w/in this Title
ACM Computing Surveys
1-10 of 195 reviews
Bridging the chasm: a survey of software engineering practice in scientific programming
Storer T. ACM Computing Surveys 50(4): 1-32, 2017. Type: Article
Software is notoriously difficult to get right even for experienced, professional software developers using modern software engineering practices. If these experts can’t produce correct programs, what chance do mere scientists have of writin...
Nov 2 2017
Fog computing for sustainable smart cities: a survey
Perera C., Qin Y., Estrella J., Reiff-Marganiec S., Vasilakos A. ACM Computing Surveys 50(3): 1-43, 2017. Type: Article
Fog computing attempts to bring the computational capabilities of clouds closer to the variety of devices that make up the Internet of Things (IoT) by creating local mini-clouds. It appears to be a very promising way to support large clusters of s...
Oct 5 2017
A survey on malware detection using data mining techniques
Ye Y., Li T., Adjeroh D., Iyengar S. ACM Computing Surveys 50(3): 1-40, 2017. Type: Article
It is not new that software is eating the world . Industries and businesses everywhere are being “softwareized.” Meanwhile, we cannot deny that malware (malicious software) is also having a feast. This paper provides a comprehensive...
Sep 22 2017
A taxonomy and survey of cloud resource orchestration techniques
Weerasiri D., Barukh M., Benatallah B., Sheng Q., Ranjan R. ACM Computing Surveys 50(2): 1-41, 2017. Type: Article
Cloud services provide computing resources (for example, infrastructure, platform, and software) as services. Utilizing these cloud resources requires a complex life cycle process that involves select, describe, configure, deploy, and manage steps...
Aug 9 2017
A survey on systems security metrics
Pendleton M., Garcia-Lebron R., Cho J., Xu S. ACM Computing Surveys 49(4): 1-35, 2017. Type: Article
As information security becomes a mainstream discipline and is talked about on primetime news and in cafes, among the first questions after the dust around the breach of the day settles would be whether we are secure, and how we measure whether we...
Aug 3 2017
A survey on ensemble learning for data stream classification
Gomes H., Barddal J., Enembreck F., Bifet A. ACM Computing Surveys 50(2): 1-36, 2017. Type: Article
The automation of several processes, such as business transactions, smartphones, and various types of sensors, has severely increased the number of data stream generators. In data stream classification, data items are represented by a vector of fe...
Jun 16 2017
Presentation attack detection methods for face recognition systems: a comprehensive survey
Ramachandra R., Busch C. ACM Computing Surveys 50(1): 1-37, 2017. Type: Article
This paper deals in general with biometric technology and specifically with facial recognition. In this offering, the authors present an exhaustive review of all pioneering efforts on facial presentation attack detection (PAD) algorithms. Accordin...
May 30 2017
Computer vision and natural language processing: recent approaches in multimedia and robotics
Wiriyathammabhum P., Summers-Stay D., Fermüller C., Aloimonos Y. ACM Computing Surveys 49(4): 1-44, 2017. Type: Article
Robot learning operates at the crossroads of disciplines such as machine learning, robotics engineering, and developmental robotics for lifelong learning. Robot skills can be divided into four categories: sensorimotor (locomotion, grasping); inter...
Apr 21 2017
Toward engineering a secure Android ecosystem: a survey of existing techniques
Xu M., Song C., Ji Y., Shih M., Lu K., Zheng C., Duan R., Jang Y., Lee B., Qian C., Lee S., Kim T. ACM Computing Surveys 49(2): 1-47, 2016. Type: Article
Android has clearly surpassed every other mobile operating system in terms of popularity, adoption rates, and alternative uses (Internet of Things, IoT). With mobile malware increasing faster than mobile commerce (mCommerce), it is worth understan...
Mar 9 2017
A survey on wireless indoor localization from the device perspective
Xiao J., Zhou Z., Yi Y., Ni L. ACM Computing Surveys 49(2): 1-31, 2016. Type: Article
This long survey considers the problems related to wirelessly localizing objects in an indoor setting. For the purpose of dividing the problem, the authors consider two categories: device based and device free. Device-based localization requires t...
Oct 28 2016
Reproduction in whole or in part without permission is prohibited. Copyright © 2000-2017 ThinkLoud, Inc.