Computing Surveys (CSUR)


Search Issue
enter search term and/or author name


ACM Computing Surveys (CSUR), Volume 47 Issue 2, January 2015

Survey of Temporal Information Retrieval and Related Applications
Ricardo Campos, Gaël Dias, Alípio M. Jorge, Adam Jatowt
Article No.: 15
DOI: 10.1145/2619088

Temporal information retrieval has been a topic of great interest in recent years. Its purpose is to improve the effectiveness of information retrieval methods by exploiting temporal information in documents and queries. In this article, we...

Graphical Modeling Tools for Systems Biology
Roswitha Gostner, Bianca Baldacci, Melissa J. Morine, Corrado Priami
Article No.: 16
DOI: 10.1145/2633461

Modeling biological systems to understand their mechanistic behavior is an important activity in molecular systems biology. Mathematical modeling typically requires deep mathematical or computing knowledge, and this limits the spread of modeling...

Analysis of Fork/Join and Related Queueing Systems
Alexander Thomasian
Article No.: 17
DOI: 10.1145/2628913

Fork/join (F/J) requests arise in contexts such as parallel computing, query processing in parallel databases, and parallel disk access in RAID. F/J requests spawn K tasks that are sent to K parallel servers, and the completion of...

A Survey of Provably Secure Searchable Encryption
Christoph Bösch, Pieter Hartel, Willem Jonker, Andreas Peter
Article No.: 18
DOI: 10.1145/2636328

We survey the notion of provably secure searchable encryption (SE) by giving a complete and comprehensive overview of the two main SE techniques: searchable symmetric encryption (SSE) and public key encryption with keyword search (PEKS). Since the...

A Survey of Methods for Analyzing and Improving GPU Energy Efficiency
Sparsh Mittal, Jeffrey S. Vetter
Article No.: 19
DOI: 10.1145/2636342

Recent years have witnessed phenomenal growth in the computational capabilities and applications of GPUs. However, this trend has also led to a dramatic increase in their power consumption. This article surveys research works on analyzing and...

A Survey on DHT-Based Routing for Large-Scale Mobile Ad Hoc Networks
Shahbaz Akhtar Abid, Mazliza Othman, Nadir Shah
Article No.: 20
DOI: 10.1145/2632296

Mobile ad hoc networks (MANETs) are infrastructureless and distributed communication systems that require sophisticated approaches to routing to cope with node mobility and heterogeneous application requirements. In the past few years, distributed...

Regression Testing of Web Service: A Systematic Mapping Study
Dong Qiu, Bixin Li, Shunhui Ji, Hareton Leung
Article No.: 21
DOI: 10.1145/2631685

Web service is a widely used implementation technique under the paradigm of Service-Oriented Architecture (SOA). A service-based system is subjected to continuous evolution and regression testing is required to check whether new faults have been...

Opportunistic Routing in Wireless Networks: Models, Algorithms, and Classifications
Azzedine Boukerche, Amir Darehshoorzadeh
Article No.: 22
DOI: 10.1145/2635675

Opportunistic Routing (OR) is a new promising paradigm that has been proposed for wireless networks. OR has gained a lot of attention from the research communities for its ability to increase the performance of wireless networks. It benefits from...

A Survey of Interdependent Information Security Games
Aron Laszka, Mark Felegyhazi, Levente Buttyan
Article No.: 23
DOI: 10.1145/2635673

Risks faced by information system operators and users are not only determined by their own security posture, but are also heavily affected by the security-related decisions of others. This interdependence between information system operators and...

Node-Capture Resilient Key Establishment in Sensor Networks: Design Space and New Protocols
Andrew Newell, Hongyi Yao, Alex Ryker, Tracey Ho, Cristina Nita-Rotaru
Article No.: 24
DOI: 10.1145/2636344

Key management is required for basic security services of confidentiality, integrity, and data source authentication. Wireless sensor networks (WSNs) are a challenging environment to provide such services due to the resource constraints and the...

Urban Sensing Using Mobile Phone Network Data: A Survey of Research
Francesco Calabrese, Laura Ferrari, Vincent D. Blondel
Article No.: 25
DOI: 10.1145/2655691

The recent development of telecommunication networks is producing an unprecedented wealth of information and, as a consequence, an increasing interest in analyzing such data both from telecoms and from other stakeholders' points of view. In...

Automated Generation of Music Playlists: Survey and Experiments
Geoffray Bonnin, Dietmar Jannach
Article No.: 26
DOI: 10.1145/2652481

Most of the time when we listen to music on the radio or on our portable devices, the order in which the tracks are played is governed by so-called playlists. These playlists are basically sequences of tracks that traditionally are designed...

Software-Defined Networking Paradigms in Wireless Networks: A Survey
Nachikethas A. Jagadeesan, Bhaskar Krishnamachari
Article No.: 27
DOI: 10.1145/2655690

Software-defined networking (SDN) has generated tremendous interest from both academia and industry. SDN aims at simplifying network management while enabling researchers to experiment with network protocols on deployed networks. This article is a...

A Survey on Antispoofing Schemes for Fingerprint Recognition Systems
Emanuela Marasco, Arun Ross
Article No.: 28
DOI: 10.1145/2617756

Several issues related to the vulnerability of fingerprint recognition systems to attacks have been highlighted in the biometrics literature. One such vulnerability involves the use of artificial fingers, where materials such as Play-Doh,...

A Model for Context in the Design of Open Production Communities
Pujan Ziaie
Article No.: 29
DOI: 10.1145/2661642

Open production communities (OPCs) provide technical features and social norms for a vast but dispersed and diverse crowd to collectively accumulate content. In OPCs, certain mechanisms, policies, and technologies are provided for voluntary users...

A Survey on Green-Energy-Aware Power Management for Datacenters
Fanxin Kong, Xue Liu
Article No.: 30
DOI: 10.1145/2642708

Megawatt-scale datacenters have emerged to meet the increasing demand for IT applications and services. The hunger for power brings large electricity bills to datacenter operators and causes significant impacts to the environment. To reduce costs...

Supporting Novice to Expert Transitions in User Interfaces
Andy Cockburn, Carl Gutwin, Joey Scarr, Sylvain Malacria
Article No.: 31
DOI: 10.1145/2659796

Interface design guidelines encourage designers to provide high-performance mechanisms for expert users. However, research shows that many expert interface components are seldom used and that there is a tendency for users to persistently fail to...

Rich Vehicle Routing Problem: Survey
Jose Caceres-Cruz, Pol Arias, Daniel Guimarans, Daniel Riera, Angel A. Juan
Article No.: 32
DOI: 10.1145/2666003

The Vehicle Routing Problem (VRP) is a well-known research line in the optimization research community. Its different basic variants have been widely explored in the literature. Even though it has been studied for years, the research around it is...

Cloud Computing: Survey on Energy Efficiency
Toni Mastelic, Ariel Oleksiak, Holger Claussen, Ivona Brandic, Jean-Marc Pierson, Athanasios V. Vasilakos
Article No.: 33
DOI: 10.1145/2656204

Cloud computing is today’s most emphasized Information and Communications Technology (ICT) paradigm that is directly or indirectly used by almost every online user. However, such great significance comes with the support of a great...

On Computing Mapping of 3D Objects: A Survey
Xin Li, S. S. Iyengar
Article No.: 34
DOI: 10.1145/2668020

We review the computation of 3D geometric data mapping, which establishes one-to-one correspondence between or among spatial/spatiotemporal objects. Effective mapping benefits many scientific and engineering tasks that involve the modeling and...

Progress in Case-Based Planning
Daniel Borrajo, Anna Roubíčková, Ivan Serina
Article No.: 35
DOI: 10.1145/2674024

Case-based planning (CBP) is an approach to automated planning that tries to save computational effort by reusing previously found solutions. In 2001, Spalazzi published a survey of work in CBP; here, we present an updated overview of systems that...

Low-Rank Modeling and Its Applications in Image Analysis
Xiaowei Zhou, Can Yang, Hongyu Zhao, Weichuan Yu
Article No.: 36
DOI: 10.1145/2674559

Low-rank modeling generally refers to a class of methods that solves problems by representing variables of interest as low-rank matrices. It has achieved great success in various fields including computer vision, data mining, signal processing,...

Mitigation of Radiation Effects in SRAM-Based FPGAs for Space Applications
Felix Siegle, Tanya Vladimirova, Jørgen Ilstad, Omar Emam
Article No.: 37
DOI: 10.1145/2671181

The use of static random access memory (SRAM)-based field programmable gate arrays (FPGAs) in harsh radiation environments has grown in recent years. These types of programmable devices require special mitigation techniques targeting the...