ACM DL

Computing Surveys (CSUR)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Computing Surveys (CSUR), Volume 50 Issue 2, June 2017

Systematic Review of Software Behavioral Model Consistency Checking
Faiz ul Muram, Huy Tran, Uwe Zdun
Article No.: 17
DOI: 10.1145/3037755

In software development, models are often used to represent multiple views of the same system. Such models need to be properly related to each other in order to provide a consistent description of the developed system. Models may contain...

Changes as First-Class Citizens: A Research Perspective on Modern Software Tooling
Quinten David Soetens, Romain Robbes, Serge Demeyer
Article No.: 18
DOI: 10.1145/3038926

Software must evolve to keep up with an ever-changing context, the real world. We discuss an emergent trend in software evolution research revolving around the central notion that drives evolution: Change. By reifying change, and by modelling it...

Online Algorithms with Advice: A Survey
Joan Boyar, Lene M. Favrholdt, Christian Kudahl, Kim S. Larsen, Jesper W. Mikkelsen
Article No.: 19
DOI: 10.1145/3056461

In online scenarios requests arrive over time, and each request must be serviced in an irrevocable manner before the next request arrives. Online algorithms with advice is an area of research where one attempts to measure how much knowledge of...

Deep Learning Advances in Computer Vision with 3D Data: A Survey
Anastasia Ioannidou, Elisavet Chatzilari, Spiros Nikolopoulos, Ioannis Kompatsiaris
Article No.: 20
DOI: 10.1145/3042064

Deep learning has recently gained popularity achieving state-of-the-art performance in tasks involving text, sound, or image processing. Due to its outstanding performance, there have been efforts to apply it in more challenging scenarios, for...

Imitation Learning: A Survey of Learning Methods
Ahmed Hussein, Mohamed Medhat Gaber, Eyad Elyan, Chrisina Jayne
Article No.: 21
DOI: 10.1145/3054912

Imitation learning techniques aim to mimic human behavior in a given task. An agent (a learning machine) is trained to perform a task from demonstrations by learning a mapping between observations and actions. The idea of teaching by imitation has...

Spatio-Temporal Analysis of Team Sports
Joachim Gudmundsson, Michael Horton
Article No.: 22
DOI: 10.1145/3054132

Team-based invasion sports such as football, basketball, and hockey are similar in the sense that the players are able to move freely around the playing area and that player and team performance cannot be fully analysed without considering...

A Survey on Ensemble Learning for Data Stream Classification
Heitor Murilo Gomes, Jean Paul Barddal, Fabrício Enembreck, Albert Bifet
Article No.: 23
DOI: 10.1145/3054925

Ensemble-based methods are among the most widely used techniques for data stream classification. Their popularity is attributable to their good performance in comparison to strong single learners while being relatively easy to deploy in real-world...

A Survey and Comparative Study of Hard and Soft Real-Time Dynamic Resource Allocation Strategies for Multi-/Many-Core Systems
Amit Kumar Singh, Piotr Dziurzanski, Hashan Roshantha Mendis, Leandro Soares Indrusiak
Article No.: 24
DOI: 10.1145/3057267

Multi-/many-core systems are envisioned to satisfy the ever-increasing performance requirements of complex applications in various domains such as embedded and high-performance computing. Such systems need to cater to increasingly dynamic...

Current State of Text Sentiment Analysis from Opinion to Emotion Mining
Ali Yadollahi, Ameneh Gholipour Shahraki, Osmar R. Zaiane
Article No.: 25
DOI: 10.1145/3057270

Sentiment analysis from text consists of extracting information about opinions, sentiments, and even emotions conveyed by writers towards topics of interest. It is often equated to opinion mining, but it should also encompass emotion mining....

A Taxonomy and Survey of Cloud Resource Orchestration Techniques
Denis Weerasiri, Moshe Chai Barukh, Boualem Benatallah, Quan Z. Sheng, Rajiv Ranjan
Article No.: 26
DOI: 10.1145/3054177

Cloud services and applications prove indispensable amid today’s modern utility-based computing. The cloud has displayed a disruptive and growing impact on everyday computing tasks. However, facilitating the orchestration of cloud resources...

A Survey of Techniques for Cache Partitioning in Multicore Processors
Sparsh Mittal
Article No.: 27
DOI: 10.1145/3062394

As the number of on-chip cores and memory demands of applications increase, judicious management of cache resources has become not merely attractive but imperative. Cache partitioning, that is, dividing cache space between applications based on...

Simulation and Experimentation Platforms for Underwater Acoustic Sensor Networks: Advancements and Challenges
Hanjiang Luo, Kaishun Wu, Rukhsana Ruby, Feng Hong, Zhongwen Guo, Lionel M. Ni
Article No.: 28
DOI: 10.1145/3040990

Ocean and water basically cover the major parts of our planet. To obtain the best utilization of the underlying resources on these parts of the Earth, people have made some research advancements. Specifically, the research on underwater wireless...

Effective Regression Test Case Selection: A Systematic Literature Review
Rafaqut Kazmi, Dayang N. A. Jawawi, Radziah Mohamad, Imran Ghani
Article No.: 29
DOI: 10.1145/3057269

Regression test case selection techniques attempt to increase the testing effectiveness based on the measurement capabilities, such as cost, coverage, and fault detection. This systematic literature review presents state-of-the-art research in...

Game Theory for Cyber Security and Privacy
Cuong T. Do, Nguyen H. Tran, Choongseon Hong, Charles A. Kamhoua, Kevin A. Kwiat, Erik Blasch, Shaolei Ren, Niki Pissinou, Sundaraja Sitharama Iyengar
Article No.: 30
DOI: 10.1145/3057268

In this survey, we review the existing game-theoretic approaches for cyber security and privacy issues, categorizing their application into two classes, security and privacy. To show how game theory is utilized in cyberspace security and privacy,...

A Survey on Reliability Protocols in Wireless Sensor Networks
Mohamed Amine Kafi, Jalel Ben Othman, Nadjib Badache
Article No.: 31
DOI: 10.1145/3064004

Wireless Sensor Network (WSN) applications have become more and more attractive with the miniaturization of circuits and the large variety of sensors. The different application domains, especially critical fields of WSN use, make the reliability...