ACM DL

Computing Surveys (CSUR)

Menu

Search Issue
enter search term and/or author name below:

Archive


ACM Computing Surveys (CSUR), Volume 49 Issue 4, February 2017

Visual Menu Techniques
Gilles Bailly, Eric Lecolinet, Laurence Nigay
Article No.: 60
DOI: 10.1145/3002171

Menus are used for exploring and selecting commands in interactive applications. They are widespread in current systems and used by a large variety of users. As a consequence, they have motivated many studies in Human-Computer Interaction (HCI)....

A Survey of Authentication and Communications Security in Online Banking
Sven Kiljan, Koen Simoens, Danny De Cock, Marko Van Eekelen, Harald Vranken
Article No.: 61
DOI: 10.1145/3002170

A survey was conducted to provide a state of the art of online banking authentication and communications security implementations. Between global regions the applied (single or multifactor) authentication schemes differ greatly, as well as the...

A Survey on Systems Security Metrics
Marcus Pendleton, Richard Garcia-Lebron, Jin-Hee Cho, Shouhuai Xu
Article No.: 62
DOI: 10.1145/3005714

Security metrics have received significant attention. However, they have not been systematically explored based on the understanding of attack-defense interactions, which are affected by various factors, including the degree of system...

Automated Planning for Ubiquitous Computing
Ilche Georgievski, Marco Aiello
Article No.: 63
DOI: 10.1145/3004294

The goal of ubiquitous computing is to create ambience in which one’s experiences and quality of life are improved by monitoring and assisting people using ubiquitous technologies and computation in coherence. The continuous advancements of...

Affinity-Based Thread and Data Mapping in Shared Memory Systems
Matthias Diener, Eduardo H. M. Cruz, Marco A. Z. Alves, Philippe O. A. Navaux, Israel Koren
Article No.: 64
DOI: 10.1145/3006385

Shared memory architectures have recently experienced a large increase in thread-level parallelism, leading to complex memory hierarchies with multiple cache memory levels and memory controllers. These new designs created a Non-Uniform Memory...

Current Research and Open Problems in Attribute-Based Access Control
Daniel Servos, Sylvia L. Osborn
Article No.: 65
DOI: 10.1145/3007204

Attribute-based access control (ABAC) is a promising alternative to traditional models of access control (i.e., discretionary access control (DAC), mandatory access control (MAC), and role-based access control (RBAC)) that is drawing attention in...

Scientific Workflows: Moving Across Paradigms
Chee Sun Liew, Malcolm P. Atkinson, Michelle Galea, Tan Fong Ang, Paul Martin, Jano I. Van Hemert
Article No.: 66
DOI: 10.1145/3012429

Modern scientific collaborations have opened up the opportunity to solve complex problems that require both multidisciplinary expertise and large-scale computational experiments. These experiments typically consist of a sequence of processing...

Inner Source Definition, Benefits, and Challenges
Maximilian Capraro, Dirk Riehle
Article No.: 67
DOI: 10.1145/2856821

Inner Source (IS) is the use of open source software development practices and the establishment of an open source-like culture within organizations. The organization may still develop proprietary software but internally opens up its development....

Abuse Reporting and the Fight Against Cybercrime
Mohammad Hanif Jhaveri, Orcun Cetin, Carlos Gañán, Tyler Moore, Michel Van Eeten
Article No.: 68
DOI: 10.1145/3003147

Cybercriminal activity has exploded in the past decade, with diverse threats ranging from phishing attacks to botnets and drive-by-downloads afflicting millions of computers worldwide. In response, a volunteer defense has emerged, led by security...

A Survey of Link Prediction in Complex Networks
Víctor Martínez, Fernando Berzal, Juan-Carlos Cubero
Article No.: 69
DOI: 10.1145/3012704

Networks have become increasingly important to model complex systems composed of interacting elements. Network data mining has a large number of applications in many disciplines including protein-protein interaction networks, social networks,...

Mobile Cloud Business Process Management System for the Internet of Things: A Survey
Chii Chang, Satish Narayana Srirama, Rajkumar Buyya
Article No.: 70
DOI: 10.1145/3012000

The Internet of Things (IoT) represents a comprehensive environment that consists of a large number of smart devices interconnecting heterogeneous physical objects to the Internet. Many domains such as logistics, manufacturing, agriculture, urban...

Computer Vision and Natural Language Processing: Recent Approaches in Multimedia and Robotics
Peratham Wiriyathammabhum, Douglas Summers-Stay, Cornelia Fermüller, Yiannis Aloimonos
Article No.: 71
DOI: 10.1145/3009906

Integrating computer vision and natural language processing is a novel interdisciplinary field that has received a lot of attention recently. In this survey, we provide a comprehensive introduction of the integration of computer vision and natural...

A Survey on Crossover Operators
G. Pavai, T. V. Geetha
Article No.: 72
DOI: 10.1145/3009966

Crossover is an important operation in the Genetic Algorithms (GA). Crossover operation is responsible for producing offspring for the next generation so as to explore a much wider area of the solution space. There are many crossover operators...

Mobile IP Handover for Vehicular Networks: Methods, Models, and Classifications
Azzedine Boukerche, Alexander Magnano, Noura Aljeri
Article No.: 73
DOI: 10.1145/2996451

The popularity and development of wireless devices has led to a demand for widespread high-speed Internet access, including access for vehicles and other modes of high-speed transportation. The current widely deployed method for providing Internet...

A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems
Youngjoo Shin, Dongyoung Koo, Junbeom Hur
Article No.: 74
DOI: 10.1145/3017428

Data deduplication has attracted many cloud service providers (CSPs) as a way to reduce storage costs. Even though the general deduplication approach has been increasingly accepted, it comes with many security and privacy problems due to the...

Advances in the Quantum Theoretical Approach to Image Processing Applications
Nour Abura'ed, Faisal Shah Khan, Harish Bhaskar
Article No.: 75
DOI: 10.1145/3009965

In this article, a detailed survey of the quantum approach to image processing is presented. Recently, it has been established that existing quantum algorithms are applicable to image processing tasks allowing quantum informational models of...

The Evolution of Android Malware and Android Analysis Techniques
Kimberly Tam, Ali Feizollah, Nor Badrul Anuar, Rosli Salleh, Lorenzo Cavallaro
Article No.: 76
DOI: 10.1145/3017427

With the integration of mobile devices into daily life, smartphones are privy to increasing amounts of sensitive information. Sophisticated mobile malware, particularly Android malware, acquire or utilize such data without user consent. It is...