ACM DL

Computing Surveys (CSUR)

Menu

Search Issue
enter search term and/or author name below:

Archive


ACM Computing Surveys (CSUR), Volume 50 Issue 1, April 2017

Data-Driven Techniques in Disaster Information Management
Tao Li, Ning Xie, Chunqiu Zeng, Wubai Zhou, Li Zheng, Yexi Jiang, Yimin Yang, Hsin-Yu Ha, Wei Xue, Yue Huang, Shu-Ching Chen, Jainendra Navlakha, S. S. Iyengar
Article No.: 1
DOI: 10.1145/3017678

Improving disaster management and recovery techniques is one of national priorities given the huge toll caused by man-made and nature calamities. Data-driven disaster management aims at applying advanced data collection and analysis technologies...

Business Process Variability Modeling: A Survey
Marcello La Rosa, Wil M. P. Van Der Aalst, Marlon Dumas, Fredrik P. Milani
Article No.: 2
DOI: 10.1145/3041957

It is common for organizations to maintain multiple variants of a given business process, such as multiple sales processes for different products or multiple bookkeeping processes for different countries. Conventional business process modeling...

Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence
Marwa Salayma, Ahmed Al-Dubai, Imed Romdhani, Youssef Nasser
Article No.: 3
DOI: 10.1145/3041956

Wireless Body Area Network (WBAN) has been a key element in e-health to monitor bodies. This technology enables new applications under the umbrella of different domains, including the medical field, the entertainment and ambient intelligence...

Evaluation of Knowledge Gaps in Mathematical Applications of Thermal Image Processing Techniques for Fire Prevention
Sayantan Nath, Sonali Agarwal, G. N. Pandey
Article No.: 4
DOI: 10.1145/3009967

In this article, we present literature reviews on fire prevention methods, especially in mining industries, using thermal image processing techniques. Fire protection systems are crucial because of the increased loss of human lives due to coal...

A Survey on Data-Flow Testing
Ting Su, Ke Wu, Weikai Miao, Geguang Pu, Jifeng He, Yuting Chen, Zhendong Su
Article No.: 5
DOI: 10.1145/3020266

Data-flow testing (DFT) is a family of testing strategies designed to verify the interactions between each program variable’s definition and its uses. Such a test objective of interest is referred to as a def-use pair. DFT selects...

A Survey of Timing Channels and Countermeasures
Arnab Kumar Biswas, Dipak Ghosal, Shishir Nagaraja
Article No.: 6
DOI: 10.1145/3023872

A timing channel is a communication channel that can transfer information to a receiver/decoder by modulating the timing behavior of an entity. Examples of this entity include the interpacket delays of a packet stream, the reordering packets in a...

A Survey of Qualitative Spatial and Temporal Calculi: Algebraic and Computational Properties
Frank Dylla, Jae Hee Lee, Till Mossakowski, Thomas Schneider, André Van Delden, Jasper Van De Ven, Diedrich Wolter
Article No.: 7
DOI: 10.1145/3038927

Qualitative spatial and temporal reasoning (QSTR) is concerned with symbolic knowledge representation, typically over infinite domains. The motivations for employing QSTR techniques include exploiting computational properties that allow efficient...

Presentation Attack Detection Methods for Face Recognition Systems: A Comprehensive Survey
Raghavendra Ramachandra, Christoph Busch
Article No.: 8
DOI: 10.1145/3038924

The vulnerability of face recognition systems to presentation attacks (also known as direct attacks or spoof attacks) has received a great deal of interest from the biometric community. The rapid evolution of face recognition systems into...

Hypervideos and Interactive Multimedia Presentations
Britta Meixner
Article No.: 9
DOI: 10.1145/3038925

Hypervideos and interactive multimedia presentations allow the creation of fully interactive and enriched video. It is possible to organize video scenes in a nonlinear way. Additional information can be added to the video ranging from short...

Smart Computing and Sensing Technologies for Animal Welfare: A Systematic Review
Admela Jukan, Xavi Masip-Bruin, Nina Amla
Article No.: 10
DOI: 10.1145/3041960

Animals play a profoundly important and intricate role in our lives today. Dogs have been human companions for thousands of years, but now they work to assist the disabled, and in combat and search and rescue situations. Farm animals are a...

Hashing Techniques: A Survey and Taxonomy
Lianhua Chi, Xingquan Zhu
Article No.: 11
DOI: 10.1145/3047307

With the rapid development of information storage and networking technologies, quintillion bytes of data are generated every day from social networks, business transactions, sensors, and many other domains. The increasing data volumes impose...

Understanding Human-Machine Networks: A Cross-Disciplinary Survey
Milena Tsvetkova, Taha Yasseri, Eric T. Meyer, J. Brian Pickering, Vegard Engen, Paul Walland, Marika Lüders, Asbjørn Følstad, George Bravos
Article No.: 12
DOI: 10.1145/3039868

In the current hyperconnected era, modern Information and Communication Technology (ICT) systems form sophisticated networks where not only do people interact with other people, but also machines take an increasingly visible and participatory...

Surviving the Web: A Journey into Web Session Security
Stefano Calzavara, Riccardo Focardi, Marco Squarcina, Mauro Tempesta
Article No.: 13
DOI: 10.1145/3038923

In this article, we survey the most common attacks against web sessions, that is, attacks that target honest web browser users establishing an authenticated session with a trusted web application. We then review existing security solutions that...

CASE Tool Support for Variability Management in Software Product Lines
Rabih Bashroush, Muhammad Garba, Rick Rabiser, Iris Groher, Goetz Botterweck
Article No.: 14
DOI: 10.1145/3034827

Software product lines (SPL) aim at reducing time-to-market and increasing software quality through extensive, planned reuse of artifacts. An essential activity in SPL is variability management, i.e., defining and managing commonality and...

A Survey on Financial Applications of Metaheuristics
Amparo Soler-Dominguez, Angel A. Juan, Renatas Kizys
Article No.: 15
DOI: 10.1145/3054133

Modern heuristics or metaheuristics are optimization algorithms that have been increasingly used during the last decades to support complex decision-making in a number of fields, such as logistics and transportation, telecommunication networks,...

Control-Flow Integrity: Precision, Security, and Performance
Nathan Burow, Scott A. Carr, Joseph Nash, Per Larsen, Michael Franz, Stefan Brunthaler, Mathias Payer
Article No.: 16
DOI: 10.1145/3054924

Memory corruption errors in C/C++ programs remain the most common source of security vulnerabilities in today’s systems. Control-flow hijacking attacks exploit memory corruption vulnerabilities to divert program execution away from the...