ACM DL

Computing Surveys (CSUR)

Menu

Search Issue
enter search term and/or author name below:

Archive


ACM Computing Surveys (CSUR), Volume 49 Issue 3, December 2016

Understanding GPU Power: A Survey of Profiling, Modeling, and Simulation Methods
Robert A. Bridges, Neena Imam, Tiffany M. Mintz
Article No.: 41
DOI: 10.1145/2962131

Modern graphics processing units (GPUs) have complex architectures that admit exceptional performance and energy efficiency for high-throughput applications. Although GPUs consume large amounts of power, their use for high-throughput applications...

A Survey of Signed Network Mining in Social Media
Jiliang Tang, Yi Chang, Charu Aggarwal, Huan Liu
Article No.: 42
DOI: 10.1145/2956185

Many real-world relations can be represented by signed networks with positive and negative links, as a result of which signed network analysis has attracted increasing attention from multiple disciplines. With the increasing prevalence of social...

A Survey of Wearable Biometric Recognition Systems
Jorge Blasco, Thomas M. Chen, Juan Tapiador, Pedro Peris-Lopez
Article No.: 43
DOI: 10.1145/2968215

The growing popularity of wearable devices is leading to new ways to interact with the environment, with other smart devices, and with other people. Wearables equipped with an array of sensors are able to capture the owner’s physiological...

Interconnection Networks in Petascale Computer Systems: A Survey
Roman Trobec, Radivoje Vasiljević, Milo Tomašević, Veljko Milutinović, Ramon Beivide, Mateo Valero
Article No.: 44
DOI: 10.1145/2983387

This article provides background information about interconnection networks, an analysis of previous developments, and an overview of the state of the art. The main contribution of this article is to highlight the importance of the interpolation...

Text Stemming: Approaches, Applications, and Challenges
Jasmeet Singh, Vishal Gupta
Article No.: 45
DOI: 10.1145/2975608

Stemming is a process in which the variant word forms are mapped to their base form. It is among the basic text pre-processing approaches used in Language Modeling, Natural Language Processing, and Information Retrieval applications. In this...

Connected Car: Technologies, Issues, Future Trends
Riccardo Coppola, Maurizio Morisio
Article No.: 46
DOI: 10.1145/2971482

The connected car—a vehicle capable of accessing to the Internet, of communicating with smart devices as well as other cars and road infrastructures, and of collecting real-time data from multiple sources—is likely to play a...

A Survey of Repair Analysis Algorithms for Memories
Keewon Cho, Wooheon Kang, Hyungjun Cho, Changwook Lee, Sungho Kang
Article No.: 47
DOI: 10.1145/2971481

Current rapid advancements in deep submicron technologies have enabled the implementation of very large memory devices and embedded memories. However, the memory growth increases the number of defects, reducing the yield and reliability of such...

Techniques and Devices Used in Palpation Simulation with Haptic Feedback
Mateus L. Ribeiro, Henrique Manoel Lederman, Simone Elias, FÁtima L. S. Nunes
Article No.: 48
DOI: 10.1145/2962723

Palpation exam is a procedure in which a healthcare professional presses a specific region of a patient’s body with the fingers in order to detect the presence of features and abnormalities under the skin. A simulator that aids the training...

Mapping Virtual Machines onto Physical Machines in Cloud Computing: A Survey
Ilia Pietri, Rizos Sakellariou
Article No.: 49
DOI: 10.1145/2983575

Cloud computing enables users to provision resources on demand and execute applications in a way that meets their requirements by choosing virtual resources that fit their application resource needs. Then, it becomes the task of cloud resource...

A Study of Security Isolation Techniques
Rui Shu, Peipei Wang, Sigmund A Gorski III, Benjamin Andow, Adwait Nadkarni, Luke Deshotels, Jason Gionta, William Enck, Xiaohui Gu
Article No.: 50
DOI: 10.1145/2988545

Security isolation is a foundation of computing systems that enables resilience to different forms of attacks. This article seeks to understand existing security isolation techniques by systematically classifying different approaches and analyzing...

Attestation in Wireless Sensor Networks: A Survey
Rodrigo Vieira Steiner, Emil Lupu
Article No.: 51
DOI: 10.1145/2988546

Attestation is a mechanism used by a trusted entity to validate the software integrity of an untrusted platform. Over the past few years, several attestation techniques have been proposed. While they all use variants of a challenge-response...

Predicting Breast Cancer Recurrence Using Machine Learning Techniques: A Systematic Review
Pedro Henriques Abreu, Miriam Seoane Santos, Miguel Henriques Abreu, Bruno Andrade, Daniel Castro Silva
Article No.: 52
DOI: 10.1145/2988544

Background: Recurrence is an important cornerstone in breast cancer behavior, intrinsically related to mortality. In spite of its relevance, it is rarely recorded in the majority of breast cancer datasets, which makes research in its prediction...

Gaussian Random Number Generation: A Survey on Hardware Architectures
Jamshaid Sarwar Malik, Ahmed Hemani
Article No.: 53
DOI: 10.1145/2980052

Some excellent surveys of the Gaussian random number generators (GRNGs) from the algorithmic perspective exist in the published literature to date (e.g., Thomas et al. [2007]). In the last decade, however, advancements in digital...

Hypergraph Acyclicity Revisited
Johann Brault-Baron
Article No.: 54
DOI: 10.1145/2983573

The notion of graph acyclicity has been extended to several notions of hypergraph acyclicity. In increasing order of generality: gamma acyclicity, beta acyclicity, and alpha acyclicity have met a great interest in many...

*droid: Assessment and Evaluation of Android Application Analysis Tools
Bradley Reaves, Jasmine Bowers, Sigmund Albert Gorski III, Olabode Anise, Rahul Bobhate, Raymond Cho, Hiranava Das, Sharique Hussain, Hamza Karachiwala, Nolen Scaife, Byron Wright, Kevin Butler, William Enck, Patrick Traynor
Article No.: 55
DOI: 10.1145/2996358

The security research community has invested significant effort in improving the security of Android applications over the past half decade. This effort has addressed a wide range of problems and resulted in the creation of many tools for...

A Systematic Literature Review of Adaptive Parameter Control Methods for Evolutionary Algorithms
Aldeida Aleti, Irene Moser
Article No.: 56
DOI: 10.1145/2996355

Evolutionary algorithms (EAs) are robust stochastic optimisers that perform well over a wide range of problems. Their robustness, however, may be affected by several adjustable parameters, such as mutation rate, crossover rate, and population...

Processor Design for Soft Errors: Challenges and State of the Art
Tuo Li, Jude Angelo Ambrose, Roshan Ragel, Sri Parameswaran
Article No.: 57
DOI: 10.1145/2996357

Today, soft errors are one of the major design technology challenges at and beyond the 22nm technology nodes. This article introduces the soft error problem from the perspective of processor design. This article also provides a survey of the...

A Survey About Prediction-Based Data Reduction in Wireless Sensor Networks
Gabriel Martins Dias, Boris Bellalta, Simon Oechsner
Article No.: 58
DOI: 10.1145/2996356

One of the main characteristics of Wireless Sensor Networks (WSNs) is the constrained energy resources of their wireless sensor nodes. Although this issue has been addressed in several works and received much attention over the years, the most...

On the Security of Machine Learning in Malware C&C Detection: A Survey
Joseph Gardiner, Shishir Nagaraja
Article No.: 59
DOI: 10.1145/3003816

One of the main challenges in security today is defending against malware attacks. As trends and anecdotal evidence show, preventing these attacks, regardless of their indiscriminate or targeted nature, has proven difficult: intrusions happen and...