dost Muhammad Saqib Bhatti:
A Survey on Multidimensional Scaling. 47:1-47:25 - Paulo Angelo Alves Resende
, André Costa Drummond
:
A Survey of Random Forest Based Methods for Intrusion Detection Systems. 48:1-48:36 - Cláudio Gomes
, Casper Thule, David Broman, Peter Gorm Larsen
, Hans Vangheluwe
:
Co-Simulation: A Survey. 49:1-49:33 - Roberto Baldoni, Emilio Coppa
, Daniele Cono D'Elia
, Camil Demetrescu, Irene Finocchi
:
A Survey of Symbolic Execution Techniques. 50:1-50:39 - Fatemeh Shirazi, Milivoj Simeonovski, Muhammad Rizwan Asghar
, Michael Backes, Claudia Díaz:
A Survey on Routing in Anonymous Communication Protocols. 51:1-51:39 - Niels Van Dijkhuizen, Jeroen van der Ham
:
A Survey of Network Traffic Anonymisation Techniques and Implementations. 52:1-52:27 - Wellington Moreira de Oliveira, Daniel de Oliveira, Vanessa Braganholo:
Provenance Analytics for Workflow-Based Computational Experiments: A Survey. 53:1-53:25 - Nathan Hanford
, Vishal Ahuja, Matthew K. Farrens, Brian Tierney, Dipak Ghosal:
A Survey of End-System Optimizations for High-Speed Networks. 54:1-54:36 - Ali Ahmadian Ramaki, Abbas Rasoolzadegan
, Abbas Ghaemi Bafghi:
A Systematic Mapping Study on Intrusion Alert Analysis in Intrusion Detection Systems. 55:1-55:41 - Stylianos I. Venieris
, Alexandros Kouris, Christos-Savvas Bouganis
:
Toolflows for Mapping Convolutional Neural Networks on FPGAs: A Survey and Future Directions. 56:1-56:39 - Isabel Wagner
, David Eckhoff:
Technical Privacy Metrics: A Systematic Survey. 57:1-57:38 - Ayman Meidan
, J. A. García-García, Isabel M. Ramos, María José Escalona:
Measuring Software Process: A Systematic Mapping Study. 58:1-58:32 - Jungmin Son
, Rajkumar Buyya
:
A Taxonomy of Software-Defined Networking (SDN)-Enabled Cloud Computing. 59:1-59:36 - Safiollah Heidari
, Yogesh Simmhan
, Rodrigo N. Calheiros
, Rajkumar Buyya
:
Scalable Graph Processing Frameworks: A Taxonomy and Open Challenges. 60:1-60:53 - Tao Chen
, Rami Bahsoon, Xin Yao
:
A Survey and Taxonomy of Self-Aware and Self-Adaptive Cloud Autoscaling Systems. 61:1-61:40 - Yike Liu
, Tara Safavi, Abhilash Dighe, Danai Koutra:
Graph Summarization Methods and Applications: A Survey. 62:1-62:34 - Peter Ivie
, Douglas Thain
:
Reproducibility in Scientific Computing. 63:1-63:36 - Jianzhong Qi
, Rui Zhang, Christian S. Jensen
, Kotagiri Ramamohanarao, Jiayuan He
:
Continuous Spatial Query Processing: A Survey of Safe Region Based Techniques. 64:1-64:39 - Kalaivani Sundararajan
, Damon L. Woodard:
Deep Learning for Biometrics: A Survey. 65:1-65:34
Volume 51, Number 4, September 2018
- Massimo Quadrana
, Paolo Cremonesi
, Dietmar Jannach:
Sequence-Aware Recommender Systems. 66:1-66:36 - Yury Zhauniarovich
, Issa Khalil
, Ting Yu, Marc Dacier:
A Survey on Malicious Domains Detection through DNS Data Analysis. 67:1-67:36 - Mireia Farrús
:
Voice Disguise in Automatic Speaker Recognition. 68:1-68:22 - Marcus Botacin
, Paulo Lício de Geus
, André Ricardo Abed Grégio
:
Who Watches the Watchmen: A Security-focused Review on Current State-of-the-art Techniques, Tools, and Methods for Systems and Binary Analysis on Modern Platforms. 69:1-69:34 - Keman Huang
, Michael D. Siegel, Stuart E. Madnick:
Systematically Understanding the Cyber Attack Business: A Survey. 70:1-70:36 - Zahraa Said Abdallah
, Mohamed Medhat Gaber
, Bala Srinivasan, Shonali Krishnaswamy:
Activity Recognition with Evolving Data Streams: A Review. 71:1-71:36 - Kizheppatt Vipin, Suhaib A. Fahmy
:
FPGA Dynamic and Partial Reconfiguration: A Survey of Architectures, Methods, and Applications. 72:1-72:39 - Chenhao Qu
, Rodrigo N. Calheiros
, Rajkumar Buyya
:
Auto-Scaling Web Applications in Clouds: A Taxonomy and Survey. 73:1-73:33 - Eugene Siow
, Thanassis Tiropanis, Wendy Hall
:
Analytics for the Internet of Things: A Survey. 74:1-74:36 - Peter Juma Ochieng
, Swaib Kyanda:
Large-Scale Ontology Matching: State-of-the-Art Analysis. 75:1-75:35 - Jairo Giraldo
, David I. Urbina, Alvaro A. Cárdenas, Junia Valente, Mustafa Amir Faisal, Justin Ruths, Nils Ole Tippenhauer, Henrik Sandberg
, Richard Candell
:
A Survey of Physics-Based Attack Detection in Cyber-Physical Systems. 76:1-76:36 - Edward Toth
, Sanjay Chawla:
Group Deviation Detection Methods: A Survey. 77:1-77:38 - Lynda Tamine
, Mariam Daoud:
Evaluation in Contextual Information Retrieval: Foundations and Recent Advances within the Challenges of Context Dynamicity and Data Privacy. 78:1-78:36 - Abbas Acar
, Hidayet Aksu, A. Selcuk Uluagac
, Mauro Conti
:
A Survey on Homomorphic Encryption Schemes: Theory and Implementation. 79:1-79:35 - Xiao Han
, Nizar Kheir, Davide Balzarotti:
Deception Techniques in Computer Security: A Research Perspective. 80:1-80:36 - Miltiadis Allamanis
, Earl T. Barr
, Premkumar T. Devanbu, Charles Sutton:
A Survey of Machine Learning for Big Code and Naturalness. 81:1-81:37 - Harcharan Jit Singh
, Seema Bawa:
Scalable Metadata Management Techniques for Ultra-Large Distributed Storage Systems - A Systematic Review. 82:1-82:37 - Gowtham Atluri, Anuj Karpatne
, Vipin Kumar:
Spatio-Temporal Data Mining: A Survey of Problems and Methods. 83:1-83:41 - Marcin Wylot, Manfred Hauswirth, Philippe Cudré-Mauroux
, Sherif Sakr
:
RDF Data Storage and Query Processing Schemes: A Survey. 84:1-84:36 - Paula Fortuna
, Sérgio Nunes
:
A Survey on Automatic Detection of Hate Speech in Text. 85:1-85:30 - Adam Czajka
, Kevin W. Bowyer
:
Presentation Attack Detection for Iris Recognition: An Assessment of the State-of-the-Art. 86:1-86:35 - Nishant Gupta
, Vibhash Yadav, Mayank Singh
:
Automated Regression Test Case Generation for Web Application: A Survey. 87:1-87:25
Volume 51, Number 5, January 2019
- Mohammad Naim Rastgoo
, Bahareh Nakisa
, Andry Rakotonirainy
, Vinod Chandran, Dian Tjondronegoro:
A Critical Review of Proactive Detection of Driver Stress Levels Based on Multimodal Measurements. 88:1-88:35 - Changsheng Wan
, Li Wang, Vir V. Phoha
:
A Survey on Gait Recognition. 89:1-89:35 - Christophe Kiennert, Ziad Ismail
, Hervé Debar
, Jean Leneutre:
A Survey on Game-Theoretic Approaches for Intrusion Detection and Response Optimization. 90:1-90:31 - Alexandra Covaci
, Longhao Zou
, Irina Tal
, Gabriel-Miro Muntean
, Gheorghita Ghinea
:
Is Multimedia Multisensorial? - A Review of Mulsemedia Systems. 91:1-91:35 - Samira Pouyanfar, Saad Sadiq, Yilin Yan, Haiman Tian, Yudong Tao
, Maria E. Presa Reyes, Mei-Ling Shyu, Shu-Ching Chen
, S. S. Iyengar
:
A Survey on Deep Learning: Algorithms, Techniques, and Applications. 92:1-92:36 - Riccardo Guidotti
, Anna Monreale, Salvatore Ruggieri, Franco Turini, Fosca Giannotti, Dino Pedreschi
:
A Survey of Methods for Explaining Black Box Models. 93:1-93:42 - Gildas Avoine
, Muhammed Ali Bingöl
, Ioana Boureanu, Srdjan Capkun, Gerhard P. Hancke
, Süleyman Kardas, Chong Hee Kim, Cédric Lauradoux, Benjamin Martin, Jorge Munilla, Alberto Peinado, Kasper Bonne Rasmussen, Dave Singelée, Aslan Tchamkerten, Rolando Trujillo-Rasua
, Serge Vaudenay:
Security of Distance-Bounding: A Survey. 94:1-94:33 - Rui Henriques
, Sara C. Madeira
:
Triclustering Algorithms for Three-Dimensional Data Analysis: A Comprehensive Survey. 95:1-95:43 - Amir H. Ashouri
, William Killian, John Cavazos, Gianluca Palermo, Cristina Silvano:
A Survey on Compiler Autotuning using Machine Learning. 96:1-96:42 - Dileep Kumar
, Akash Gandhamal, Sanjay N. Talbar
, Ahmad Fadzil Mohamad Hani:
Knee Articular Cartilage Segmentation from MR Images: A Review. 97:1-97:29 - Ming Liu, Zhi Xue, Xianghua Xu, Changmin Zhong, Jinjun Chen
:
Host-Based Intrusion Detection System with System Calls: Review and Future Trends. 98 - Kevin Doherty
, Gavin J. Doherty
:
Engagement in HCI: Conception, Theory and Measurement. 99:1-99:39 - Giannis Tziakouris
, Rami Bahsoon, Muhammad Ali Babar:
A Survey on Self-Adaptive Security for Large-scale Open Environments. 100:1-100:42 - Diego de Siqueira Braga
, Marco Niemann, Bernd Hellingrath
, Fernando Buarque de Lima Neto
:
Survey on Computational Trust and Reputation Models. 101:1-101:40 - Felipe Grando
, Lisandro Zambenedetti Granville
, Luís C. Lamb
:
Machine Learning in Network Centrality Measures: Tutorial and Outlook. 102:1-102:32 - Vaia Moustaka
, Athena Vakali, Leonidas G. Anthopoulos
:
A Systematic Review for Smart City Data Analytics. 103:1-103:41 - Sukhpal Singh Gill
, Rajkumar Buyya
:
A Taxonomy and Future Directions for Sustainable Cloud Computing: 360 Degree View. 104:1-104:33 - Rajkumar Buyya
, Satish Narayana Srirama
, Giuliano Casale
, Rodrigo N. Calheiros, Yogesh Simmhan
, Blesson Varghese, Erol Gelenbe, Bahman Javadi, Luis Miguel Vaquero
, Marco A. S. Netto, Adel Nadjaran Toosi
, Maria Alejandra Rodriguez
, Ignacio Martín Llorente, Sabrina De Capitani di Vimercati, Pierangela Samarati, Dejan S. Milojicic
, Carlos A. Varela, Rami Bahsoon, Marcos Dias de Assunção, Omer F. Rana
, Wanlei Zhou
, Hai Jin, Wolfgang Gentzsch, Albert Y. Zomaya
, Haiying Shen:
A Manifesto for Future Generation Cloud Computing: Research Directions for the Next Decade. 105:1-105:38 - Alisa Smirnova
, Philippe Cudré-Mauroux
:
Relation Extraction Using Distant Supervision: A Survey. 106:1-106:35 - Muhammad Ziad Nayyer, Imran Raza
, Syed Asad Hussain:
A Survey of Cloudlet-Based Mobile Augmentation Approaches for Resource Optimization. 107:1-107:28 - Andreas Biørn-Hansen
, Tor-Morten Grønli
, Gheorghita Ghinea
:
A Survey and Taxonomy of Core Concepts and Research Challenges in Cross-Platform Mobile Development. 108:1-108:34 - Yasir Imtiaz Khan
, Alexandros Konios
, Nicolas Guelfi:
A Survey of Petri Nets Slicing. 109:1-109:32
Volume 51, Number 6, January 2019
- Ping Wang
, Yan Li, Chandan K. Reddy:
Machine Learning for Survival Analysis: A Survey. 110:1-110:36 - Ana Juan Ferrer
, Joan Manuel Marquès, Josep Jorba
:
Towards the Decentralised Cloud: Survey on Approaches and Challenges for Mobile, Ad hoc, and Edge Computing. 111:1-111:36 - Qiong Gui, Maria V. Ruiz-Blondet, Sarah Laszlo, Zhanpeng Jin
:
A Survey on Brain Biometrics. 112:1-112:38 - Brett W. Israelsen, Nisar R. Ahmed
:
"Dave...I can assure you ...that it's going to be all right ..." A Definition, Case for, and Survey of Algorithmic Assurances in Human-Autonomy Trust Relationships. 113:1-113:37 - Michel S. Bonfim, Kelvin L. Dias, Stenio F. L. Fernandes
:
Integrated NFV/SDN Architectures: A Systematic Literature Review. 114:1-114:39 - Janibul Bashir
, Eldhose Peter, Smruti R. Sarangi:
A Survey of On-Chip Optical Interconnects. 115:1-115:34 - Jasenka Dizdarevic, Francisco Carpio, Admela Jukan, Xavi Masip-Bruin
:
A Survey of Communication Protocols for Internet of Things and Related Challenges of Fog and Cloud Computing Integration. 116:1-116:29 - Moisés Díaz
, Miguel A. Ferrer
, Donato Impedovo
, Muhammad Imran Malik, Giuseppe Pirlo, Réjean Plamondon:
A Perspective Analysis of Handwritten Signature Technology. 117:1-117:39 - Md. Zakir Hossain
, Ferdous Sohel
, Mohd Fairuz Shiratuddin
, Hamid Laga:
A Comprehensive Survey of Deep Learning for Image Captioning. 118:1-118:36 - Abdessalam Elhabbash
, Faiza Samreen, James Hadley, Yehia Elkhatib
:
Cloud Brokerage: A Systematic Survey. 119:1-119:28 - Pawan Kumar
, Rakesh Kumar:
Issues and Challenges of Load Balancing Techniques in Cloud Computing: A Survey. 120:1-120:35 - Amani Abu Jabal
, Maryam Davari, Elisa Bertino, Christian Makaya, Seraphin B. Calo, Dinesh C. Verma, Alessandra Russo
, Christopher Williams:
Methods and Tools for Policy Analysis. 121:1-121:35 - Abdul Manazir, Khalid Raza
:
Recent Developments in Cartesian Genetic Programming and its Variants. 122:1-122:29 - Shirin Tavara
:
Parallel Computing of Support Vector Machines: A Survey. 123:1-123:38 - Rafael Luiz Testa
, Cléber Gimenez Corrêa
, Ariane Machado-Lima
, Fátima L. S. Nunes
:
Synthesis of Facial Expressions in Photographs: Characteristics, Approaches, and Challenges. 124:1-124:35 - Marco Patrignani
, Amal Ahmed
, Dave Clarke:
Formal Approaches to Secure Compilation: A Survey of Fully Abstract Compilation and Related Work. 125:1-125:36 - Juan A. Rico-Gallego
, Juan Carlos Díaz Martín, Ravi Reddy Manumachu
, Alexey L. Lastovetsky
:
A Survey of Communication Performance Models for High-Performance Computing. 126:1-126:36 - Niklas Kolbe, Sylvain Kubler
, Jérémy Robert, Yves Le Traon, Arkady B. Zaslavsky:
Linked Vocabulary Recommendation Tools for Internet of Things: A Survey. 127:1-127:31 - Hamid Nejatollahi
, Nikil D. Dutt
, Sandip Ray, Francesco Regazzoni
, Indranil Banerjee, Rosario Cammarota:
Post-Quantum Lattice-Based Cryptography Implementations: A Survey. 129:1-129:41 - Jin-Hee Cho, Shouhuai Xu
, Patrick M. Hurley
, Matthew MacKay, Trevor Benjamin, Mark R. Beaumont
:
STRAM: Measuring the Trustworthiness of Computer-Based Systems. 128:1-128:47 - Sandro Pinto
, Nuno Santos
:
Demystifying Arm TrustZone: A Comprehensive Survey. 130:1-130:36 - Jiajian Xiao, Philipp Andelfinger
, David Eckhoff, Wentong Cai
, Alois C. Knoll
:
A Survey on Agent-based Simulation Using Hardware Accelerators. 131:1-131:35

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.