Computing Surveys (CSUR)

Latest Articles

Bridging the Chasm

The use of software is pervasive in all fields of science. Associated software development efforts may be very large, long lived, and complex, requiring the commitment of significant resources. However, several authors have argued that the “gap” or “chasm” between software engineering and scientific programming is a... (more)

The Need for Affective Trust Applied to Trust and Reputation Models

Trust allows the behavior evaluation of individuals by setting confidence values, which are used in... (more)

On the Collaboration Support in Information Retrieval

Collaborative Information Retrieval (CIR) is a well-known setting in which explicit collaboration occurs among a group of users working together to... (more)

Similarity of Business Process Models—A State-of-the-Art Analysis

Business process models play an important role in today’s enterprises, hence, model repositories may contain hundreds of models. These models... (more)

A Classification of Locality in Network Research

Limiting the knowledge of individual nodes is a major concern for the design of distributed algorithms. With the LOCAL model, theoretical research already established a common model of locality that has gained little practical relevance. As a result, practical research de facto lacks any common locality model. The only common denominator among... (more)

Metrics for Community Analysis

Detecting and analyzing dense groups or communities from social and information networks has attracted immense attention over the last decade due to its enormous applicability in different domains. Community detection is an ill-defined problem, as the nature of the communities is not known in advance. The problem has turned even more complicated... (more)

Searching the Web of Things

Technological advances allow more physical objects to connect to the Internet and provide their services on the Web as resources. Search engines are the key to fully utilize this emerging Web of Things, as they bridge users and applications with resources needed for their operation. Developing these systems is a challenging and diverse endeavor due... (more)

Software Vulnerability Analysis and Discovery Using Machine-Learning and Data-Mining Techniques

Software security vulnerabilities are one of the critical issues in the realm of computer security.... (more)

Non-GPS Positioning Systems

An enormous amount of research has been conducted in the area of positioning systems and thus it calls for a detailed literature review of recent localization systems. This article focuses on recent developments of non-Global Positioning System (GPS) localization/positioning systems. We have presented a new hierarchical method to classify various... (more)

Toward Real-Time Ray Tracing

Ray tracing has long been considered as the next-generation technology for graphics rendering. Recently, there has been strong momentum to adopt ray tracing--based rendering techniques on consumer-level platforms due to the inability of further enhancing user experience by increasing display resolution. On the other hand, the computing workload of... (more)

Analysis of JavaScript Programs

JavaScript has been a de facto standard language for client-side web programs, and now it is expanding its territory to general purpose programs. In this article, we classify the client-side JavaScript research for the last decade or so into six topics: static analysis, dynamic analysis, formalization and reasoning, type safety and JIT... (more)

A Survey of Algorithmic Debugging

Algorithmic debugging is a technique proposed in 1982 by E. Y. Shapiro in the context of logic programming. This survey shows how the initial ideas have been developed to become a widespread debugging schema fitting many different programming paradigms and with applications out of the program debugging field. We describe the general framework and... (more)


About CSUR

ACM Computing Surveys (CSUR) publishes comprehensive, readable tutorials and survey papers that give guided tours through the literature and explain topics to those who seek to learn the basics of areas outside their specialties. These carefully planned and presented introductions are also an excellent way for professionals to develop perspectives on, and identify trends in complex technologies. Recent issues have covered image understanding, software reusability, and object and relational database topics. 

read more
Forthcoming Articles
Graph Processing on GPUs: A Survey

In the big data era, much real-world data can be naturally represented as graphs. Consequently, many application domains can be modelled as graph processing. Graph processing, especially the processing of the large scale graphs with the number of vertices and edges in the order of billions or even hundreds of billions, has attracted much attention in both industry and academia. It still remains a great challenge to process such large scale graphs. Researchers have been seeking for new possible solutions. Because of the massive degree of parallelism and the high memory access bandwidth in GPU, utilizing GPU to accelerate graph processing proves to be a promising solution. This paper surveys the key issues of graph processing on GPUs, including data layout, memory access pattern, workload mapping and specific GPU programming. In this paper, we summarize the state-of-the-art research on GPU-based graph processing, analyze the existing challenges in details, and explore the research opportunities in future.

Foundations of Modern Graph Query Languages

We survey foundational features underlying modern graph query languages. We first discuss two popular graph data models: edge-labelled graphs, where nodes are connected to other nodes by directed, labelled edges; and property graphs, where nodes and edges can have attributes. Next we discuss the two most basic graph querying functionalities: graph patterns and navigational expressions. We start with graph patterns, in which a graph-structured query is matched against the data. Thereafter we discuss navigational expressions, in which patterns can be matched recursively against the graph to navigate paths of arbitrary length; we give an overview of what kinds of expressions have been proposed, and how such expressions can be combined with graph patterns. We also discuss a variety of semantics under which queries using the previous features can be evaluated, what effects the introduction of additional features and the selection of semantics has on complexity, as well as offering examples of said features in three modern languages that can be used to query graphs: SPARQL, Cypher and Gremlin. We conclude with discussion of the importance of formalisation for graph query languages, as well as possible future directions in which such languages can be extended.

Automated Vehicle Detection and Classification: Models, Methods, and Techniques

Automated Vehicle Classification (AVC) based on vision sensors has received active attention from researchers, due to heightened security concerns in Intelligent Transportation Systems. In this work, we propose a categorization of AVC studies based on the granularity of classification, namely Vehicle Type Recognition (VTR), Vehicle Make Recognition (VMR) and Vehicle Make and Model Recognition (VMMR). For each category of AVC systems, we present a comprehensive review and comparison of features extraction, global representation, and classification techniques. The various datasets proposed over the years for AVC are also compared in light of the real-world challenges they represent, and those they do not. The major challenges involved in each category of AVC systems are presented, highlighting open problems in this area of research. Finally, we conclude by providing future directions of research in this area, paving the way towards efficient large-scale AVC systems. This survey shall help researchers interested in the area to analyze works completed so far in each category of AVC, focusing on techniques proposed for each module, and to chalk out strategies to enhance state-of-the-art technology.

Surveying Stylometry Techniques and Applications

Stylometry, or the analysis of authorial writing style, relies on the assumption that this style is quantifiable and distinct. However, deriving a universal style representation has plagued researchers for nearly 200 years, resulting in several methods and tools to address various challenges, such as use of limited training samples for accurate author recognition. Research has since concentrated on the fine tuning of these techniques and the role of stylometry in preserving and/or exposing privacy and anonymity. This survey covers these methods with emphasis on stylometry-related sub-problems. Additionally, while previous surveys neglect to include adversarial stylometric techniques, methods specifically designed to counter authorship detection are discussed. Many experimental models and databases are defined and discussion of various research approaches which employ each are provided. Finally, several research challenges and descriptions of various open-source and commercial software are provided.

Software Platforms for Smart Cities: Concepts, Requirements, Challenges, and a Unified Reference Architecture

Making cities smarter help improve city services and increase citizens quality of life. Information and communication technologies (ICT) are fundamental for progressing towards smarter city environments. Smart City software platforms potentially support the development and integration of Smart City applications. However, the ICT community must overcome current signicant technological and scientic challenges before these platforms can be widely used. This paper surveys the state-of-the-art in software platforms for Smart Cities. We analyzed 23 projects with respect to the most used enabling technologies, as well as functional and non-functional requirements, classifying them into four categories: Cyber-Physical Systems, InternetofThings,BigData,andCloudComputing.Basedontheseresults,wederivedareferencearchitecture to guide the development of next-generation software platforms for Smart Cities. Finally, we enumerated the most frequently cited open research challenges, and discussed future opportunities. This survey gives important references for helping application developers, city managers, system operators, end-users, and Smart City researchers to make project, investment, and research decisions.

A Survey of Modelling Trends in Temporal GIS

The main achievements of spatio-temporal modelling in the field of Geographic Information Science over the past three decades are surveyed. This article offers an overview of: (i) the origins and history of Temporal Geographic Information Systems (T-GIS); (ii) relevant spatio-temporal data models proposed; (iii) the evolution of spatio-temporal modelling trends; and (iv) an analysis of the future trends and developments in T-GIS. It also presents some current theories and concepts that have emerged from the research performed, as well as a summary of the current progress and the upcoming challenges and potential research directions for T-GIS. One relevant result of this survey is the proposed taxonomy of spatio-temporal modelling trends, which classifies 186 modelling proposals surveyed from more than 1400 articles.

A Tutorial on Canonical Correlation Methods

Canonical correlation analysis is a family of multivariate statistical methods for the analysis of paired sets of variables. Since its proposition, canonical correlation analysis has been extended to extract relations between two sets of variables when the sample size is insufficient in relation to the data dimensionality, when the relations have been considered to be non-linear, and when the dimensionality is too large for human interpretation. Applying linear algebra, this tutorial explains the theory of canonical correlation analysis including its regularised, kernel, and sparse variants. Together with the numerical examples, this overview provides a coherent compendium on the applicabilities of the variants of canonical correlation analysis. By bringing together techniques for solving the optimisation problems, evaluating the statistical significance and generalisability of the canonical correlation model, and interpreting the relations, we hope that this article can serve as a hands-on tool for applying canonical correlation methods in data analysis.

Strategic Aspects of Cyber Risk Information Sharing

Cyber risk management largely reduces to a race for information between defenders and attackers. Defenders can gain advantage in this race by sharing cyber risk information with each other. Yet, defenders often share less than is socially desirable, because sharing decisions are guided by selfish rather than altruistic reasons. A growing line of research studies these strategic aspects that drive defenders' sharing decisions. The present survey systematizes these works in a novel framework. It provides a consolidated understanding of defenders' strategies to privately or publicly share information, and enables us to distill trends in the literature and identify future research directions. The review also reveals that many theoretical works assume cyber risk information sharing to be beneficial, while corresponding empirical validations are missing.

Mining Electronic Health Records (EHRs): A Survey

The continuously increasing cost of the US healthcare system has received significant attention. Central to the ideas aimed at curbing this trend is the use of technology, in the form of the mandate to implement electronic health records (EHRs). EHRs consist of patient information such as demographics, medications, laboratory test results, diagnosis codes and procedures. Mining EHRs could lead to improvement in patient health management as EHRs contain detailed information related to disease prognosis for large patient populations. In this manuscript, we provide a structured and comprehensive overview of data mining techniques for modeling EHR data. We first provide a detailed understanding of the major application areas to which EHR mining has been applied and then discuss the nature of EHR data and its accompanying challenges. Next, we describe major approaches used for EHR mining, the metrics associated with EHRs, and the various study designs. With this foundation, we then provide a systematic and methodological organization of existing data mining techniques used to model EHRs and discuss ideas for future research.

An Offensive and Defensive Exposition of Wearable Computing

Wearable computing is rapidly getting deployed in many  commercial, medical and personal  domains of day-to-day life. Wearable devices appear in various forms, shapes and sizes and facilitate a wide variety of applications in many domains of life. However, wearables raise unique security and privacy concerns. Wearables also hold the promise to help enhance the existing security, privacy and safety paradigms in unique ways while preserving systems usability. The contribution of this research literature survey is three-fold. First, as a background, we identify a wide range of existing as well as upcoming wearable devices and investigate their broad applications. Second, we provide an exposition of the security and privacy of wearable computing, studying dual aspects, i.e., both attacks and defenses. Third, we provide a comprehensive study of the potential security, privacy and safety enhancements to existing systems based on the emergence of wearable technology. Although several research works have emerged exploring different offensive and defensive uses of wearables, there is a lack of a broad and precise literature review systematizing all those security and privacy aspects and the underlying threat models. This research survey also analyzes current and emerging research trends, and provides directions for future research.

A Survey on Fully Homomorphic Encryption: an Engineering Perspective

It is unlikely that an hacker is able to compromise sensitive data that is stored in an encrypted form. However, when data is to be processed, it has to be decrypted, becoming vulnerable to attacks. Homomorphic encryption fixes this vulnerability by allowing one to compute directly on encrypted data. In this survey, both previous and current Somewhat Homomorphic Encryption (SHE) schemes are reviewed, and the more powerful and recent Fully Homomorphic Encryption (FHE) schemes are comprehensively studied. The concepts that support these schemes are presented, and their performance and security are analyzed from an engineering standpoint.

The Experience Sampling Method on Mobile Devices

The Experience Sampling Method (ESM) is used by scientists from various disciplines to gather insights into the intrapsychic elements of human life. Researchers have used the ESM in a wide variety of studies, with the method seeing increased popularity. Mobile technologies have enabled new possibilities for the use of the ESM, while simultaneously leading to new conceptual, methodological, and technological challenges. In this survey, we provide an overview of the history of the ESM, usage of this methodology in the computer science discipline, as well as its evolution over time. Next, we identify and discuss important considerations for ESM studies on mobile devices, and analyse the particular methodological parameters scientists should consider in their study design. We reflect on the existing tools that support the ESM methodology and discuss the future development of such tools. Finally, we discuss the effect of future technological developments on the use of the ESM and identify areas requiring further investigation.

Systems Applications of Social Networks

The aim of this article is to provide an understanding of social networks as a useful addition to the standard tool-box of techniques used by system designers. To this end, we give examples of how data about social links have been collected and used in different application contexts. We develop a broad taxonomy-based overview of common properties of social networks, review how they might be used in different applications, and point out potential pitfalls where appropriate. We propose a framework, distinguishing between two main types of social network-based user selection  personalised user selection which identifies target users who may be relevant for a given source node, using the social network around the source as a context, and generic user selection or group delimitation, which filters for a set of users who satisfy a set of application requirements based on their social properties. Using this framework, we survey applications of social networks in three typical kinds of application scenarios: recommender systems, content-sharing systems (e.g., P2P or video streaming), and systems which defend against users who abuse the system (e.g., spam or sybil attacks). In each case, we discuss potential directions for future research that involve using social network properties.

Systematic Literature Review on Usability of Firewall Configuration

Firewalls are network security components that handle incoming and outgoing network traffic based on a set of rules. The process of correctly configuring a firewall is complicated and prone to error, and it worsens as the network complexity grows. A poorly configured firewall may result in major security threats; in case of a network firewall, an organizations security could be endangered, and in the case of a personal firewall, an individual computers security is threatened. A major reason of poorly configured firewalls, as pointed out in the literature, is usability issues. Our aim is to identify existing solutions that help professional and non- professional users to create and manage firewall configuration files, and to analyze the proposals in respect of usability. A systematic literature review with a focus on usability of firewall configuration is presented in the paper. Its main goal is to explore what has already been done in this field. In the primary selection procedure, 1,202 papers were retrieved and then screened. The secondary selection led us to 35 papers carefully chosen for further investigation, of which, 14 papers were selected and summarized....

Data Storage Management in Cloud Environments: Taxonomy, Survey, and Future Directions

Storage as a Service (StaaS) forms a critical component of cloud computing by offering the vision of a virtually infinite pool of storage resources. It supports a variety of cloud-based data store classes in terms of availability, scalability, ACID (Atomicity, Consistency, Isolation, Durability) properties, data models, and price options. Despite many open challenges within a cloud-based data store, application providers deploy Geo-replicated data stores in order to obtain higher availability, lower response time, and more cost efficiency. The deployment of Geo-replicated data stores is in its infancy and poses vital challenges for researchers. In this paper, we first discuss the key advantages and challenges of data-intensive applications deployed within and across cloud-based data stores. Then, we provide a comprehensive taxonomy that covers key aspects of cloud-based data store: data model, data dispersion, data consistency, data transaction service, and data cost optimization. Finally, we map various cloud-based data store projects to our proposed taxonomy not only to validate the taxonomy but also to identify areas for future research.

A Survey on Optical Network-on-Chip Architectures

Optical on-chip data transmission enabled by silicon photonics is widely considered a key technology to overcome the bandwidth and energy limitations of electrical interconnects. The possibility of utilizing optical links in the on-chip communication fabric has paved the way to a fascinating new research field - Optical Networks-on-Chip (ONoCs) - which has been gaining large interest in the community. Nanophotonic devices and materials, however, are still evolving, and dealing with optical data transmission on chip makes designers and researchers face a whole new set of obstacles and challenges. Designing efficient ONoCs is a challenging task and requires a detailed knowledge from on-chip traffic demands and patterns down to the physical layout and implications of integrating both electronic and photonic devices. In this paper, we provide an exhaustive review of recent ONoC proposals, discuss their strengths and weaknesses, and outline outstanding research questions. Moreover, we discuss recent research efforts in key enabling technologies, such as on-chip and adaptive laser sources, automatic synthesis tools, and ring heating techniques, which are essential to enable a widespread commercial adoption of ONoCs in the future.

Survey of Naturalistic Programming Technologies

Programming languages expressiveness is limited by paradigm because it is focused on solving abstraction problems without considering expressiveness of abstractions described using natural language. So, authors have developed tools for natural language software development. In this paper, many works consisting of tools that use some natural language level and domain-specific languages that have an expressiveness level similar to natural languages are reviewed. The goal of the paper is to present a review and highlight the problems that were solved and those left aside. Also, it addresses the fact that a naturalistic language based on a model is not reported.

A Survey of Fault Tolerance Algorithms for Reconfigurable Nano-Crossbar Arrays

Nano-crossbar arrays have emerged as a promising and viable technology to improve computing performance of electronic circuits beyond the limits of current CMOS. Arrays offer both structural efficiency with reconfiguration and prospective capability of integration with different technologies. However, certain problems need to be addressed and the most important one is the prevailing occurrence of faults. Considering fault rate projections as high as 20\% that is much higher than those of CMOS, it is fair to expect sophisticated fault tolerance methods. The focus of this survey paper is the assessment and evaluation of these methods and related algorithms applied in logic mapping and configuration processes. As a start, we concisely explain reconfigurable nano-crossbar arrays with their fault characteristics and models. Following that, we demonstrate configuration techniques of the arrays in the presence of permanent faults and elaborate on two main fault tolerance methodologies, namely defect-unaware and defect-aware approaches, with a short review on advantages and disadvantages. Next, we overview fault tolerance approaches for transient faults. In the experimental results section, we give detailed results of the algorithms regarding their strengths and weaknesses with a comprehensive yield, success rate, and runtime analysis. As a conclusion, we overview the proposed algorithms with future directions and upcoming challenges.

Feature Selection: A Data Perspective

Feature selection has been proven to be effective and efficient in preparing high-dimensional data for data mining and machine learning problems. The objectives include: building simpler and more comprehensible models, improving data mining performance, and preparing clean, understandable data. The recent proliferation of big data has presented some substantial challenges and opportunities of feature selection algorithms. In this survey, we provide a comprehensive and structured overview of recent advances in feature selection research. In particular, we revisit feature selection research from a data perspective, and review representative feature selection algorithms for generic data, structured data, heterogeneous data and streaming data. Methodologically, to emphasize the differences and similarities of most existing feature selection algorithms for generic data, we generally categorize them into four groups: similarity based, information theoretical based, sparse learning based and statistical based methods. Finally, to facilitate and promote the research in this community, we also present an open-source feature selection repository that consists of most of the popular feature selection algorithms ( Also, we use it as an example to show how to evaluate feature selection algorithms. At last, we also have a discussion about some open problems and challenges that need to be paid more attention in future research.

Probabilistic Complex Event Recognition: A Survey

Complex Event Recognition applications exhibit various types of uncertainty, ranging from incomplete and erroneous data streams to imperfect complex event patterns. We review Complex Event Recognition techniques that handle, to some extent, uncertainty. We examine techniques based on automata, probabilistic graphical models and first-order logic, which are the most common ones, and approaches based on Petri Nets and Grammars, which are less frequently used. A number of limitations are identified with respect to the employed languages, their probabilistic models and their performance, as compared to the purely deterministic cases. Based on those limitations, we highlight promising directions for future work.

Automatic Sarcasm Detection: A Survey

Automatic sarcasm detection is the task of predicting sarcasm in text. This is a crucial step to sentiment analysis, considering prevalence and challenges of sarcasm in sentiment-bearing text. Beginning with an approach that used speech-based features, automatic sarcasm detection has witnessed great interest from the sentiment analysis community. This paper is the first known compilation of past work in automatic sarcasm detection. We observe three milestones in the research so far: semi-supervised pattern extraction to identify implicit sentiment, use of hashtag-based supervision, and incorporation of context beyond target text. In this paper, we describe datasets, approaches, trends and issues in sarcasm detection. We also discuss representative performance values, shared tasks and pointers to future work, as given in prior works. In terms of resources to understand the state-of-the-art, the survey presents several useful illustrations - most prominently, a table that summarizes past papers along different dimensions such as features, annotation techniques, data forms, etc.

A Survey On Authenticated Encryption  ASIC Designers Perspective

Authenticated encryption (AE) has long been a vital operation in cryptography due to its ability to provide confidentiality, integrity and authenticity at the same time. Its use has soared in parallel with widespread use of Internet and has led to several new schemes. There have already been studies investigating software performance of various schemes. However, the same is yet to be done for hardware. In this paper, we present a comprehensive survey of hardware performance of the most commonly used authenticated encryption schemes in literature. These schemes include encrypt-then-MAC combination, block cipher based AE modes, relatively new authenticated encryption ciphers and the recently-introduced permutation-based AE scheme. For completeness, we implemented each scheme with various standardized block ciphers and/or hash algorithms, and their lightweight versions. In our evaluation, we targeted minimizing the time-area product while maximizing the throughput on ASIC platforms. 45nm NANGATE Open Cell Library was used for syntheses. In the results, we present area, speed, time-area product, throughput, and power figures for both standard and lightweight versions of each scheme. Finally, we provide an unbiased discussion on the impact of the structure and complexity of each scheme on hardware implementation, together with recommendations on hardware-friendly authenticated encryption scheme design.

A survey of techniques for automatically sensing the behavior of a crowd

Crowd-centric research is receiving increasingly more attention as data sets on crowd behavior are becoming readily available. We have come to a point that many of the models on pedestrian analytics introduced in the last decade, which have mostly not been validated, can now be tested using real-world data sets. In this survey we concentrate exclusively on automatically gathering such data sets, which we refer to as sensing the behavior of pedestrians. We roughly distinguish two approaches: one that requires users to explicitly use local applications and wearables, and one that scans the presence of handheld devices such as smartphones. We come to the conclusion that despite the numerous reports in popular media, relatively few groups have been looking into practical solutions for sensing pedestrian behavior. Moreover, we find that much work is still needed, in particular when it comes to combing privacy, transparency, scalability, and ease of deployment. We report on over 90 relevant articles and discuss and compare in detail 30 reports on sensing pedestrian behavior.

Geomagnetism for Smartphone-Based Indoor Localization: Challenges, Advances, and Comparisons

Geomagnetism has recently attracted considerable attention for indoor localization due to its pervasiveness and unreliance on extra infrastructure. Its location signature has been observed to be temporally stable and spatially discernible for localization purposes. This survey investigates the recent challenges and advances in geomagnetism-based indoor localization using smartphones. We first study smartphone-based geomagnetism measurements. We then review recent efforts in database construction and computation reduction, followed by state-of-the-art schemes in localizing the target. For each category, we identify practical deployment challenges and compare related studies. Finally, we summarize future directions and provide guideline for new researchers in this field.

Automatic Software Repair: a Bibliography

This article presents an annotated bibliography on automatic software repair. Automatic software repair consists of automatically finding a solution to software bugs, without human intervention. The uniqueness of this article is that it spans the research communities that contribute to this body of knowledge: software engineering, dependability, operating systems, programming languages and security. Furthermore, it provides a novel and structured overview of the diversity of bug oracles and repair operators used in the literature.

Secure Smart Homes: Opportunities and Challenges

The Smart Home concept integrates smart applications in the daily human life. In recent years, Smart Homes have increased security and management challenges due to low capacity of small sensors, multiple connectivity to the internet for efficient applications (use of big data and cloud computing) and heterogeneity of home systems, which imposes that inexpert users should configure devices and micro-systems. This paper presents current security and management approaches in Smart Homes and shows the good practices imposed into the market for developing secure systems in houses. At last, we propose future solutions for efficiently and securely managing the Smart Homes.

Towards Reasoning Vehicles: A Survey of Fuzzy Logic-based Solutions in Vehicular Networks

Vehicular networks and their associated technologies enable an extremely varied plethora of applications and therefore attract increasing attention from a wide audience. However vehicular networks also have many challenges that arise mainly due to their dynamic and complex environment. Fuzzy Logic, known for its ability to deal with complexity, imprecision and model non-deterministic problems, is a very promising technology for use in such a dynamic and complex context. This paper presents the first comprehensive survey of research on Fuzzy Logic approaches in the context of vehicular networks, and provides fundamental information which enables readers to design their own Fuzzy Logic systems in this context. As such, the paper describes the Fuzzy Logic concepts with emphasis on their implementation in vehicular networks, includes a classification and thorough analysis of the Fuzzy Logic-based solutions in vehicular networks and discusses how Fuzzy Logic could empower the key research directions in the 5G-enabled vehicular networks, the next generation of vehicular communications.

A Survey of Research into Mixed Criticality Systems

This survey covers research on the topic of mixed criticality systems that has been published since Vestal's seminal paper in 2007. It covers the period up to and including July 2015. The survey is organised along the lines of the major research areas within this topic. These include single processor analysis (including job-based, task-based, fixed priority and EDF scheduling, shared resources and static and synchronous scheduling), multiprocessor analysis, realistic models, formal treatments, and systems issues. The survey also explores the relationship between research into mixed criticality systems and other topics such as fault tolerant scheduling, hierarchical scheduling, cyber physical systems, and probabilistic hard real-time systems. An appendix lists funded projects in the area of mixed criticality.

A Survey of Presence and Related Concepts

The presence construct, most commonly defined as the sense of "being there", has driven research and development of virtual environments (VEs) for decades. Despite that, there is not widespread agreement on how to define or operationalize this construct. The literature contains many different definitions of presence, and many proposed measures for it. This article reviews many of the definitions, measures, and models of presence from the literature. We also discuss several related constructs, including immersion, agency, transportation, and reality judgment. We also present a meta-analysis of existing models of presence informed by Slater's Place Illusion and Plausibility Illusion constructs.

A Survey of Dynamic Analysis and Test Generation for JavaScript

JavaScript has become one of the most prevalent programming languages. Unfortunately, some of the unique properties that contribute to this popularity also make JavaScript programs prone to errors and difficult for program analyses to reason about. These properties include the highly dynamic nature of the language, a set of unusual language features, a lack of encapsulation mechanisms, and the "no crash" philosophy. This paper surveys dynamic program analysis and test generation techniques for JavaScript targeted at improving the correctness, reliability, performance, security, and privacy of JavaScript-based software.

A Survey of Active Object Languages

To program parallel systems efficiently and easily, a wide range of programming models appeared, each with different choices concerning synchronization and communication between parallel entities. Among them, the actor model is based on loosely coupled parallel entities that communicate trough asynchronous messages thanks to the use of mailboxes. Some actor languages provide a strong integration with the object-oriented concepts; they are often called active object languages. This paper reviews four major actor and active object languages and compares them according to well-chosen dimensions that cover the programming paradigms and their implementation.

A Survey of Quantification Learning

The task of quantification consists in providing an aggregate estimation (e.g. the class distribution in a classification problem) for unseen test sets, applying a model that is trained using a training set with a different data distribution.} Several real-world applications demand this kind of methods that do not require predictions for individual examples and just focus on obtaining accurate estimates at an aggregate level. During the past few years, several quantification methods have been proposed from different perspectives and with different goals. This paper presents a unified review of the main approaches with the aim of serving as an introductory tutorial for newcomers in the field.

A Tutorial for Olfaction-based Multisensorial Media Application Design and Evaluation

Recently, multimedia researchers have added several so called new media to the traditional multimedia components (e.g. olfaction, haptic and gustation). The inclusion of such stimuli in addition to traditional media components is typically labeled as multiple sensorial media or mulsemedia. Capturing multimedia user perceived Quality of Experience (QoE) is already non-trivial and the addition of multiple sensorial media components increases this challenge. No standardized methodology exists to conduct subjective quality assessments of multiple sensorial media applications. To date researchers have employed different aspects of audiovisual standards to assess user QoE of multiple sensorial media applications and thus, a fragmented approach exists. In this paper, the authors highlight issues researchers face from numerous perspectives including applicability (or lack of) existing audio-visual standards to evaluate user QoE and lack of result comparability due to varying approaches, specific requirements of olfactory-based multiple sensorial media applications, and novelty associated with these applications. Finally, based on the diverse approaches in the literature and the collective experience of authors, this paper provides a tutorial and recommendations on the key steps to conduct olfactory-based multiple sensorial media QoE evaluation.

Modeling, Evaluation and Scale on Artificial Pedestrians: A Literature Review

Modeling pedestrian dynamics and their implementation in a computer are challenging and important issues in the knowledge areas of transportation and computer simulation. The aim of this paper is to provide a bibliographic outlook so that the reader could have a quick access to the most relevant works related with this problem. We have used three main axes to organise the paper contents: pedestrian models, validation techniques and multiscale approaches. The backbone of the paper is the classification of existing pedestrian models; we have organised the works in the literature under five categories, according to the techniques used for the operational level in each pedestrian model. Then, the main existing validation methods, oriented to evaluate the behavioural quality of the simulation systems, are reviewed. Furthermore, we review the key issues that arise when facing multiscale pedestrian modeling, where we firstly focus on the behavioural scale (combinations of micro and macro pedestrian models) and secondly, on the scale size (from individuals to crowds). Finally, the paper concludes with a discussion about the contributions that different knowledge fields can do in a near future to this exciting area.

A Functional Taxonomy of Music Generation Systems

Digital advances have transformed the face of automatic music generation since its beginnings at the dawn of computing. Despite the many breakthroughs, issues such as the musical tasks targeted by different machines and the degree to which they succeed remain open questions. We present a functional taxonomy for music generation systems with reference to existing systems according to the purposes for which they were designed. The taxonomy also reveals the inter-relatedness among the systems. This design-centred approach contrasts with predominant methods-based surveys, and facilitates the identification of grand challenges so as to set the stage for new breakthroughs.

Cooperative Multi-Agent Planning: A Survey

Distributed and multi-agent planning (MAP) is a relatively recent research field that combines technologies, algorithms and techniques developed by the Artificial Intelligence Planning and Multi-Agent Systems communities. While planning has been generally treated as a single-agent task, MAP generalizes this concept by considering multiple intelligent agents that work together to develop a course of action that satisfies the goals of the group. This paper reviews the most relevant approaches to MAP, including the solvers that took part in the 2015 Competition of Distributed and Multi-Agent Planning, and classifies them according to the key features of the solvers, distribution and coordination.


Publication Years 1969-2017
Publication Count 1638
Citation Count 50464
Available for Download 1638
Downloads (6 weeks) 20367
Downloads (12 Months) 203904
Downloads (cumulative) 3183920
Average downloads per article 1944
Average citations per article 31
First Name Last Name Award
El Saddik Abdulmotaleb ACM Distinguished Member (2010)
ACM Senior Member (2008)
Serge Abiteboul ACM Fellows (2011)
Gregory Abowd ACM Eugene L. Lawler Award for Humanitarian Contributions within Computer Science and Informatics (2009)
ACM Fellows (2008)
ACM Senior Member (2008)
Pankaj Agarwal ACM Fellows (2002)
Charu Chandra Aggarwal ACM Fellows (2013)
Alfred V Aho ACM Fellows (1996)
Narendra Ahuja ACM Fellows (1996)
Rajeev Alur ACM Fellows (2007)
Lorenzo Alvisi ACM Fellows (2010)
Nancy M Amato ACM Fellows (2015)
ACM Distinguished Member (2012)
Gregory R Andrews ACM Fellows (1998)
Owen Astrachan ACM Karl V. Karlstrom Outstanding Educator Award (2016)
ACM Distinguished Member (2013)
David F Bacon ACM Fellows (2009)
ACM Distinguished Member (2006)
Ricardo A Baeza-Yates ACM Fellows (2009)
Ruzena R Bajcsy ACM Distinguished Service Award (2003)
ACM AAAI Allen Newell Award (2001)
ACM Fellows (1996)
Victor Basili ACM Fellows (1997)
Benjamin B Bederson ACM Distinguished Member (2011)
Philip A Bernstein ACM Fellows (2001)
Fernando Berzal Galiano ACM Senior Member (2008)
Jose A Blakeley ACM Fellows (2009)
Michael W Blasgen ACM Fellows (1994)
ACM Programming Systems and Languages Paper Award (1982)
Guy Blelloch ACM Fellows (2011)
Daniel Bobrow ACM Fellows (1994)
ACM Software System Award (1992)
ACM Programming Systems and Languages Paper Award (1974)
Gregor V Bochmann ACM Fellows (1996)
Ronald J. Brachman ACM Fellows (1999)
Eric A. Brewer ACM Prize in Computing (2009)
ACM Fellows (2007)
Peter Brusilovsky ACM Senior Member (2008)
Randal E Bryant ACM Fellows (2000)
ACM Paris Kanellakis Theory and Practice Award (1998)
Douglas C Burger ACM Fellows (2010)
ACM Distinguished Member (2008)
ACM Senior Member (2006)
Margaret Burnett ACM Distinguished Member (2015)
Rajkumar Buyya ACM Senior Member (2008)
Robert Cailliau ACM Software System Award (1995)
Murray S Campbell ACM Distinguished Member (2008)
Mario Cannataro ACM Senior Member (2009)
Luca Cardelli ACM Fellows (2004)
Robert S Cartwright ACM Fellows (1998)
Godwin V Caruana ACM Senior Member (2013)
Carlos A. Castillo ACM Senior Member (2014)
Rick Cattell ACM Fellows (2012)
Stefano Ceri ACM Fellows (2013)
Donald Chamberlin ACM Fellows (1994)
ACM Software System Award (1988)
Ramalingam Chellappa ACM Fellows (2013)
Danny Z Chen ACM Distinguished Member (2014)
ACM Senior Member (2011)
Peter Chen ACM Fellows (2010)
Alok Choudhary ACM Fellows (2009)
Michael G Christel ACM Senior Member (2010)
David D Clark ACM Fellows (2001)
Edmund Clarke ACM A. M. Turing Award (2007)
ACM Fellows (1998)
ACM Paris Kanellakis Theory and Practice Award (1998)
Lori Clarke ACM Fellows (1998)
Ed Coffman ACM Distinguished Service Award (2004)
ACM Fellows (1994)
Outstanding Contribution to ACM Award (1987)
Tom Cormen ACM Distinguished Member (2009)
J D Couger ACM Fellows (1997)
Lorrie Faith Cranor ACM Fellows (2014)
ACM Senior Member (2006)
Fabio Crestani ACM Senior Member (2009)
Ron Cytron ACM Fellows (2010)
Ernesto Damiani ACM Distinguished Member (2008)
Susan B Davidson ACM Fellows (2001)
Umeshwar Dayal ACM Fellows (2008)
David DeWitt ACM Software System Award (2008)
ACM Fellows (1995)
Thomas L Dean ACM Fellows (2009)
Rina Dechter ACM Fellows (2013)
Alberto Del Bimbo ACM Distinguished Member (2016)
Richard Demillo ACM Fellows (2003)
Dorothy E Denning ACM Fellows (1995)
Peter J Denning Outstanding Contribution to ACM Award (1998)
ACM Karl V. Karlstrom Outstanding Educator Award (1996)
ACM Fellows (1994)
ACM Distinguished Service Award (1989)
ACM Programming Systems and Languages Paper Award (1971)
Jack Dennis ACM Fellows (1994)
ACM-IEEE CS Eckert-Mauchly Award (1984)
Narsingh Deo ACM Fellows (1996)
Steven J Derose ACM Senior Member (2007)
Thomas G Dietterich ACM Fellows (2002)
George Dodd ACM Fellows (1996)
Michel Dubois ACM Fellows (2005)
Matthew B Dwyer ACM Distinguished Member (2007)
David S Ebert ACM Senior Member (2009)
Faith Ellen ACM Fellows (2014)
Carla S. Ellis ACM Fellows (2010)
ACM Distinguished Member (2009)
Ahmed Elmagarmid ACM Fellows (2012)
ACM Distinguished Member (2009)
Joel Emer ACM-IEEE CS Eckert-Mauchly Award (2009)
ACM Fellows (2004)
Douglas Engelbart ACM A. M. Turing Award (1997)
ACM Software System Award (1990)
Martin Erwig ACM Senior Member (2008)
Vladimir Estivill-Castro ACM Senior Member (2015)
Christos Faloutsos ACM Fellows (2010)
Matthias Felleisen ACM Karl V. Karlstrom Outstanding Educator Award (2009)
ACM Fellows (2006)
Tse-Yun Feng ACM Fellows (1994)
Aaron Finerman ACM Fellows (1994)
Stephen Fink ACM Distinguished Member (2011)
ACM Senior Member (2008)
Michael J Flynn ACM Fellows (1994)
ACM-IEEE CS Eckert-Mauchly Award (1992)
Patrick J Flynn ACM Distinguished Member (2011)
ACM Senior Member (2009)
James D Foley ACM Fellows (1999)
Stephanie Forrest ACM AAAI Allen Newell Award (2011)
Michael Franz ACM Fellows (2015)
ACM Distinguished Member (2006)
Herbert Freeman ACM Fellows (1997)
Peter A Freeman ACM Fellows (2000)
Ophir Frieder ACM Fellows (2005)
Benjamin Fung ACM Senior Member (2013)
Zvi Galil ACM Fellows (1995)
Wen Gao ACM Fellows (2013)
Hector Garcia-Molina ACM Fellows (1997)
David Garlan ACM Fellows (2013)
ACM Senior Member (2008)
Minos Garofalakis ACM Distinguished Member (2011)
ACM Senior Member (2009)
Garth A Gibson ACM Fellows (2012)
ACM Doctoral Dissertation Award
Series Winner (1991)
David K Gifford ACM Fellows (2011)
Robert L Glass ACM Fellows (1999)
Adele Goldberg ACM Fellows (1994)
ACM Software System Award (1987)
Michael T Goodrich ACM Fellows (2009)
ACM Distinguished Member (2006)
Georg Gottlob ACM Fellows (2007)
Goetz Graefe ACM Software System Award (2008)
Susan L Graham ACM-IEEE CS Ken Kennedy Award (2011)
ACM Distinguished Service Award (2006)
ACM Fellows (1994)
Jim Gray ACM A. M. Turing Award (1998)
ACM Fellows (1994)
ACM Software System Award (1988)
ACM Programming Systems and Languages Paper Award (1982)
Cordell Green ACM Fellows (1994)
ACM Grace Murray Hopper Award (1985)
Robert Grossman ACM Fellows (2016)
Barbara J Grosz ACM AAAI Allen Newell Award (2008)
ACM Fellows (2003)
Jonathan Grudin ACM Fellows (2012)
Rachid Guerraoui ACM Fellows (2012)
Leonidas J Guibas ACM AAAI Allen Newell Award (2007)
ACM Fellows (1999)
Gopal Krishna Gupta ACM Fellows (1998)
Rajiv Gupta ACM Fellows (2009)
Carl Gutwin ACM Distinguished Member (2015)
Brent T Hailpern ACM Fellows (2003)
Wendy Hall Outstanding Contribution to ACM Award (2014)
ACM Fellows (2010)
Lynda Hardman ACM Distinguished Member (2014)
ACM Senior Member (2013)
Robert Harper ACM Fellows (2005)
Juris Hartmanis ACM Distinguished Service Award (2013)
ACM Fellows (1994)
ACM A. M. Turing Award (1993)
Marti Hearst ACM Fellows (2013)
John L Hennessy ACM-IEEE CS Eckert-Mauchly Award (2001)
ACM Fellows (1997)
Thomas A Henzinger ACM Fellows (2006)
John Hershberger ACM Fellows (2012)
C. Antony R. Hoare ACM A. M. Turing Award (1980)
ACM Programming Systems and Languages Paper Award (1973)
Lance Hoffman ACM Fellows (1995)
Gerard J. Holzmann ACM Fellows (2011)
ACM Paris Kanellakis Theory and Practice Award (2005)
ACM Software System Award (2001)
James Jay Horning ACM Fellows (1998)
Tiejun Huang ACM Senior Member (2013)
Jean-Pierre Hubaux ACM Fellows (2010)
Paul Hudak ACM Fellows (2003)
Richard Hull ACM Fellows (2007)
Ihab F. Ilyas ACM Distinguished Member (2014)
Yannis E Ioannidis ACM Fellows (2004)
Sitharama Iyengar ACM Fellows (2001)
Robert J.K. Jacob ACM Fellows (2016)
Anil K Jain ACM Fellows (2003)
Ramesh C Jain ACM Fellows (2003)
Matthias Jarke ACM Fellows (2013)
Christian S. Jensen ACM Fellows (2011)
Anita K Jones ACM Fellows (1996)
Cliff B Jones ACM Fellows (1995)
Neil Jones ACM Fellows (1998)
Michael I. Jordan ACM Fellows (2010)
ACM AAAI Allen Newell Award (2009)
Joaquim Jorge ACM Senior Member (2007)
Randy H. Katz ACM Karl V. Karlstrom Outstanding Educator Award (1999)
ACM Fellows (1996)
Arie E Kaufman ACM Fellows (2009)
Lydia Kavraki ACM Athena Lecturer Award (2017)
ACM Fellows (2010)
ACM Grace Murray Hopper Award (2000)
Stephen T Kent ACM Fellows (1998)
Anne-Marie Kermarrec ACM Fellows (2016)
Angelos Dennis Keromytis ACM Distinguished Member (2012)
ACM Senior Member (2007)
Gregor Kiczales ACM Fellows (2012)
Won Kim ACM Distinguished Service Award (2001)
Jon Kleinberg ACM AAAI Allen Newell Award (2014)
ACM Fellows (2013)
ACM Prize in Computing (2008)
Craig Knoblock ACM Distinguished Member (2008)
Donald E Knuth ACM Fellows (1994)
ACM Software System Award (1986)
ACM A. M. Turing Award (1974)
ACM Grace Murray Hopper Award (1971)
Daphne Koller ACM Prize in Computing (2007)
Henry F Korth ACM Fellows (2000)
Donald Kossmann ACM Fellows (2010)
David Kotz ACM Senior Member (2006)
David J Kuck ACM-IEEE CS Ken Kennedy Award (2010)
ACM Fellows (1994)
ACM-IEEE CS Eckert-Mauchly Award (1993)
Vipin Kumar ACM Fellows (2005)
James Kurose ACM Fellows (2001)
Douglas S Lea ACM Fellows (2013)
Der-Tsai Lee ACM Fellows (1997)
Peter Lee ACM Fellows (2004)
K Rustan Leino ACM Fellows (2016)
Abraham Lempel ACM Paris Kanellakis Theory and Practice Award (1997)
Maurizio Lenzerini ACM Fellows (2009)
George Lepouras ACM Senior Member (2008)
Nancy Leveson ACM AAAI Allen Newell Award (1999)
ACM Fellows (1995)
Roy Levin ACM Fellows (2008)
Ming C Lin ACM Fellows (2011)
Bruce Lindsay ACM Fellows (1994)
ACM Programming Systems and Languages Paper Award (1982)
Witold Litwin ACM Fellows (2001)
Yunhao Liu ACM Fellows (2015)
Yunhao Liu ACM Presidential Award (2013)
David B Lomet ACM Fellows (2002)
Javier Lopez ACM Senior Member (2012)
Raymond A Lorie ACM Fellows (2000)
ACM Software System Award (1988)
ACM Programming Systems and Languages Paper Award (1982)
David Maier ACM Fellows (1998)
Alessio Malizia ACM Senior Member (2014)
Igor Markov ACM Distinguished Member (2011)
ACM Senior Member (2007)
Steven R. McCanne ACM Doctoral Dissertation Award (1997)
Paul R McJones ACM Fellows (1994)
ACM Programming Systems and Languages Paper Award (1982)
Tao Mei ACM Distinguished Member (2016)
ACM Senior Member (2012)
Panagiotis Takis Metaxas ACM Senior Member (2009)
Barton P Miller ACM Fellows (2001)
Jack Minker ACM AAAI Allen Newell Award (2005)
ACM Fellows (1994)
Outstanding Contribution to ACM Award (1985)
John C. Mitchell ACM Fellows (2008)
Thomas Moran ACM Fellows (2003)
James H Morris ACM Fellows (2000)
Rajeev Motwani ACM Fellows (2007)
Trevor Mudge ACM Fellows (2016)
ACM-IEEE CS Eckert-Mauchly Award (2014)
Richard R Muntz ACM Fellows (1996)
S. Muthukrishnan ACM Fellows (2010)
Brad A Myers ACM Fellows (2005)
Klara Nahrstedt ACM Fellows (2012)
Shamkant B Navathe ACM Fellows (2014)
J Nievergelt ACM Fellows (1995)
David S Notkin ACM Fellows (1998)
Martin Odersky ACM Fellows (2007)
Beng Chin Ooi ACM Fellows (2011)
Leon J Osterweil ACM Fellows (1998)
M. Tamer Ozsu ACM Fellows (2006)
Yale Patt ACM Fellows (2001)
ACM Karl V. Karlstrom Outstanding Educator Award (2000)
ACM-IEEE CS Eckert-Mauchly Award (1996)
David Patterson ACM-IEEE CS Eckert-Mauchly Award (2008)
ACM Distinguished Service Award (2007)
ACM Fellows (1994)
ACM Karl V. Karlstrom Outstanding Educator Award (1991)
Randy Pausch ACM Fellows (2007)
ACM Karl V. Karlstrom Outstanding Educator Award (2007)
Judea Pearl ACM Fellows (2015)
ACM A. M. Turing Award (2011)
ACM AAAI Allen Newell Award (2003)
Fernando Pereira ACM Fellows (2010)
Ron Perrott ACM Distinguished Service Award (2015)
ACM Fellows (1997)
Frank Pfenning ACM Fellows (2015)
ACM Senior Member (2007)
Andre Platzer ACM Doctoral Dissertation Award
Honorable Mention (2009) ACM Doctoral Dissertation Award
Honorable Mention (2009)
Vaughan Ronald Pratt ACM Fellows (1997)
Thomas G Price ACM Programming Systems and Languages Paper Award (1982)
Roy F Rada ACM Fellows (1995)
Prabhakar Raghavan ACM Fellows (2001)
Raghu Ramakrishnan ACM Fellows (2001)
Krithivasan Ramamritham ACM Fellows (2001)
Brian Randell ACM Fellows (2008)
Rajeev Ramnarain Rastogi ACM Fellows (2012)
Raj Reddy ACM Fellows (2012)
ACM A. M. Turing Award (1994)
Daniel A Reed ACM Fellows (2003)
Edward M Reingold ACM Fellows (1996)
Aristides A Requicha ACM Fellows (2007)
John C Reynolds ACM Fellows (2001)
ACM Programming Systems and Languages Paper Award (1971)
John Rice ACM Fellows (1996)
Dirk Riehle ACM Senior Member (2008)
Eric S Roberts ACM Karl V. Karlstrom Outstanding Educator Award (2012)
ACM Fellows (2007)
Joel Jose Rodrigues ACM Senior Member (2011)
Saul Rosen ACM Distinguished Service Award (1984)
Arnold Rosenberg ACM Fellows (1996)
David S. Rosenblum ACM Fellows (2010)
Azriel Rosenfeld ACM Fellows (1994)
Nick Roussopoulos ACM Fellows (2001)
Daniela Rus ACM Fellows (2014)
Barbara Gershon Ryder ACM Presidential Award (2008)
ACM Fellows (1998)
Rizos Sakellariou ACM Senior Member (2015)
Sherif Sakr ACM Senior Member (2017)
Ahmed Sameh ACM Fellows (1999)
Hanan Samet ACM Paris Kanellakis Theory and Practice Award (2011)
ACM Fellows (1996)
Ravinderpal S Sandhu ACM Fellows (2001)
Vijay Saraswat ACM Doctoral Dissertation Award (1989)
Mahadev Satyanarayanan ACM Software System Award (2016)
ACM Fellows (2002)
John E Savage ACM Fellows (1996)
Hans-Joerg Schek ACM Fellows (2001)
William L Scherlis ACM Senior Member (2009)
Fred B Schneider ACM Fellows (1995)
Robert Sedgewick ACM Fellows (1997)
Bart Selman ACM Fellows (2012)
Lui Sha ACM Fellows (2005)
Marc Shapiro ACM Senior Member (2009)
Micha Sharir ACM Fellows (1997)
Dennis E Shasha ACM Fellows (2013)
Alan C Shaw ACM Fellows (1997)
Mary M Shaw ACM Fellows (1996)
Prashant J Shenoy ACM Distinguished Member (2009)
ACM Senior Member (2006)
Stuart Shieber ACM Fellows (2014)
Kang Shin ACM Fellows (2001)
Frank Shipman ACM Distinguished Member (2009)
Ben Shneiderman ACM Fellows (1997)
Yoav Shoham ACM AAAI Allen Newell Award (2012)
ACM Fellows (2012)
Howard Siegel ACM Fellows (1998)
Joseph Sifakis ACM Fellows (2012)
ACM A. M. Turing Award (2007)
Abraham Silberschatz ACM Karl V. Karlstrom Outstanding Educator Award (1998)
ACM Fellows (1996)
Kevin Skadron ACM Fellows (2015)
ACM Distinguished Member (2010)
ACM Senior Member (2007)
Jacob Slonim ACM Doctoral Dissertation Award (1980)
Alan Smith ACM Fellows (2001)
Richard T Snodgrass Outstanding Contribution to ACM Award (2004)
ACM Fellows (1999)
Diomidis Spinellis ACM Senior Member (2006)
Richard Stallman ACM Software System Award (2015)
ACM Grace Murray Hopper Award (1990)
John A Stankovic ACM Fellows (1996)
John Stasko ACM Distinguished Member (2011)
ACM Senior Member (2011)
Giancarlo Succi ACM Senior Member (2008)
S. Sudarshan ACM Fellows (2014)
Subhash Suri ACM Fellows (2010)
ACM Distinguished Member (2007)
Ivan Sutherland ACM Fellows (1994)
ACM Software System Award (1993)
ACM A. M. Turing Award (1988)
Jeffrey Victor Sutherland ACM Senior Member (2009)
Roberto Tamassia ACM Fellows (2012)
Andrew S Tanenbaum ACM Fellows (1996)
Andrew S. Tanenbaum ACM Karl V. Karlstrom Outstanding Educator Award (1994)
Robert W Taylor ACM Fellows (1994)
ACM Software System Award (1984)
Bent Thomsen ACM Senior Member (2016)
Irv Traiger ACM Fellows (1994)
ACM Software System Award (1988)
ACM Programming Systems and Languages Paper Award (1982)
ACM Programming Systems and Languages Paper Award (1971)
Allen Tucker ACM Fellows (1994)
Outstanding Contribution to ACM Award (1991)
Jeffrey D Ullman ACM Karl V. Karlstrom Outstanding Educator Award (1997)
ACM Fellows (1995)
Patrick Valduriez ACM Fellows (2012)
Mateo Valero ACM Distinguished Service Award (2012)
ACM-IEEE CS Eckert-Mauchly Award (2007)
ACM Fellows (2002)
Paul Van Oorschot ACM Fellows (2016)
Robbert Van Renesse ACM Fellows (2009)
C J Van Rijsbergen ACM Fellows (2003)
Moshe Y Vardi ACM Presidential Award (2017)
Outstanding Contribution to ACM Award (2009)
ACM Presidential Award (2008)
ACM Paris Kanellakis Theory and Practice Award (2005)
ACM Fellows (2000)
Sebastian Ventura ACM Senior Member (2013)
Jeffrey S Vetter ACM Distinguished Member (2012)
ACM Gordon Bell Prize
Performance (2010)
Philip Wadler ACM Fellows (2007)
David L Waltz ACM Fellows (1999)
Yu Wang ACM Senior Member (2011)
Anthony I Wasserman ACM Fellows (1996)
Peter Wegner ACM Distinguished Service Award (2000)
ACM Fellows (1995)
Bruce W Weide ACM Senior Member (2009)
Fred W Weingarten ACM Fellows (1996)
Edgar Weippl ACM Senior Member (2008)
Michael Wellman ACM Fellows (2005)
John R. White ACM Presidential Award (2015)
ACM Fellows (1995)
Outstanding Contribution to ACM Award (1994)
Jennifer Widom ACM Athena Lecturer Award (2015)
ACM Fellows (2005)
Gio Wiederhold ACM Fellows (1995)
Reinhard Wilhelm ACM Distinguished Service Award (2010)
ACM Fellows (2000)
John Wilkes ACM Fellows (2002)
Maurice V. Wilkes ACM Fellows (1994)
ACM-IEEE CS Eckert-Mauchly Award (1980)
ACM A. M. Turing Award (1967)
Jeannette M. Wing ACM Distinguished Service Award (2014)
ACM Fellows (1998)
Niklaus E Wirth ACM Fellows (1994)
ACM A. M. Turing Award (1984)
ACM Programming Systems and Languages Paper Award (1978)
Ian Witten ACM Fellows (1996)
Ouri Wolfson ACM Fellows (2001)
Pierre Wolper ACM Paris Kanellakis Theory and Practice Award (2005)
Jie Wu ACM Senior Member (2006)
William A Wulf ACM Karl V. Karlstrom Outstanding Educator Award (2014)
ACM Distinguished Service Award (2011)
ACM Fellows (1994)
Qiang Yang ACM Distinguished Member (2011)
Bulent Yener ACM Senior Member (2013)
Philip S Yu ACM Fellows (1997)
Pamela Zave ACM Fellows (2001)
HongJiang Zhang ACM Fellows (2007)
Lixia Zhang ACM Fellows (2006)
Feng Zhao ACM Distinguished Member (2006)
Yuanyuan Zhou ACM Fellows (2013)
ACM Distinguished Member (2011)
Albert Zomaya ACM Distinguished Member (2006)
Stuart Zweben ACM Fellows (1998)
Outstanding Contribution to ACM Award (1997)
Andries van Dam ACM Fellows (1994)
ACM Karl V. Karlstrom Outstanding Educator Award (1993)
Andries van Dam ACM Fellows (1994)
ACM Karl V. Karlstrom Outstanding Educator Award (1993)

First Name Last Name Paper Counts
Peter Denning 21
Adele Goldberg 18
William Dorn 9
Anthony Wasserman 8
Sparsh Mittal 7
Helen Ashman 6
Rachid Guerraoui 6
Andries Van Dam 6
Rajkumar Buyya 6
Peter Wegner 6
Jeffrey Vitter 5
Rance Cleaveland 5
Yannis Ioannidis 5
Jacques Cohen 5
Elliott Organick 5
Andrew Tanenbaum 5
Wendy Hall 4
Corrado Priami 4
Gonzalo Navarro 4
Albert Zomaya 4
James Fry 4
James Peterson 4
Pierpaolo Degano 4
Peter Lee 4
Fred Schneider 4
Jayadev Misra 4
Peter Wegner 4
Sameeullah Khan 4
Azriel Rosenfeld 4
Richard Muntz 4
Hanan Samet 4
Jens Palsberg 4
Narendra Ahuja 4
Brad Myers 4
Tamer Özsu 4
Sundaraja Iyengar 4
Gregory Andrews 4
Jeffrey Buzen 4
Luca Cardelli 4
Scott Smolka 4
Mohamed Fayad 4
Mahadevan Ganapathi 3
Udo Pooch 3
Dirk Riehle 3
Jon Doyle 3
George Nagy 3
Alexander Thomasian 3
Laurie Damianos 3
Zimu Zhou 3
Carlo Furia 3
Henry Ledgard 3
Hanne Nielson 3
Flemming Nielson 3
Roberto Tamassia 3
Randy Katz 3
Frank Manola 3
Jacques Noyé 3
Ben Shneiderman 3
Isabel Cruz 3
Roberto Gorrieri 3
David De Roure 3
Michael Marcotty 3
Bruce Weide 3
Garth Gibson 3
Johnleslie King 3
Joseph Pasquale 3
Toby Teorey 3
Miroslaw Malek 3
David Schmidt 3
Robert Rosin 3
Pankaj Agarwal 3
Nabil Adam 3
Charles Consel 3
Abdullah Gani 3
Goetz Graefe 3
Ingrid Carlbom 3
Avi Silberschatz 3
David Lilja 3
Dick Bulterman 3
Leslie Carr 3
Michael Bieber 3
Robyn Kozierok 3
Mark Harman 3
Cristina Nita-Rotaru 3
Werner Retschitzegger 3
Patrick Cousot 3
Chris Hankin 3
Alberto Pettorossi 3
Jonathan Grudin 3
Thomas Dean 3
Fabrício Enembreck 3
Maurizio Proietti 3
John Rice 3
Michael, Loui 3
John Stankovic 3
Azzedine Boukerche 3
Quan Sheng 3
Emil Lupu 3
Marvin Zelkowitz 3
Raghu Ramakrishnan 3
Michael Hanus 2
Fred Maryanski 2
Edward Reingold 2
Antônio Loureiro 2
William Wulf 2
Charles Fischer 2
Chittoor Ramamoorthy 2
Eduardo Hruschka 2
Angelo Morzenti 2
Jeffrey Ullman 2
Lynette Hirschman 2
Edgar Sibley 2
Cinzia Cappiello 2
Leon Presser 2
Walter Kohler 2
Norman Meyrowitz 2
Dana Angluin 2
H Li 2
James Foley 2
Faron Moller 2
Theodor Nelson 2
Harri Oinas-Kukkonen 2
Gustavo Rossi 2
Robert Jacob 2
Fatima Nunes 2
Yexi Jiang 2
Otto Lessing 2
Umesh Bellur 2
John Derrick 2
Sigmund Gorski 2
Carl Gunter 2
Arun Ross 2
Victor Lesser 2
Douglas Comer 2
Clement Yu 2
Aristides Requicha 2
Zvi Galil* 2
David Maier 2
Guillaume Pierre 2
Pieter Hartel 2
William Stallings 2
Jan Heering 2
Carlo Batini 2
Philip YU 2
Alberto Marchetti-Spaccamela 2
Philippe Codognet 2
Mary Rosson 2
Betty Salzberg 2
Henry Korth 2
Dino Mandrioli 2
Ouri Wolfson 2
Renaud Marlet 2
Nic Volanschi 2
Michael Leuschel 2
Martha Larson 2
Ephraim Glinert 2
Tiziana Margaria 2
Patricia Lago 2
CÉcile Paris 2
Athanasios Vasilakos 2
Wubai Zhou 2
Yue Huang 2
Robbert Van Renesse 2
Peter Larsen 2
Marjan Mernik 2
Mark Truran 2
David Kotz 2
Zhiwen Yu 2
Thierry Lecroq 2
Hector Levesque 2
Claudio Carpineto 2
Richard Bird 2
Giuseppe Italiano 2
Mohammed Bennamoun 2
Jim Woodcock 2
Jim Kurose 2
Michael Wellman 2
Ronald Brachman 2
Siba Mohanty 2
Gary Sockut 2
Patrick Hall 2
Frank Piessens 2
Narain Gehani 2
Donald Knuth 2
Ann Fitzsimmons 2
Tom Love 2
Erik Sandewall 2
Dale Miller 2
John Hatcliff 2
Robert Sedgewick 2
Allen Tucker 2
Mathias Fischer 2
Josep Silva 2
Peter Fontana 2
Shishir Nagaraja 2
Lionel Ni 2
Niki Pissinou 2
John Fitzgerald 2
Hans Gellersen 2
Abdelhamid Bouchachia 2
Frederick Lochovsky 2
Won Kim 2
Wolfgang Klas 2
Thomas Moran 2
Lester Lipsky 2
Pascal Felber 2
Subrata Dasgupta 2
Paul Hudak 2
Derrell Foster 2
Subhash Suri 2
James Michener 2
Lawrence Dowdy 2
João Gama 2
Charles Hoare 2
Juris Hartmanis 2
Kevin Mills 2
Howard Wactlar 2
John Gallagher 2
Douglas Schmidt 2
Steve Bryson 2
Vijay Saraswat 2
Leon Osterweil 2
Francis Sullivan 2
Nathan Goodman 2
Joseph Sifakis 2
Robert Harper 2
Bernhard Steffen 2
Ugo Montanari 2
Rizos Sakellariou 2
Brian Davison 2
William Enck 2
Sungho Kang 2
Zhiqiang Lin 2
Thomas Dietterich 2
Alistair Moffat 2
Yonathan Bard 2
Klara Nahrstedt 2
Gary Leavens 2
Kenneth Kraemer 2
Ricardo Baeza-Yates 2
Andrew Turpin 2
Jörg Rothe 2
Bruce Schachter 2
David Embley 2
Maarten Van Steen 2
Benjamin Bustos 2
Daniel Keim 2
Philip Wadler 2
William Kent 2
André Schiper 2
Gerti Kappel 2
Eduardo Miranda 2
Luke Hornof 2
Katia Sycara 2
Sajjad Madani 2
Trevor Mudge 2
Wayne Citrin 2
James Hollan 2
Malvin Kalos 2
Pierre Wolper 2
Tom Van Cutsem 2
Andrzej Jajszczyk 2
Chunqiu Zeng 2
Imran Ghani 2
Ilia Pietri 2
Michael Franz 2
Raymond Yeh 2
Christos Faloutsos 2
Albert Bifet 2
Sitharama Iyengar 2
Inderveer Chana 2
Andreas Bulling 2
Sivan Toledo 2
Axel Jantsch 2
Alexander Gluhak 2
Andrew Newell 2
Justin Zobel 2
Giovanni Romano 2
Natarajan Shankar 2
Bruce Leverett 2
Olivier Danvy 2
Alan Feuer 2
Barbara Ryder 2
Eduardofreire Nakamura 2
Dennis Volpano 2
Matthias Jarke 2
Sushil Jajodia 2
Andy Cockburn 2
Julia Lawall 2
Mehmet Akşit 2
John Wilkes 2
Pascal Van Hentenryck 2
George Cybenko 2
Yale Patt 2
Chunyan Miao 2
Sabri Mahmoud 2
Jones Granatyr 2
Sarvnaz Karimi 2
Kotagiri Ramamohanarao 2
Jean Hubaux 2
Levente Buttyán 2
Maxime Crochemore 2
Charu Aggarwal 2
John Roddick 2
Kevin Crowston 2
Carl Landwehr 2
Richard Snodgrass 2
John Hennessy 2
Ahmed Elmagarmid 2
Michael Mannino 2
Gilles Muller 2
Tiziana Catarci 2
John Mitchell 2
Kenneth Neves 2
Philip Bernstein 2
Alexander Brodsky 2
Fabio Vitali 2
Daniel Schwabe 2
Ivona Brandić 2
Kim Bruce 2
Jeffrey Kurtz 2
Edmund Clarke 2
Jeannette Wing 2
Krithi Ramamritham 2
Anne Kermarrec 2
Max Mühlhäuser 2
Edson Scalabrin 2
James Stanier 2
Francky Catthoor 2
William Smyth 2
Cornelia Fermüller 2
Catherine McGeoch 2
George Lueker 2
Jonathan Walpole 2
James Church 2
Robert Sproull 2
Asuman Dogac 2
Rosemary Simpson 2
Abraham Silberschatz 2
C Hoare 2
Daniel Le Métayer 2
Philip Treleaven 2
Richard Millar 2
Alan Burns 2
David Brailsford 2
Fabio Crestani 2
Stephen Taylor 2
Karl Lieberherr 2
Kevin Martin 2
Scott Thibault 2
Laura Lafave 2
Davide Brugali 2
Brian Randell 2
Lori Clarke 2
Peter Triantafillou 2
Hafedh Mili 2
Matteo Rossi 2
Serge Demeyer 2
Jochen Huber 2
Boualem Benatallah 2
Alípio Jorge 2
Giuseppe Anastasi 2
Ronald Loui 2
Simon Kasif 2
Elisha Sacks 2
Joseph Paciorek 2
Dennis Severance 2
Jürg Nievergelt 2
Angeliki Kritikakou 1
Matthew Gerber 1
Mireia Farrús 1
Mohand Boughanem 1
Bernt Schiele 1
Jacques Pitrat 1
Steven Beauchemin 1
Austin Tate 1
J McKinney 1
Neus Català 1
Hassnaa Moustafa 1
Hossam Afifi 1
Robert Wójcik 1
David Zhang 1
Daniel Bobrow 1
Rama Chellappa 1
Jaishankar Menon 1
David Dewitt 1
Simon Puglisi 1
Dagmar Bruß 1
Qi Tian 1
Borko Furht 1
Daniel Mossé 1
Venkat Gudivada 1
John Iliffe 1
Joonho Kong 1
Wouter Joosen 1
Hossain Shahriar 1
Mohammad Zulkernine 1
William White 1
H Hellerman 1
Zhiyuan Chen 1
Guido Urdaneta 1
Sami Iren 1
Juan Bicarregui 1
Rupak Majumdar 1
Fabrizio Sebastiani 1
Melody Ivory 1
Roman Vitenberg 1
Rajendra Bose 1
Jan Midtgaard 1
Jorg Riesmeier 1
Peter Chen 1
David Gelernter 1
Vecheslav Volkov 1
Gregory Brewster 1
Duncan Wilson 1
Rui Shu 1
Benjamin Andow 1
Henrique Lederman 1
Hyungjun Cho 1
Changwook Lee 1
Veljko Milutinović 1
Florian Daniel 1
Gildas Avoine 1
Louis Demay 1
Karin Hummel 1
Mohammed Feham 1
Simone Brienza 1
Kashifnizam Khan 1
Öznur Özkasap 1
Kevin Butler 1
Raymond Cho 1
Sharique Hussain 1
Hamza Karachiwala 1
Roshan Ragel 1
Sri Parameswaran 1
Boris Bellalta 1
Robert Bridges 1
Quanghieu Vu 1
Samuel Kounev 1
Bryan Payne 1
Guozhu Meng 1
Raouf Boutaba 1
Bingdong Li 1
Awais Rashid 1
Karen Pinel-Sauvagnat 1
Guoliang Li 1
Steven Hoi 1
Mary Harrison 1
Luca Console 1
George Dodd 1
Margaret Atkins 1
Johnny Wong 1
Alfred Dale 1
David Alberts 1
Alicia Ageno 1
Jordi Turmo 1
Henrik Pilegaard 1
Yimin Wang 1
Wenyi Zhao 1
David Hsaio 1
Gábor Erdélyi 1
Gilberto Filé 1
William Frakes 1
Lorenzo Strigini 1
Shaji Bhaskar 1
Rajiv Gupta 1
Richard Hopkins 1
Diomidis Spinellis 1
Raman Ramsin 1
Renzo Angles 1
Claudio Gutiérrez 1
Subject index 1
Venkat Devarajan 1
Edward Bender 1
Sriram Sankar 1
Chiara Francalanci 1
Inmaculada Aleman 1
Robert Davis 1
Óscar Díaz 1
Brian Kernighan 1
Peter Brown 1
Jonathan Millen 1
Richard Frost 1
James Larson 1
Gomer Thomas 1
J Farrar 1
W Maurer 1
Geoffrey Smith 1
Luciano Costa 1
Felix Gärtner 1
Carl Smith 1
Christopher Fraser 1
Volker Gaede 1
Yuri Leontiev 1
Weekeong Ng 1