ACM DL

Computing Surveys (CSUR)

Menu

Search Issue
enter search term and/or author name below:

Archive


ACM Computing Surveys (CSUR), Volume 46 Issue 4, April 2014

A survey on ontologies for human behavior recognition
Natalia Díaz Rodríguez, M. P. Cuéllar, Johan Lilius, Miguel Delgado Calvo-Flores
Article No.: 43
DOI: 10.1145/2523819

Describing user activity plays an essential role in ambient intelligence. In this work, we review different methods for human activity recognition, classified as data-driven and knowledge-based techniques. We focus on context ontologies whose...

A survey on concept drift adaptation
João Gama, Indrė Žliobaitė, Albert Bifet, Mykola Pechenizkiy, Abdelhamid Bouchachia
Article No.: 44
DOI: 10.1145/2523813

Concept drift primarily refers to an online supervised learning scenario when the relation between the input data and the target variable changes over time. Assuming a general knowledge of supervised learning in this article, we characterize...

Shortest-path queries in static networks
Christian Sommer
Article No.: 45
DOI: 10.1145/2530531

We consider the point-to-point (approximate) shortest-path query problem, which is the following generalization of the classical single-source (SSSP) and all-pairs shortest-path (APSP) problems: we are first presented with a...

A catalog of stream processing optimizations
Martin Hirzel, Robert Soulé, Scott Schneider, Buğra Gedik, Robert Grimm
Article No.: 46
DOI: 10.1145/2528412

Various research communities have independently arrived at stream processing as a programming model for efficient and parallel computing. These communities include digital signal processing, databases, operating systems, and complex event...

A survey on techniques for improving the energy efficiency of large-scale distributed systems
Anne-Cecile Orgerie, Marcos Dias de Assuncao, Laurent Lefevre
Article No.: 47
DOI: 10.1145/2532637

The great amounts of energy consumed by large-scale computing and network systems, such as data centers and supercomputers, have been a major source of concern in a society increasingly reliant on information technology. Trying to tackle this...

Fault-tolerant scheduling in homogeneous real-time systems
C. M. Krishna
Article No.: 48
DOI: 10.1145/2534028

Real-time systems are one of the most important applications of computers, both in commercial terms and in terms of social impact. Increasingly, real-time computers are used to control life-critical applications and need to meet stringent...

A survey on standards for real-time distribution middleware
Héctor Pérez, J. Javier Gutiérrez
Article No.: 49
DOI: 10.1145/2532636

This survey covers distribution standards oriented to the development of distributed real-time systems. Currently, there are many distribution standards that provide a wide and different set of real-time facilities to control the temporal aspects...

When Errors Become the Rule: Twenty Years with Transformation-Based Learning
Marcus Uneson
Article No.: 50
DOI: 10.1145/2534189

Transformation-based learning (TBL) is a machine learning method for, in particular, sequential classification, invented by Eric Brill [Brill 1993b, 1995a]. It is widely used within computational linguistics and natural language processing, but...

Interest management for distributed virtual environments: A survey
Elvis S. Liu, Georgios K. Theodoropoulos
Article No.: 51
DOI: 10.1145/2535417

The past two decades have witnessed an explosion in the deployment of large-scale distributed simulations and distributed virtual environments in different domains, including military and academic simulation systems, social media, and commercial...

Spaces, Trees, and Colors: The algorithmic landscape of document retrieval on sequences
Gonzalo Navarro
Article No.: 52
DOI: 10.1145/2535933

Document retrieval is one of the best-established information retrieval activities since the ’60s, pervading all search engines. Its aim is to obtain, from a collection of text documents, those most relevant to a pattern query. Current...

Memory encryption: A survey of existing techniques
Michael Henson, Stephen Taylor
Article No.: 53
DOI: 10.1145/2566673

Memory encryption has yet to be used at the core of operating system designs to provide confidentiality of code and data. As a result, numerous vulnerabilities exist at every level of the software stack. Three general approaches have evolved to...

A survey on server-side approaches to securing web applications
Xiaowei Li, Yuan Xue
Article No.: 54
DOI: 10.1145/2541315

Web applications are one of the most prevalent platforms for information and service delivery over the Internet today. As they are increasingly used for critical services, web applications have become a popular and valuable target for security...

A survey of intrusion detection techniques for cyber-physical systems
Robert Mitchell, Ing-Ray Chen
Article No.: 55
DOI: 10.1145/2542049

Pervasive healthcare systems, smart grids, and unmanned aircraft systems are examples of Cyber-Physical Systems (CPSs) that have become highly integrated in the modern world. As this integration deepens, the importance of securing these systems...