ACM DL

Computing Surveys (CSUR)

Menu

Search Issue
enter search term and/or author name below:

Archive


ACM Computing Surveys (CSUR), Volume 48 Issue 4, May 2016

Shared-Memory Optimizations for Inter-Virtual-Machine Communication
Yi Ren, Ling Liu, Qi Zhang, Qingbo Wu, Jianbo Guan, Jinzhu Kong, Huadong Dai, Lisong Shao
Article No.: 49
DOI: 10.1145/2847562

Virtual machines (VMs) and virtualization are one of the core computing technologies today. Inter-VM communication is not only prevalent but also one of the leading costs for data-intensive systems and applications in most data centers and cloud...

A Survey of Role Mining
Barsha Mitra, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri
Article No.: 50
DOI: 10.1145/2871148

Role-Based Access Control (RBAC) is the most widely used model for advanced access control deployed in diverse enterprises of all sizes. RBAC critically depends on defining roles, which are a functional intermediate between users and permissions....

A Systematic Review of Shared Sensor Networks
Claudio M. De Farias, Wei Li, Flávia C. Delicato, Luci Pirmez, Albert Y. Zomaya, Paulo F. Pires, José N. De Souza
Article No.: 51
DOI: 10.1145/2851510

While Wireless Sensor Networks (WSNs) have been traditionally tasked with single applications, in recent years we have witnessed the emergence of Shared Sensor Networks (SSNs) as integrated cyber-physical system infrastructures for a multitude of...

Audio Surveillance: A Systematic Review
Marco Crocco, Marco Cristani, Andrea Trucco, Vittorio Murino
Article No.: 52
DOI: 10.1145/2871183

Despite surveillance systems becoming increasingly ubiquitous in our living environment, automated surveillance, currently based on video sensory modality and machine intelligence, lacks most of the time the robustness and reliability required in...

Seamless Outdoors-Indoors Localization Solutions on Smartphones: Implementation and Challenges
Halgurd S. Maghdid, Ihsan Alshahib Lami, Kayhan Zrar Ghafoor, Jaime Lloret
Article No.: 53
DOI: 10.1145/2871166

The demand for more sophisticated Location-Based Services (LBS) in terms of applications variety and accuracy is tripling every year since the emergence of the smartphone a few years ago. Equally, smartphone manufacturers are mounting several...

A Survey of Architectural Techniques for Managing Process Variation
Sparsh Mittal
Article No.: 54
DOI: 10.1145/2871167

Process variation—deviation in parameters from their nominal specifications—threatens to slow down and even pause technological scaling, and mitigation of it is the way to continue the benefits of chip miniaturization. In this article,...

The Ethics of Computing: A Survey of the Computing-Oriented Literature
Bernd Carsten Stahl, Job Timmermans, Brent Daniel Mittelstadt
Article No.: 55
DOI: 10.1145/2871196

Computing technologies and artifacts are increasingly integrated into most aspects of our professional, social, and private lives. One consequence of this growing ubiquity of computing is that it can have significant ethical implications that...

Olfaction-Enhanced Multimedia: A Survey of Application Domains, Displays, and Research Challenges
Niall Murray, Brian Lee, Yuansong Qiao, Gabriel-Miro Muntean
Article No.: 56
DOI: 10.1145/2816454

Recently, the concept of olfaction-enhanced multimedia applications has gained traction as a step toward further enhancing user quality of experience. The next generation of rich media services will be immersive and multisensory, with olfaction...

A Survey on Mobile Social Signal Processing
Niklas Palaghias, Seyed Amir Hoseinitabatabaei, Michele Nati, Alexander Gluhak, Klaus Moessner
Article No.: 57
DOI: 10.1145/2893487

Understanding human behavior in an automatic but nonintrusive manner is an important area for various applications. This requires the collaboration of information technology with human sciences to transfer existing knowledge of human behavior into...

Rare Event Detection and Propagation in Wireless Sensor Networks
David C. Harrison, Winston K. G. Seah, Ramesh Rayudu
Article No.: 58
DOI: 10.1145/2885508

Rarely occurring events present unique challenges to energy constrained systems designed for long term sensing of their occurrence or effect. Unlike periodic sampling or query based sensing systems, longevity cannot be achieved simply by adjusting...

A Survey on Design Approaches to Circumvent Permanent Faults in Networks-on-Chip
Sebastian Werner, Javier Navaridas, Mikel Luján
Article No.: 59
DOI: 10.1145/2886781

Increasing fault rates in current and future technology nodes coupled with on-chip components in the hundreds calls for robust and fault-tolerant Network-on-Chip (NoC) designs. Given the central role of NoCs in today’s many-core chips,...

A Closer Look at GPGPU
Liang Hu, Xilong Che, Si-Qing Zheng
Article No.: 60
DOI: 10.1145/2873053

The lack of detailed white box illustration leaves a gap in the field of GPGPU (General-Purpose Computing on the Graphic Processing Unit), thus hindering users and researchers from exploring hardware potential while improving application...

On Choosing Server- or Client-Side Solutions for BFT
Marco Platania, Daniel Obenshain, Thomas Tantillo, Yair Amir, Neeraj Suri
Article No.: 61
DOI: 10.1145/2886780

Byzantine Fault Tolerant (BFT) protocols have the ability to work correctly even when up to a threshold f of system servers are compromised. This makes them appealing for the construction of critical systems connected to the Internet, which...

A Survey of Techniques for Approximate Computing
Sparsh Mittal
Article No.: 62
DOI: 10.1145/2893356

Approximate computing trades off computation quality with effort expended, and as rising performance demands confront plateauing resource budgets, approximate computing has become not merely attractive, but even imperative. In this article, we...

Parallel Optimal Pairwise Biological Sequence Comparison: Algorithms, Platforms, and Classification
Edans Flavius De Oliveira Sandes, Azzedine Boukerche, Alba Cristina Magalhaes Alves De Melo
Article No.: 63
DOI: 10.1145/2893488

Many bioinformatics applications, such as the optimal pairwise biological sequence comparison, demand a great quantity of computing resource, thus are excellent candidates to run in high-performance computing (HPC) platforms. In the last two...

A Survey and Analysis of the GNSS Spoofing Threat and Countermeasures
Desmond Schmidt, Kenneth Radke, Seyit Camtepe, Ernest Foo, Michał Ren
Article No.: 64
DOI: 10.1145/2897166

Detection and prevention of global navigation satellite system (GNSS) “spoofing” attacks, or the broadcast of false global navigation satellite system services, has recently attracted much research interest. This survey aims to fill...

Type Inference on Executables
Juan Caballero, Zhiqiang Lin
Article No.: 65
DOI: 10.1145/2896499

In many applications, source code and debugging symbols of a target program are not available, and the only thing that we can access is the program executable. A fundamental challenge with executables is that, during compilation, critical...