Computing Surveys (CSUR)


Search Issue
enter search term and/or author name below:


ACM Computing Surveys (CSUR), Volume 48 Issue 1, September 2015

Collaborative Security: A Survey and Taxonomy
Guozhu Meng, Yang Liu, Jie Zhang, Alexander Pokluda, Raouf Boutaba
Article No.: 1
DOI: 10.1145/2785733

Security is oftentimes centrally managed. An alternative trend of using collaboration in order to improve security has gained momentum over the past few years. Collaborative security is an abstract concept that applies to a wide variety of systems...

From Security to Assurance in the Cloud: A Survey
Claudio A. Ardagna, Rasool Asal, Ernesto Damiani, Quang Hieu Vu
Article No.: 2
DOI: 10.1145/2767005

The cloud computing paradigm has become a mainstream solution for the deployment of business processes and applications. In the public cloud vision, infrastructure, platform, and software services are provisioned to tenants (i.e., customers and...

Logic-Based Modeling Approaches for Qualitative and Hybrid Reasoning in Dynamic Spatial Systems
Stefan Mitsch, André Platzer, Werner Retschitzegger, Wieland Schwinger
Article No.: 3
DOI: 10.1145/2764901

Autonomous agents that operate as components of dynamic spatial systems are becoming increasingly popular and mainstream. Applications can be found in consumer robotics, in road, rail, and air transportation, manufacturing, and military...

Performance Anomaly Detection and Bottleneck Identification
Olumuyiwa Ibidunmoye, Francisco Hernández-Rodriguez, Erik Elmroth
Article No.: 4
DOI: 10.1145/2791120

In order to meet stringent performance requirements, system administrators must effectively detect undesirable performance behaviours, identify potential root causes, and take adequate corrective measures. The problem of uncovering and...

The Impact of Bio-Inspired Approaches Toward the Advancement of Face Recognition
Bisan Alsalibi, Ibrahim Venkat, K.G. Subramanian, Syaheerah Lebai Lutfi, Philippe De Wilde
Article No.: 5
DOI: 10.1145/2791121

An increased number of bio-inspired face recognition systems have emerged in recent decades owing to their intelligent problem-solving ability, flexibility, scalability, and adaptive nature. Hence, this survey aims to present a detailed overview...

Privacy in the Genomic Era
Muhammad Naveed, Erman Ayday, Ellen W. Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, Xiaofeng Wang
Article No.: 6
DOI: 10.1145/2767007

Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including...

Mobile Crowd Sensing and Computing: The Review of an Emerging Human-Powered Sensing Paradigm
Bin Guo, Zhu Wang, Zhiwen Yu, Yu Wang, Neil Y. Yen, Runhe Huang, Xingshe Zhou
Article No.: 7
DOI: 10.1145/2794400

With the surging of smartphone sensing, wireless networking, and mobile social networking techniques, Mobile Crowd Sensing and Computing (MCSC) has become a promising paradigm for cross-space and large-scale sensing. MCSC extends the vision of...

Survey on Broadcast Algorithms for Mobile Ad Hoc Networks
Patricia Ruiz, Pascal Bouvry
Article No.: 8
DOI: 10.1145/2786005

Networking at any time and any place paves the way for a large number of possible applications in ad hoc networks, from disaster relief in remote areas to network extension. Thus, for the past decades, many works have been proposed trying to make...

Lifetime Reliability Enhancement of Microprocessors: Mitigating the Impact of Negative Bias Temperature Instability
Hyejeong Hong, Jaeil Lim, Hyunyul Lim, Sungho Kang
Article No.: 9
DOI: 10.1145/2785988

Ensuring lifetime reliability of microprocessors has become more critical. Continuous scaling and increasing temperatures due to growing power density are threatening lifetime reliability. Negative bias temperature instability (NBTI) has been...

A Survey on Hypervisor-Based Monitoring: Approaches, Applications, and Evolutions
Erick Bauman, Gbadebo Ayoade, Zhiqiang Lin
Article No.: 10
DOI: 10.1145/2775111

When designing computer monitoring systems, one goal has always been to have a complete view of the monitored target and at the same time stealthily protect the monitor itself. One way to achieve this is to use hypervisor-based, or more generally...

Allocation of Virtual Machines in Cloud Data Centers—A Survey of Problem Models and Optimization Algorithms
Zoltán Ádám Mann
Article No.: 11
DOI: 10.1145/2797211

Data centers in public, private, and hybrid cloud settings make it possible to provision virtual machines (VMs) with unprecedented flexibility. However, purchasing, operating, and maintaining the underlying physical resources incurs significant...

Evaluating Computer Intrusion Detection Systems: A Survey of Common Practices
Aleksandar Milenkoski, Marco Vieira, Samuel Kounev, Alberto Avritzer, Bryan D. Payne
Article No.: 12
DOI: 10.1145/2808691

The evaluation of computer intrusion detection systems (which we refer to as intrusion detection systems) is an active research area. In this article, we survey and systematize common practices in the area of evaluation of such systems. For this...

Many-Objective Evolutionary Algorithms: A Survey
Bingdong Li, Jinlong Li, Ke Tang, Xin Yao
Article No.: 13
DOI: 10.1145/2792984

Multiobjective evolutionary algorithms (MOEAs) have been widely used in real-world applications. However, most MOEAs based on Pareto-dominance handle many-objective problems (MaOPs) poorly due to a high proportion of incomparable and thus mutually...

Video Interaction Tools: A Survey of Recent Work
Klaus Schoeffmann, Marco A. Hudelist, Jochen Huber
Article No.: 14
DOI: 10.1145/2808796

Digital video enables manifold ways of multimedia content interaction. Over the last decade, many proposals for improving and enhancing video content interaction were published. More recent work particularly leverages on highly capable devices...

A Systematic Survey of Online Data Mining Technology Intended for Law Enforcement
Matthew Edwards, Awais Rashid, Paul Rayson
Article No.: 15
DOI: 10.1145/2811403

As an increasing amount of crime takes on a digital aspect, law enforcement bodies must tackle an online environment generating huge volumes of data. With manual inspections becoming increasingly infeasible, law enforcement bodies are optimising...

The Multiple Facets of Software Diversity: Recent Developments in Year 2000 and Beyond
Benoit Baudry, Martin Monperrus
Article No.: 16
DOI: 10.1145/2807593

Early experiments with software diversity in the mid 1970s investigated N-version programming and recovery blocks to increase the reliability of embedded systems. Four decades later, the literature about software diversity has expanded in multiple...