Computing Surveys (CSUR)


Search Issue
enter search term and/or author name below:


ACM Computing Surveys (CSUR), Volume 50 Issue 3, August 2017

Fog Computing for Sustainable Smart Cities: A Survey
Charith Perera, Yongrui Qin, Julio C. Estrella, Stephan Reiff-Marganiec, Athanasios V. Vasilakos
Article No.: 32
DOI: 10.1145/3057266

The Internet of Things (IoT) aims to connect billions of smart objects to the Internet, which can bring a promising future to smart cities. These objects are expected to generate large amounts of data and send the data to the cloud for further...

Arabic Online Handwriting Recognition (AOHR): A Survey
Baligh M. Al-Helali, Sabri A. Mahmoud
Article No.: 33
DOI: 10.1145/3060620

This article comprehensively surveys Arabic Online Handwriting Recognition (AOHR). We address the challenges posed by online handwriting recognition, including ligatures, dots and diacritic problems, online/offline touching of text, and geometric...

A Survey on Reinforcement Learning Models and Algorithms for Traffic Signal Control
Kok-Lim Alvin Yau, Junaid Qadir, Hooi Ling Khoo, Mee Hong Ling, Peter Komisarczuk
Article No.: 34
DOI: 10.1145/3068287

Traffic congestion has become a vexing and complex issue in many urban areas. Of particular interest are the intersections where traffic bottlenecks are known to occur despite being traditionally signalized. Reinforcement learning (RL), which is...

GPU Virtualization and Scheduling Methods: A Comprehensive Survey
Cheol-Ho Hong, Ivor Spence, Dimitrios S. Nikolopoulos
Article No.: 35
DOI: 10.1145/3068281

The integration of graphics processing units (GPUs) on high-end compute nodes has established a new accelerator-based heterogeneous computing model, which now permeates high-performance computing. The same paradigm nevertheless has limited...

Cross Domain Recommender Systems: A Systematic Literature Review
Muhammad Murad Khan, Roliana Ibrahim, Imran Ghani
Article No.: 36
DOI: 10.1145/3073565

Cross domain recommender systems (CDRS) can assist recommendations in a target domain based on knowledge learned from a source domain. CDRS consists of three building blocks: domain, user-item overlap scenarios, and recommendation tasks. The...

A Survey of Power and Energy Predictive Models in HPC Systems and Applications
Kenneth O’brien, Ilia Pietri, Ravi Reddy, Alexey Lastovetsky, Rizos Sakellariou
Article No.: 37
DOI: 10.1145/3078811

Power and energy efficiency are now critical concerns in extreme-scale high-performance scientific computing. Many extreme-scale computing systems today (for example: Top500) have tight integration of multicore CPU processors and accelerators (mix...

Optimization of Complex Dataflows with User-Defined Functions
Astrid Rheinländer, Ulf Leser, Goetz Graefe
Article No.: 38
DOI: 10.1145/3078752

In many fields, recent years have brought a sharp rise in the size of the data to be analyzed and the complexity of the analysis to be performed. Such analyses are often described as dataflows specified in declarative dataflow languages. A key...

A New Classification Framework to Evaluate the Entity Profiling on the Web: Past, Present and Future
Ahmad Barforoush, Hossein Shirazi, Hojjat Emami
Article No.: 39
DOI: 10.1145/3066904

Recently, we have witnessed entity profiling (EP) becoming increasingly one of the most important topics in information extraction, personalized applications, and web data analysis. EP aims to identify, extract, and represent a compact summary of...

Searchable Symmetric Encryption: Designs and Challenges
Geong Sen Poh, Ji-Jian Chin, Wei-Chuen Yau, Kim-Kwang Raymond Choo, Moesfa Soeheila Mohamad
Article No.: 40
DOI: 10.1145/3064005

Searchable Symmetric Encryption (SSE) when deployed in the cloud allows one to query encrypted data without the risk of data leakage. Despite the widespread interest, existing surveys do not examine in detail how SSE’s underlying structures...

A Survey on Malware Detection Using Data Mining Techniques
Yanfang Ye, Tao Li, Donald Adjeroh, S. Sitharama Iyengar
Article No.: 41
DOI: 10.1145/3073559

In the Internet age, malware (such as viruses, trojans, ransomware, and bots) has posed serious and evolving security threats to Internet users. To protect legitimate users from these threats, anti-malware software products from different...

Corrections to “A Menagerie of Timed Automata”
Jeroen J. A. Keiren, Peter Fontana, Rance Cleaveland
Article No.: 42
DOI: 10.1145/3078809

This note corrects a technical error in the ACM Computing Surveys article mentioned in the title. The flaw involved constructions for showing that timed automata with urgent locations have the same expressiveness as timed automata that...

Data Science: A Comprehensive Overview
Longbing Cao
Article No.: 43
DOI: 10.1145/3076253

The 21st century has ushered in the age of big data and data economy, in which data DNA, which carries important knowledge, insights, and potential, has become an intrinsic constituent of all data-based organisms. An appropriate...

Nudges for Privacy and Security: Understanding and Assisting Users’ Choices Online
Alessandro Acquisti, Idris Adjerid, Rebecca Balebako, Laura Brandimarte, Lorrie Faith Cranor, Saranga Komanduri, Pedro Giovanni Leon, Norman Sadeh, Florian Schaub, Manya Sleeper, Yang Wang, Shomir Wilson
Article No.: 44
DOI: 10.1145/3054926

Advancements in information technology often task users with complex and consequential privacy and security decisions. A growing body of research has investigated individuals’ choices in the presence of privacy and information security...

Data-Driven Techniques in Computing System Management
Tao Li, Chunqiu Zeng, Yexi Jiang, Wubai Zhou, Liang Tang, Zheng Liu, Yue Huang
Article No.: 45
DOI: 10.1145/3092697

Modern forms of computing systems are becoming progressively more complex, with an increasing number of heterogeneous hardware and software components. As a result, it is quite challenging to manage these complex systems and meet the requirements...

Encoding Arguments
Pat Morin, Wolfgang Mulzer, Tommy Reddad
Article No.: 46
DOI: 10.1145/3084288

Many proofs in discrete mathematics and theoretical computer science are based on the probabilistic method. To prove the existence of a good object, we pick a random object and show that it is bad with low probability. This method is effective,...