default search action
ACM Computing Surveys, Volume 51
Volume 51, Number 1, April 2018
- Filipe Betzel, S. Karen Khatamifard, Harini Suresh, David J. Lilja, John Sartori, Ulya R. Karpuzcu:
Approximate Communication: Techniques for Reducing Communication Bottlenecks in Large-Scale Parallel Systems. 1:1-1:32 - Miriam Sturdee, Jason Alexander:
Analysis and Classification of Shape-Changing Interfaces for Design and Application-based Research. 2:1-2:32 - Szymon Wasik, Maciej Antczak, Jan Badura, Artur Laskowski, Tomasz Sternal:
A Survey on Online Judge Systems and Their Applications. 3:1-3:34 - Tsong Yueh Chen, Fei-Ching Kuo, Huai Liu, Pak-Lok Poon, Dave Towey, T. H. Tse, Zhi Quan Zhou:
Metamorphic Testing: A Review of Challenges and Opportunities. 4:1-4:27 - Unaizah Obaidellah, Mohammed Al Haek, Peter C.-H. Cheng:
A Survey on the Usage of Eye-Tracking in Computer Programming. 5:1-5:58 - Federica Paci, Anna Cinzia Squicciarini, Nicola Zannone:
Survey on Access Control for Community-Centered Collaborative Systems. 6:1-6:38 - Florian Daniel, Pavel Kucherbaev, Cinzia Cappiello, Boualem Benatallah, Mohammad Allahbakhsh:
Quality Control in Crowdsourcing: A Survey of Quality Attributes, Assessment Techniques, and Assurance Actions. 7:1-7:40 - Marco A. S. Netto, Rodrigo N. Calheiros, Eduardo R. Rodrigues, Renato Luiz de Freitas Cunha, Rajkumar Buyya:
HPC Cloud for Scientific and Business Applications: Taxonomy, Vision, and Research Challenges. 8:1-8:29 - Eliahu Khalastchi, Meir Kalech:
On Fault Detection and Diagnosis in Robotic Systems. 9:1-9:24 - Samira Pouyanfar, Yimin Yang, Shu-Ching Chen, Mei-Ling Shyu, S. S. Iyengar:
Multimedia Big Data Analytics: A Survey. 10:1-10:34 - Dimitris Gritzalis, Giulia Iseppi, Alexios Mylonas, Vasilis Stavrou:
Exiting the Risk Assessment Maze: A Meta-Survey. 11:1-11:30 - Dalia Nashat, Ali A. Amer:
A Comprehensive Taxonomy of Fragmentation and Allocation Techniques in Distributed Database Design. 12:1-12:25 - Bowen Zhou, Rajkumar Buyya:
Augmentation Techniques for Mobile Cloud Computing: A Taxonomy, Survey, and Future Directions. 13:1-13:38 - Jeremy A. Marvel, Roger Bostelman, Joe Falco:
Multi-Robot Assembly Strategies and Metrics. 14:1-14:32 - Michal Gaziel Yablowitz, David G. Schwartz:
A Review and Assessment Framework for Mobile-Based Emergency Intervention Apps. 15:1-15:32 - Mohammed Ali Al-garadi, Kasturi Dewi Varathan, Sri Devi Ravana, Ejaz Ahmed, Ghulam Mujtaba, Muhammad Usman Shahid Khan, Samee U. Khan:
Analysis of Online Social Network Connections for Identification of Influential Users: Survey and Open Research Issues. 16:1-16:37 - Martin Monperrus:
Automatic Software Repair: A Bibliography. 17:1-17:24 - Zhijun Ding, Xiaolun Li, Changjun Jiang, Mengchu Zhou:
Objectives and State-of-the-Art of Location-Based Social Network Recommender Systems. 18:1-18:28 - Rodolfo W. L. Coutinho, Azzedine Boukerche, Luiz Filipe M. Vieira, Antonio A. F. Loureiro:
Underwater Wireless Sensor Networks: A New Challenge for Topology Control-Based Systems. 19:1-19:36 - Rodrigo Bruno, Paulo Ferreira:
A Study on Garbage Collection Algorithms for Big Data Environments. 20:1-20:35 - Adriana Draghici, Maarten van Steen:
A Survey of Techniques for Automatically Sensing the Behavior of a Crowd. 21:1-21:40 - Alexander Bergmayr, Uwe Breitenbücher, Nicolas Ferry, Alessandro Rossini, Arnor Solberg, Manuel Wimmer, Gerti Kappel, Frank Leymann:
A Systematic Review of Cloud Modeling Languages. 22:1-22:38
Volume 51, Number 2, June 2018
- Francieli Zanon Boito, Eduardo C. Inacio, Jean Luca Bez, Philippe O. A. Navaux, Mario A. R. Dantas, Yves Denneulin:
A Checkpoint of Research on Parallel I/O for High-Performance Computing. 23:1-23:35 - Ivan Brugere, Brian Gallagher, Tanya Y. Berger-Wolf:
Network Structure Inference, A Survey: Motivations, Methods, and Applications. 24:1-24:39 - Ligang Zhang, Brijesh K. Verma, Dian Tjondronegoro, Vinod Chandran:
Facial Expression Analysis under Partial Occlusion: A Survey. 25:1-25:49 - Mohamad Gebai, Michel R. Dagenais:
Survey and Analysis of Kernel and Userspace Tracers on Linux: Design, Implementation, and Overhead. 26:1-26:33 - Elisa Rojas, Roberto Doriguzzi Corin, Sergio Tamurejo, Andres Beato, Arne Schwabe, Kevin Phemius, Carmen Guerrero:
Are We Ready to Drive Software-Defined Networks? A Comprehensive Survey on Management Tools and Techniques. 27:1-27:35 - Carolyn Lamb, Daniel G. Brown, Charles L. A. Clarke:
Evaluating Computational Creativity: An Interdisciplinary Tutorial. 28:1-28:34 - Yasmin Fathy, Payam M. Barnaghi, Rahim Tafazolli:
Large-Scale Indexing, Discovery, and Ranking for the Internet of Things (IoT). 29:1-29:53 - Willington Siabato, Christophe Claramunt, Sergio Ilarri, Miguel-Ángel Manso-Callejo:
A Survey of Modelling Trends in Temporal GIS. 30:1-30:41 - Zihao Shan, Kui Ren, Marina Blanton, Cong Wang:
Practical Secure Computation Outsourcing: A Survey. 31:1-31:40 - Arkaitz Zubiaga, Ahmet Aker, Kalina Bontcheva, Maria Liakata, Rob Procter:
Detection and Resolution of Rumours in Social Media: A Survey. 32:1-32:36 - Miyuru Dayarathna, Srinath Perera:
Recent Advancements in Event Processing. 33:1-33:36 - Wooi-King Soo, Teck Chaw Ling, Aung Htein Maw, Su Thawda Win:
Survey on Load-Balancing Methods in 802.11 Infrastructure Mode Wireless Networks for Improving Quality of Service. 34:1-34:21 - Giulio Rossetti, Rémy Cazabet:
Community Discovery in Dynamic Networks: A Survey. 35:1-35:37 - Eran Toch, Claudio Bettini, Erez Shmueli, Laura Radaelli, Andrea Lanzi, Daniele Riboni, Bruno Lepri:
The Privacy Implications of Cyber Security Systems: A Technological Survey. 36:1-36:27 - Muhamad Risqi Utama Saputra, Andrew Markham, Niki Trigoni:
Visual SLAM and Structure from Motion in Dynamic Environments: A Survey. 37:1-37:36 - Hadi Ghanbari, Tero Vartiainen, Mikko T. Siponen:
Omission of Quality Software Development Practices: A Systematic Literature Review. 38:1-38:27 - Chao Li, Yushu Xue, Jing Wang, Weigong Zhang, Tao Li:
Edge-Oriented Computing Paradigms: A Survey on Architecture Design and System Management. 39:1-39:34 - Ali Davoudian, Liu Chen, Mengchi Liu:
A Survey on NoSQL Stores. 40:1-40:43 - Davi Silva Rodrigues, Márcio Eduardo Delamaro, Cléber Gimenez Corrêa, Fátima L. S. Nunes:
Using Genetic Algorithms in Test Data Generation: A Critical Systematic Mapping. 41:1-41:23 - Rodolfo Stoffel Antunes, Lucas Adams Seewald, Vinicius Facco Rodrigues, Cristiano André da Costa, Luiz Gonzaga Jr., Rodrigo da Rosa Righi, Andreas K. Maier, Björn M. Eskofier, Malte Ollenschläger, Farzad Naderi, Rebecca Fahrig, Sebastian Bauer, Sigrun Klein, Gelson Campanatti:
A Survey of Sensors in Healthcare Workflow Monitoring. 42:1-42:37 - Matteo Turilli, Mark Santcroos, Shantenu Jha:
A Comprehensive Perspective on Pilot-Job Systems. 43:1-43:32
Volume 51, Number 3, July 2018
- Tobias Brandt, Marco Grawunder:
GeoStreams: A Survey. 44:1-44:37 - Vishnu Srinivasa Murthy Yarlagadda, Shashidhar G. Koolagudi:
Content-Based Music Information Retrieval (CB-MIR) and Its Applications toward the Music Industry: A Review. 45:1-45:46 - Konstantia Barmpatsalou, Tiago Cruz, Edmundo Monteiro, Paulo Simões:
Current and Future Trends in Mobile Device Forensics: A Survey. 46:1-46:31 - Nasir Saeed, Haewoon Nam, Mian Imtiaz Ul Haq, Dost Muhammad Saqib Bhatti:
A Survey on Multidimensional Scaling. 47:1-47:25 - Paulo Angelo Alves Resende, André Costa Drummond:
A Survey of Random Forest Based Methods for Intrusion Detection Systems. 48:1-48:36 - Cláudio Gomes, Casper Thule, David Broman, Peter Gorm Larsen, Hans Vangheluwe:
Co-Simulation: A Survey. 49:1-49:33 - Roberto Baldoni, Emilio Coppa, Daniele Cono D'Elia, Camil Demetrescu, Irene Finocchi:
A Survey of Symbolic Execution Techniques. 50:1-50:39 - Fatemeh Shirazi, Milivoj Simeonovski, Muhammad Rizwan Asghar, Michael Backes, Claudia Díaz:
A Survey on Routing in Anonymous Communication Protocols. 51:1-51:39 - Niels Van Dijkhuizen, Jeroen van der Ham:
A Survey of Network Traffic Anonymisation Techniques and Implementations. 52:1-52:27 - Wellington Moreira de Oliveira, Daniel de Oliveira, Vanessa Braganholo:
Provenance Analytics for Workflow-Based Computational Experiments: A Survey. 53:1-53:25 - Nathan Hanford, Vishal Ahuja, Matthew K. Farrens, Brian Tierney, Dipak Ghosal:
A Survey of End-System Optimizations for High-Speed Networks. 54:1-54:36 - Ali Ahmadian Ramaki, Abbas Rasoolzadegan, Abbas Ghaemi Bafghi:
A Systematic Mapping Study on Intrusion Alert Analysis in Intrusion Detection Systems. 55:1-55:41 - Stylianos I. Venieris, Alexandros Kouris, Christos-Savvas Bouganis:
Toolflows for Mapping Convolutional Neural Networks on FPGAs: A Survey and Future Directions. 56:1-56:39 - Isabel Wagner, David Eckhoff:
Technical Privacy Metrics: A Systematic Survey. 57:1-57:38 - Ayman Meidan, J. A. García-García, Isabel M. Ramos, María José Escalona:
Measuring Software Process: A Systematic Mapping Study. 58:1-58:32 - Jungmin Son, Rajkumar Buyya:
A Taxonomy of Software-Defined Networking (SDN)-Enabled Cloud Computing. 59:1-59:36 - Safiollah Heidari, Yogesh Simmhan, Rodrigo N. Calheiros, Rajkumar Buyya:
Scalable Graph Processing Frameworks: A Taxonomy and Open Challenges. 60:1-60:53 - Tao Chen, Rami Bahsoon, Xin Yao:
A Survey and Taxonomy of Self-Aware and Self-Adaptive Cloud Autoscaling Systems. 61:1-61:40 - Yike Liu, Tara Safavi, Abhilash Dighe, Danai Koutra:
Graph Summarization Methods and Applications: A Survey. 62:1-62:34 - Peter Ivie, Douglas Thain:
Reproducibility in Scientific Computing. 63:1-63:36 - Jianzhong Qi, Rui Zhang, Christian S. Jensen, Kotagiri Ramamohanarao, Jiayuan He:
Continuous Spatial Query Processing: A Survey of Safe Region Based Techniques. 64:1-64:39 - Kalaivani Sundararajan, Damon L. Woodard:
Deep Learning for Biometrics: A Survey. 65:1-65:34
Volume 51, Number 4, September 2018
- Massimo Quadrana, Paolo Cremonesi, Dietmar Jannach:
Sequence-Aware Recommender Systems. 66:1-66:36 - Yury Zhauniarovich, Issa Khalil, Ting Yu, Marc Dacier:
A Survey on Malicious Domains Detection through DNS Data Analysis. 67:1-67:36 - Mireia Farrús:
Voice Disguise in Automatic Speaker Recognition. 68:1-68:22 - Marcus Botacin, Paulo Lício de Geus, André Ricardo Abed Grégio:
Who Watches the Watchmen: A Security-focused Review on Current State-of-the-art Techniques, Tools, and Methods for Systems and Binary Analysis on Modern Platforms. 69:1-69:34 - Keman Huang, Michael D. Siegel, Stuart E. Madnick:
Systematically Understanding the Cyber Attack Business: A Survey. 70:1-70:36 - Zahraa Said Abdallah, Mohamed Medhat Gaber, Bala Srinivasan, Shonali Krishnaswamy:
Activity Recognition with Evolving Data Streams: A Review. 71:1-71:36 - Kizheppatt Vipin, Suhaib A. Fahmy:
FPGA Dynamic and Partial Reconfiguration: A Survey of Architectures, Methods, and Applications. 72:1-72:39 - Chenhao Qu, Rodrigo N. Calheiros, Rajkumar Buyya:
Auto-Scaling Web Applications in Clouds: A Taxonomy and Survey. 73:1-73:33 - Eugene Siow, Thanassis Tiropanis, Wendy Hall:
Analytics for the Internet of Things: A Survey. 74:1-74:36 - Peter Juma Ochieng, Swaib Kyanda:
Large-Scale Ontology Matching: State-of-the-Art Analysis. 75:1-75:35 - Jairo Giraldo, David I. Urbina, Alvaro A. Cárdenas, Junia Valente, Mustafa Amir Faisal, Justin Ruths, Nils Ole Tippenhauer, Henrik Sandberg, Richard Candell:
A Survey of Physics-Based Attack Detection in Cyber-Physical Systems. 76:1-76:36 - Edward Toth, Sanjay Chawla:
Group Deviation Detection Methods: A Survey. 77:1-77:38 - Lynda Tamine, Mariam Daoud:
Evaluation in Contextual Information Retrieval: Foundations and Recent Advances within the Challenges of Context Dynamicity and Data Privacy. 78:1-78:36 - Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, Mauro Conti:
A Survey on Homomorphic Encryption Schemes: Theory and Implementation. 79:1-79:35 - Xiao Han, Nizar Kheir, Davide Balzarotti:
Deception Techniques in Computer Security: A Research Perspective. 80:1-80:36 - Miltiadis Allamanis, Earl T. Barr, Premkumar T. Devanbu, Charles Sutton:
A Survey of Machine Learning for Big Code and Naturalness. 81:1-81:37 - Harcharan Jit Singh, Seema Bawa:
Scalable Metadata Management Techniques for Ultra-Large Distributed Storage Systems - A Systematic Review. 82:1-82:37 - Gowtham Atluri, Anuj Karpatne, Vipin Kumar:
Spatio-Temporal Data Mining: A Survey of Problems and Methods. 83:1-83:41 - Marcin Wylot, Manfred Hauswirth, Philippe Cudré-Mauroux, Sherif Sakr:
RDF Data Storage and Query Processing Schemes: A Survey. 84:1-84:36 - Paula Fortuna, Sérgio Nunes:
A Survey on Automatic Detection of Hate Speech in Text. 85:1-85:30 - Adam Czajka, Kevin W. Bowyer:
Presentation Attack Detection for Iris Recognition: An Assessment of the State-of-the-Art. 86:1-86:35 - Nishant Gupta, Vibhash Yadav, Mayank Singh:
Automated Regression Test Case Generation for Web Application: A Survey. 87:1-87:25
Volume 51, Number 5, January 2019
- Mohammad Naim Rastgoo, Bahareh Nakisa, Andry Rakotonirainy, Vinod Chandran, Dian Tjondronegoro:
A Critical Review of Proactive Detection of Driver Stress Levels Based on Multimodal Measurements. 88:1-88:35 - Changsheng Wan, Li Wang, Vir V. Phoha:
A Survey on Gait Recognition. 89:1-89:35 - Christophe Kiennert, Ziad Ismail, Hervé Debar, Jean Leneutre:
A Survey on Game-Theoretic Approaches for Intrusion Detection and Response Optimization. 90:1-90:31 - Alexandra Covaci, Longhao Zou, Irina Tal, Gabriel-Miro Muntean, Gheorghita Ghinea:
Is Multimedia Multisensorial? - A Review of Mulsemedia Systems. 91:1-91:35 - Samira Pouyanfar, Saad Sadiq, Yilin Yan, Haiman Tian, Yudong Tao, Maria E. Presa Reyes, Mei-Ling Shyu, Shu-Ching Chen, S. S. Iyengar:
A Survey on Deep Learning: Algorithms, Techniques, and Applications. 92:1-92:36 - Riccardo Guidotti, Anna Monreale, Salvatore Ruggieri, Franco Turini, Fosca Giannotti, Dino Pedreschi:
A Survey of Methods for Explaining Black Box Models. 93:1-93:42 - Gildas Avoine, Muhammed Ali Bingöl, Ioana Boureanu, Srdjan Capkun, Gerhard P. Hancke, Süleyman Kardas, Chong Hee Kim, Cédric Lauradoux, Benjamin Martin, Jorge Munilla, Alberto Peinado, Kasper Bonne Rasmussen, Dave Singelée, Aslan Tchamkerten, Rolando Trujillo-Rasua, Serge Vaudenay:
Security of Distance-Bounding: A Survey. 94:1-94:33 - Rui Henriques, Sara C. Madeira:
Triclustering Algorithms for Three-Dimensional Data Analysis: A Comprehensive Survey. 95:1-95:43 - Amir H. Ashouri, William Killian, John Cavazos, Gianluca Palermo, Cristina Silvano:
A Survey on Compiler Autotuning using Machine Learning. 96:1-96:42 - Dileep Kumar, Akash Gandhamal, Sanjay N. Talbar, Ahmad Fadzil Mohamad Hani:
Knee Articular Cartilage Segmentation from MR Images: A Review. 97:1-97:29 - Ming Liu, Zhi Xue, Xianghua Xu, Changmin Zhong, Jinjun Chen:
Host-Based Intrusion Detection System with System Calls: Review and Future Trends. 98 - Kevin Doherty, Gavin J. Doherty:
Engagement in HCI: Conception, Theory and Measurement. 99:1-99:39 - Giannis Tziakouris, Rami Bahsoon, Muhammad Ali Babar:
A Survey on Self-Adaptive Security for Large-scale Open Environments. 100:1-100:42 - Diego de Siqueira Braga, Marco Niemann, Bernd Hellingrath, Fernando Buarque de Lima Neto:
Survey on Computational Trust and Reputation Models. 101:1-101:40 - Felipe Grando, Lisandro Zambenedetti Granville, Luís C. Lamb:
Machine Learning in Network Centrality Measures: Tutorial and Outlook. 102:1-102:32 - Vaia Moustaka, Athena Vakali, Leonidas G. Anthopoulos:
A Systematic Review for Smart City Data Analytics. 103:1-103:41 - Sukhpal Singh Gill, Rajkumar Buyya:
A Taxonomy and Future Directions for Sustainable Cloud Computing: 360 Degree View. 104:1-104:33 - Rajkumar Buyya, Satish Narayana Srirama, Giuliano Casale, Rodrigo N. Calheiros, Yogesh Simmhan, Blesson Varghese, Erol Gelenbe, Bahman Javadi, Luis Miguel Vaquero, Marco A. S. Netto, Adel Nadjaran Toosi, Maria Alejandra Rodriguez, Ignacio Martín Llorente, Sabrina De Capitani di Vimercati, Pierangela Samarati, Dejan S. Milojicic, Carlos A. Varela, Rami Bahsoon, Marcos Dias de Assunção, Omer F. Rana, Wanlei Zhou, Hai Jin, Wolfgang Gentzsch, Albert Y. Zomaya, Haiying Shen:
A Manifesto for Future Generation Cloud Computing: Research Directions for the Next Decade. 105:1-105:38 - Alisa Smirnova, Philippe Cudré-Mauroux:
Relation Extraction Using Distant Supervision: A Survey. 106:1-106:35 - Muhammad Ziad Nayyer, Imran Raza, Syed Asad Hussain:
A Survey of Cloudlet-Based Mobile Augmentation Approaches for Resource Optimization. 107:1-107:28 - Andreas Biørn-Hansen, Tor-Morten Grønli, Gheorghita Ghinea:
A Survey and Taxonomy of Core Concepts and Research Challenges in Cross-Platform Mobile Development. 108:1-108:34 - Yasir Imtiaz Khan, Alexandros Konios, Nicolas Guelfi:
A Survey of Petri Nets Slicing. 109:1-109:32
Volume 51, Number 6, January 2019
- Ping Wang, Yan Li, Chandan K. Reddy:
Machine Learning for Survival Analysis: A Survey. 110:1-110:36 - Ana Juan Ferrer, Joan Manuel Marquès, Josep Jorba:
Towards the Decentralised Cloud: Survey on Approaches and Challenges for Mobile, Ad hoc, and Edge Computing. 111:1-111:36 - Qiong Gui, Maria V. Ruiz-Blondet, Sarah Laszlo, Zhanpeng Jin:
A Survey on Brain Biometrics. 112:1-112:38 - Brett W. Israelsen, Nisar R. Ahmed:
"Dave...I can assure you ...that it's going to be all right ..." A Definition, Case for, and Survey of Algorithmic Assurances in Human-Autonomy Trust Relationships. 113:1-113:37 - Michel S. Bonfim, Kelvin L. Dias, Stenio F. L. Fernandes:
Integrated NFV/SDN Architectures: A Systematic Literature Review. 114:1-114:39 - Janibul Bashir, Eldhose Peter, Smruti R. Sarangi:
A Survey of On-Chip Optical Interconnects. 115:1-115:34 - Jasenka Dizdarevic, Francisco Carpio, Admela Jukan, Xavi Masip-Bruin:
A Survey of Communication Protocols for Internet of Things and Related Challenges of Fog and Cloud Computing Integration. 116:1-116:29 - Moisés Díaz, Miguel A. Ferrer, Donato Impedovo, Muhammad Imran Malik, Giuseppe Pirlo, Réjean Plamondon:
A Perspective Analysis of Handwritten Signature Technology. 117:1-117:39 - Md. Zakir Hossain, Ferdous Sohel, Mohd Fairuz Shiratuddin, Hamid Laga:
A Comprehensive Survey of Deep Learning for Image Captioning. 118:1-118:36 - Abdessalam Elhabbash, Faiza Samreen, James Hadley, Yehia Elkhatib:
Cloud Brokerage: A Systematic Survey. 119:1-119:28 - Pawan Kumar, Rakesh Kumar:
Issues and Challenges of Load Balancing Techniques in Cloud Computing: A Survey. 120:1-120:35 - Amani Abu Jabal, Maryam Davari, Elisa Bertino, Christian Makaya, Seraphin B. Calo, Dinesh C. Verma, Alessandra Russo, Christopher Williams:
Methods and Tools for Policy Analysis. 121:1-121:35 - Abdul Manazir, Khalid Raza:
Recent Developments in Cartesian Genetic Programming and its Variants. 122:1-122:29 - Shirin Tavara:
Parallel Computing of Support Vector Machines: A Survey. 123:1-123:38 - Rafael Luiz Testa, Cléber Gimenez Corrêa, Ariane Machado-Lima, Fátima L. S. Nunes:
Synthesis of Facial Expressions in Photographs: Characteristics, Approaches, and Challenges. 124:1-124:35 - Marco Patrignani, Amal Ahmed, Dave Clarke:
Formal Approaches to Secure Compilation: A Survey of Fully Abstract Compilation and Related Work. 125:1-125:36 - Juan A. Rico-Gallego, Juan Carlos Díaz Martín, Ravi Reddy Manumachu, Alexey L. Lastovetsky:
A Survey of Communication Performance Models for High-Performance Computing. 126:1-126:36 - Niklas Kolbe, Sylvain Kubler, Jérémy Robert, Yves Le Traon, Arkady B. Zaslavsky:
Linked Vocabulary Recommendation Tools for Internet of Things: A Survey. 127:1-127:31 - Hamid Nejatollahi, Nikil D. Dutt, Sandip Ray, Francesco Regazzoni, Indranil Banerjee, Rosario Cammarota:
Post-Quantum Lattice-Based Cryptography Implementations: A Survey. 129:1-129:41 - Jin-Hee Cho, Shouhuai Xu, Patrick M. Hurley, Matthew MacKay, Trevor Benjamin, Mark R. Beaumont:
STRAM: Measuring the Trustworthiness of Computer-Based Systems. 128:1-128:47 - Sandro Pinto, Nuno Santos:
Demystifying Arm TrustZone: A Comprehensive Survey. 130:1-130:36 - Jiajian Xiao, Philipp Andelfinger, David Eckhoff, Wentong Cai, Alois C. Knoll:
A Survey on Agent-based Simulation Using Hardware Accelerators. 131:1-131:35
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.