ACM DL

Computing Surveys (CSUR)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Computing Surveys (CSUR), Volume 43 Issue 2, January 2011

Discrete wavelet transform-based time series analysis and mining
Pimwadee Chaovalit, Aryya Gangopadhyay, George Karabatis, Zhiyuan Chen
Article No.: 6
DOI: 10.1145/1883612.1883613

Time series are recorded values of an interesting phenomenon such as stock prices, household incomes, or patient heart rates over a period of time. Time series data mining focuses on discovering interesting patterns in such data. This article...

One step forward: Linking wireless self-organizing network validation techniques with formal testing approaches
Aline Carneiro Viana, Stephane Maag, Fatiha Zaidi
Article No.: 7
DOI: 10.1145/1883612.1883614

Wireless self-organizing networks (WSONs) have attracted considerable attention from the network research community; however, the key for their success is the rigorous validation of the properties of the network protocols. Applications of risk or...

A survey of DHT security techniques
Guido Urdaneta, Guillaume Pierre, Maarten Van Steen
Article No.: 8
DOI: 10.1145/1883612.1883615

Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable attention ever since their introduction in 2001. Unfortunately, DHT-based systems have been shown to be notoriously difficult to protect against security...

The failure detector abstraction
Felix C. Freiling, Rachid Guerraoui, Petr Kuznetsov
Article No.: 9
DOI: 10.1145/1883612.1883616

A failure detector is a fundamental abstraction in distributed computing. This article surveys this abstraction through two dimensions. First we study failure detectors as building blocks to simplify the design of reliable distributed...

Auctions and bidding: A guide for computer scientists
Simon Parsons, Juan A. Rodriguez-Aguilar, Mark Klein
Article No.: 10
DOI: 10.1145/1883612.1883617

There is a veritable menagerie of auctions—single-dimensional, multi-dimensional, single-sided, double-sided, first-price, second-price, English, Dutch, Japanese, sealed-bid—and these have been extensively discussed and analyzed in the...

A survey of combinatorial testing
Changhai Nie, Hareton Leung
Article No.: 11
DOI: 10.1145/1883612.1883618

Combinatorial Testing (CT) can detect failures triggered by interactions of parameters in the Software Under Test (SUT) with a covering array test suite generated by some sampling mechanisms. It has been an active field of research in the last...

A review of grid authentication and authorization technologies and support for federated access control
Wei Jie, Junaid Arshad, Richard Sinnott, Paul Townend, Zhou Lei
Article No.: 12
DOI: 10.1145/1883612.1883619

Grid computing facilitates resource sharing typically to support distributed virtual organizations (VO). The multi-institutional nature of a grid environment introduces challenging security issues, especially with regard to authentication and...