ACM DL

Computing Surveys (CSUR)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Computing Surveys (CSUR), Volume 45 Issue 4, August 2013

Architectures of flexible symmetric key crypto engines—a survey: From hardware coprocessor to multi-crypto-processor system on chip
Lilian Bossuet, Michael Grand, Lubos Gaspar, Viktor Fischer, Guy Gogniat
Article No.: 41
DOI: 10.1145/2501654.2501655

Throughput, flexibility, and security form the design trilogy of reconfigurable crypto engines; they must be carefully considered without reducing the major role of classical design constraints, such as surface, power consumption, dependability,...

Semantic trajectories modeling and analysis
Christine Parent, Stefano Spaccapietra, Chiara Renso, Gennady Andrienko, Natalia Andrienko, Vania Bogorny, Maria Luisa Damiani, Aris Gkoulalas-Divanis, Jose Macedo, Nikos Pelekis, Yannis Theodoridis, Zhixian Yan
Article No.: 42
DOI: 10.1145/2501654.2501656

Focus on movement data has increased as a consequence of the larger availability of such data due to current GPS, GSM, RFID, and sensors techniques. In parallel, interest in movement has shifted from raw movement data analysis to more...

Overlapping community detection in networks: The state-of-the-art and comparative study
Jierui Xie, Stephen Kelley, Boleslaw K. Szymanski
Article No.: 43
DOI: 10.1145/2501654.2501657

This article reviews the state-of-the-art in overlapping community detection algorithms, quality measures, and benchmarks. A thorough comparison of different algorithms (a total of fourteen) is provided. In addition to community-level...

Near-duplicate video retrieval: Current research and future trends
Jiajun Liu, Zi Huang, Hongyun Cai, Heng Tao Shen, Chong Wah Ngo, Wei Wang
Article No.: 44
DOI: 10.1145/2501654.2501658

The exponential growth of online videos, along with increasing user involvement in video-related activities, has been observed as a constant phenomenon during the last decade. User's time spent on video capturing, editing, uploading, searching,...

Survey and taxonomy of botnet research through life-cycle
Rafael A. Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro García-Teodoro
Article No.: 45
DOI: 10.1145/2501654.2501659

Of all current threats to cybersecurity, botnets are at the top of the list. In consequence, interest in this problem is increasing rapidly among the research community and the number of publications on the question has grown exponentially in...

The state of peer-to-peer network simulators
Anirban Basu, Simon Fleming, James Stanier, Stephen Naicken, Ian Wakeman, Vijay K. Gurbani
Article No.: 46
DOI: 10.1145/2501654.2501660

Networking research often relies on simulation in order to test and evaluate new ideas. An important requirement of this process is that results must be reproducible so that other researchers can replicate, validate, and extend existing work. We...

A survey of trust in social networks
Wanita Sherchan, Surya Nepal, Cecile Paris
Article No.: 47
DOI: 10.1145/2501654.2501661

Web-based social networks have become popular as a medium for disseminating information and connecting like-minded people. The public accessibility of such networks with the ability to share opinions, thoughts, information, and experience offers...

A survey of checker architectures
Rajshekar Kalayappan, Smruti R. Sarangi
Article No.: 48
DOI: 10.1145/2501654.2501662

Reliability is quickly becoming a primary design constraint for high-end processors because of the inherent limits of manufacturability, extreme miniaturization of transistors, and the growing complexity of large multicore chips. To achieve a high...

Analyzing and defending against web-based malware
Jian Chang, Krishna K. Venkatasubramanian, Andrew G. West, Insup Lee
Article No.: 49
DOI: 10.1145/2501654.2501663

Web-based malware is a growing threat to today's Internet security. Attacks of this type are prevalent and lead to serious security consequences. Millions of malicious URLs are used as distribution channels to propagate malware all over the Web....

A survey of pipelined workflow scheduling: Models and algorithms
Anne Benoit, Ümit V. Çatalyürek, Yves Robert, Erik Saule
Article No.: 50
DOI: 10.1145/2501654.2501664

A large class of applications need to execute the same workflow on different datasets of identical size. Efficient execution of such applications necessitates intelligent distribution of the application components and tasks on a parallel machine,...

Separation of concerns in feature diagram languages: A systematic survey
Arnaud Hubaux, Thein Than Tun, Patrick Heymans
Article No.: 51
DOI: 10.1145/2501654.2501665

The need for flexible customization of large feature-rich software systems, according to requirements of various stakeholders, has become an important problem in software development. Among the many software engineering approaches dealing with...

A survey on reactive programming
Engineer Bainomugisha, Andoni Lombide Carreton, Tom van Cutsem, Stijn Mostinckx, Wolfgang de Meuter
Article No.: 52
DOI: 10.1145/2501654.2501666

Reactive programming has recently gained popularity as a paradigm that is well-suited for developing event-driven and interactive applications. It facilitates the development of such applications by providing abstractions to express time-varying...

State-based model slicing: A survey
Kelly Androutsopoulos, David Clark, Mark Harman, Jens Krinke, Laurence Tratt
Article No.: 53
DOI: 10.1145/2501654.2501667

Slicing is a technique, traditionally applied to programs, for extracting the parts of a program that affect the values computed at a statement of interest. In recent years authors have begun to consider slicing at model level. We present a...

Decentralized resource discovery mechanisms for distributed computing in peer-to-peer environments
Daniel Lazaro, Joan Manuel Marques, Josep Jorba, Xavier Vilajosana
Article No.: 54
DOI: 10.1145/2501654.2501668

Resource discovery is an important part of distributed computing and resource sharing systems, like grids and utility computing. Because of the increasing importance of decentralized and peer-to-peer environments, characterized by high dynamism...

Critical success factors in enterprise resource planning systems: Review of the last decade
Levi Shaul, Doron Tauber
Article No.: 55
DOI: 10.1145/2501654.2501669

Organizations perceive ERP as a vital tool for organizational competition as it integrates dispersed organizational systems and enables flawless transactions and production. This review examines studies investigating Critical Success Factors...