ACM DL

Computing Surveys (CSUR)

Menu

Search Issue
enter search term and/or author name below:

Archive


ACM Computing Surveys (CSUR), Volume 48 Issue 2, November 2015

Deterministic Replay: A Survey
Yunji Chen, Shijin Zhang, Qi Guo, Ling Li, Ruiyang Wu, Tianshi Chen
Article No.: 17
DOI: 10.1145/2790077

Deterministic replay is a type of emerging technique dedicated to providing deterministic executions of computer programs in the presence of nondeterministic factors. The application scopes of deterministic replay are very broad, making it an...

Systems of Systems Engineering: Basic Concepts, Model-Based Techniques, and Research Directions
Claus Ballegaard Nielsen, Peter Gorm Larsen, John Fitzgerald, Jim Woodcock, Jan Peleska
Article No.: 18
DOI: 10.1145/2794381

The term “System of Systems” (SoS) has been used since the 1950s to describe systems that are composed of independent constituent systems, which act jointly towards a common goal through the synergism between them. Examples of SoS...

Verifying Linearisability: A Comparative Survey
Brijesh Dongol, John Derrick
Article No.: 19
DOI: 10.1145/2796550

Linearisability is a key correctness criterion for concurrent data structures, ensuring that each history of the concurrent object under consideration is consistent with respect to a history of the corresponding abstract data structure....

Indoor Positioning Using Visible LED Lights: A Survey
Naveed Ul Hassan, Aqsa Naeem, Muhammad Adeel Pasha, Tariq Jadoon, Chau Yuen
Article No.: 20
DOI: 10.1145/2835376

Visible light LEDs, due to their numerous advantages, are expected to become the dominant indoor lighting technology. These lights can also be switched ON/OFF at high frequency, enabling their additional use for wireless communication and indoor...

The Feet in Human--Computer Interaction: A Survey of Foot-Based Interaction
Eduardo Velloso, Dominik Schmidt, Jason Alexander, Hans Gellersen, Andreas Bulling
Article No.: 21
DOI: 10.1145/2816455

Foot-operated computer interfaces have been studied since the inception of human--computer interaction. Thanks to the miniaturisation and decreasing cost of sensing technology, there is an increasing interest exploring this alternative input...

Energy Efficiency Techniques in Cloud Computing: A Survey and Taxonomy
Tarandeep Kaur, Inderveer Chana
Article No.: 22
DOI: 10.1145/2742488

The increase in energy consumption is the most critical problem worldwide. The growth and development of complex data-intensive applications have promulgated the creation of huge data centers that have heightened the energy demand. In this...

In-Network Trajectory Privacy Preservation
Mingming Guo, Xinyu Jin, Niki Pissinou, Sebastian Zanlongo, Bogdan Carbunar, S. S. Iyengar
Article No.: 23
DOI: 10.1145/2818183

Recent advances in mobile device, wireless networking, and positional technologies have helped location-aware applications become pervasive. However, location trajectory privacy concerns hinder the adoptability of such applications. In this...

Detecting Malicious Data Injections in Wireless Sensor Networks: A Survey
Vittorio P. Illiano, Emil C. Lupu
Article No.: 24
DOI: 10.1145/2818184

Wireless Sensor Networks are widely advocated to monitor environmental parameters, structural integrity of the built environment and use of urban spaces, services and utilities. However, embedded sensors are vulnerable to compromise by external...

Thinking Like a Vertex: A Survey of Vertex-Centric Frameworks for Large-Scale Distributed Graph Processing
Robert Ryan McCune, Tim Weninger, Greg Madey
Article No.: 25
DOI: 10.1145/2818185

The vertex-centric programming model is an established computational paradigm recently incorporated into distributed processing frameworks to address challenges in large-scale graph processing. Billion-node graphs that exceed the memory capacity...

A Survey on Lightweight Entity Authentication with Strong PUFs
Jeroen Delvaux, Roel Peeters, Dawu Gu, Ingrid Verbauwhede
Article No.: 26
DOI: 10.1145/2818186

Physically unclonable functions (PUFs) exploit the unavoidable manufacturing variations of an Integrated Circuit (IC). Their input-output behavior serves as a unique IC “fingerprint.” Therefore, they have been envisioned as an...

Trust and Reputation Models for Multiagent Systems
Jones Granatyr, Vanderson Botelho, Otto Robert Lessing, Edson Emílio Scalabrin, Jean-Paul Barthès, Fabrício Enembreck
Article No.: 27
DOI: 10.1145/2816826

Finding reliable partners to interact with in open environments is a challenging task for software agents, and trust and reputation mechanisms are used to handle this issue. From this viewpoint, we can observe the growing body of research on this...

A Survey on Trust Modeling
Jin-Hee Cho, Kevin Chan, Sibel Adali
Article No.: 28
DOI: 10.1145/2815595

The concept of trust and/or trust management has received considerable attention in engineering research communities as trust is perceived as the basis for decision making in many contexts and the motivation for maintaining long-term relationships...

How Close are We to Realizing a Pragmatic VANET Solution? A Meta-Survey
Mukesh Saini, Abdulhameed Alelaiwi, Abdulmotaleb El Saddik
Article No.: 29
DOI: 10.1145/2817552

Vehicular Ad-hoc Networks (VANETs) are seen as the key enabling technology of Intelligent Transportation Systems (ITS). In addition to safety, VANETs also provide a cost-effective platform for numerous comfort and entertainment applications. A...

Digital Digits: A Comprehensive Survey of Finger Augmentation Devices
Roy Shilkrot, Jochen Huber, Jürgen Steimle, Suranga Nanayakkara, Pattie Maes
Article No.: 30
DOI: 10.1145/2828993

Finger augmentation devices, those that are worn and operated by fingers, are a rapidly growing field in the human--computer interaction domain. This field is rooted in ancient history; however, still the academic research arena is booming with...

Mapping QoE through QoS in an Approach to DDB Architectures: Research Analysis and Conceptualization
Ramon Hugo De Souza, Mário Antônio Ribeiro Dantas
Article No.: 31
DOI: 10.1145/2828994

In the context of distributed databases (DDBs), the absence of mathematically well defined equations to evaluate quality of service (QoS), especially with statistical models, seems to have taken database community attention from the possible...

A Survey on Cache Management Mechanisms for Real-Time Embedded Systems
Giovani Gracioli, Ahmed Alhammad, Renato Mancuso, Antônio Augusto Fröhlich, Rodolfo Pellizzoni
Article No.: 32
DOI: 10.1145/2830555

Multicore processors are being extensively used by real-time systems, mainly because of their demand for increased computing power. However, multicore processors have shared resources that affect the predictability of real-time systems, which is...