ACM DL

Computing Surveys (CSUR)

Menu

Search Issue
enter search term and/or author name below:

Archive


ACM Computing Surveys (CSUR), Volume 49 Issue 2, November 2016

A Survey on Thread-Level Speculation Techniques
Alvaro Estebanez, Diego R. Llanos, Arturo Gonzalez-Escribano
Article No.: 22
DOI: 10.1145/2938369

Thread-Level Speculation (TLS) is a promising technique that allows the parallel execution of sequential code without relying on a prior, compile-time-dependence analysis. In this work, we introduce the technique, present a taxonomy of TLS...

Out-of-Band Covert Channels—A Survey
Brent Carrara, Carlisle Adams
Article No.: 23
DOI: 10.1145/2938370

A novel class of covert channel, out-of-band covert channels, is presented by extending Simmons’ prisoners’ problem. This new class of covert channel is established by surveying the existing covert channel, device-pairing, and...

Biometric Recognition in Automated Border Control: A Survey
Ruggero Donida Labati, Angelo Genovese, Enrique Muñoz, Vincenzo Piuri, Fabio Scotti, Gianluca Sforza
Article No.: 24
DOI: 10.1145/2933241

The increasing demand for traveler clearance at international border crossing points (BCPs) has motivated research for finding more efficient solutions. Automated border control (ABC) is emerging as a solution to enhance the convenience of...

A Survey on Wireless Indoor Localization from the Device Perspective
Jiang Xiao, Zimu Zhou, Youwen Yi, Lionel M. Ni
Article No.: 25
DOI: 10.1145/2933232

With the marvelous development of wireless techniques and ubiquitous deployment of wireless systems indoors, myriad indoor location-based services (ILBSs) have permeated into numerous aspects of modern life. The most fundamental functionality is...

Survey: Live Migration and Disaster Recovery over Long-Distance Networks
Panagiotis Kokkinos, Dimitris Kalogeras, Anna Levin, Emmanouel Varvarigos
Article No.: 26
DOI: 10.1145/2940295

We study the virtual machine live migration (LM) and disaster recovery (DR) from a networking perspective, considering long-distance networks, for example, between data centers. These networks are usually constrained by limited available...

Confidentiality-Preserving Publish/Subscribe: A Survey
Emanuel Onica, Pascal Felber, Hugues Mercier, Etienne Rivière
Article No.: 27
DOI: 10.1145/2940296

Publish/subscribe (pub/sub) is an attractive communication paradigm for large-scale distributed applications running across multiple administrative domains. Pub/sub allows event-based information dissemination based on constraints on the nature of...

Like It or Not: A Survey of Twitter Sentiment Analysis Methods
Anastasia Giachanou, Fabio Crestani
Article No.: 28
DOI: 10.1145/2938640

Sentiment analysis in Twitter is a field that has recently attracted research interest. Twitter is one of the most popular microblog platforms on which users can publish their thoughts and opinions. Sentiment analysis in Twitter tackles the...

Heap Abstractions for Static Analysis
Vini Kanvar, Uday P. Khedker
Article No.: 29
DOI: 10.1145/2931098

Heap data is potentially unbounded and seemingly arbitrary. Hence, unlike stack and static data, heap data cannot be abstracted in terms of a fixed set of program variables. This makes it an interesting topic of study and there is an abundance of...

Target Tracking for Sensor Networks: A Survey
Éfren L. Souza, Eduardo F. Nakamura, Richard W. Pazzi
Article No.: 30
DOI: 10.1145/2938639

Target-tracking algorithms typically organize the network into a logical structure (e.g., tree, cluster, or faces) to enable data fusion and reduce communication costs. These algorithms often predict the target’s future position. In addition...

A Survey of Predictive Modeling on Imbalanced Domains
Paula Branco, Luís Torgo, Rita P. Ribeiro
Article No.: 31
DOI: 10.1145/2907070

Many real-world data-mining applications involve obtaining predictive models using datasets with strongly imbalanced distributions of the target variable. Frequently, the least-common values of this target variable are associated with events that...

Performance and Security Improvements for Tor: A Survey
Mashael Alsabah, Ian Goldberg
Article No.: 32
DOI: 10.1145/2946802

Tor [Dingledine et al. 2004] is the most widely used anonymity network today, serving millions of users on a daily basis using a growing number of volunteer-run routers. Since its deployment in 2003, there have been more than three dozen...

The Six Pillars for Building Big Data Analytics Ecosystems
Shadi Khalifa, Yehia Elshater, Kiran Sundaravarathan, Aparna Bhat, Patrick Martin, Fahim Imam, Dan Rope, Mike Mcroberts, Craig Statchuk
Article No.: 33
DOI: 10.1145/2963143

With almost everything now online, organizations look at the Big Data collected to gain insights for improving their services. In the analytics process, derivation of such insights requires experimenting-with and integrating different analytics...

Knuckle Print Biometrics and Fusion Schemes -- Overview, Challenges, and Solutions
Gaurav Jaswal, Amit Kaul, Ravinder Nath
Article No.: 34
DOI: 10.1145/2938727

Numerous behavioral or physiological biometric traits, including iris, signature, hand geometry, speech, palm print, face, etc. have been used to discriminate individuals in a number of security applications over the last 30 years. Among these,...

A Survey of Recent Prefetching Techniques for Processor Caches
Sparsh Mittal
Article No.: 35
DOI: 10.1145/2907071

As the trends of process scaling make memory systems an even more crucial bottleneck, the importance of latency hiding techniques such as prefetching grows further. However, naively using prefetching can harm performance and energy efficiency and,...

User Intent in Multimedia Search: A Survey of the State of the Art and Future Challenges
Christoph Kofler, Martha Larson, Alan Hanjalic
Article No.: 36
DOI: 10.1145/2954930

Today's multimedia search engines are expected to respond to queries reflecting a wide variety of information needs from users with different goals. The topical dimension (“what” the user is searching for) of these information needs is...

Parallel and Distributed Collaborative Filtering: A Survey
Efthalia Karydi, Konstantinos Margaritis
Article No.: 37
DOI: 10.1145/2951952

Collaborative filtering is among the most preferred techniques when implementing recommender systems. Recently, great interest has turned toward parallel and distributed implementations of collaborative filtering algorithms. This work is a survey...

Toward Engineering a Secure Android Ecosystem: A Survey of Existing Techniques
Meng Xu, Chengyu Song, Yang Ji, Ming-Wei Shih, Kangjie Lu, Cong Zheng, Ruian Duan, Yeongjin Jang, Byoungyoung Lee, Chenxiong Qian, Sangho Lee, Taesoo Kim
Article No.: 38
DOI: 10.1145/2963145

The openness and extensibility of Android have made it a popular platform for mobile devices and a strong candidate to drive the Internet-of-Things. Unfortunately, these properties also leave Android vulnerable, attracting attacks for profit or...

A Survey of Measures and Methods for Matching Geospatial Vector Datasets
Emerson M. A. Xavier, Francisco J. Ariza-López, Manuel A. Ureña-Cámara
Article No.: 39
DOI: 10.1145/2963147

The field of Geographical Information Systems (GIS) has experienced a rapid and ongoing growth of available sources for geospatial data. This growth has demanded more data integration in order to explore the benefits of these data further....

Scalability Issues in Online Social Networks
Tahir Maqsood, Osman Khalid, Rizwana Irfan, Sajjad A. Madani, Samee U. Khan
Article No.: 40
DOI: 10.1145/2968216

The last decade witnessed a tremendous increase in popularity and usage of social network services, such as Facebook, Twitter, and YouTube. Moreover, advances in Web technologies coupled with social networks has enabled users to not only access,...