Computing Surveys (CSUR)


Search Issue
enter search term and/or author name


ACM Computing Surveys (CSUR), Volume 46 Issue 2, November 2013

A survey of smart data pricing: Past proposals, current plans, and future trends
Soumya Sen, Carlee Joe-Wong, Sangtae Ha, Mung Chiang
Article No.: 15
DOI: 10.1145/2543581.2543582

Traditionally, network operators have used simple flat-rate broadband data plans for both wired and wireless network access. But today, with the popularity of mobile devices and exponential growth of apps, videos, and clouds, service providers are...

XL peer-to-peer pub/sub systems
Anne-Marie Kermarrec, Peter Triantafillou
Article No.: 16
DOI: 10.1145/2543581.2543583

Increasingly, one of the most prominent ways to disseminate information on the Web is through “notifications” (also known as alerts), and as such they are at the core of many large-scale applications. For instance, users are notified...

From taxi GPS traces to social and community dynamics: A survey
Pablo Samuel Castro, Daqing Zhang, Chao Chen, Shijian Li, Gang Pan
Article No.: 17
DOI: 10.1145/2543581.2543584

Vehicles equipped with GPS localizers are an important sensory device for examining people’s movements and activities. Taxis equipped with GPS localizers serve the transportation needs of a large number of people driven by diverse needs;...

Curiosity: From psychology to computation
Qiong Wu, Chunyan Miao
Article No.: 18
DOI: 10.1145/2543581.2543585

Literature in psychology has shown that curiosity is the intrinsic motivation for exploration, learning, and creativity. Various forms of computational curiosity have been developed to provide artificial beings with desirable functions, such as...

Overview of auditory representations in human-machine interfaces
Ádám Csapó, György Wersényi
Article No.: 19
DOI: 10.1145/2543581.2543586

In recent years, a large number of research projects have focused on the use of auditory representations in a broadened scope of application scenarios. Results in such projects have shown that auditory elements can effectively complement other...

VoIP steganography and its Detection—A survey
Wojciech Mazurczyk
Article No.: 20
DOI: 10.1145/2543581.2543587

Steganography is an ancient art that encompasses various techniques of information hiding, the aim of which is to embed secret information into a carrier message. Steganographic methods are usually aimed at hiding the very existence of the...

Synchronous digital circuits as functional programs
Peter Gammie
Article No.: 21
DOI: 10.1145/2543581.2543588

Functional programming techniques have been used to describe synchronous digital circuits since the early 1980s. Here we survey the systems and formal underpinnings that constitute this tradition. We situate these techniques with respect to other...

Unsolved problems in visibility graphs of points, segments, and polygons
Subir K. Ghosh, Partha P. Goswami
Article No.: 22
DOI: 10.1145/2543581.2543589

In this survey article, we present open problems and conjectures on visibility graphs of points, segments, and polygons along with necessary backgrounds for understanding them.


The perception of egocentric distances in virtual environments - A review
Rebekka S. Renner, Boris M. Velichkovsky, Jens R. Helmert
Article No.: 23
DOI: 10.1145/2543581.2543590

Over the last 20 years research has been done on the question of how egocentric distances, i.e., the subjectively reported distance from a human observer to an object, are perceived in virtual environments. This review surveys the existing...

Synchronous programming in audio processing: A lookup table oscillator case study
Karim Barkati, Pierre Jouvelot
Article No.: 24
DOI: 10.1145/2543581.2543591

The adequacy of a programming language to a given software project or application domain is often considered a key factor of success in software development and engineering, even though little theoretical or practical information is readily...

From RSSI to CSI: Indoor localization via channel response
Zheng Yang, Zimu Zhou, Yunhao Liu
Article No.: 25
DOI: 10.1145/2543581.2543592

The spatial features of emitted wireless signals are the basis of location distinction and determination for wireless indoor localization. Available in mainstream wireless signal measurements, the Received Signal Strength Indicator (RSSI) has been...

Using grammars for pattern recognition in images: A systematic review
Ricardo Wandré Dias Pedro, Fátima L. S. Nunes, Ariane Machado-Lima
Article No.: 26
DOI: 10.1145/2543581.2543593

Grammars are widely used to describe string languages such as programming and natural languages and, more recently, biosequences. Moreover, since the 1980s grammars have been used in computer vision and related areas. Some factors accountable for...

Survey and analysis of current mobile learning applications and technologies
Orlando R. E. Pereira, Joel J. P. C. Rodrigues
Article No.: 27
DOI: 10.1145/2543581.2543594

Distance learning, electronic learning, and mobile learning offer content, methods, and technologies that decrease the limitations of traditional education. Mobile learning (m-learning) is an extension of distance education, supported by mobile...

The evolution of the laws of software evolution: A discussion based on a systematic literature review
Israel Herraiz, Daniel Rodriguez, Gregorio Robles, Jesus M. Gonzalez-Barahona
Article No.: 28
DOI: 10.1145/2543581.2543595

After more than 40 years of life, software evolution should be considered as a mature field. However, despite such a long history, many research questions still remain open, and controversial studies about the validity of the laws of software...

People reidentification in surveillance and forensics: A survey
Roberto Vezzani, Davide Baltieri, Rita Cucchiara
Article No.: 29
DOI: 10.1145/2543581.2543596

The field of surveillance and forensics research is currently shifting focus and is now showing an ever increasing interest in the task of people reidentification. This is the task of assigning the same identifier to all instances of a particular...