Computing Surveys (CSUR)


Search Issue
enter search term and/or author name


ACM Computing Surveys (CSUR), Volume 49 Issue 1, July 2016

A Survey of Mobile Device Virtualization: Taxonomy and State of the Art
Junaid Shuja, Abdullah Gani, Kashif Bilal, Atta Ur Rehman Khan, Sajjad A. Madani, Samee U. Khan, Albert Y. Zomaya
Article No.: 1
DOI: 10.1145/2897164

Recent growth in the processing and memory resources of mobile devices has fueled research within the field of mobile virtualization. Mobile virtualization enables multiple persona on a single mobile device by hosting heterogeneous operating...

Computational Methods for Residential Energy Cost Optimization in Smart Grids: A Survey
Muhammad Raisul Alam, Marc St-Hilaire, Thomas Kunz
Article No.: 2
DOI: 10.1145/2897165

A smart power grid transforms the traditional electric grid into a user-centric, intelligent power network. The cost-saving potential of smart homes is an excellent motivating factor to involve users in smart grid operations. To that end, this...

Foundations of Session Types and Behavioural Contracts
Hans Hüttel, Ivan Lanese, Vasco T. Vasconcelos, Luís Caires, Marco Carbone, Pierre-Malo Deniélou, Dimitris Mostrous, Luca Padovani, António Ravara, Emilio Tuosto, Hugo Torres Vieira, Gianluigi Zavattaro
Article No.: 3
DOI: 10.1145/2873052

Behavioural type systems, usually associated to concurrent or distributed computations, encompass concepts such as interfaces, communication protocols, and contracts, in addition to the traditional input/output operations. The behavioural type of...

Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?
Sebastian Schrittwieser, Stefan Katzenbeisser, Johannes Kinder, Georg Merzdovnik, Edgar Weippl
Article No.: 4
DOI: 10.1145/2886012

Software obfuscation has always been a controversially discussed research area. While theoretical results indicate that provably secure obfuscation in general is impossible, its widespread application in malware and commercial software shows that...

On Precision Bound of Distributed Fault-Tolerant Sensor Fusion Algorithms
Buke Ao, Yongcai Wang, Lu Yu, Richard R. Brooks, S. S. Iyengar
Article No.: 5
DOI: 10.1145/2898984

Sensors have limited precision and accuracy. They extract data from the physical environment, which contains noise. The goal of sensor fusion is to make the final decision robust, minimizing the influence of noise and system errors. One problem...

Recent Advances in Camera Planning for Large Area Surveillance: A Comprehensive Review
Junbin Liu, Sridha Sridharan, Clinton Fookes
Article No.: 6
DOI: 10.1145/2906148

With recent advances in consumer electronics and the increasingly urgent need for public security, camera networks have evolved from their early role of providing simple and static monitoring to current complex systems capable of obtaining...

Cloud Log Forensics: Foundations, State of the Art, and Future Directions
Suleman Khan, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Mustapha Aminu Bagiwa, Muhammad Shiraz, Samee U. Khan, Rajkumar Buyya, Albert Y. Zomaya
Article No.: 7
DOI: 10.1145/2906149

Cloud log forensics (CLF) mitigates the investigation process by identifying the malicious behavior of attackers through profound cloud log analysis. However, the accessibility attributes of cloud logs obstruct accomplishment of the goal to...

Understanding the Limitations of Particle Swarm Algorithm for Dynamic Optimization Tasks: A Survey Towards the Singularity of PSO for Swarm Robotic Applications
Dada Emmanuel Gbenga, Effirul Ikhwan Ramlan
Article No.: 8
DOI: 10.1145/2906150

One of the most widely used biomimicry algorithms is the Particle Swarm Optimization (PSO). Since its introduction in 1995, it has caught the attention of both researchers and academicians as a way of solving various optimization problems, such as...

A Survey of Socially Aware Peer-to-Peer Systems
Xiang Zuo, Adriana Iamnitchi
Article No.: 9
DOI: 10.1145/2894761

Peer-to-peer technologies have proven their strength in large-scale resource sharing and data transfer. Such systems, however, still need to address a variety of issues, including efficient routing, security, quality of service, incentives, and...

Understanding Graph-Based Trust Evaluation in Online Social Networks: Methodologies and Challenges
Wenjun Jiang, Guojun Wang, Md Zakirul Alam Bhuiyan, Jie Wu
Article No.: 10
DOI: 10.1145/2906151

Online Social Networks (OSNs) are becoming a popular method of meeting people and keeping in touch with friends. OSNs resort to trust evaluation models and algorithms to improve service quality and enhance user experiences. Much research has been...

Vehicular Networks: A New Challenge for Content-Delivery-Based Applications
Fabrício A. Silva, Azzedine Boukerche, Thais R. M. Braga Silva, Linnyer B. Ruiz, Eduardo Cerqueira, Antonio A. F. Loureiro
Article No.: 11
DOI: 10.1145/2903745

A significant number of promising applications for vehicular ad hoc networks (VANETs) are becoming a reality. Most of these applications require a variety of heterogenous content to be delivered to vehicles and to their on-board users. However,...

Computational Health Informatics in the Big Data Age: A Survey
Ruogu Fang, Samira Pouyanfar, Yimin Yang, Shu-Ching Chen, S. S. Iyengar
Article No.: 12
DOI: 10.1145/2932707

The explosive growth and widespread accessibility of digital health data have led to a surge of research activity in the healthcare and data sciences fields. The conventional approaches for health data management have achieved limited success as...

Ensuring Security and Privacy Preservation for Cloud Data Services
Jun Tang, Yong Cui, Qi Li, Kui Ren, Jiangchuan Liu, Rajkumar Buyya
Article No.: 13
DOI: 10.1145/2906153

With the rapid development of cloud computing, more and more enterprises/individuals are starting to outsource local data to the cloud servers. However, under open networks and not fully trusted cloud environments, they face enormous security and...

Socializing the Semantic Gap: A Comparative Survey on Image Tag Assignment, Refinement, and Retrieval
Xirong Li, Tiberio Uricchio, Lamberto Ballan, Marco Bertini, Cees G. M. Snoek, Alberto Del Bimbo
Article No.: 14
DOI: 10.1145/2906152

Where previous reviews on content-based image retrieval emphasize what can be seen in an image to bridge the semantic gap, this survey considers what people tag about an image. A comprehensive treatise of three closely linked problems (i.e., image...

A Survey and Comparative Study of Tweet Sentiment Analysis via Semi-Supervised Learning
Nadia Felix F. Da Silva, Luiz F. S. Coletta, Eduardo R. Hruschka
Article No.: 15
DOI: 10.1145/2932708

Twitter is a microblogging platform in which users can post status messages, called “tweets,” to their friends. It has provided an enormous dataset of the so-called sentiments, whose classification can take place through supervised...

Handling Boot Storms in Virtualized Data Centers—A Survey
Durgesh Samant, Umesh Bellur
Article No.: 16
DOI: 10.1145/2932709

Large-scale virtual machine (VM) deployment in virtualized data centers is a very slow process. This is primarily due to the resource bottlenecks that are created at the storage, network, and host physical machines when a large number of VMs are...

Visualizing Natural Language Descriptions: A Survey
Kaveh Hassani, Won-Sook Lee
Article No.: 17
DOI: 10.1145/2932710

A natural language interface exploits the conceptual simplicity and naturalness of the language to create a high-level user-friendly communication channel between humans and machines. One of the promising applications of such interfaces is...

Measuring and Predicting Search Engine Users’ Satisfaction
Ovidiu Dan, Brian D. Davison
Article No.: 18
DOI: 10.1145/2893486

Search satisfaction is defined as the fulfillment of a user’s information need. Characterizing and predicting the satisfaction of search engine users is vital for improving ranking models, increasing user retention rates, and growing market...

Consistency in Non-Transactional Distributed Storage Systems
Paolo Viotti, Marko Vukolić
Article No.: 19
DOI: 10.1145/2926965

Over the years, different meanings have been associated with the word consistency in the distributed systems community. While in the ’80s “consistency” typically meant strong consistency, later defined also as...

Distributed Intelligent MEMS: A Survey and a Real-Time Programming Framework
Junbin Liang, Jiannong Cao, Rui Liu, Tao Li
Article No.: 20
DOI: 10.1145/2926964

In recent years, distributed intelligent microelectromechanical systems (DiMEMSs) have appeared as a new form of distributed embedded systems. DiMEMSs contain thousands or millions of removable autonomous devices, which will collaborate with each...

Survey On Software Design-Pattern Specification Languages
Salman Khwaja, Mohammad Alshayeb
Article No.: 21
DOI: 10.1145/2926966

A design pattern is a well-defined solution to a recurrent problem. Over the years, the number of patterns and domains of design patterns have expanded, as the patterns are the experiences of the experts of the domain captured in a higher-level...