Computing Surveys (CSUR)


Search Issue
enter search term and/or author name


ACM Computing Surveys (CSUR), Volume 45 Issue 3, June 2013

Game theory meets network security and privacy
Mohammad Hossein Manshaei, Quanyan Zhu, Tansu Alpcan, Tamer Bacşar, Jean-Pierre Hubaux
Article No.: 25
DOI: 10.1145/2480741.2480742

This survey provides a structured and comprehensive overview of research on security and privacy in computer and communication networks that use game-theoretic approaches. We present a selected set of works to highlight the application of game...

Intermediate representations in imperative compilers: A survey
James Stanier, Des Watson
Article No.: 26
DOI: 10.1145/2480741.2480743

Compilers commonly translate an input program into an intermediate representation (IR) before optimizing it and generating code. Over time there have been a number of different approaches to designing and implementing IRs. Different IRs have...

A survey on smartphone-based systems for opportunistic user context recognition
Seyed Amir Hoseini-Tabatabaei, Alexander Gluhak, Rahim Tafazolli
Article No.: 27
DOI: 10.1145/2480741.2480744

The ever-growing computation and storage capability of mobile phones have given rise to mobile-centric context recognition systems, which are able to sense and analyze the context of the carrier so as to provide an appropriate level of service. As...

Recovery within long-running transactions
Christian Colombo, Gordon J. Pace
Article No.: 28
DOI: 10.1145/2480741.2480745

As computer systems continue to grow in complexity, the possibility of failure increases. At the same time, the increase in computer system pervasiveness in day-to-day activities bring along increased expectations on their reliability. This has...

Phase-change memory: An architectural perspective
Omer Zilberberg, Shlomo Weiss, Sivan Toledo
Article No.: 29
DOI: 10.1145/2480741.2480746

This article surveys the current state of phase-change memory (PCM) as a nonvolatile memory technology set to replace flash and DRAM in modern computerized systems. It has been researched and developed in the last decade, with researchers...

Detection and classification of peer-to-peer traffic: A survey
João V. Gomes, Pedro R. M. Inácio, Manuela Pereira, Mário M. Freire, Paulo P. Monteiro
Article No.: 30
DOI: 10.1145/2480741.2480747

The emergence of new Internet paradigms has changed the common properties of network data, increasing the bandwidth consumption and balancing traffic in both directions. These facts raise important challenges, making it necessary to devise...

A survey of intelligent assistants for data analysis
Floarea Serban, Joaquin Vanschoren, Jörg-Uwe Kietz, Abraham Bernstein
Article No.: 31
DOI: 10.1145/2480741.2480748

Research and industry increasingly make use of large amounts of data to guide decision-making. To do this, however, data needs to be analyzed in typically nontrivial refinement processes, which require technical expertise about methods and...

A survey on cache tuning from a power/energy perspective
Wei Zang, Ann Gordon-Ross
Article No.: 32
DOI: 10.1145/2480741.2480749

Low power and/or energy consumption is a requirement not only in embedded systems that run on batteries or have limited cooling capabilities, but also in desktop and mainframes where chips require costly cooling techniques. Since the cache...

Power-reduction techniques for data-center storage systems
Tom Bostoen, Sape Mullender, Yolande Berbers
Article No.: 33
DOI: 10.1145/2480741.2480750

As data-intensive, network-based applications proliferate, the power consumed by the data-center storage subsystem surges. This survey summarizes, organizes, and integrates a decade of research on power-aware enterprise storage systems. All of the...

3D Virtual worlds and the metaverse: Current status and future possibilities
John David N. Dionisio, William G. Burns III, Richard Gilbert
Article No.: 34
DOI: 10.1145/2480741.2480751

Moving from a set of independent virtual worlds to an integrated network of 3D virtual worlds or Metaverse rests on progress in four areas: immersive realism, ubiquity of access and identity, interoperability, and scalability. For each area, the...

Exploration and exploitation in evolutionary algorithms: A survey
Matej Črepinšek, Shih-Hsi Liu, Marjan Mernik
Article No.: 35
DOI: 10.1145/2480741.2480752

“Exploration and exploitation are the two cornerstones of problem solving by search.” For more than a decade, Eiben and Schippers' advocacy for balancing between these two antagonistic cornerstones still greatly influences the research...

Survey on application-layer mechanisms for speech quality adaptation in VoIP
Leandro Silva Galvão De Carvalho, Edjair De Souza Mota
Article No.: 36
DOI: 10.1145/2480741.2480753

VoIP calls are sensitive to several impairments, such as delay and packet loss. One way to overcome these problems is by adaptively adjusting application-layer parameters to keep a minimum speech quality level. At the heart of self-adaptive...

A survey of task mapping on production grids
Xavier Grehant, Isabelle Demeure, Sverre Jarp
Article No.: 37
DOI: 10.1145/2480741.2480754

Grids designed for computationally demanding scientific applications started experimental phases ten years ago and have been continuously delivering computing power to a wide range of applications for more than half of this time. The observation...

Mathematical formalisms for performance evaluation of networks-on-chip
Abbas Eslami Kiasari, Axel Jantsch, Zhonghai Lu
Article No.: 38
DOI: 10.1145/2480741.2480755

This article reviews four popular mathematical formalisms—queueing theory, network calculus, schedulability analysis, and dataflow analysis—and how they have been applied to the analysis of on-chip communication...

On the practicality of cryptographic defences against pollution attacks in wireless network coding
Andrew Newell, Jing Dong, Cristina Nita-Rotaru
Article No.: 39
DOI: 10.1145/2480741.2480756

Numerous practical systems based on network coding have been proposed in recent years demonstrating the wide range of benefits of network coding, such as increased throughput, reliability, and energy efficiency. However, network coding systems are...

A survey of security issues in hardware virtualization
Gábor Pék, Levente Buttyán, Boldizsár Bencsáth
Article No.: 40
DOI: 10.1145/2480741.2480757

Virtualization is a powerful technology for increasing the efficiency of computing services; however, besides its advantages, it also raises a number of security issues. In this article, we provide a thorough survey of those security issues in...