ACM DL

Computing Surveys (CSUR)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Computing Surveys (CSUR), Volume 47 Issue 3, April 2015

Classification Framework for Analysis and Modeling of Physically Induced Reliability Violations
Dimitrios Rodopoulos, Georgia Psychou, Mohamed M. Sabry, Francky Catthoor, Antonis Papanikolaou, Dimitrios Soudris, Tobias G. Noll, David Atienza
Article No.: 38
DOI: 10.1145/2678276

Technology downscaling is expected to amplify a variety of reliability concerns in future digital systems. A good understanding of reliability threats is crucial for the creation of efficient mitigation techniques. This survey performs a...

Thermal-Aware Scheduling in Green Data Centers
Muhammad Tayyab Chaudhry, Teck Chaw Ling, Atif Manzoor, Syed Asad Hussain, Jongwon Kim
Article No.: 39
DOI: 10.1145/2678278

Data centers can go green by saving electricity in two major areas: computing and cooling. Servers in data centers require a constant supply of cold air from on-site cooling mechanisms for reliability. An increased computational load makes servers...

A Taxonomy of Domain-Specific Aspect Languages
Johan Fabry, Tom Dinkelaker, Jacques Noyé, Éric Tanter
Article No.: 40
DOI: 10.1145/2685028

Domain-Specific Aspect Languages (DSALs) are Domain-Specific Languages (DSLs) designed to express crosscutting concerns. Compared to DSLs, their aspectual nature greatly amplifies the language design space. We structure this space in order to shed...

Secure the Cloud: From the Perspective of a Service-Oriented Organization
Arpan Roy, Santonu Sarkar, Rajeshwari Ganesan, Geetika Goel
Article No.: 41
DOI: 10.1145/2693841

In response to the revival of virtualized technology by Rosenblum and Garfinkel [2005], NIST defined cloud computing, a new paradigm in service computing infrastructures. In cloud environments, the basic security mechanism is ingrained in...

Paxos Made Moderately Complex
Robbert Van Renesse, Deniz Altinbuken
Article No.: 42
DOI: 10.1145/2673577

This article explains the full reconfigurable multidecree Paxos (or multi-Paxos) protocol. Paxos is by no means a simple protocol, even though it is based on relatively simple invariants. We provide pseudocode and explain it guided by invariants....

A Review and Meta-Analysis of Multimodal Affect Detection Systems
Sidney K. D'mello, Jacqueline Kory
Article No.: 43
DOI: 10.1145/2682899

Affect detection is an important pattern recognition problem that has inspired researchers from several areas. The field is in need of a systematic review due to the recent influx of Multimodal (MM) affect detection systems that differ in several...

3D Mesh Compression: Survey, Comparisons, and Emerging Trends
Adrien Maglo, Guillaume Lavoué, Florent Dupont, Céline Hudelot
Article No.: 44
DOI: 10.1145/2693443

3D meshes are commonly used to represent virtual surface and volumes. However, their raw data representations take a large amount of space. Hence, 3D mesh compression has been an active research topic since the mid 1990s. In 2005, two very good...

A Qualitative Review on 3D Coarse Registration Methods
Yago Díez, Ferran Roure, Xavier Lladó, Joaquim Salvi
Article No.: 45
DOI: 10.1145/2692160

3D registration or matching is a crucial step in 3D model reconstruction. Registration applications span along a variety of research fields, including computational geometry, computer vision, and geometric modeling. This variety of applications...

Interaction with Large Displays: A Survey
Carmelo Ardito, Paolo Buono, Maria Francesca Costabile, Giuseppe Desolda
Article No.: 46
DOI: 10.1145/2682623

Large interactive displays are increasingly placed in public (or semipublic) locations, including museums, shops, various city settings, and offices. This article discusses the evolution of such displays by looking at their use and analyzing how...

Anticipatory Mobile Computing: A Survey of the State of the Art and Research Challenges
Veljko Pejovic, Mirco Musolesi
Article No.: 47
DOI: 10.1145/2693843

Today’s mobile phones are far from the mere communication devices they were 10 years ago. Equipped with sophisticated sensors and advanced computing hardware, phones can be used to infer users’ location, activity, social setting, and...

Graph-Based Label Propagation in Digital Media: A Review
Olga Zoidi, Eftychia Fotiadou, Nikos Nikolaidis, Ioannis Pitas
Article No.: 48
DOI: 10.1145/2700381

The expansion of the Internet over the last decade and the proliferation of online social communities, such as Facebook, Google+, and Twitter, as well as multimedia sharing sites, such as YouTube, Flickr, and Picasa, has led to a vast...

Classification Framework of MapReduce Scheduling Algorithms
Nidhi Tiwari, Santonu Sarkar, Umesh Bellur, Maria Indrawan
Article No.: 49
DOI: 10.1145/2693315

A MapReduce scheduling algorithm plays a critical role in managing large clusters of hardware nodes and meeting multiple quality requirements by controlling the order and distribution of users, jobs, and tasks execution. A comprehensive and...

Pattern-Based Survey and Categorization of Network Covert Channel Techniques
Steffen Wendzel, Sebastian Zander, Bernhard Fechner, Christian Herdin
Article No.: 50
DOI: 10.1145/2684195

Network covert channels are used to hide communication inside network protocols. Various techniques for covert channels have arisen in the past few decades. We surveyed and analyzed 109 techniques developed between 1987 and 2013 and show that...

Renegotiation in Service Level Agreement Management for a Cloud-Based System
Ahmad Fadzil M. Hani, Irving Vitra Paputungan, Mohd Fadzil Hassan
Article No.: 51
DOI: 10.1145/2716319

Managing Service Level Agreement (SLA) within a cloud-based system is important to maintain service continuity and improve trust due to cloud flexibility and scalability. We conduct a general review on cloud-based systems to understand how service...

A Tutorial on Multilabel Learning
Eva Gibaja, Sebastián Ventura
Article No.: 52
DOI: 10.1145/2716262

Multilabel learning has become a relevant learning paradigm in the past years due to the increasing number of fields where it can be applied and also to the emerging number of techniques that are being developed. This article presents an...

A Survey of TDMA Scheduling Schemes in Wireless Multihop Networks
Aggeliki Sgora, Dimitrios J. Vergados, Dimitrios D. Vergados
Article No.: 53
DOI: 10.1145/2677955

One of the major problems in wireless multihop networks is the scheduling of transmissions in a fair and efficient manner. Time Division Multiple Access (TDMA) seems to be one of the dominant solutions to achieve this goal since it is a simple...

Mobility Increases Localizability: A Survey on Wireless Indoor Localization using Inertial Sensors
Zheng Yang, Chenshu Wu, Zimu Zhou, Xinglin Zhang, Xu Wang, Yunhao Liu
Article No.: 54
DOI: 10.1145/2676430

Wireless indoor positioning has been extensively studied for the past 2 decades and continuously attracted growing research efforts in mobile computing context. As the integration of multiple inertial sensors (e.g., accelerometer, gyroscope, and...