Computing Surveys (CSUR)


Search Issue
enter search term and/or author name below:


ACM Computing Surveys (CSUR), Volume 50 Issue 6, January 2018

Software Platforms for Smart Cities: Concepts, Requirements, Challenges, and a Unified Reference Architecture
Eduardo Felipe Zambom Santana, Ana Paula Chaves, Marco Aurelio Gerosa, Fabio Kon, Dejan S. Milojicic
Article No.: 78
DOI: 10.1145/3124391

Information and communication technologies (ICT) can be instrumental in progressing towards smarter city environments, which improve city services, sustainability, and citizens’ quality of life. Smart City software platforms can support...

A Survey of Fault-Tolerance Algorithms for Reconfigurable Nano-Crossbar Arrays
Onur Tunali, Mustafa Altun
Article No.: 79
DOI: 10.1145/3125641

Nano-crossbar arrays have emerged as a promising and viable technology to improve computing performance of electronic circuits beyond the limits of current CMOS. Arrays offer both structural efficiency with reconfiguration and prospective...

Towards Reasoning Vehicles: A Survey of Fuzzy Logic-Based Solutions in Vehicular Networks
Irina Tal, Gabriel-Miro Muntean
Article No.: 80
DOI: 10.1145/3125640

Vehicular networks and their associated technologies enable an extremely varied plethora of applications and therefore attract increasing attention from a wide audience. However, vehicular networks also have many challenges that arise mainly due...

Graph Processing on GPUs: A Survey
Xuanhua Shi, Zhigao Zheng, Yongluan Zhou, Hai Jin, Ligang He, Bo Liu, Qiang-Sheng Hua
Article No.: 81
DOI: 10.1145/3128571

A Survey of Research into Mixed Criticality Systems
Alan Burns, Robert I. Davis
Article No.: 82
DOI: 10.1145/3131347

This survey covers research into mixed criticality systems that has been published since Vestal’s seminal paper in 2007, up until the end of 2016. The survey is organised along the lines of the major research areas within this topic. These...

A Survey on Fully Homomorphic Encryption: An Engineering Perspective
Paulo Martins, Leonel Sousa, Artur Mariano
Article No.: 83
DOI: 10.1145/3124441

It is unlikely that a hacker is able to compromise sensitive data that is stored in an encrypted form. However, when data is to be processed, it has to be decrypted, becoming vulnerable to attacks. Homomorphic encryption fixes this vulnerability...

Cooperative Multi-Agent Planning: A Survey
Alejandro Torreño, Eva Onaindia, Antonín Komenda, Michal Štolba
Article No.: 84
DOI: 10.1145/3128584

Cooperative multi-agent planning (MAP) is a relatively recent research field that combines technologies, algorithms, and techniques developed by the Artificial Intelligence Planning and Multi-Agent Systems communities. While planning has been...

Mining Electronic Health Records (EHRs): A Survey
Pranjul Yadav, Michael Steinbach, Vipin Kumar, Gyorgy Simon
Article No.: 85
DOI: 10.1145/3127881

Surveying Stylometry Techniques and Applications
Tempestt Neal, Kalaivani Sundararajan, Aneez Fatima, Yiming Yan, Yingfei Xiang, Damon Woodard
Article No.: 86
DOI: 10.1145/3132039

The analysis of authorial style, termed stylometry, assumes that style is quantifiably measurable for evaluation of distinctive qualities. Stylometry research has yielded several methods and tools over the past 200 years to handle a variety of...

Systematic Literature Review on Usability of Firewall Configuration
Artem Voronkov, Leonardo Horn Iwaya, Leonardo A. Martucci, Stefan Lindskog
Article No.: 87
DOI: 10.1145/3130876

Firewalls are network security components that handle incoming and outgoing network traffic based on a set of rules. The process of correctly configuring a firewall is complicated and prone to error, and it worsens as the network complexity grows....

A Survey on Authenticated Encryption--ASIC Designer’s Perspective
Elif Bilge Kavun, Hristina Mihajloska, Tolga Yalçin
Article No.: 88
DOI: 10.1145/3131276

Authenticated encryption (AE) has been a vital operation in cryptography due to its ability to provide confidentiality, integrity, and authenticity at the same time. Its use has soared in parallel with widespread use of the internet and has led to...

A Survey on Optical Network-on-Chip Architectures
Sebastian Werner, Javier Navaridas, Mikel Luján
Article No.: 89
DOI: 10.1145/3131346

Optical on-chip data transmission enabled by silicon photonics (SiP) is widely considered a key technology to overcome the bandwidth and energy limitations of electrical interconnects. The possibility of integrating optical links into the on-chip...

Data-Driven Approaches to Game Player Modeling: A Systematic Literature Review
Danial Hooshyar, Moslem Yousefi, Heuiseok Lim
Article No.: 90
DOI: 10.1145/3145814

Data Storage Management in Cloud Environments: Taxonomy, Survey, and Future Directions
Yaser Mansouri, Adel Nadjaran Toosi, Rajkumar Buyya
Article No.: 91
DOI: 10.1145/3136623

An Offensive and Defensive Exposition of Wearable Computing
Prakash Shrestha, Nitesh Saxena
Article No.: 92
DOI: 10.1145/3133837

Wearable computing is rapidly getting deployed in many—commercial, medical, and personal—domains of day-to-day life. Wearable devices appear in various forms, shapes, and sizes and facilitate a wide variety of applications in many...

The Experience Sampling Method on Mobile Devices
Niels Van Berkel, Denzil Ferreira, Vassilis Kostakos
Article No.: 93
DOI: 10.1145/3123988

The Experience Sampling Method (ESM) is used by scientists from various disciplines to gather insights into the intra-psychic elements of human life. Researchers have used the ESM in a wide variety of studies, with the method seeing increased...

Feature Selection: A Data Perspective
Jundong Li, Kewei Cheng, Suhang Wang, Fred Morstatter, Robert P. Trevino, Jiliang Tang, Huan Liu
Article No.: 94
DOI: 10.1145/3136625

Feature selection, as a data preprocessing strategy, has been proven to be effective and efficient in preparing data (especially high-dimensional data) for various data-mining and machine-learning problems. The objectives of feature selection...

A Tutorial on Canonical Correlation Methods
Viivi Uurtio, João M. Monteiro, Jaz Kandola, John Shawe-Taylor, Delmiro Fernandez-Reyes, Juho Rousu
Article No.: 95
DOI: 10.1145/3136624

Canonical correlation analysis is a family of multivariate statistical methods for the analysis of paired sets of variables. Since its proposition, canonical correlation analysis has, for instance, been extended to extract relations between two...

A Survey of Presence and Related Concepts
Richard Skarbez, Frederick P. Brooks, Jr., Mary C. Whitton
Article No.: 96
DOI: 10.1145/3134301

The presence construct, most commonly defined as the sense of “being there,” has driven research and development of virtual environments (VEs) for decades. Despite that, there is not widespread agreement on how to define or...

Geomagnetism for Smartphone-Based Indoor Localization: Challenges, Advances, and Comparisons
Suining He, Kang G. Shin
Article No.: 97
DOI: 10.1145/3139222

Geomagnetism has recently attracted considerable attention for indoor localization due to its pervasiveness and independence from extra infrastructure. Its location signature has been observed to be temporally stable and spatially discernible for...

Understanding Application-Level Caching in Web Applications: A Comprehensive Introduction and Survey of State-of-the-Art Approaches
Jhonny Mertz, Ingrid Nunes
Article No.: 98
DOI: 10.1145/3145813

A new form of caching, namely application-level caching, has been recently employed in web applications to improve their performance and increase scalability. It consists of the insertion of caching logic into the application base code to...