ACM DL

Computing Surveys (CSUR)

Menu

Search Issue
enter search term and/or author name below:

Archive


ACM Computing Surveys (CSUR), Volume 48 Issue 3, February 2016

Web Service Composition: A Survey of Techniques and Tools
Angel Lagares Lemos, Florian Daniel, Boualem Benatallah
Article No.: 33
DOI: 10.1145/2831270

Web services are a consolidated reality of the modern Web with tremendous, increasing impact on everyday computing tasks. They turned the Web into the largest, most accepted, and most vivid distributed computing platform ever. Yet, the use and...

Multioccupant Activity Recognition in Pervasive Smart Home Environments
Asma Benmansour, Abdelhamid Bouchachia, Mohammed Feham
Article No.: 34
DOI: 10.1145/2835372

Human activity recognition in ambient intelligent environments like homes, offices, and classrooms has been the center of a lot of research for many years now. The aim is to recognize the sequence of actions by a specific person using sensor...

Reputation Systems Evaluation Survey
Eleni Koutrouli, Aphrodite Tsalgatidou
Article No.: 35
DOI: 10.1145/2835373

Various reputation systems have been proposed for a broad range of distributed applications, such as peer-to-peer, ad-hoc, and multiagent systems. Their evaluation has been mostly based on proprietary methods due to the lack of widely acceptable...

A Survey on Energy Efficiency in P2P Systems: File Distribution, Content Streaming, and Epidemics
Simone Brienza, Sena Efsun Cebeci, Seyed Saeid Masoumzadeh, Helmut Hlavacs, Öznur Özkasap, Giuseppe Anastasi
Article No.: 36
DOI: 10.1145/2835374

Several Peer-to-Peer (P2P) protocols and applications have been developed to allow file distribution/sharing, video and music streaming, and data and information dissemination. These P2P systems are regularly used by a large number of users, both...

A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks
Ryan Heartfield, George Loukas
Article No.: 37
DOI: 10.1145/2835375

Social engineering is used as an umbrella term for a broad spectrum of computer exploitations that employ a variety of attack vectors and strategies to psychologically manipulate a user. Semantic attacks are the specific type of social...

Data-driven Human Mobility Modeling: A Survey and Engineering Guidance for Mobile Networking
Andrea Hess, Karin Anna Hummel, Wilfried N. Gansterer, Günter Haring
Article No.: 38
DOI: 10.1145/2840722

Over the last decades, modeling of user mobility has become increasingly important in mobile networking research and development. This has led to the adoption of modeling techniques from other disciplines such as kinetic theory or urban planning....

Modeling, Profiling, and Debugging the Energy Consumption of Mobile Devices
Mohammad Ashraful Hoque, Matti Siekkinen, Kashif Nizam Khan, Yu Xiao, Sasu Tarkoma
Article No.: 39
DOI: 10.1145/2840723

Software energy profilers are the tools to measure the energy consumption of mobile devices, applications running on those devices, and various hardware components. They adopt different modeling and measurement techniques. In this article, we aim...

A Survey of Automatic Protocol Reverse Engineering Tools
John Narayan, Sandeep K. Shukla, T. Charles Clancy
Article No.: 40
DOI: 10.1145/2840724

Computer network protocols define the rules in which two entities communicate over a network of unique hosts. Many protocol specifications are unknown, unavailable, or minimally documented, which prevents thorough analysis of the protocol for...

A Survey on Assessment and Ranking Methodologies for User-Generated Content on the Web
Elaheh Momeni, Claire Cardie, Nicholas Diakopoulos
Article No.: 41
DOI: 10.1145/2811282

User-generated content (UGC) on the Web, especially on social media platforms, facilitates the association of additional information with digital resources; thus, it can provide valuable supplementary content. However, UGC varies in quality and,...

QoS-Aware Autonomic Resource Management in Cloud Computing: A Systematic Review
Sukhpal Singh, Inderveer Chana
Article No.: 42
DOI: 10.1145/2843889

As computing infrastructure expands, resource management in a large, heterogeneous, and distributed environment becomes a challenging task. In a cloud environment, with uncertainty and dispersion of resources, one encounters problems of allocation...

A Systematic Review of Service Level Management in the Cloud
Funmilade Faniyi, Rami Bahsoon
Article No.: 43
DOI: 10.1145/2843890

Cloud computing make it possible to flexibly procure, scale, and release computational resources on demand in response to workload changes. Stakeholders in business and academia are increasingly exploring cloud deployment options for their...

Assessing Dependability with Software Fault Injection: A Survey
Roberto Natella, Domenico Cotroneo, Henrique S. Madeira
Article No.: 44
DOI: 10.1145/2841425

With the rise of software complexity, software-related accidents represent a significant threat for computer-based systems. Software Fault Injection is a method to anticipate worst-case scenarios caused by faulty software through the deliberate...

A Survey of Techniques for Architecting and Managing Asymmetric Multicore Processors
Sparsh Mittal
Article No.: 45
DOI: 10.1145/2856125

To meet the needs of a diverse range of workloads, asymmetric multicore processors (AMPs) have been proposed, which feature cores of different microarchitecture or ISAs. However, given the diversity inherent in their design and application...

Evolution of Attacks, Threat Models, and Solutions for Virtualized Systems
Daniele Sgandurra, Emil Lupu
Article No.: 46
DOI: 10.1145/2856126

Virtualization technology enables Cloud providers to efficiently use their computing services and resources. Even if the benefits in terms of performance, maintenance, and cost are evident, however, virtualization has also been exploited by...

A Survey of Security and Privacy Issues in ePassport Protocols
Gildas Avoine, Antonin Beaujeant, Julio Hernandez-Castro, Louis Demay, Philippe Teuwen
Article No.: 47
DOI: 10.1145/2825026

This article examines in great detail the most relevant security and privacy issues affecting the protocols used by contactless chips integrated in ePassports, and presents all relevant literature together with some new attacks and insights that...

Workload Characterization: A Survey Revisited
Maria Carla Calzarossa, Luisa Massari, Daniele Tessera
Article No.: 48
DOI: 10.1145/2856127

Workload characterization is a well-established discipline that plays a key role in many performance engineering studies. The large-scale social behavior inherent in the applications and services being deployed nowadays leads to rapid changes in...