Computing Surveys (CSUR)


Search Issue
enter search term and/or author name below:


ACM Computing Surveys (CSUR), Volume 47 Issue 4, July 2015

Taxonomy and Survey of Collaborative Intrusion Detection
Emmanouil Vasilomanolakis, Shankar Karuppayah, Max Mühlhäuser, Mathias Fischer
Article No.: 55
DOI: 10.1145/2716260

The dependency of our society on networked computers has become frightening: In the economy, all-digital networks have turned from facilitators to drivers; as cyber-physical systems are coming of age, computer networks are now becoming the central...

Text and Data Mining Techniques in Adverse Drug Reaction Detection
Sarvnaz Karimi, Chen Wang, Alejandro Metke-Jimenez, Raj Gaire, Cecile Paris
Article No.: 56
DOI: 10.1145/2719920

We review data mining and related computer science techniques that have been studied in the area of drug safety to identify signals of adverse drug reactions from different data sources, such as spontaneous reporting databases, electronic health...

A Survey of Interactive Remote Rendering Systems
Shu Shi, Cheng-Hsin Hsu
Article No.: 57
DOI: 10.1145/2719921

Remote rendering means rendering 3D graphics on a computing device and displaying the results on another computing device connected through a network. The concept was originally developed for sharing computing resources remotely. It has been...

Securing Android: A Survey, Taxonomy, and Challenges
Sufatrio, Darell J. J. Tan, Tong-Wei Chua, Vrizlynn L. L. Thing
Article No.: 58
DOI: 10.1145/2733306

Recent years have seen a global adoption of smart mobile devices, particularly those based on Android. However, Android’s widespread adoption is marred with increasingly rampant malware threats. This article gives a survey and taxonomy of...

Accounting and Accountability in Content Distribution Architectures: A Survey
Diarmuid Ó Coileáin, Donal O'mahony
Article No.: 59
DOI: 10.1145/2723701

Many content distribution architectures offer desirable elements that lead to less bandwidth usage, reduced network congestion, higher content availability, and reduced costs. However, their level of adoption and utilization in commercial...

A Survey on Implicit Surface Polygonization
B. R. de Araújo, Daniel S. Lopes, Pauline Jepp, Joaquim A. Jorge, Brian Wyvill
Article No.: 60
DOI: 10.1145/2732197

Implicit surfaces (IS) are commonly used in image creation, modeling environments, modeling objects, and scientific data visualization. In this article, we present a survey of different techniques for fast visualization of IS. The main classes of...

A Survey of Multiobjective Evolutionary Clustering
Anirban Mukhopadhyay, Ujjwal Maulik, Sanghamitra Bandyopadhyay
Article No.: 61
DOI: 10.1145/2742642

Data clustering is a popular unsupervised data mining tool that is used for partitioning a given dataset into homogeneous groups based on some similarity/dissimilarity metric. Traditional clustering algorithms often make prior assumptions about...

Partitioned Global Address Space Languages
Mattias De Wael, Stefan Marr, Bruno De Fraine, Tom Van Cutsem, Wolfgang De Meuter
Article No.: 62
DOI: 10.1145/2716320

The Partitioned Global Address Space (PGAS) model is a parallel programming model that aims to improve programmer productivity while at the same time aiming for high performance. The main premise of PGAS is that a globally shared address space...

Cloud Computing Resource Scheduling and a Survey of Its Evolutionary Approaches
Zhi-Hui Zhan, Xiao-Fang Liu, Yue-Jiao Gong, Jun Zhang, Henry Shu-Hung Chung, Yun Li
Article No.: 63
DOI: 10.1145/2788397

A disruptive technology fundamentally transforming the way that computing services are delivered, cloud computing offers information and communication technology users a new dimension of convenience of resources, as services via the Internet....

Energy-Efficient Networking Solutions in Cloud-Based Environments: A Systematic Literature Review
Fahimeh Alizadeh Moghaddam, Patricia Lago, Paola Grosso
Article No.: 64
DOI: 10.1145/2764464

The energy consumed by data centers hosting cloud services is increasing enormously. This brings the need to reduce energy consumption of different components in data centers. In this work, we focus on energy efficiency of the networking...

Remote Data Auditing in Cloud Computing Environments: A Survey, Taxonomy, and Open Issues
Mehdi Sookhak, Abdullah Gani, Hamid Talebian, Adnan Akhunzada, Samee U. Khan, Rajkumar Buyya, Albert Y. Zomaya
Article No.: 65
DOI: 10.1145/2764465

Cloud computing has emerged as a long-dreamt vision of the utility computing paradigm that provides reliable and resilient infrastructure for users to remotely store data and use on-demand applications and services. Currently, many individuals and...

Assessing the Structural Complexity of Computer and Communication Networks
Andrzej Kamisiński, Piotr Chołda, Andrzej Jajszczyk
Article No.: 66
DOI: 10.1145/2755621

In this tutorial, 17 structural complexity indices are presented and compared, each representing one of the following categories: adjacency- and distance-based metrics, Shannon entropy-based metrics, product measures, subgraph-based metrics, and...

Processing Social Media Messages in Mass Emergency: A Survey
Muhammad Imran, Carlos Castillo, Fernando Diaz, Sarah Vieweg
Article No.: 67
DOI: 10.1145/2771588

Social media platforms provide active communication channels during mass convergence and emergency events such as disasters caused by natural hazards. As a result, first responders, decision makers, and the public can use this information to gain...

The State of Public Infrastructure-as-a-Service Cloud Security
Wei Huang, Afshar Ganjali, Beom Heyn Kim, Sukwon Oh, David Lie
Article No.: 68
DOI: 10.1145/2767181

The public Infrastructure-as-a-Service (IaaS) cloud industry has reached a critical mass in the past few years, with many cloud service providers fielding competing services. Despite the competition, we find some of the security mechanisms offered...

A Survey of CPU-GPU Heterogeneous Computing Techniques
Sparsh Mittal, Jeffrey S. Vetter
Article No.: 69
DOI: 10.1145/2788396

As both CPUs and GPUs become employed in a wide range of applications, it has been acknowledged that both of these Processing Units (PUs) have their unique features and strengths and hence, CPU-GPU collaboration is inevitable to achieve...

Systems Approaches to Tackling Configuration Errors: A Survey
Tianyin Xu, Yuanyuan Zhou
Article No.: 70
DOI: 10.1145/2791577

In recent years, configuration errors (i.e., misconfigurations) have become one of the dominant causes of system failures, resulting in many severe service outages and downtime. Unfortunately, it is notoriously difficult for system users (e.g.,...