Computing Surveys (CSUR)


Search Issue
enter search term and/or author name below:


ACM Computing Surveys (CSUR), Volume 50 Issue 4, November 2017

Bridging the Chasm: A Survey of Software Engineering Practice in Scientific Programming
Tim Storer
Article No.: 47
DOI: 10.1145/3084225

The use of software is pervasive in all fields of science. Associated software development efforts may be very large, long lived, and complex, requiring the commitment of significant resources. However, several authors have argued that the...

The Need for Affective Trust Applied to Trust and Reputation Models
Jones Granatyr, Nardine Osman, João Dias, Maria Augusta Silveira Netto Nunes, Judith Masthoff, Fabrício Enembreck, Otto Robert Lessing, Carles Sierra, Ana Maria Paiva, Edson Emílio Scalabrin
Article No.: 48
DOI: 10.1145/3078833

Trust allows the behavior evaluation of individuals by setting confidence values, which are used in decisions about whether or not to interact. They have been used in several fields, and many trust and reputation models were developed recently. We...

Interoperability and Portability Approaches in Inter-Connected Clouds: A Review
Kiranbir Kaur, DR. Sandeep Sharma, DR. Karanjeet Singh Kahlon
Article No.: 49
DOI: 10.1145/3092698

Inter-connected cloud computing is an inherent evolution of Cloud Computing. Numerous benefits provided by connecting clouds have garnered attraction from the academic as well as the industry sector. Just as every new evolution faces challenges,...

Classification of Resilience Techniques Against Functional Errors at Higher Abstraction Layers of Digital Systems
Georgia Psychou, Dimitrios Rodopoulos, Mohamed M. Sabry, Tobias Gemmeke, David Atienza, Tobias G. Noll, Francky Catthoor
Article No.: 50
DOI: 10.1145/3092699

Nanoscale technology nodes bring reliability concerns back to the center stage of digital system design. A systematic classification of approaches that increase system resilience in the presence of functional hardware (HW)-induced errors is...

On the Collaboration Support in Information Retrieval
Laure Soulier, Lynda Tamine
Article No.: 51
DOI: 10.1145/3092696

Collaborative Information Retrieval (CIR) is a well-known setting in which explicit collaboration occurs among a group of users working together to solve a shared information need. This type of collaboration has been deemed as beneficial for...

Similarity of Business Process Models—A State-of-the-Art Analysis
Andreas Schoknecht, Tom Thaler, Peter Fettke, Andreas Oberweis, Ralf Laue
Article No.: 52
DOI: 10.1145/3092694

Business process models play an important role in today’s enterprises, hence, model repositories may contain hundreds of models. These models are, for example, reused during process modeling activities or utilized to check the conformance...

A Classification of Locality in Network Research
Michael Stein, Mathias Fischer, Immanuel Schweizer, Max Mühlhäuser
Article No.: 53
DOI: 10.1145/3092693

Limiting the knowledge of individual nodes is a major concern for the design of distributed algorithms. With the LOCAL model, theoretical research already established a common model of locality that has gained little practical relevance. As a...

Metrics for Community Analysis: A Survey
Tanmoy Chakraborty, Ayushi Dalmia, Animesh Mukherjee, Niloy Ganguly
Article No.: 54
DOI: 10.1145/3091106

Detecting and analyzing dense groups or communities from social and information networks has attracted immense attention over the last decade due to its enormous applicability in different domains. Community detection is an ill-defined...

Searching the Web of Things: State of the Art, Challenges, and Solutions
Nguyen Khoi Tran, Quan Z. Sheng, Muhammad Ali Babar, Lina Yao
Article No.: 55
DOI: 10.1145/3092695

Technological advances allow more physical objects to connect to the Internet and provide their services on the Web as resources. Search engines are the key to fully utilize this emerging Web of Things, as they bridge users and applications with...

Software Vulnerability Analysis and Discovery Using Machine-Learning and Data-Mining Techniques: A Survey
Seyed Mohammad Ghaffarian, Hamid Reza Shahriari
Article No.: 56
DOI: 10.1145/3092566

Software security vulnerabilities are one of the critical issues in the realm of computer security. Due to their potential high severity impacts, many different approaches have been proposed in the past decades to mitigate the damages of software...

Non-GPS Positioning Systems: A Survey
Zain Bin Tariq, Dost Muhammad Cheema, Muhammad Zahir Kamran, Ijaz Haider Naqvi
Article No.: 57
DOI: 10.1145/3098207

An enormous amount of research has been conducted in the area of positioning systems and thus it calls for a detailed literature review of recent localization systems. This article focuses on recent developments of non-Global Positioning System...

Toward Real-Time Ray Tracing: A Survey on Hardware Acceleration and Microarchitecture Techniques
Yangdong Deng, Yufei Ni, Zonghui Li, Shuai Mu, Wenjun Zhang
Article No.: 58
DOI: 10.1145/3104067

Ray tracing has long been considered as the next-generation technology for graphics rendering. Recently, there has been strong momentum to adopt ray tracing--based rendering techniques on consumer-level platforms due to the inability of further...

Analysis of JavaScript Programs: Challenges and Research Trends
Kwangwon Sun, Sukyoung Ryu
Article No.: 59
DOI: 10.1145/3106741

JavaScript has been a de facto standard language for client-side web programs, and now it is expanding its territory to general purpose programs. In this article, we classify the client-side JavaScript research for the last decade or so...

A Survey of Algorithmic Debugging
Rafael Caballero, Adrián Riesco, Josep Silva
Article No.: 60
DOI: 10.1145/3106740

Algorithmic debugging is a technique proposed in 1982 by E. Y. Shapiro in the context of logic programming. This survey shows how the initial ideas have been developed to become a widespread debugging schema fitting many different programming...

A Survey on Post-Silicon Functional Validation for Multicore Architectures
Padma Jayaraman, Ranjani Parthasarathi
Article No.: 61
DOI: 10.1145/3107615

During a processor development cycle, post-silicon validation is performed on the first fabricated chip to detect and fix design errors. Design errors occur due to functional issues when a unit in a design does not meet its specification. The...